![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer software packages > Other software packages > Enterprise software
A homogenous guide integrating the features of JSF 2.x (2.0, 2.1 and 2.2), following a learning through examples paradigm with its main focus on the advanced concepts of JSF. If you are a web developer who uses JSF, this is the book for you. Catering to an intermediate-advanced audience, the book assumes you have fundamental knowledge of JSF. It is intended for the developer who wants to improve their skills with the combined power of JSF 2.0, 2.1, and 2.2.
This book is written in plain conversational terms (as if the author is talking to you) and is catered for those who are wanting to learn to CREATE YOUR FIRST SAP LSMW. The content does not only document the steps but is accompanied with images showing the exact activity being performed and the results. Unlike most LSMW guides out there, this guide goes through everything from beginning to end including interaction with Excel and creating templates for uploads. This book is the first book of a number of series on the topic of LSMW & Data Migration and is the foundation for the more advanced methods for using LSMW and performing data migration in the most efficient manner. Don't be fooled, whilst this is the first book on LSMW and is intended to be the foundation to build upon, many data migration projects can be performed using the information contained in this book.
1- MUSTAFA ALMAHDI ALGAET received the B.S. degrees in electrical engineering from Altahdi university of Libya, in 2004 and the M.S. degree in information and Communication technology from University Utara Malaysia, Malaysia (UUM), in 2006. Currently, he is PhD student at UTeM. His research interest is Quality of service (QoS) in wireless telemedicine. 2-DR. ZUL AZRI BIN MUHAMAD NOH is a Senior Lecturer teaching Advanced High Performance Networks, Network Routing, Implementing and Administering Active Directory, and Wireless Network and Mobile Computing. Dr. Zul Azri's education was first in Bachelor of Engineering in Electrical and Computer Engineering, then Masters of Engineering in Communication and Computer Engineering, then Doctor of Engineering in Communication and Computer Engineering, all from Nagoya Institute of Technology Japan. In October 2007, while pursuing his PhD, he joined UTeM as lecturer at Faculty of Information and Communication Technology. Currently, he is head of Advanced Networking and Distributed System research cluster. His current research interests include quality of service (QoS), wireless LAN, packet scheduling algorithm, and multimedia communication 3-DR. ABDUL SAMAD SHIBGHATULLAH is a Senior Lecturer in faculty of information and communication Technology UTeM, and his PhD Degree in computer science (Brunel University, UK) 2008, Msc Computer science (UTM) 2001, B.Acc (UKM) in 1999, and his field is Scheduling and Agent Technology 4-ALI AHMAD MILAD received the B.S. degrees in computer science from Almergib University in 2005, and the M.S. degree in computer science from University Putra Malaysia, Malaysia (UPM) 2009, currently; He is Ph.D. student at UTeM. His research interest is Very High Speed Wireless LANs. MAC protocols. 5-DR. AOUACHE MUSTAPHA . Was born in Frenda, Algeria; received the B.Sc. (2000) in Control and Automation from University of Boumerdes (UMBB), Algeria; M.Sc (2006) and PhD (2012) in Electrical, Electronic & Sys
This book is an easy to follow guide full of hands on examples of administration tasks and valuable information about security. Each topic is explained and placed in context, and for the more inquisitive readers, there are more indepth details of the concepts used. If you are an application server administrator or a Java developer with some experience with previous versions of JBoss AS and you want to familiarize yourself with WildFly, then this book is ideal for you.
How do you respond to those in your company who propose two-tiered ERP? Text in the wave in the center of the cover: If you need help determining your company's overall enterprise software strategy and how two-tiered ERP fits in, this book is for you. Two-tiered ERP is widely understood as the use of different ERP systems for different layers of an organization. Until this book, the effectiveness of a two-tiered ERP strategy could only be determined through anecdotal evidence, the marketing literature of ERP vendors, and the advice of consulting companies. By understanding two-tiered ERP within the context of ERP's history, readers will see how two-tiered ERP may represent a crack in the facade of "big ERP," and will know how to formulate a comprehensive and logical response to proposals about implementing a two-tiered strategy. By reading this book you will: Eliminate confusion over definitions of two-tiered, multi-tiered, and single instance ERP. Review SAP and Oracle's Tier 1 and Tier 2 ERP products. Understand why two-tiered and single instance ERP is not the best strategy. Appreciate that WHAT is written about two-tiered ERP depends greatly upon WHO is writing it. Recognize the logic used by vendors to sell two-tiered ERP and whose interests are being served by a two-tiered strategy. Learn an alternative strategy that provides functionality, cost savings, and the best return on investment. If you are just beginning your research on ERP, read the companion book by the same author, The Real Story Behind ERP: Separating Fiction from Reality first, as it provides the most exhaustive history of ERP currently published."
Few IT professionals take the time to learn what needs to be known to do disaster recovery well. Most labor under the pretense that good administration equals close to five-nines uptime. Most technical people do not see the value of planning for disasters until the unexpected has already happened, and the effects of a disaster involving a SharePoint farmwhich today houses business information, line-of-business applications, sensitive information, extranets, and other highly important assetscan be staggering Pro SharePoint Disaster Recovery and High Availability, Second Editionwill take you through a step-by-step process to show how to build an awareness and reaction plan for the inevitable. With a focus on real-world experiences and war stories, author Stephen Cummins weaves an expert tale of woe response and offers you: Ways to see the warning signs of disaster, and ways toavoid it Ways to respond to a disaster while it is happening Perhaps most importantly, how to develop a plan to deal with disaster when it inevitably does happen What you'll learn WithPro SharePoint Disaster Recovery and High Availability, Second Edition, learn and discover: How to build resilience and high availability into your systems to make them less likely to fail How to use technologies like log shipping, clustering and mirroring to replicate data How to use redundancy of web front-ends, service applications and other parts of your SharePoint farm to prevent failure How companies that realize the cost of disasters create processes to prevent them by tracking and responding to near-misses How to implement the right monitoring tools to ensure you are alerted to impending problems as soon as possible How todiagnose and repair broken systems, and develop processes to ensure you have backups and a place to restore them to if all else fails Who this book is for If you worry about what would happen to your organization if what is in your SharePoint farm was lost, this book is for you. It is a technical book, but parts of it are about the principles of good planning. Other parts arestories of how things have gone wrong (and right) in the field--all of whichshould be instructive and entertaining for anyone who relies on any technology a great deal in their daily life. Table of Contents Steering Away from Disaster Planning Your Plan Processes and Procedures High Availability and Resilience Quality of Service Back Up a Step Monitoring and Alerts DIY Disaster Recovery Change Management and Disaster Recovery Disaster Recovery and the Cloud Best Practices and Worst Practices Final Conclusions
This book is a tutorial guide that covers each topic in depth with examples. The step by step approach will help you better understand each task as you will have to perform them frequently when utilizing the services. If you are a Dynamics AX developer, new or experienced who wants to implement services with Microsoft Dynamics AX 2012, then this book is for you. A basic understanding of MorphX and X++ is assumed, but the step by step instructions are easy to follow even for beginners. Some examples use C# and .NET, so experience with Visual Studio is a plus but not a must.
COBIT(R)5 (Control Objectives for Information and related Technology) is the latest release of the popular framework for the governance of enterprise IT. It links controls, technical issues and business risks, enabling managers to manage the risks associated with business goals. Written for IT service managers, consultants and other practitioners in IT governance, risk and compliance, this practical book discusses all the key concepts of COBIT(R)5, and explains how to direct the governance of enterprise IT (GEIT) using the COBIT(R)5 framework. The book also covers the main frameworks and standards supporting GEIT, discusses the ideas of enterprise and governance, and shows the path from corporate governance to the governance of enterprise IT. Drawing on more than 30 years of experience in the IT sector, the author explains crucial concepts, including: the key elements of COBIT(R)5, the 5 principles, 7 enablers and the goals cascade the structure of the 37 COBIT(R)5 processes the implementation of GEIT using COBIT(R)5 and an implementation lifecycle the COBIT(R)5 Process Assessment Model (PAM) - the approach to process assessment of COBIT(R)5 processes based on International Standard ISO/IEC 15504. For those studying for the COBIT(R)5 qualifications, Governance of Enterprise IT based on COBIT(R)5 covers all the material needed for the COBIT(R)5 Foundation course, making it invaluable to anyone planning to take the exam. Read this book and get to grips with COBIT(R)5 today.
This book is a handson practical guide that provides the reader with a number of clear scenarios and examples, making it easier to understand and apply the new concepts. Each chapter can be used as a reference, or it can be read from beginning to end, allowing consultants/administrators to build a solid and highly available Exchange 2013 environment. If you are a messaging professional who wants to learn to design a highly available Exchange 2013 environment, this book is for you. Although not a definite requirement, practical experience with Exchange 2010 is expected, without being a subject matter expert.
You will be led carefully step by step through a detailed set of recipes. This book focuses on web content management using Microsoft SharePoint 2013 server. The practical examples are built logically throughout the chapters to create a common theme. This book is ideal for developers who want to broaden their understanding of the web content management features available with SharePoint 2013. It is assumed that you already have some experience using SharePoint and developing web content. Experience with Microsoft PowerShell and coding C# with Visual Studio will also be helpful, but is not essential.
This is a step-by-step tutorial that covers the basics of working with the MicroStrategy platform. If you are a BI developer who would like to use MicroStrategy to build BI apps, this book is ideal for you. This book is also for mid-management executives who need to analyze data and Excel files that are too complicated to manage. A basic concept of BI is assumed.
An easy-to-understand guide, covering topics using practical scenarios and live examples, and answering all possible questions. If you are a solution architect, developer, modeler, sales leader, business transformation managers, directors, COO, or CIO; this book is perfect for you. If you are interested in other technologies and want to jump-start into SAP, this book gives you the chance to learn SAP HANA. Basic knowledge of RDBMS concepts enough is to get you started.
This practical tutorial-based book is filled with information about the architecture, functionality, and extensions of Microsoft Windows Server 2012 Dynamic Access Control. If you are an IT consultant/architect, system engineer, system administrator, or security engineers planning to implement Dynamic Access Control in your organization, or have already implemented it and want to discover more about the abilities and how to use them effectively, this book will be an essential resource. You should have some understanding of security solutions, Active Directory, Access Privileges/ Rights and Authentication methods, and a fundamental understanding of Microsoft technologies. Programming knowledge is not required but can be helpful for using PowerShell or the APIs to customize your solution.
SAP ABAP with NetWeaver 7.0 Development Associate Certification Exam
A practical and fast-paced guide that gives you all the information you need to get up and running with Opsview. This book is for anyone interested in using Opsview as a potential monitoring solution or for those who are already running Opsview Core and who would like to improve on their setup by exploring the features of Pro and Enterprise. Some working knowledge of monitoring and Linux is assumed, and it is recommended to have an Opsview system at hand while reading, allowing you to immediately try out the features discussed.
Practical QlikView 2 - Beyond Basic QlikView Practical QlikView 2 is for people who have developed documents with QlikView for at least a few months and are looking for concise instructions on some of the more advanced topics in QlikView Development. You will be comfortable with the basics of creating QlikView documents and eager to learn more techniques and functions that QlikView has to offer. Practical QlikView 2 is focussed on the QlikView Desktop and the development of QlikView documents but we will also cover QlikView server topics and creating applications in Visual Studio which can access information in your QlikView server (extra license required for QlikView Server examples). Other topics cover in this book include: Creating Custom Data Sources using QVX. QlikView extensions - examples including Jquery and CSS. Advanced Sheet Objects - such as Dynamic Charts, Trendlines, Sparklines, Custom Chart Formatting and creating links to documents from charts. Alternate States. Advanced Scripting Techniques and functions such as interval match, aggr. Set Analysis/ QVD and Incremental Loading. QlikView table joins. Security using section access and QlikView Server security. Installation and Setup of a QlikView Server (extra license required). Finally QlikView Design tips.
This book is a step-by-step tutorial filled with practical examples which will show readers how to configure and manage IaaS and DBaaS with Oracle Enterprise Manager. If you are a cloud administrator or a user of self-service provisioning systems offered by Enterprise Manager, this book is ideal for you. It will also help administrators who want to understand the chargeback mechanism offered by Enterprise Manager.An understanding of the basic building blocks of cloud computing such as networking, virtualization, storage, and so on, is needed by those of you interested in this book
This book is a step-by-step tutorial filled with practical examples which will show you how to build and manage a Hadoop cluster along with its intricacies. This book is ideal for database administrators, data engineers, and system administrators, and it will act as an invaluable reference if you are planning to use the Hadoop platform in your organization. It is expected that you have basic Linux skills since all the examples in this book use this operating system. It is also useful if you have access to test hardware or virtual machines to be able to follow the examples in the book.
This is a practical and fast-paced guide that gives you all the information you need to start implementing secure OAuth 2.0 implementations in your web applications.OAuth 2.0 Identity and Access Management Patterns is intended for software developers, software architects, and enthusiasts working with the OAuth 2.0 framework. In order to learn and understand the OAuth 2.0 grant flow, it is assumed that you have some basic knowledge of HTTP communication. For the practical examples, basic knowledge of HTML templating, programming languages, and executing commands in the command line terminal is assumed.
Am Beginn des 21. Jahrhunderts wandelt sich die alte Industriegesellschaft in eine digitale Wissensgesellschaft. In diesem Buch wird dieser grundlegende Wandel analysiert. Festnetz- und Mobilanwendungen des Internet werden vor dem Hintergrund der europaischen und globalen Deregulierung dargestellt. Aus empirischer Sicht werden erstmals die Wachstumseffekte der Telekommunikation fur Deutschland untersucht; zudem die Wirkungen des Internet fur Wachstum und Beschaftigung quantifiziert. Die Herausforderungen an die Wirtschaftspolitik werden in 10 Geboten fur die Internet- und Bildungspolitik formuliert. Es wird gezeigt, dass sich bei richtigen Weichenstellungen erhebliche Expansionspotentiale in Deutschland und Europa ergeben."
A practical guide to creating and managing reports as well as identifying the most appropriate reporting tool for any reporting challenge, this book employs real-life, step-by-step examples in a part tutorial, part reference manner.If you are a Microsoft Dynamics GP developer, consultant or power user who wants to create and manage reports, then "Microsoft Dynamics GP 2013 Reporting, Second Edition" is for you. A working knowledge of Microsoft Dynamics GP is required. A basic understanding of business management systems and reporting applications such as Microsoft Excel and SQL Reporting Services is highly recommended.
Written in a cookbook style, this book will teach you through the use of recipes with examples and illustrations. Each recipe contains step-by-step instructions about everything necessary to execute a particular task. This book is intended for both BI and database developers who want to expand their knowledge of MicroStrategy. It is also useful for advanced data analysts who are evaluating different technologies. You do not need to be an SQL master to read this book, yet knowledge of some concepts like foreign keys and many-to-many relationships is assumed. Some knowledge of basic concepts such as dimensional modeling (fact tables, dimensions) will also help your comprehension of this book. No previous MicroStrategy knowledge is needed.
You've read the books, but...A wealth of material has been written to describe the underlying mechanics of ITSM, but very little practical advice is available on how to implement ITSM best practices to achieve an organization's business objectives. The official ITIL(R) volumes explain what service management is, how the processes work and fit together, and why IT shops should adopt the practice, but they are notoriously vague on how to design and implement an ITSM model in a real organization. This challenge is best understood by those with experience of transforming ineffective and expensive IT, yet most ITSM guides are authored from a purely academic standpoint. From the classroom to the real world This book provides guidance on implementing ITSM Best Practices in an organization based on the authors' real-world experiences. Advice is delivered through a Ten-Step approach, with each step building upon the successes of its predecessors. Subjects covered include - * Documenting objectives, identifying current and future demands, analyzing service financials. * High-level design, negotiating development priorities, creating an execution plan and roadmap, agreeing roles and responsibilities. * Detailed design, building, testing, deploying. * Monitoring and continual improvement. Each step includes summary lists of key questions to ask and specific actions to take, and a useful business case template is included as an appendix. A practical guide to ITSM Improvement As organizations seek to boost revenue, cut costs and increase efficiency, they increasingly look to IT as a strategic partner in achieving these objectives. Ten Steps to ITSM Success helps IT to prepare for this role by providing a detailed and practical guide to implementing ITSM best practices. It is aimed at ITSM practitioners and consultants, but will also be of interest to IT Directors and C-suite executives looking to transform the role of IT into a value-creating business partner, to establish a service management culture, and to drive improvements in their respective organizations. A structured yet flexible method for achieving ITSM success! |
You may like...
The Slow Evolution of Foster Care in…
Nell Musgrove, Deidre Michell
Hardcover
R2,446
Discovery Miles 24 460
|