Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building Web Applications with UML Second Edition
Building Web Applications with UML Second Edition

This is a new edition of the widely acclaimed Building Web Applications with UML. Based on the author's extensive experience as a Web developer, it incorporates helpful reader feedback, identifies and addresses modeling problems unique to page-based Web applications, and offers practical advice...

Time-Saver Standards for Architectural Design Data
Time-Saver Standards for Architectural Design Data

In preparing this the Seventh edition, the first revision in more than a dozen years, the editors were challenged in many respects. This is evident in the fact that the volume has been almost entirely rewritten, with new articles by over eighty authors. It is also evident in its new format and contents, expanded to include...

Architecting Complex-Event Processing Solutions with TIBCO® (TIBCO Press)
Architecting Complex-Event Processing Solutions with TIBCO® (TIBCO Press)

The architecture series from TIBCO® Press comprises a coordinated set of titles for software architects and developers, showing how to combine TIBCO components to design and build real-world solutions.

 

Complex-event processing is required when...

Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance (2nd Edition)
Cisco ASA: All-in-One Firewall, IPS, Anti-X, and VPN Adaptive Security Appliance (2nd Edition)

For organizations of all sizes, the Cisco ASA product family offers powerful new tools for maximizing network security. Cisco ASA: All-in-One Firewall, IPS, Anti-X and VPN Adaptive Security Appliance, Second Edition, is Cisco's authoritative practitioner's guide to planning, deploying, managing, and troubleshooting...

Core Security Patterns: Best Practices and Strategies for J2EE(TM), Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE(TM), Web Services, and Identity Management
Core Security Patterns is the hands-on practitioner™s guide to building robust end-to-end security into J2EE™ enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. Written by three leading Java security architects, the patterns-driven approach...
Embedded Multitasking (Embedded Technology)
Embedded Multitasking (Embedded Technology)
In an embedded system, firmware is the software that directly interfaces with the microcontroller, controlling the systems function. The major forces driving the embedded firmware development process today are reduced development times, increased complexity, and the need to handle multiple tasks simultaneously. These forces translate into strenuous...
Architecting Dependable Systems (Lecture Notes in Computer Science)
Architecting Dependable Systems (Lecture Notes in Computer Science)
As software systems become more and more ubiquitous, the issues of dependability become more and more critical. Given that solutions to these issues must be planned at the beginning of the design process, it is appropriate that these issues be addressed at the architectural level. This book is inspired by the ICSE 2002 Workshop on Architecting...
Oracle SOA Governance 11g Implementation
Oracle SOA Governance 11g Implementation

Being able to implement SOA governance competently can make a huge difference to your organization's efficiency. This guide shows you how through a complete practical course based on Oracle's highly regarded software suite.

Overview

  • Understand SOA governance including its key concepts, goals, and...
Power Management Integrated Circuits (Devices, Circuits, and Systems)
Power Management Integrated Circuits (Devices, Circuits, and Systems)

Power Management Integrated Circuits and Technologies delivers a modern treatise on mixed-signal integrated circuit design for power management. Comprised of chapters authored by leading researchers from industry and academia, this definitive text:

  • Describes circuit- and architectural-level innovations...
Seismic Design for Architects
Seismic Design for Architects
Essential visual guide to successful architecture in earthquake zones

Architects across the world have to design buildings that need to comply with strict seismic codes. All too often the need to comply with the code is put ahead of the design of the building, resulting in dull and functional architecture.

Andrew
...
Lonely Planet Paris (City Guide)
Lonely Planet Paris (City Guide)

“Paris has a timeless familiarity for first-time and frequent visitors, with more architectural icons than any other city along with glorious food, stylish shopping and priceless artistic treasures.” – Catherine Le Nevez, Lonely Planet Writer

Our Promise
You can trust our travel information
...

Internet of Things for Architects: Architecting IoT solutions by implementing sensors, communication infrastructure, edge computing, analytics, and security
Internet of Things for Architects: Architecting IoT solutions by implementing sensors, communication infrastructure, edge computing, analytics, and security

Learn to design, implement and secure your IoT infrastructure

Key Features

  • Build a complete IoT system that is the best fit for your organization
  • Learn about different concepts, technologies, and tradeoffs in the IoT architectural stack
  • Understand the...
unlimited object storage image
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy