Home | Amazing | Today | Tags | Publishers | Years | Search 
Citrix XenApp Performance Essentials
Citrix XenApp Performance Essentials

A practical guide for tuning and optimizing the performance of XenApp farms using real-world examples

Overview

  • Design a scalable XenApp infrastructure
  • Monitor and optimize server performance
  • Improve end user experience
  • Tune the farm for WAN connections
  • ...
Expert PHP and MySQL: Application Design and Development
Expert PHP and MySQL: Application Design and Development

Expert PHP and MySQL takes you beyond learning syntax to showing you how to apply proven software development methods to building commerce-grade PHP and MySQL projects that will stand the test of time and reliably deliver on customer needs.

Developers of real-world applications face numerous problems that seem
...

Internet Resource Pricing Models (SpringerBriefs in Computer Science)
Internet Resource Pricing Models (SpringerBriefs in Computer Science)

This brief guides the reader through three basic Internet resource pricing models using an Internet cost analysis. Addressing the evolution of service types, it presents several corresponding mechanisms which can ensure pricing implementation and resource allocation. The authors discuss utility optimization of network pricing methods in...

Invest Like an Institution: Professional Strategies for Funding a Successful Retirement
Invest Like an Institution: Professional Strategies for Funding a Successful Retirement

All too often, when investors go in search of investment advice, they are met with television personalities and so-called investment “gurus” who do little more than push the latest and greatest scheme to retire rich. Your retirement funds—in the form of IRAs, 401(k)s, SEP or Simple IRAs, and other plans you can direct to...

Beginning Android C++ Game Development
Beginning Android C++ Game Development

Beginning Android C++ Game Development introduces general and Android game developers like you to Android's powerful Native Development Kit (NDK). The Android NDK platform allows you to build the most sophisticated, complex and best performing game apps that leverage C++.  In short, you learn to build professional looking...

Healthcare, Insurance, and You: The Savvy Consumer's Guide
Healthcare, Insurance, and You: The Savvy Consumer's Guide

Healthcare is changing and you need to know how—and what to do about it.

Getting good medical care shouldn’t be so confusing—or so costly. Healthcare, Insurance, and You simplifies the many confusing details about our healthcare system so you can make informed decisions. Result? Better health at...

Marginality: Addressing the Nexus of Poverty, Exclusion and Ecology
Marginality: Addressing the Nexus of Poverty, Exclusion and Ecology

This book takes a new approach on understanding causes of extreme poverty and promising actions to address it. Its focus is on marginality being a root cause of poverty and deprivation. “Marginality” is the position of people on the edge, preventing their access to resources, freedom of choices, and the development of...

Maturing Megacities: The Pearl River Delta in Progressive Transformation (Advances in Asian Human-Environmental Research)
Maturing Megacities: The Pearl River Delta in Progressive Transformation (Advances in Asian Human-Environmental Research)

This edited volume covers the multiple changes concerning urban governance in the course of the progressive transformation of the Pearl River Delta mega-urban region in China. Looking at the megacities Guangzhou and Shenzhen, it analyzes the maturing of socio-economic, political and spatial structures after the first waves of economic...

Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)
Secure Information Management Using Linguistic Threshold Approach (Advanced Information and Knowledge Processing)

In recent years, cryptographic techniques for protecting and hiding secret information have been included in directions of research on intelligent information management. Data can be managed securely due to the use of algorithms for ensuring the confidentiality of data, information splitting techniques as well as protocols for sharing...

Official (ISC)2 Guide to the CSSLP CBK, Second Edition ((ISC)2 Press)
Official (ISC)2 Guide to the CSSLP CBK, Second Edition ((ISC)2 Press)

The text allows readers to learn about software security from a renowned security practitioner who is the appointed software assurance advisor for (ISC)2. Complete with numerous illustrations, it makes complex security concepts easy to understand and implement. In addition to being a valuable resource for those studying for the CSSLP...

Microsoft ADO.NET Entity Framework Step by Step (Step By Step (Microsoft))
Microsoft ADO.NET Entity Framework Step by Step (Step By Step (Microsoft))
Gaining access to data in a managed way without a lot of coding—that’s a tall order! The Entity Framework fulfills this promise and far more. Each version of the Entity Framework is more capable than the last. The latest version, Entity Framework version 5, provides you with access to far more database features with less...
Nanomechanical Analysis of High Performance Materials (Solid Mechanics and Its Applications)
Nanomechanical Analysis of High Performance Materials (Solid Mechanics and Its Applications)

This book is intended for researchers who are interested in investigating the nanomechanical properties of materials using advanced instrumentation techniques. The chapters of the book are written in an easy-to-follow format, just like solved examples. The book comprehensively covers a broad range of materials such as polymers, ceramics,...

Result Page: Previous 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy