Automating Microsoft Azure with Powershell
Automate Microsoft Azure tasks using Windows PowerShell to take full control of your Microsoft Azure deployments
About This Book
Deploy and manage virtual machines, virtual networks, and an online database for application provisioning, maintenance, and high availability of your data
Having a command of the Vaadin framework means your Java web applications will look and perform brilliantly. Learn how with this all-inclusive, step-by-step tutorial to mastering Rich Internet Application development.
Discover the Vaadin framework in a progressive and structured...
Sparrow iOS Game Framework, Beginner's Guide
Create mobile games for iOS devices with the Sparrow iOS game framework
About This Book
Learn the principles of Game Mechanics and implement them with Sparrow's powerful framework
Build an entire game throughout the course of the book
This is a practical guide with...
The Definitive Guide to GCC, Second Edition
The GNU Compiler Collection (GCC) offers a variety of compilers for different programming languages including C, C++, Java, Fortran, and Ada. The Definitive Guide to GCC, Second Edition has been revised to reflect the changes made in the most recent major GCC release, version 4. Providing in-depth information on GCC's enormous...
Perl 6 Fundamentals: A Primer with Examples, Projects, and Case Studies
Gain the skills to begin developing Perl 6 applications from the ground up in this hands-on compact book, which includes a foreword from Larry Wall, creator of Perl. You’ll learn enough to get started building with Perl 6, using Perl 6’s gradual typing, handy object orientation features, powerful parsing capabilities, and... Tcl 8.5 Network Programming
Tcl (Tool Command Language) is a very powerful and easy to learn dynamic programming language, suitable for a very wide range of uses. Tcl is regarded as one of the best-kept secrets in the software industry. This book gives you a hands-on experience on Tcl, helping you develop network-aware applications using this mature yet evolving...
Windows PowerShell 3.0 Step by Step (Step by Step Developer)
Your hands-on, step-by-step guide to automating Windows administration with Windows PowerShell 3.0
Teach yourself the fundamentals of Windows PowerShell 3.0 command line interface and scripting language—one step at a time. Written by a leading scripting expert, this practical tutorial delivers learn-by-doing exercises,...
Windows PowerShell Best Practices
Expert recommendations, pragmatically applied.
Automate system administration using Windows PowerShell best practices—and optimize your operational efficiency. With this practical guide, Windows PowerShell expert and instructor Ed Wilson delivers field-tested tips, real-world examples, and candid advice culled from...
Programming Windows Identity Foundation (Dev - Pro)
A few years ago, I was sitting at a table playing a game of poker with a few colleagues from Microsoft who had all been involved at various times in the development of Web Services Enhancements for Microsoft .NET (WSE). Don Box, Mark Fussell, Kirill Gavrylyuk, and I played the hands while showman extraordinaire Doug Purdy engaged us with...
Mastering OpenLDAP: Configuring, Securing and Integrating Directory Services This book is the ideal introduction to using OpenLDAP for Application Developers and will also benefit System Administrators running OpenLDAP. It prepares the reader to build a directory using OpenLDAP, and then employ this directory in the context of the network, taking a practical approach that emphasizes how to get things done. On occasion, it... Absolute BSD: The Ultimate Guide to FreeBSD Welcome to Absolute BSD! This book is a one-stop shop for new UNIX administrators who want to build, configure, and manage dedicated FreeBSD servers. It will also be useful for those folks who want to run FreeBSD on their desktop or combined desktop/server systems.
By the time you finish this book, you...
Kerberos: The Definitive Guide Kerberos is a sophisticated network authentication system—one that has been publicly available since 1989 and provides that eternal holy grail of network administrators, single-sign-on. Yet, in that intervening decade, documentation on Kerberos has been notably lacking. While many large organizations and academic institutions have enjoyed the...
|Result Page: 38 37 36 35 34 33 32 31 30 29 |