Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
ASP.NET Solutions - 23 Case Studies: Best Practices for Developers
ASP.NET Solutions - 23 Case Studies: Best Practices for Developers

Many developers are already familiar with the basics of ASP.NET and have been impressed with its potential to ease the creation of Web applications. However, few resources exist for those looking to translate their knowledge of ASP.NET into tailored solutions for actual challenges developers face on a daily basis.

...
Collaboration Explained : Facilitation Skills for Software Project Leaders (Agile Software Development Series)
Collaboration Explained : Facilitation Skills for Software Project Leaders (Agile Software Development Series)

The Hands-On Guide to Effective Collaboration in Agile Projects

To succeed, an agile project demands outstanding collaboration among all its stakeholders. But great collaboration doesn't happen by itself; it must be carefully planned and facilitated throughout the entire...

SAP BW: A Step by Step Guide for BW 2.0
SAP BW: A Step by Step Guide for BW 2.0

SAP BW has recently come to the fore as a valuable tool for developing data warehouses that accurately and effectively support critical business decision making. It facilitates easy-to-use and high-performance extraction, transfer, transformation, and loading of data from a variety of...

UML Distilled: A Brief Guide to the Standard Object Modeling Language, Third Edition
UML Distilled: A Brief Guide to the Standard Object Modeling Language, Third Edition

The long-awaited third edition of the best-selling UML book on the market; fully-updated and compliant with UML 2.0.

  • The best-selling UML book on the market, thoroughly revised and updated

  • More pearls of wisdom from Martin Fowler, one...

The Art of UNIX Programming
The Art of UNIX Programming

"Reading this book has filled a gap in my education. I feel a sense of completion, understand that UNIX is really a style of community. Now I get it, at least I get it one level deeper than I ever did before. This book came at a perfect moment for me, a moment when I shifted from visualizing programs as things to programs as...

Windows System Programming Third Edition
Windows System Programming Third Edition

Windows System Programming, Third Edition gives a solid grounding on using the core Windows APIs, includingWin64; is updated for Windows Server 2003, Windows XP, and the Microsoft Visual Studio .NET Framework, and has extensive examples illustrate all topics and...

Refactoring Databases : Evolutionary Database Design
Refactoring Databases : Evolutionary Database Design

Refactoring has proven its value in a wide range of development projectshelping software professionals improve system designs, maintainability, extensibility, and performance. Now, for the first time, leading agile methodologist Scott Ambler and renowned consultant Pramodkumar Sadalage introduce powerful refactoring techniques...

Hibernate: A J2EE™ Developer's Guide
Hibernate: A J2EE™ Developer's Guide
Build fast, high-performance Java database applications with Hibernate.

Hibernate makes it far easier to build robust, high-performance database applications with Java. Now there's a practical, hands-on guide to using Hibernate's flexible, fast object/relational persistence and query services. Will Iverson covers every facet of...

The Object Constraint Language: Getting Your Models Ready for MDA, Second Edition
The Object Constraint Language: Getting Your Models Ready for MDA, Second Edition

The release of Unified Modeling Language (UML) 2.0 places renewed emphasis on the Object Constraint Language (OCL). Within UML, OCL is the standard for specifying expressions that add vital information to object-oriented models and other object-modeling artifacts. Model-Driven Architecture (MDA) relies on OCL to add the level of...

The Tao of Network Security Monitoring : Beyond Intrusion Detection
The Tao of Network Security Monitoring : Beyond Intrusion Detection

Every network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen?

...
Preventing Web Attacks with Apache
Preventing Web Attacks with Apache

The only end-to-end guide to securing Apache Web servers and Web applications

Apache can be hacked. As companies have improved perimeter security, hackers have increasingly focused on attacking Apache Web servers and Web applications....

A First Look at ASP.NET v 2.0
A First Look at ASP.NET v 2.0

Drawing on extraordinary insider access to Microsoft's ASP.NET development team, three renowned ASP.NET experts cover every key platform enhancement, from Master Page templates for standardizing look and feel to improved security and data- access controls. They go far beyond already published white papers and previews, presenting...

unlimited object storage image
Result Page: 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy