Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Special Edition Using Java Server Pages and Servlets
Special Edition Using Java Server Pages and Servlets
Special Edition Using JSP and Servlets starts by detailing the evolution of web servers that led to the creation of ASP and JSP. It explains both the limitations of previous technologies and the benefits that JSP provides including platform independence. Includes coverage of: organizing applications with multiple files and client-side objects,...
Forensic Medicine of the Lower Extremity (Forensic Science and Medicine)
Forensic Medicine of the Lower Extremity (Forensic Science and Medicine)

Publius Syrus stated back in 42 B.C., “You cannot put the same shoe on every foot.” (Maxim 596) Though written long before the advent of forensic science, Syrus’ maxim summarizes the theme of Forensic Medicine of the Lower Extremity: Human Identification and Trauma Analysis of the Thigh, Leg, and Foot. Put simply, the lower...

Serious Performance Consulting According to Rummler
Serious Performance Consulting According to Rummler

Praise for Serious Performance Consulting According to Rummler

"Before there was 'lean,' before there was TQM, before there was knowledge management, and before there were any one-minute cures, there was Geary Rummler preaching and practicing performance technology. With Serious...

Objects, Abstraction, Data Structures and Design: Using C++
Objects, Abstraction, Data Structures and Design: Using C++
Our goal in writing this book was to combine a strong emphasis on problem solving and software design with the study of data structures. To this end, we discuss applications of each data structure to motivate its study. After providing the specification (a header file) and the implementation of an abstract data type, we cover case...
How to Cheat at Securing a Wireless Network
How to Cheat at Securing a Wireless Network
Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. Some of the primary threats are the result of the following factors:
  • Denial of service (DoS) and other network layer attacks
  • Unauthorized...
Network Models and Optimization: Multiobjective Genetic Algorithm Approach (Decision Engineering)
Network Models and Optimization: Multiobjective Genetic Algorithm Approach (Decision Engineering)
Network models are critical tools in business, management, science and industry. Network Models and Optimization: Multiobjective Genetic Algorithm Approach presents an insightful, comprehensive, and up-to-date treatment of multiple objective genetic algorithms to network optimization problems in many disciplines, such as engineering,...
Everyday Information: The Evolution of Information Seeking in America (MIT Press)
Everyday Information: The Evolution of Information Seeking in America (MIT Press)

All day, every day, Americans seek information. We research major purchases. We check news and sports. We visit government Web sites for public information and turn to friends for advice about our everyday lives. Although the Internet influences our information-seeking behavior, we gather information from many sources: family and friends,...

The Pragmatist's Guide to Corporate Lean Strategy: Incorporating Lean Startup and Lean Enterprise Practices in Your Business
The Pragmatist's Guide to Corporate Lean Strategy: Incorporating Lean Startup and Lean Enterprise Practices in Your Business
Use this practical, step-by-step guide on lean agile strategy to harness technological disruption at your large business to successfully advance your business rather than suffer a loss of business. The lean agile enterprise concept is demystified and translated into action as the author shares his experience with both success and major...
A Comprehensive Guide to Enterprise Mobility (Infosys Press)
A Comprehensive Guide to Enterprise Mobility (Infosys Press)

Although enterprise mobility is in high demand across domains, an absence of experts who have worked on enterprise mobility has resulted in a lack of books on the subject. A Comprehensive Guide to Enterprise Mobility fills this void. It supplies authoritative guidance on all aspects of enterprise mobility―from technical...

Approximation and Online Algorithms: 8th International Workshop, WAOA 2010
Approximation and Online Algorithms: 8th International Workshop, WAOA 2010

Networked systems for transport, communication, and social interaction have contributed to all aspects of life by increasing economic and social efficiency. However, increased connectivity also gives intruders and attackers better opportunities to maliciously spread in the network, whether the spread is of disinformation, or of contamination...

Delphi/Kylix Database Development
Delphi/Kylix Database Development
The aim of this book is to teach cross-platform database programming to Delphi 6 or Kylix programmers. The book will assume the reader has a basic understanding of databases, such as what tables, rows, columns, fields, indexes, etc. are. It will also assume the reader has a working knowledge of Delphi and/or Kylix. A thorough investigation of...
Becoming Immortal: Combining Cloning and Stem-Cell Therapy
Becoming Immortal: Combining Cloning and Stem-Cell Therapy
Expecting to relax during a routine flight home, I casually glanced through the contents of the airline’s magazine and practically suffered a heart attack. The first feature article was entitled, “How to Live Forever”! Believing for a moment that Becoming Immortal had been scooped, I tore through the magazine...
unlimited object storage image
Result Page: 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy