|
|
|
|
Embedded Java Security: Security for Mobile DevicesThis book is a comprehensive presentation of embedded Java security (namely, J2ME CLDC/MIDP), in the sense that the security model of embedded Java is thoroughly explained, then a detailed analysis of this model is undertaken. It is compared with the security model of Java Standard Edition in order to view the impact of limited resources (typically... | | Making IT Count: Strategy, Delivery, Infrastructure (Computer Weekly Professional)'Making IT Count: from strategy to implementation' focuses on the practical elements of delivering Information Technology strategy. Studies regularly show that over half of Information Technology strategies are never implemented, or are unsuccessful in delivering the desired results, and that a significant percentage of strategies implemented... | | flex & bisonIf you need to parse or process text data in Linux or Unix, this useful book explains how to use flex and bison to solve your problems quickly. flex & bison is the long-awaited sequel to the classic O'Reilly book, lex & yacc. In the nearly two decades since the original book was published, the flex and bison utilities have proven... |
|
|
|
|
|
Result Page: 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 |