Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Developing Java Web Services: Architecting and Developing Secure Web Services Using Java
Developing Java Web Services: Architecting and Developing Secure Web Services Using Java
"I commend this book to you as your springboard to the future of how to make the Net work."
-from the Foreword by Simon Phipps, Chief Technology Evangelist, Sun Microsystems, Inc.

This hands-on developer's guide to Web services prepares you for the next level of distributed computing. The authors clearly show
...
Design Methods and Applications for Distributed Embedded Systems
Design Methods and Applications for Distributed Embedded Systems

The ever decreasing price/performance ratio of microcontrollers makes it economically attractive to replace more and more conventional mechanical or electronic control systems within many products by embedded real-time computer systems. An embedded real-time computer system is always part of a well-specified larger system, which we call an...

Mastering Azure Analytics: Architecting in the Cloud with Azure Data Lake, HDInsight, and Spark
Mastering Azure Analytics: Architecting in the Cloud with Azure Data Lake, HDInsight, and Spark

Microsoft Azure has over 20 platform-as-a-service (PaaS) offerings that can act in support of a big data analytics solution. So which one is right for your project? This practical book helps you understand the breadth of Azure services by organizing them into a reference framework you can use when crafting your own big data analytics...

Service-Oriented Modeling (SOA): Service Analysis, Design, and Architecture
Service-Oriented Modeling (SOA): Service Analysis, Design, and Architecture
Answers to your most pressing SOA development questions

How do we start with service modeling? How do we analyze services for better reusability? Who should be involved? How do we create the best architecture model for our organization? This must-read for all enterprise leaders gives you all the answers and tools needed to develop a sound...

Wireless Security
Wireless Security
Get full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless...
Deployment of Microsoft Azure Cloud Solutions: A complete guide to cloud development using Microsoft Azure
Deployment of Microsoft Azure Cloud Solutions: A complete guide to cloud development using Microsoft Azure

Master all the important and tough decision-making aspects involved in architecting an Azure public cloud for your organization.

Key Features

  • Deploy Azure Active Directory and implement synchronization
  • Manage storage solutions with Azure network services
  • ...
Enterprise Rails
Enterprise Rails
Enterprise Rails is indispensable for anyone planning to build enterprise web services. It's one thing to get your service off the ground with a framework like Rails, but quite another to construct a system that will hold up at enterprise scale. The secret is to make good architectural choices from the beginning. Chak shows you how to make those...
Linux HPC Cluster Installation
Linux HPC Cluster Installation
Few people who use computers have not heard of Linux®. Linux is at the heart of a revolution that is fundamentally changing many aspects of how software is written and delivered. It remains to be seen where this revolution will ultimately lead. Far less nebulous is the Linux penetration into the scientific calculation arena, or more...
Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise
Blackjacking: Security Threats to BlackBerry Devices, PDAs, and Cell Phones in the Enterprise

Is someone waiting to pick off your BlackBerry?

Today, it is almost impossible to do business without a cell phone and a BlackBerry or PDA. These devices are a lifeline for companies large and small. And nobody knows this better than a hacker.

Traditionally, security for mobile devices—which are essentially...

Architecting the Industrial Internet: The architect's guide to designing Industrial Internet solutions
Architecting the Industrial Internet: The architect's guide to designing Industrial Internet solutions

Learn the ins and outs of the Industrial Internet of Things through subjects ranging from its history and evolution, right up to what the future holds.

About This Book

  • Define solutions that can connect existing systems and newer cloud-based solutions to thousands of thousands of edge devices and...
Architecting Composite Applications and Services with TIBCO (TIBCO Press)
Architecting Composite Applications and Services with TIBCO (TIBCO Press)

The architecture series from TIBCO® Press comprises a coordinated set of titles for software architects and developers, showing how to combine TIBCO components to design and build real-world solutions. TIBCO’s product suite comprises components with functionality ranging from messaging through services, service...

Buliding N1™ Grid Solutions Preparing, Architecting, and Implementing Service-Centric Data Centers (Official Sun Microsystems Resource)
Buliding N1™ Grid Solutions Preparing, Architecting, and Implementing Service-Centric Data Centers (Official Sun Microsystems Resource)

The N1 Grid is Sun's vision, strategy, and architecture—and a set of products—that redefine the nature of data center computing. The N1 Grid architecture uses the network, physically and logically, as its fundamental organizing principle.

This book enables the reader to implement service-centric data center solutions through...

unlimited object storage image
Result Page: 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy