Home | Amazing | Today | Tags | Publishers | Years | Search 
Oracle Real Application Clusters, First Edition
Oracle Real Application Clusters, First Edition

Clustered configuration first hit the scene nearly 20 years ago when Digital Equipment Corporation (DEC) introduced the VaxCluster. Until now, the topic of Real Application Clusters (RAC) implementation had never been fully explored. For the first time, Murali Vallath dissects RAC mysteries in his book Oracle Real Application Clusters to...

Socially Responsible IT Management
Socially Responsible IT Management
"A recommended read for all IT professionals and a must read for those in management."Tom Molnar, business systems analyst

"The combination of practicality, ease of implementation, and positive return on investment is what makes this book work so well. The easy-to-implement action steps makes dealing with these ten social
...
Mission-Critical Microsoft Exchange 2003 : Designing and Building Reliable Exchange Servers
Mission-Critical Microsoft Exchange 2003 : Designing and Building Reliable Exchange Servers

Mission-Critical Microsoft Exchange 2003 provides a complete update of Cochran’s Mission-Critical Microsoft Exchange 2000, and complements Tony Redmond’s new book, the best-selling Microsoft Exchange Server 2003. This book includes many of the same high-availability topics as the first edition but also...

Firewalls: Jumpstart for Network and Systems Administrators
Firewalls: Jumpstart for Network and Systems Administrators
Security advice for any organization from a consultant with decades of experience

In this book, you will gain extensive hands-on experience installing and configuring a firewall. You will also learn how to allow access to key Web services while maintaining your organization's security, as well as how to implement
...
Internet Security: A Jumpstart for Systems Administrators and IT Managers
Internet Security: A Jumpstart for Systems Administrators and IT Managers

Internet Security discusses not only the technology needed to support a solid security strategy, but also those policies and processes that must be incorporated in order for that strategy to work.

New methods of breaking into corporate networks are resulting in major losses. This book provides the latest information on how to...

Leveraging WMI Scripting (HP Technologies)
Leveraging WMI Scripting (HP Technologies)

Leveraging Scripting is the second in a series of two books dedicated to WMI. Understanding WMI, Lissoir’s first book, explained to Windows Administrators the various WMI scripting techniques and manageability capabilities of this new Windows Server 2003 platform. Illustrated with hundreds of scripts and detailed...

Microsoft SharePoint Technologies : Planning, Design and Implementation (HP Technologies)
Microsoft SharePoint Technologies : Planning, Design and Implementation (HP Technologies)
Microsoft SharePoint Technologies: Planning, Design and Implementation provides an in-depth examination of the tasks involved in planning, designing and deploying SharePoint in your enterprise. The book examines SharePoint from the user's perspective, the administrator's perspective, and the application developer's perspective and looks at how you...
Monitoring and Managing Microsoft Exchange Server 2003, First Edition
Monitoring and Managing Microsoft Exchange Server 2003, First Edition

Monitoring and Managing Microsoft Exchange Server 2003 presents best practices and innovative everyday techniques for running Exchange Server 2003.

This authoritative book teaches IT professionals responsible for Exchange messaging systems how to efficiently manage the program’s many and complex system capabilities and...

Oracle High Performance Tuning for 9i and 10g
Oracle High Performance Tuning for 9i and 10g

Master the three parts of tuning an Oracle database: data modeling, SQL code tuning and physical database configuration.

A data model contains tables and relationships between tables. Tuning a data model involves nNormalization and dDe-normalization. Different approaches are required depending on the application, such as OLTP or a...

Cybersecurity Operations Handbook
Cybersecurity Operations Handbook
Cybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity...
Debugging by Thinking : A Multidisciplinary Approach (HP Technologies)
Debugging by Thinking : A Multidisciplinary Approach (HP Technologies)

Debugging by Thinking: A Multidisciplinary Approach uses the methods of literary detectives such as Sherlock Holmes, the techniques of mathematical problem solving, the results of research into the cognitive psychology of human error, the root cause analyses of safety experts, the compiler analyses of computer science, and the...

Designing Storage for Exchange 2007 SP1 (Digital Press Storage Technologies)
Designing Storage for Exchange 2007 SP1 (Digital Press Storage Technologies)
The more important data storage gets, the more admins need this guide to maximize Microsoft server storage performance and efficiency.

This book will help you understand the new choices and possibilities available in designing your storage environment for Microsoft Exchange Server 2007 SP1. The move of Microsoft Exchange
...
Result Page: Previous 2257 2258 2259 2260 2261 2262 2263 2264 2265 2266 2267 2268 2269 2270 2271 2272 2273 2274 2275 2276 2277 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy