Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Documenting Software Architectures: Views and Beyond
Documenting Software Architectures: Views and Beyond

"This book is of immense value. It should save you months of trials and errors, lots of undeserved hassle, and many costly mistakes that could potentially jeopardize the whole endeavor. It will become an important reference on the shelf of the software architect."—From the Foreword by Philippe Kruchten,...

Windows Server 2003 Security : A Technical Reference
Windows Server 2003 Security : A Technical Reference

This book is not designed with the Windows end user, advanced or not, in mind. It is meant for the server administrator, network administrator, security administrator, IT manager, technology specialist, or other individual who must design, implement, troubleshoot, or configure the security of Windows Server 2003 or the...

Developing Scalable Series 40 Applications : A Guide for Java Developers (Nokia Mobile Developer)
Developing Scalable Series 40 Applications : A Guide for Java Developers (Nokia Mobile Developer)

The First Official End-To-End Solutions Guide for Every Nokia Series 40 Developer

Nokia's Series 40 Developer Platform gives Java developers access to the world's highest-volume, fastest-growing, and most exciting mobile markets. Nokia sells close to 100 million units...

XQuery from the Experts: A Guide to the W3C XML Query Language
XQuery from the Experts: A Guide to the W3C XML Query Language

"The individual perspectives on the concepts behind the XQuery language offered by XQuery from the Experts will be of great value to those who are seeking to understand the implications, opportunities, and challenges of XQuery as they design future information systems based on XML."
—Michael Champion,
...

Wireless Security and Privacy: Best Practices and Design Techniques
Wireless Security and Privacy: Best Practices and Design Techniques

The trick to sound security is to begin early, know your threats,... design for security, and subject your design to thorough objective risk analyses and testing. This book will help."—From the Foreword by Gary McGraw, CTO of Cigital, and coauthor of Building Secure...

Java and JMX: Building Manageable Systems
Java and JMX: Building Manageable Systems

Java is now used with increasing frequency to develop mission-critical applications. Using Java Management Extensions (JMX) is the key to managing those applications. As JMX is increasingly accepted into the fields of embedded systems, enterprise systems, and telephony, it is clear that all Java developers will encounter JMX...

Developing Applications with Visual Studio .NET
Developing Applications with Visual Studio .NET
DEVELOPING APPLICATIONS WITH VISUAL STUDIO.NET is
an in-depth guide that takes Windows programming to the next
level: creating .NET applications that leverage the prior
knowledge and experience of C++ Win32 programmers.

The .NET Framework supplies programmers with rich standard
run-time services, supports the
...
Inside Java 2 Platform Security: Architecture, API Design, and Implementation (2nd Edition)
Inside Java 2 Platform Security: Architecture, API Design, and Implementation (2nd Edition)

Inside Java(TM) 2 Platform Security, the definitive and comprehensive guide to the Java security platform, has been thoroughly updated to reflect key additions and revisions to Java security technologies currently in use by leading technology companies. This second edition, penned by the Java...

Software Engineering and Computer Games
Software Engineering and Computer Games

"This book should be a requirement of anyone that wants to write games-period"-Andre Lamothe, author and CEO of Xtreme Games

Software Engineering and Computer Games was written with four broad goals:

  • To teach a lively...

LDAP Programming with Java(TM)
LDAP Programming with Java(TM)
In this book we’ve provided a very large number of examples for every aspect of
programming with Directory SDK for Java, from simple code snippets to more than
two dozen complete components and applications. You may be able to use some of
them as starting points for your own projects.

We do not discuss directory
...
LDAP Directories Explained: An Introduction and Analysis
LDAP Directories Explained: An Introduction and Analysis

Directory technology promises to solve the problem of decentralized information that has arisen with the explosion of distributed computing. Lightweight Directory Access Protocol (LDAP) is a set of protocols that has become the Internet standard for accessing information directories. Until now, however, those curious about...

XML and Java: Developing Web Applications, Second Edition
XML and Java: Developing Web Applications, Second Edition

Fully revised to cover the latest standards and technologies, XML and Java(TM), Second Edition provides the practical solutions developers need to design powerful and portable Web-based applications. Featuring step-by-step examples, this book focuses on harnessing the power of Java(TM) and XML...

Result Page: 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 63 62 61 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy