Home | Amazing | Today | Tags | Publishers | Years | Search 
Advanced J2EE Platform Development: Applying Integration Tier Patterns
Advanced J2EE Platform Development: Applying Integration Tier Patterns
A proven Java(TM)-based approach to standardizing and streamlining legacy migration

This book focuses on the key challenges developers face when using the Java 2 platform Enterprise Edition (J2EE) to encapsulate legacy applications for delivery in a multi-tier Internet environment. Leading Sun architects Torbjoern Dahlen and Thorbioern Fritzon...

IT Web Services: A Roadmap for the Enterprise (Harris Kern's Enterprise Computing Institute Series)
IT Web Services: A Roadmap for the Enterprise (Harris Kern's Enterprise Computing Institute Series)

Today, more than ever, enterprises are faced with great challenges: rising development costs, budget cutbacks, and increasing customer demands, to name a few. Decision makers must determine which projects to fund and are often confronted with an existing technology infrastructure that already includes a hodgepodge of...

Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition
Oracle Identity Management: Governance, Risk, and Compliance Architecture, Third Edition
An identity management system is defined as the management of the identity life cycle of entities (subjects or objects) during which the identity is established, described, and destroyed. What this definition fails to cover is the social, personal, and financial impact of the identity life cycle.

Before I joined Oracle as director of GRC
...
Wireless Communications Security (Artech House Universal Personal Communications)
Wireless Communications Security (Artech House Universal Personal Communications)
Addressing the fast-growing need to integrate effective security features into wireless communication systems, this cutting-edge book offers a broad overview of wireless security, so engineers can choose the methods and techniques that are most appropriate for their projects. Professionals gain a solid understanding of critical cryptography...
Network Security Essentials (2nd Edition)
Network Security Essentials (2nd Edition)
This book provides a practical, up-to-date, and comprehensive survey of network-based and Internet-based security applications and standards. This books covers e-mail security, IP security, Web security, and network management security. It also includes a concise section on the discipline of cryptography—covering algorithms and protocols...
Developing Software with UML: Object-Oriented Analysis and Design in Practice (2nd Edition)
Developing Software with UML: Object-Oriented Analysis and Design in Practice (2nd Edition)

Practical guide to exploiting the power of Object Technology and UML in your software development process.

This book is a practical, example-driven introduction to OO analysis and design. The author is a highly experienced OO practitioner and in the book he highlights the benefits of using the OO approach for software development.

...
AutoCAD 2009 and AutoCAD LT 2009: No Experience Required
AutoCAD 2009 and AutoCAD LT 2009: No Experience Required
This book was born of the need for a simple, yet engaging tutorial that would help beginners step into the world of AutoCAD or AutoCAD LT without feeling intimidated. That tutorial has evolved over the years into a full introduction to the ways in which architects and civil and structural engineers use AutoCAD to increase their efficiency and...
Implementing Email and Security Tokens: Current Standards, Tools, and Practices
Implementing Email and Security Tokens: Current Standards, Tools, and Practices
It's your job to make email safe.

Where do you start?

In today's national and global enterprises where business is conducted across time zones and continents, the "e" in email could stand for "essential." Even more critical is rock-solid email security. If you're the...

The Grid 2: Blueprint for a New Computing Infrastructure (The Elsevier Series in Grid Computing)
The Grid 2: Blueprint for a New Computing Infrastructure (The Elsevier Series in Grid Computing)
“This is a source book for the history of the future.

Vint Cerf, Senior Vice President, Internet Architecture and Engineering, MCI Communications

The grid promises to fundamentally change the way we think about and use computing. This infrastructure will connect multiple regional and national computational...

Object Oriented Programming in VB.Net
Object Oriented Programming in VB.Net
This book takes an object-oriented approach to introduce Visual Basic .NET. The author begins by covering object-oriented analysis, design, and modeling using UML. He then moves into a detailed discussion of objects and clasess, after which, readers begin develoing their own short programs. Advanced topics such as data structures, components,...
End-to-End Quality of Service Over Heterogeneous Networks
End-to-End Quality of Service Over Heterogeneous Networks
The book presents mechanisms, protocols, and system architectures to achieve end-to-end Quality-of-Service (QoS) over heterogeneous wired/wireless networks in the Internet. Particular focus is on measurement techniques, traffic engineering mechanisms and protocols, signalling protocols as well as transport protocol extensions to support fairness...
Embedded Computer Systems: Architectures, Modeling, and Simulation: 8th International Workshop, SAMOS 2008, Samos, Greece, July 21-24, 2008, Proceedings
Embedded Computer Systems: Architectures, Modeling, and Simulation: 8th International Workshop, SAMOS 2008, Samos, Greece, July 21-24, 2008, Proceedings
This book constitutes the refereed proceedings of the 8th International Workshop on Systems, Architectures, Modeling, and Simulation, SAMOS 2008, held in Samos, Greece, in July 2008.

The 24 revised full papers presented together with a contamplative keynote and additional papers of two special workshop sessions were carefully reviewed and...

Result Page: 204 203 202 201 200 199 198 197 196 195 194 193 192 191 190 189 188 187 186 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy