HP-UX | |
Cooper/Moore
| HP-UX 11i Internals |
Fernandez
| Configuring CDE |
Keenan
| HP-UX CSE: Official Study Guide and Desk Reference |
Madell
| Disk and File Management Tasks on HP-UX |
Olker
| Optimizing NFS Performance |
Poniatowski
| HP-UX 11i Virtual Partitions |
Poniatowski
| HP-UX 11i System Administration Handbook and Toolkit, Second Edition |
Poniatowski
| The HP-UX 11.x System Administration Handbook and Toolkit |
Poniatowski
| HP-UX 11.x System Administration "How To" Book |
Poniatowski
| HP-UX 10.x System Administration "How To" Book |
Poniatowski
| HP-UX System Administration Handbook and Toolkit |
Poniatowski
| Learning the HP-UX Operating System |
Rehman
| HP-UX CSA: Official Study Guide and Desk Reference |
Sauers/Ruemmler/Weygant
| HP-UX 11i Tuning and Performance |
Weygant
| Clusters for High Availability, Second Edition |
Wong
| HP-UX 11i Security |
UNIX, LINUX |
Mosberger/Eranian
| IA-64 Linux Kernel |
Poniatowski
| Linux on HP Integrity Servers |
Poniatowski
| UNIX User's Handbook, Second Edition |
Stone/Symons
| UNIX Fault Management |
COMPUTER ARCHITECTURE |
Evans/Trimper
| Itanium Architecture for Programmers |
Kane
| PA-RISC 2.0 Architecture |
Markstein
| IA-64 and Elementary Functions |
NETWORKING/COMMUNICATIONS |
Blommers
| Architecting Enterprise Solutions with UNIX Networking |
Blommers
| OpenView Network Node Manager |
Blommers
| Practical Planning for Network Growth |
Brans
| Mobilize Your Enterprise |
Cook
| Building Enterprise Information Architecture |
Lucke
| Designing and Implementing Computer Workgroups |
Lund
| Integrating UNIX and PC Network Operating Systems |
SECURITY |
Bruce
| Security in Distributed Computing |
Mao
| Modern Cryptography: Theory and Practice |
Pearson et al.
| Trusted Computing Platforms |
Pipkin
| Halting the Hacker, Second Edition |
Pipkin
| Information Security |
WEB/INTERNET CONCEPTS AND PROGRAMMING |
Amor
| E-business (R)evolution, Second Edition |
Apte/Mehta
| UDDI |
Chatterjee/Webber
| Developing Enterprise Web Services: An Architect's Guide |
Kumar
| J2EE Security for Servlets, EJBs, and Web Services |
Little/Maron/Pavlik
| Java Transaction Processing |
Mowbrey/Werry
| Online Communities |
Tapadiya
| .NET Programming |
OTHER PROGRAMMING |
Blinn
| Portable Shell Programming |
Caruso
| Power Programming in HP OpenView |
Chaudhri
| Object Databases in Practice |
Chew
| The Java/C++ Cross Reference Handbook |
Grady
| Practical Software Metrics for Project Management and Process Improvement |
Grady
| Software Metrics |
Grady
| Successful Software Process Improvement |
Lee/Schneider/Schell
| Mobile Applications |
Lewis
| The Art and Science of Smalltalk |
Lichtenbelt
| Introduction to Volume Rendering |
Mellquist
| SNMP++ |
Mikkelsen
| Practical Software Configuration Management |
Norton
| Thread Time |
Tapadiya
| COM+ Programming |
Yuan
| Windows 2000 GDI Programming |
STORAGE |
Thornburgh
| Fibre Channel for Mass Storage |
Thornburgh/Schoenborn
| Storage Area Networks |
Todman
| Designing Data Warehouses |
IT/IS |
Anderson
| mySAP Tool Bag for Performance Tuning and Stress Testing |
Missbach/Hoffman
| SAP Hardware Solutions |
IMAGE PROCESSING |
Crane
| A Simplified Approach to Image Processing |
Gann
| Desktop Scanners |