17 tháng 12, 2013

Thông báo sách điện tử mới về Công nghệ thông tin

TÀI LIỆU MỚI TRONG BỘ SÁCH ĐIỆN TỬ ITPRO


Thân chào các bạn, 
CSDL Book24x7 mới cập nhật 23 tài liệu mới về lĩnh vực công nghệ thông tin. Các bạn xem thông tin chi tiết bên dưới để được cập nhật những bộ sách mới nhất nhé:

STT
Thông tin mô tả
Tóm tắt nội dung
1
Backing up SAP MaxDB Using NetWorker 8.0 by Michael Dick
EMC © 2013 (40 pages)
Authored by EMC Proven Professionals, Knowledge Sharing articles present ideas, expertise, unique deployments, and best practices. This article is intended as a guide to backing up SAP MaxDB using NetWorker 8.
2
Backup Deduplication Efficiencies and Capacity Planning Demystified by Peter Marelas
EMC © 2013 (22 pages)
Authored by EMC Proven Professionals, Knowledge Sharing articles present ideas, expertise, unique deployments, and best practices. This article will equip readers to better understand and forecast deduplication storage consumption.
3
Body Area Networks: Safety, Security, and Sustainability by Sandeep K. S. Gupta, Tridib Mukherjee and Krishna Kumar Venkatasubramanian
Cambridge University Press © 2013 (161 pages)
ISBN: 9781107021020
Featuring real-world case studies, suggestions for further investigation and project ideas, this invaluable reference is aimed at anyone involved in pervasive and mobile healthcare, telemedicine, medical apps and other cyber-physical systems.
4
Configuration and Implementation of EMC VNX Storage by Octavio Guerra M.
EMC © 2013 (13 pages)
Authored by EMC Proven Professionals, Knowledge Sharing articles present ideas, expertise, unique deployments, and best practices. This article provides Implementers and Solution Architects with rules, ideas, and recommendations to arrive at the “adequate” configuration in a new VNX.
5
Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions by Thomas J. Mowbray
John Wiley & Sons © 2014 (360 pages)
ISBN: 9781118697115
A comprehensive and authoritative look at the critical topic of cybersecurity from start to finish, this essential book addresses cybersecurity strategies that include identity management, risk management, and incident management.
6
Demystifying Avamar: Key Concepts and Features by Arunkamar Velumani and Anay Pathak
EMC © 2013 (48 pages)
Authored by EMC Proven Professionals, Knowledge Sharing articles present ideas, expertise, unique deployments, and best practices. This article will help readers gain a comfort level about Avamar and will be able to use key concepts and features efficiently to solve their data protection challenges.
7
Does Cloud Storage Portend “Creation by Destruction” of Traditional Storage? by Mikhail Gloukhovtsev
EMC © 2013 (40 pages)
Authored by EMC Proven Professionals, Knowledge Sharing articles present ideas, expertise, unique deployments, and best practices. This article discusses holistic guidelines that can help readers select storage technologies for implementation of cloud-based information services and Big Data solutions.
8
From Business Strategy to IT Action: Right Decisions for a Better Bottom Line by Robert J. Benson, Thomas L. Bugnitz and William B. Walton
John Wiley & Sons © 2004 (352 pages)
ISBN: 9780471491910
Presenting CEOs, CFOs, CIOs, and IT managers with a powerful and accessible resource packed with useful material, this book gives companies of all sizes the tools to effectively link IT to business strategy and produce effective, actionable strategies for bottom-line results.
9
Green Computing: Tools and Techniques for Saving Energy, Money, and Resources by Bud E. Smith
Auerbach Publications © 2014 (260 pages)
ISBN: 9781466503403
Bringing together everything IT professionals need to know about green computing, this comprehensive book embodies a new philosophy on how to deploy IT devices, software, and services in a way that makes people more effective with fewer resources.
10
Java Programming by Poornachandra Sarang
McGraw-Hill/Osborne © 2012 (672 pages)
ISBN: 9780071633604
Featuring real-world code samples and detailed instructions, this practical Oracle Press guide demonstrates how to fully utilize the powerful features of Java SE 7 such as designing multithreaded and network applications, recovering from errors, input failures, and exceptions, and more.
11
Mastering Software Project Requirements: A Framework for Successful Planning, Development & Alignment by Barbara Davis
J. Ross Publishing © 2013 (297 pages)
ISBN: 9781604270914
Explaining how to generate consistent, complete, and accurate requirements in exacting detail, this book is a concise, step-by-step guide to building and establishing the frameworks and models for the effective management and development of software requirements.
12
Open Replicator Data Migration of File Server Clusters to VMware by Brian Russell and Michael Aldo
EMC © 2008 (31 pages)
Authored by EMC Proven Professionals, Knowledge Sharing articles present ideas, expertise, unique deployments, and best practices. This article shares the real-world challenge and solution of migrating a large file server cluster into a virtualized server environment combined with a storage array hardware refresh.
13
PMP Project Management Professional Study Guide, Fourth Edition by Joseph Phillips
McGraw-Hill/Osborne © 2013 (784 pages)
ISBN: 9780071775915
Providing complete coverage of all official objectives for the PMP exam, this book includes an Exam Readiness checklist, Inside the Exam sections in every chapter, Two-Minute Drills, and simulated exam questions that match the format, tone, topics, and difficulty of the real exam.
14
Pro JPA 2, Second Edition by Mike Keith and Merrick Schincariol
Apress © 2013 (508 pages)
ISBN: 9781430249269
Demonstrating how to use the new Java Persistence API (JPA) 2.1 from the perspective of one of the specification creators, this one-of-a-kind resource provides both theoretical and extremely practical coverage of JPA usage for both beginning and advanced developers.

15
Self-Assessment in your RecoverPoint Installation by Alexandre Zancope and Carlos Cardozo
EMC © 2013 (26 pages)
Authored by EMC Proven Professionals, Knowledge Sharing articles present ideas, expertise, unique deployments, and best practices. This article provides guidance for self assessment in a RecoverPoint installation, using commands from the Command Line Interface and working together with some scripts to interpret the CLI output.

16
Teradata Architecture for IT and Developers by Tom Coffing and John Nolan
Coffing Data Warehousing © 2013 (571 pages)
Leaving no stone unturned, this book takes a building block approach to allow readers to continually see how the data is laid out, how to design the tables, as well as understand the mechanisms that Teradata uses, and understand why Teradata is the best data warehouse in the world.

17
Teradata Basics for Business Users by Tom Coffing and Leona Coffing
Coffing Data Warehousing © 2013 (333 pages)
Beginning with brilliant fundamentals, this book then dives into how Teradata works, how data is laid out, how people are set up as users, and how they are tracked.

18
Teradata Database Administration: TASM and Viewpoint by Tom Coffing and Carling Nolan
Coffing Data Warehousing © 2013 (262 pages)
Taking you through Viewpoint, TASM, and setting up workloads, this book provides step-by-step guidance that will make these very challenging subjects easy to master.

19
Teradata Database Administration: The Fundamentals by Tom Coffing and Thomas Coffing III
Coffing Data Warehousing © 2013 (449 pages)
Explaining how Teradata works, this book will help you to understand the environment and the landscape providing you with strong fundamentals so you can do your job.
20
Teradata Physical Database Design by Tom Coffing and Leah Nolander
Coffing Data Warehousing © 2013 (394 pages)
Helping you to understand the important issues so you can make clear decisions, this thorough resource brilliantly touches on the important things a designer needs to do to build a world-class data warehouse.
21
The Handbook of Personal Area Networking Technologies and Protocols by Dean Anthony Gratton
Cambridge University Press © 2013 (418 pages)
ISBN: 9780521197267
An authoritative review of the complete short-range RF domain, this definitive book demystifies personal-area networking technologies and protocols and explores their application potential in a unique real-world context.
22
The Key to Successfully Sizing a VDI Project by Housna Hamadet
EMC © 2013 (14 pages)
Authored by EMC Proven Professionals, Knowledge Sharing articles present ideas, expertise, unique deployments, and best practices. This article highlights the complete VDI solution design: not only hardware and software, but all the processes of change.

23
Transforming Storage Resource Management by Russell Easter
EMC © 2013 (14 pages)
Authored by EMC Proven Professionals, Knowledge Sharing articles present ideas, expertise, unique deployments, and best practices. This article explores an approach to transforming an SRM capability and demonstrates how a strategic focus can deliver more scalable efficiencies across the business.

Không có nhận xét nào:

Đăng nhận xét

Translate