Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Perimeter Security
Perimeter Security
Perimeter Security has taken on a new level of importance since 9/11. Whether insuring the safety of government buildings, hospitals, residences, or bio-research labs, the safety of workers and materials can only be ensured by outfitting all points of entry with the appropriate alarm and surveillance equipment. This comprehensive hands-on resource...
Building Web Reputation Systems
Building Web Reputation Systems

Today’s Web is the product of over a billion hands and minds. Around the clock and around the globe, people are pumping out contributions small and large: full-length features on Vimeo, video shorts on YouTube, comments on Blogger, discussions on Yahoo! Groups, and tagged-and-titled Del.icio.us bookmarks. User-generated content...

Framework Design Guidelines: Conventions, Idioms, and Patterns for Reusable .NET Libraries (2nd Edition)
Framework Design Guidelines: Conventions, Idioms, and Patterns for Reusable .NET Libraries (2nd Edition)

Framework Design Guidelines, Second Edition, teaches developers the best practices for designing reusable libraries for the Microsoft .NET Framework. Expanded and updated for .NET 3.5, this new edition focuses on the design issues that directly affect the programmability of a class library, specifically its...

Ajax Security
Ajax Security
The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities

 

More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly moving to the Web via Ajax. But, all too often, this...

Big Data Application Architecture Q&A: A Problem - Solution Approach (Expert's Voice in Big Data)
Big Data Application Architecture Q&A: A Problem - Solution Approach (Expert's Voice in Big Data)

Big Data Application Architecture Pattern Recipes provides an insight into heterogeneous infrastructures, databases, and visualization and analytics tools used for realizing the architectures of big data solutions. Its problem-solution approach helps in selecting the right architecture to solve the problem at hand. In the process of...

Requirements Management Using IBM(R) Rational(R) RequisitePro(R)
Requirements Management Using IBM(R) Rational(R) RequisitePro(R)
Optimize Your Entire Requirements Process–and Use Requirements to Build More Successful Software

 

Using IBM® Rational® RequisitePro®, you can systematically improve the way you create and maintain requirements–and use those requirements to build...

VMware vCloud Director Cookbook
VMware vCloud Director Cookbook

Over 80 recipes to help you master VMware vCloud Director

Overview

  • Learn how to work with the vCloud API
  • Covers the recently launched VMware vCloud Suite 5.5
  • Step-by-step instructions to simplify infrastructure provisioning
  • Real-life implementation of tested...
House Rating Schemes: From Energy to Comfort Base (Green Energy and Technology)
House Rating Schemes: From Energy to Comfort Base (Green Energy and Technology)

"House Rating Schemes" provides information to students, architects and researchers in the field of the built environment. It reviews current House Rating Schemes (HRS) used in different countries and investigates how these schemes assess the thermal performance of a house. It challenges the way that these schemes assess building...

DevOps for Serverless Applications: Design, deploy, and monitor your serverless applications using DevOps practices
DevOps for Serverless Applications: Design, deploy, and monitor your serverless applications using DevOps practices

Set up complete CI and CD pipelines for your serverless applications using DevOps principles

Key Features

  • Understand various services for designing serverless architecture
  • Build CD pipelines using various cloud providers for your serverless applications
  • ...
The Object Constraint Language: Getting Your Models Ready for MDA, Second Edition
The Object Constraint Language: Getting Your Models Ready for MDA, Second Edition

The release of Unified Modeling Language (UML) 2.0 places renewed emphasis on the Object Constraint Language (OCL). Within UML, OCL is the standard for specifying expressions that add vital information to object-oriented models and other object-modeling artifacts. Model-Driven Architecture (MDA) relies on OCL to add the level of...

Professional BizTalk Server 2006
Professional BizTalk Server 2006
This book provides insight into how industry experts have successfully architected, developed, and maintained Microsoft BizTalk Server in mission-critical environments. Authored by highly-regarded consultants with a wealth of knowledge on designing, building, and operating enterprise applications using BizTalk, this comprehensive guide gives you...
LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning
LDAP Metadirectory Provisioning Methodology: a step by step method to implementing LDAP based metadirectory provisioning

This work provides system architects a methodology for the implementation of x.500 and LDAP based metadirectory provisioning systems. In addition this work assists in the business process analysis that accompanies any deployment. DOC Safe Harbor & European Commission’s Directive on Data Protection (Directive 95/46/EC) issues are also...

Result Page: 66 65 64 63 62 61 60 59 58 57 56 55 54 53 52 51 50 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy