BOOKS - NETWORK TECHNOLOGIES - VMware Cross-Cloud Architecture
VMware Cross-Cloud Architecture - Ajit Pratap Kundan 2018 EPUB Packt Publishing BOOKS NETWORK TECHNOLOGIES
ECO~19 kg CO²

2 TON

Views
87206

Telegram
 
VMware Cross-Cloud Architecture
Author: Ajit Pratap Kundan
Year: 2018
Pages: 504
Format: EPUB
File size: 20 MB
Language: ENG



Pay with Telegram STARS
''

You may also be interested in:

VMware Cross-Cloud Architecture
VMware Cloud on AWS: Insights on the First VMware Enterprise-Proven SaaS Solution
Mastering VMware Cloud Disaster Recovery and Ransomware Resilience A Practical Guide on VMware Cloud Disaster and Ransomware Recovery SaaS Solution
VCP-Cloud Official Cert Guide VMware Certified Professional Cloud
Virtualization and Private Cloud with VMware Cloud Suite
VMware Private Cloud Computing with vCloud Director
Cloud Application Architecture Patterns Designing, Building, and Modernizing for the Cloud (Early Release)
Cloud Application Architecture Patterns Designing, Building, and Modernizing for the Cloud (Early Release)
Cloud Computing Fundamentals: Learn the Latest Cloud Technology and Architecture with Real-World Examples and Applications
Cloud Architecture Demystified: Understand how to design sustainable architectures in the world of Agile, DevOps, and Cloud (English Edition)
Learning VMware Workstation for Windows: Implementing and Managing VMware|s Desktop Hypervisor Solution
Learning VMware Workstation for Windows Implementing and Managing VMware|s Desktop Hypervisor Solution
Learning VMware Workstation for Windows Implementing and Managing VMware|s Desktop Hypervisor Solution
Learning Vmware Workstation Pro for Windows Volume 2 Implementing and Managing Vmware|s Desktop Hypervisor Solution
The Cloud Data Lake: A Guide to Building Robust Cloud Data Architecture
Kickstart Software Design Architecture Transform Your Software Development Journey with Key Principles and Advanced Practices in Architecture, Microservices, and Cloud Computing
Implementing VMware Dynamic Environment Manager Manage, Administer and Control VMware DEM, Dynamic Desktop, User Policies and Complete Troubleshooting
Cloud Application Architecture Patterns (ER)
Cloud-Native Application Architecture
Adaptive Cloud Enterprise Architecture
Cloud Architecture Patterns Using Microsoft Azure
Cloud Computing Concepts, Technology & Architecture
Cloud-Native Application Architecture Microservice Development Best Practice
Cloud-Native Application Architecture Microservice Development Best Practice
Building Cross-Platform Apps using Titanium, Alloy, and Appcelerator Cloud Services
Research Culture in Architecture: Cross-Disciplinary Collaboration
World Architecture A Cross-Cultural History Second Edition
Cloud Computing Concepts, Technology, Security, and Architecture, Second Edition (Final)
Cloud Computing Concepts, Technology, Security, and Architecture, Second Edition (Final)
Application Layering with VMware App Volumes Designing and deploying VMware App Volumes
Cloud-Native Data Center Networking Architecture, Protocols, and Tools (Early Release)
Cloud Native Data Center Networking Architecture, Protocols, and Tools, 1st Edition
Building Microservices with ASP.NET Core Develop, Test, and Deploy Cross-Platform Services in the Cloud
Building a Future-Proof Cloud Infrastructure A Unified Architecture for Network, Security, and Storage Services
Multi-Cloud Administration Guide Manage and optimize cloud resources across Azure, AWS, GCP, and Alibaba Cloud
Mastering Cloud Security Posture Management (CSPM): Secure multi-cloud infrastructure across AWS, Azure, and Google Cloud using proven techniques
Cloud Computing Simplified Explore Application of Cloud, Cloud Deployment Models, Service Models and Mobile Cloud Computing
Modern Computer Architecture and Organization - Second Edition: Learn x86, ARM, and RISC-V architectures and the design of smartphones, PCs, and cloud servers
Security Architecture for Hybrid Cloud A Practical Method for Designing Security Using Zero Trust Principles
Security Architecture for Hybrid Cloud: A Practical Method for Designing Security Using Zero Trust Principles