Mostrando 52,381 - 52,400 Resultados de 53,879 Para Buscar 'NPBL~', tiempo de consulta: 0.94s Limitar resultados
  1. 52381
    por Kaza, Ramesh
    Publicado 2004
    “…A guide to successful deployment of the Cisco IP Telephony solution Real-world case studies from the Cisco design consulting engineers who developed the PDIOO process provide practical advice on all stages of successful IPT deployment Concise understanding of the PDIOO phases enables architects and engineers to successfully deploy the Cisco IPT solution Division of the process into PDIOO phases provides a logical and defined guide for network engineers and architects as they proceed through each of the phases in deploying the Cisco IPT solution Includes detailed questionnaires for each phase of deployment in the PDIOO cycle—a great aid in understanding customer networks and requirements Network infrastructure design, call processing infrastructure design and applications, and voice-mail system design are covered in depth Cisco® IP Telephony (IPT) solutions are being deployed at an accelerated rate, and network architects and engineers need to understand the various phases involved in successful deployment: planning, design, implementation, operation, and optimization (PDIOO). …”
    Libro electrónico
  2. 52382
    por Fleishman, Glenn
    Publicado 2007
    “…What are the steps for connecting an Apple TV to a network?…”
    Libro electrónico
  3. 52383
    por Edney, Jon
    Publicado 2004
    “…"This book keeps the exposition as straightforward as possible and enables you to cut through the maze of acronyms, hacking tools, rumored weaknesses, and vague vendor security claims to make educated security decisions when purchasing or deploying WLAN." …”
    Libro electrónico
  4. 52384
    Publicado 2010
    “…Discover how to • Get your next job in software development • Master the nontechnical skills crucial to your success • “Work the org” to move up rapidly • Successfully manage your time, projects, and life • Avoid “killer” mistakes that could destroy your career • Move up to “medium-shot,” “big-shot,” and finally, “visionary” • Launch your own winning software company Exclusive interviews with Steve Wozniak , Inventor, Apple computer John Schwarz , CEO, Business Objects James Gosling , Inventor, Java programming language Marissa Mayer , Google VP, Search Products and User Experience Jon Bentley , Author, Programming Pearls Marc Benioff , CEO and founder, Salesforce.com Grady Booch , IBM Fellow and co-founder Rational Software Bjarne Stroustrup , Inventor, C++ programming language David Vaskevitch , Microsoft CTO Linus Torvalds , Creator, Linux operating system kernel Richard Stallman , Founder, Free software movement Peter Norvig , Google’s Director of Research Mark Russinovich , Microsoft Fellow and Windows Architect Tom Malloy , Adobe Chief Software Architect Diane Greene , Co-founder and past CEO of VMware Robert Kahn , Co-inventor, the Internet Ray Tomlinson , Inventor, email…”
    Libro electrónico
  5. 52385
    Publicado 2009
    “…Coverage includes • Viewing virtualization from the attacker’s perspective, and understanding the new security problems it can introduce • Discovering which security threats the vmkernel does (and doesn’t) address • Learning how VMsafe enables third-party security tools to access the vmkernel API • Understanding the security implications of VMI, paravirtualization, and VMware Tools • Securing virtualized storage: authentication, disk encryption, virtual storage networks, isolation, and more • Protecting clustered virtual environments that use VMware High Availability, Dynamic Resource Scheduling, Fault Tolerance, vMotion, and Storage vMotion • Securing the deployment and management of virtual machines across the network • Mitigating risks associated with backup, performance management, and other day-to-day operations • Using multiple security zones and other advanced virtual network techniques • Securing Virtual Desktop Infrastructure (VDI) • Auditing virtual infrastructure, and conducting forensic investigations after a possible breach informit.com/ph www.Astroarch.com…”
    Libro electrónico
  6. 52386
    por Kasian-Lew, Dionne
    Publicado 2014
    “…In The Social Executive, readers are given evidence-based, data-driven strategies for mastering social media, and using it to enable business success. This book's easy, straightforward, practical style ensures that you will gain a solid working platform in the shortest amount of time possible. …”
    Libro electrónico
  7. 52387
    por Qin, Mélony
    Publicado 2022
    Tabla de Contenidos: “…Cover -- Title Page -- Copyright and Credits -- Foreword -- Contributors -- Table of Contents -- Preface -- Part 1: Cluster Architecture, Installation, and Configuration -- Chapter 1: Kubernetes Overview -- CKA exam overview -- What to expect in your CKA exam -- CKA exam tips and tricks -- Cluster architecture and components -- Kubernetes core concepts -- Containerized workloads -- Container images -- Container registry -- Container runtimes -- Kubernetes basic workflow -- Kubernetes plugin model -- Kubernetes API primitives -- Sharing a cluster with namespaces…”
    Libro electrónico
  8. 52388
    Publicado 2022
    Tabla de Contenidos: “…Table of Contents Introduction to Sequelize and ORM in Node.js Defining and Using Sequelize Models Validating Models Associating Models Adding Hooks and Lifecycle Events to Your Models Implementing Transactions with Sequelize Handling Customized, JSON, and Blob Data Types Logging and Monitoring Your Application Using and Creating Adapters Deploying a Sequelize Application…”
    Libro electrónico
  9. 52389
    Publicado 2023
    Tabla de Contenidos: “…Table of Contents Introduction to Data Ingestion Principals of Data Access – Accessing your Data Data Discovery – Understanding Our Data Before Ingesting It Reading CSV and JSON Files and Solving Problems Ingesting Data from Structured and Unstructured Databases Using PySpark with Defined and Non-Defined Schemas Ingesting Analytical Data Designing Monitored Data Workflows Putting Everything Together with Airflow Logging and Monitoring Your Data Ingest in Airflow Automating Your Data Ingestion Pipelines Using Data Observability for Debugging, Error Handling, and Preventing Downtime…”
    Libro electrónico
  10. 52390
    Publicado 2023
    “…This book offers step-by-step guidance on using various quantum algorithm frameworks within a Python environment, enabling you to tackle business challenges in finance. …”
    Libro electrónico
  11. 52391
    Publicado 2021
    “…No-code automation will enable you to increase productivity by automating these tasks. …”
    Libro electrónico
  12. 52392
    Publicado 2016
    “…IBM Spectrum ArchiveTM EE enables the use of the LTFS for the policy management of tape as a storage tier in a IBM Spectrum ScaleTM (formerly IBM General Parallel File System (IBM GPFSTM)) based environment and helps encourage the use of tape as a critical tier in the storage environment. …”
    Libro electrónico
  13. 52393
    Publicado 2017
    “…IBM Spectrum ArchiveTM EE enables the use of the LTFS for the policy management of tape as a storage tier in an IBM Spectrum ScaleTM based environment and helps encourage the use of tape as a critical tier in the storage environment. …”
    Libro electrónico
  14. 52394
    Publicado 2017
    “…A full index of the Regulation, enabling you to find relevant Articles quickly and easily…”
    Libro electrónico
  15. 52395
    Publicado 2015
    “…Whether you're moving to modern Swift from Objective-C, from older versions of the Swift language, or from the world of non-Apple languages, this guide will help you master both the "how" and "why" of effective Swift development. …”
    Libro electrónico
  16. 52396
    por Box, Alison
    Publicado 2023
    “…After working through this book, you will have extended your knowledge of Power BI to an expert level, alleviating your existing frustrations and so enabling you to design Power BI reports where you are no longer limited by your lack of knowledge or experience…”
    Libro electrónico
  17. 52397
    Publicado 2018
    “…El británico Kim Philby (1912-1988) está considerado el agente doble más importante de la historia del siglo XX. …”
    Libro
  18. 52398
    por Weisman, Steve
    Publicado 2008
    “…· The truth about recognizing today’s newest scams--online and off · The truth about safeguarding your money, health, and reputation · The truth about phishing, vishing, pharming, slamming, and more Scams have always been with us, and they always will be - except now, technology makes scammers' jobs even easier, enabling them to reach out from anywhere around the world, and take advantage of more people than ever before. …”
    Libro electrónico
  19. 52399
    Publicado 2006
    “…For enterprises, they enable right-sourcing of WAN services and yield generous operational cost savings. …”
    Libro electrónico
  20. 52400
    por Apte, Naresh
    Publicado 2002
    “…Web services: what they are, and how they can solve business problems Enabling Internet-based services to find each other and interact programmatically, wherever they are—securely E-Speak service development, deployment, and discovery Comparative survey of competitive initiatives and technologies such as CORBA, J2EE, ebXML, UDDI, and .NET Key concepts: client and service interactions, vocabularies, contracts, service composition; the multicore environment; persistence, events, messages, and HP's "E-Services Village" service registry E-Speak's transformation into HP Web Services Platform—a standards-based, highly interoperable platform for Internet service delivery Web Services: A Java Developer's Guide Using E-Speak contains Java code examples throughout. …”
    Libro electrónico