Special Edition Using Java Server Pages and Servlets Special Edition Using JSP and Servlets starts by detailing the evolution of web servers that led to the creation of ASP and JSP. It explains both the limitations of previous technologies and the benefits that JSP provides including platform independence. Includes coverage of: organizing applications with multiple files and client-side objects,... Forensic Medicine of the Lower Extremity (Forensic Science and Medicine)
Publius Syrus stated back in 42 B.C., “You cannot put the same shoe on every foot.” (Maxim 596) Though written long before the advent of forensic science, Syrus’ maxim summarizes the theme of Forensic Medicine of the Lower Extremity: Human Identification and Trauma Analysis of the Thigh, Leg, and Foot. Put simply, the lower...
Serious Performance Consulting According to Rummler
Praise for Serious Performance Consulting According to Rummler
"Before there was 'lean,' before there was TQM, before there was knowledge management, and before there were any one-minute cures, there was Geary Rummler preaching and practicing performance technology. With Serious...
Objects, Abstraction, Data Structures and Design: Using C++
Our goal in writing this book was to combine a strong emphasis on problem solving
and software design with the study of data structures. To this end, we discuss applications
of each data structure to motivate its study. After providing the specification
(a header file) and the implementation of an abstract data type, we cover case... How to Cheat at Securing a Wireless Network Wireless connectivity is now a reality in most businesses. Yet by its nature, wireless networks are the most difficult to secure and are often the favorite target of intruders. Some of the primary threats are the result of the following factors:
- Denial of service (DoS) and other network layer attacks
Approximation and Online Algorithms: 8th International Workshop, WAOA 2010
Networked systems for transport, communication, and social interaction have contributed to all aspects of life by increasing economic and social efficiency. However, increased connectivity also gives intruders and attackers better opportunities to maliciously spread in the network, whether the spread is of disinformation, or of contamination...
Delphi/Kylix Database Development The aim of this book is to teach cross-platform database programming to Delphi 6 or Kylix programmers. The book will assume the reader has a basic understanding of databases, such as what tables, rows, columns, fields, indexes, etc. are. It will also assume the reader has a working knowledge of Delphi and/or Kylix. A thorough investigation of... Becoming Immortal: Combining Cloning and Stem-Cell Therapy
Expecting to relax during a routine flight home, I casually glanced through
the contents of the airline’s magazine and practically suffered a heart attack.
The first feature article was entitled, “How to Live Forever”! Believing for
a moment that Becoming Immortal had been scooped, I tore through the
|Result Page: 3 2 1 |