Account
Orders
Advanced search
This book shows what IT in organizations need to accomplish to implement The National Strategy for the Physical Protection of Critical Infrastructures and Key Assets and The National Strategy to Secure Cyberspace which were developed by the Department of Homeland...
Mission-Critical Microsoft Exchange 2003 provides a complete update of Cochran'sMission-Critical Microsoft Exchange 2000, and complements Tony Redmond's new book, the best-selling Microsoft Exchange Server 2003. This book includes many of the same high-availability...
There are three parts to tuning an Oracle database: data modeling, SQL code tuning and physical database configuration.A data model contains tables and relationships between tables. Tuning a data model involves normalization and de-normalization. Different approaches...
Managing Software Deliverables describes a set of proven processes for establishing an effective Software Program Management Office (SPMO) function in a corporate setting. Every business that has people performing Software Project Management (PM) activities has a need...
Integrating Wireless Devices in the Enterprise provides a solution that every enterprise can use, described in terms of scope, feasibility and return on investment, architecture, and data structures. The solution Wheeler offers here is scalable from a single handheld...
Debugging by Thinking: A Multi-Disciplinary Approach is the first book to apply the wisdom of six disciplines—logic, mathematics, psychology, safety analysis, computer science, and engineering—to the problem of debugging. It uses the methods of literary detectives such...
Providing thorough coverage of implementation, migration and management issues for Exchange 2000 and 2003, this book also describes the best practices of one of the largest Exchange consulting groups outside Microsoft. This revised edition features key updates based on...
OpenVMS System Management Guide, Second Edition, the most complete book on the topic, details for system administrators the tools, technologies, and techniques by which they can configure, maintain, and tune computers running Hewlett-Packard's high-performanceOpenVMS...
Clustered configuration first hit the scene nearly 20 years ago when Digital Equipment Corporation (DEC) introduced the VaxCluster. Until now, the topic of Real Application Clusters (RAC) implementation had never been fully explored. For the first time, Murali Vallath...
The model presented in this manual for the IT professional helps managers work with tech workers and their customers to make a clear and well-substantiated argument for IT service investments. In order to validate and fully explain this model, Wigodsky presents an...
Since the last publication of the Ernst and Young book on Tandem security in the early 90's, there has been no such book on the subject. We've taken on the task of supplying a new Handbook whose content provides current, generic information about securing HP NonStop...
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on...
Unlike so many books that focus on how to use Linux, Linux and the Unix Philosophy explores the "way of thinking that is Linux" and why Linux is a superior implementation of this highly capable operating system.This book is a revision and expansion of a computer science...
Computer Systems Performance Evaluation and Prediction bridges the gap from academic to professional analysis of computer performance.This book makes analytic, simulation and instrumentation based modeling and performance evaluation of computer systems components...
Internet Security incorporates not only the technology needed to support a solid security strategy but also those policies and processes that must be incorporated in order for that strategy to work.New methods of breaking into corporate networks are resulting in major...
UNIX for OpenVMS Users, 3E, makes it easy to see what OpenVMS andUNIX have in common, and to transfer your knowledge and experience in OpenVMS over to the world of UNIX. Since most shops rely on more than one operating system, it is critical for system administrators...
Leveraging WMI Scripting is the second in a series of two books dedicated to WMI. Understanding WMI Scripting (ISBN 1-55558-266-4), Lissoir's first book, explained to Windows Administrators the various WMI scripting techniques and manageability capabilities of this new...
Every customer-facing corporation has at least one call center. In the United States, call centers handle a billion calls per year. Call Center Operation gives you complete coverage of the critical issues involved in the design, implementation, organization, and...
Getting Started with OpenVMS System Management gives new VMS system managers a jumpstart in managing this powerful and reliable operating system. Dave Miller describes the essentials of what an OpenVMS System Manager will have to manage. He defines areas of OpenVMS...
Make OpenVMS High Availability systems and low cost Open System computers work together in complex Intranet and Internet environments.Users of Linux, UNIX and the hundreds of thousands of OpenVMS installations world-wide will find invaluable information in Linux and...
Les livres numériques peuvent être téléchargés depuis l'ebookstore Numilog ou directement depuis une tablette ou smartphone.
PDF : format reprenant la maquette originale du livre ; lecture recommandée sur ordinateur et tablette EPUB : format de texte repositionnable ; lecture sur tous supports (ordinateur, tablette, smartphone, liseuse)
DRM Adobe LCP
LCP DRM Adobe
Sign up to get our latest ebook recommendations and special offers