Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Developing Scalable Series 40 Applications : A Guide for Java Developers (Nokia Mobile Developer)
Developing Scalable Series 40 Applications : A Guide for Java Developers (Nokia Mobile Developer)

The First Official End-To-End Solutions Guide for Every Nokia Series 40 Developer

Nokia's Series 40 Developer Platform gives Java developers access to the world's highest-volume, fastest-growing, and most exciting mobile markets. Nokia sells close to 100 million units...

XQuery from the Experts: A Guide to the W3C XML Query Language
XQuery from the Experts: A Guide to the W3C XML Query Language

"The individual perspectives on the concepts behind the XQuery language offered by XQuery from the Experts will be of great value to those who are seeking to understand the implications, opportunities, and challenges of XQuery as they design future information systems based on XML."
—Michael Champion,
...

Wireless Security and Privacy: Best Practices and Design Techniques
Wireless Security and Privacy: Best Practices and Design Techniques

The trick to sound security is to begin early, know your threats,... design for security, and subject your design to thorough objective risk analyses and testing. This book will help."—From the Foreword by Gary McGraw, CTO of Cigital, and coauthor of Building Secure...

Java and JMX: Building Manageable Systems
Java and JMX: Building Manageable Systems

Java is now used with increasing frequency to develop mission-critical applications. Using Java Management Extensions (JMX) is the key to managing those applications. As JMX is increasingly accepted into the fields of embedded systems, enterprise systems, and telephony, it is clear that all Java developers will encounter JMX...

Developing Applications with Visual Studio .NET
Developing Applications with Visual Studio .NET
DEVELOPING APPLICATIONS WITH VISUAL STUDIO.NET is
an in-depth guide that takes Windows programming to the next
level: creating .NET applications that leverage the prior
knowledge and experience of C++ Win32 programmers.

The .NET Framework supplies programmers with rich standard
run-time services, supports the
...
Inside Java 2 Platform Security: Architecture, API Design, and Implementation (2nd Edition)
Inside Java 2 Platform Security: Architecture, API Design, and Implementation (2nd Edition)

Inside Java(TM) 2 Platform Security, the definitive and comprehensive guide to the Java security platform, has been thoroughly updated to reflect key additions and revisions to Java security technologies currently in use by leading technology companies. This second edition, penned by the Java...

Software Engineering and Computer Games
Software Engineering and Computer Games

"This book should be a requirement of anyone that wants to write games-period"-Andre Lamothe, author and CEO of Xtreme Games

Software Engineering and Computer Games was written with four broad goals:

  • To teach a lively...

LDAP Directories Explained: An Introduction and Analysis
LDAP Directories Explained: An Introduction and Analysis

Directory technology promises to solve the problem of decentralized information that has arisen with the explosion of distributed computing. Lightweight Directory Access Protocol (LDAP) is a set of protocols that has become the Internet standard for accessing information directories. Until now, however, those curious about...

XML and Java: Developing Web Applications, Second Edition
XML and Java: Developing Web Applications, Second Edition

Fully revised to cover the latest standards and technologies, XML and Java(TM), Second Edition provides the practical solutions developers need to design powerful and portable Web-based applications. Featuring step-by-step examples, this book focuses on harnessing the power of Java(TM) and XML...

Real-Time Design Patterns: Robust Scalable Architecture for Real-Time Systems
Real-Time Design Patterns: Robust Scalable Architecture for Real-Time Systems

When creating real-time and embedded (RTE) systems, there is no room for error. The nature of the final product demands that systems be powerful, efficient, and highly reliable. The constraints of processor and memory resources add to this challenge. Sophisticated developers rely on design patterns—proven solutions to...

Programming Ruby: A Pragmatic Programmer's Guide
Programming Ruby: A Pragmatic Programmer's Guide
This book is a tutorial and reference for the Ruby programming language. Use Ruby, and you'll write better code, be more productive, and enjoy programming more.

These are bold claims, but we think that after reading this book you'll agree with them. And we have the experience to back up this belief.

As Pragmatic
...
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Real 802.11 Security: Wi-Fi Protected Access and 802.11i

"Real 802.11 Security provides clear descriptions of current and emerging security techniques. The authors handle complex topics nicely, and offer significant clarification of IEEE draft standards."
-Russ Housley, IETF Security Area Director and founder of Vigil Security, LLC

"This...

Result Page: 82 81 80 79 78 77 76 75 74 73 72 71 70 69 68 67 66 65 64 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy