Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Migrating Unmanaged Applications to .NET

Buy
Learn about different types of migration and how to migrate Visual Basic 6.0, Visual C++, ASP, and ADO based applications to the .NET Framework.

The aim of the Migration Series from Skillsoft Press is to provide system administrators with a hands-on guide for migrating from one enterprise computing technology to another. If your organization is planning to upgrade or replace an existing system, this series provides you with the advice you need to ensure a smooth and successful transition.

The series describes how to plan and implement the entire migration process for a wide variety of operating systems, database servers, mail servers, and Web servers. It contains practical advice on how best to make use of migration tools, troubleshoot configuration conflicts, and ensure smooth operations during and after a migration project.

Who Should Read These Books

These books are written for system administrators who are responsible for maintaining the network services of an enterprise. To get the most out of these books, you need a basic understanding of the technologies being covered. The Migration Series is not intended to provide general conceptual information. Instead, the series focuses on detailed procedures to perform specific migration tasks.

(HTML tags aren't allowed.)

Relativistic Reality: A Modern View (Knots and Everything, Vol 12)
Relativistic Reality: A Modern View (Knots and Everything, Vol 12)
This book has its origins in my leaving applied physics in 1969 to teach at a small college and ponder the foundations of physics without pressure, even if with limited time caused by a heavy teaching load. Richard Feynman had lectured weekly during the two years I spent at Hughes Labs in Malibu, after graduating from Engineering Physics at...
MPLS VPN Security
MPLS VPN Security
A practical guide to hardening MPLS networks Define "zones of trust" for your MPLS VPN environment Understand fundamental security principles and how MPLS VPNs work Build an MPLS VPN threat model that defines attack points, such as VPN separation, VPN spoofing, DoS against the network's backbone, misconfigurations, sniffing, and...
HBase Administration Cookbook
HBase Administration Cookbook

Master HBase configuration and administration for optimum database performance

  • Move large amounts of data into HBase and learn how to manage it efficiently
  • Set up HBase on the cloud, get it ready for production, and run it smoothly with high performance
  • Maximize the ability of HBase with the...

XPath 2.0 Programmer's Reference (Programmer to Programmer)
XPath 2.0 Programmer's Reference (Programmer to Programmer)
From its origins as a sublanguage of XSLT, XPath has come into its own as a key element of XML. XPath 2.0 has emerged as a robust language twice the size of its predecessor, complex and capable of standing on its own.

This substantive volume, by the editor of the W3C® XSLT 2.0 specification, is the authoritative reference on XPath 2.0. It...

Practical DataOps: Delivering Agile Data Science at Scale
Practical DataOps: Delivering Agile Data Science at Scale
Gain a practical introduction to DataOps, a new discipline for delivering data science at scale inspired by practices at companies such as Facebook, Uber, LinkedIn, Twitter, and eBay. Organizations need more than the latest AI algorithms, hottest tools, and best people to turn data into insight-driven action and useful...
Design Methodologies for Secure Embedded Systems: Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss
Design Methodologies for Secure Embedded Systems: Festschrift in Honor of Prof. Dr.-Ing. Sorin A. Huss

This Festschrift is dedicated to Mr. Sorin A. Huss by his friends and his Ph.D. students to honor him duly on the occasion of his 60th birthday.

Mr. Sorin A. Huss was born in Bukarest, Romania on May 21, 1950. He attended a secondary school with emphasis on mathematic and scientific topics in Dachau near Munich and after his Abitur...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy