Microsoft System Center: Designing Orchestrator Runbooks

Part of a series of specialized guides on System Center - this book delivers a focused drilldown into designing runbooks for Orchestrator workflow management solutions. Series editor Mitch Tulloch and a team of System Center experts provide concise technical guidance as they step you through key design concepts, criteria, and tasks.

Learning The Vi And Vim Editors

Text processing at maximum speed and power There's nothing that hard-core Unix and Linux users are more fanatical about than their text editor. Editors are the subject of adoration and worship, or of scorn and ridicule, depending upon whether the topic of discussion is your editor or someone else's. vi has been the standard editor for close to 30 years. Popular on Unix and Linux, it has a growing following on Windows systems, too. Mo...

Agile Metrics In Action

Project tracking systems, test and build tools, source control, continuous integration, and other built-in parts of the software development lifecycle generate a wealth of data that can be used to track and improve the quality and performance of products, processes, and teams. Although the iterative nature of Agile development is perfect for data-driven continuous improvement, the collection, analysis, and application of meaningful m...

Html5 Games Most Wanted: Build The Best Html5 Games

HTML5 Games Most Wanted gathers the top HTML5 games developers and reveals the passion they all share for creating and coding great games. You'll learn programming tips, tricks, and optimization techniques alongside real-world code examples that you can use in your own projects. You won't just make games—you'll make great games. The book is packed full of JavaScript, HTML5, WebGL, and CSS3 code, showing you how these fantastic games ...

Activity Recognition In Pervasive Intelligent Environments

This book consists of a number of chapters addressing different aspects of activity recognition, roughly in three main categories of topics. The first topic will be focused on activity modeling, representation and reasoning using mathematical models, knowledge representation formalisms and AI techniques. The second topic will concentrate on activity recognition methods and algorithms. Apart from traditional methods based on data mini...

Graph Databases: New Opportunities For Connected Data, 2nd Edition

Discover how graph databases can help you manage and query highly connected data. With this practical book, you'll learn how to design and implement a graph database that brings the power of graphs to bear on a broad range of problem domains. Whether you want to speed up your response to user queries or build a database that can adapt as your business evolves, this book shows you how to apply the schema-free graph model to real-world...

Mac OS X Leopard Just the Steps For Dummies (For Dummies (Computers))

* Eliminates lengthy introductions, detailed explanations, and sidebars, focusing on what new Mac OS X users want most-clear instructions on how to accomplish specific tasks* An easy-to-navigate landscape layout featuring a two-column design and illustrated step-by-step instructions make it easy to find a specific task fast and get it done in a flash* Tasks covered include adjusting system preferences, creating and managing user acco...

Object-oriented Programming Languages And Event-driven Programming

Essential concepts of programming language design and implementation are explained and illustrated in the context of the object-oriented programming language (OOPL) paradigm. Written with the upper-level undergraduate student in mind, the text begins with an introductory chapter that summarizes the essential features of an OOPL, then widens the discussion to categorize the other major paradigms, introduce the important issues, and de...

The Antivirus Hacker's Handbook

Hack your antivirus software to stamp out future vulnerabilities The Antivirus Hacker's Handbook guides you through the process of reverse engineering antivirus software. You explore how to detect and exploit vulnerabilities that can be leveraged to improve future software design, protect your network, and anticipate attacks that may sneak through your antivirus' line of defense. You'll begin building your knowledge by diving into th...

Mac Os X Leopard Para Dummies

Simplifique las copias de seguridad con Time Machine (Máquina del tiempo) y proteja sus datos La forma divertida y fácil para desatar el poder de las emocionantes funciones de Leopard ¿Quiere ir al fondo de Leopard? Ya sea que usted es un nuevo usuario de Mac o un antiguo usuario entusiasta, esta amigable guía le pone al tanto del último sistema operativo de Apple. Desde navegar en el Finder (Buscador) y agregar símbolos del tablero ...