Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Memory Management: International Workshop IWMM 92, St.Malo, France, September 17 - 19, 1992. Proceedings
Memory Management: International Workshop IWMM 92, St.Malo, France, September 17 - 19, 1992. Proceedings
This is the first book entirely dedicated to the problem of memory management in programming language implementation. Its originality stems from the diversity of languages and approaches presented: functional programming, logic programming, object oriented programming, and parallel and sequential programming. The book...
MVVM Survival Guide for Enterprise Architectures in Silverlight and WPF
MVVM Survival Guide for Enterprise Architectures in Silverlight and WPF
Rich client development remains one of the most popular forms of application development, both from a user and a developer point of view. While nobody denies the importance of thin-client interface technologies such as HTML(5), it is clear that consumers and enterprises alike enjoy using applications that provide a rich,...
Software Architectures and Tools for Computer Aided Process Engineering, Volume 11
Software Architectures and Tools for Computer Aided Process Engineering, Volume 11
The idea of editing a book on modern software architectures and tools for CAPE (Computer Aided Process Engineering) came about when the editors of this volume realized that existing titles relating to CAPE did not include references to the design and development of CAPE software.

Scientific software is needed to solve CAPE related
...
Enterprise Security with EJB and CORBA(r)
Enterprise Security with EJB and CORBA(r)
"Leveraging their strong implemention and standards committee experience, the authors have delivered the definitive guide to enterprise distributed object security."–Wing K. Lee, Sprint

Enterprise Security with EJB and CORBA

With e-business and distributed components comes the need for a bold new approach to...

The Mac Hacker's Handbook
The Mac Hacker's Handbook
As more and more vulnerabilities are found in the Mac OS X (Leopard) operating system, security researchers are realizing the importance of developing proof-of-concept exploits for those vulnerabilities. This unique tome is the first book to uncover the flaws in the Mac OS X operating system—and how to deal with them. Written by two white hat...
Web 2.0 Architectures: What entrepreneurs and information architects need to know
Web 2.0 Architectures: What entrepreneurs and information architects need to know

Web 2.0 is more pervasive than ever, with business analysts and technologists struggling to comprehend the opportunity it represents. But what exactly is Web 2.0 -- a marketing term or technical reality? This fascinating book finally puts substance behind the phenomenon by identifying the core patterns of Web 2.0, and by introducing an...

Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure
Private Cloud Computing: Consolidation, Virtualization, and Service-Oriented Infrastructure
Is “provisioning a web server in 5 minutes for $5” the most interesting thing about the cloud?

Those responsible for IT in their enterprise are quickly discovering that the cloud is a game-changing trend that offers a completely new methodology for service provision. The cloud not only lets you cut
...
Categories for Software Engineering
Categories for Software Engineering

This book provides a gentle, software engineering oriented introduction to category theory. Assuming only a minimum of mathematical preparation, this book explores the use of categorical constructions from the point of view of the methods and techniques that have been proposed for the engineering of complex software systems: object-oriented...

Software Engineering for Modern Web Applications: Methodologies and Technologies (Premier Reference Source)
Software Engineering for Modern Web Applications: Methodologies and Technologies (Premier Reference Source)
As modern organizations migrate from older information architectures to new Web-based systems, the discipline of software engineering is changing both in terms of technologies and methodologies. There is a need to examine this new frontier from both a theoretical and pragmatic perspective, and offer not only a survey of new technologies and...
Managing Oracle Fusion Applications (Oracle Press)
Managing Oracle Fusion Applications (Oracle Press)
Fusion Applications takes the concept of an Enterprise Application to a whole new level. Whether you’re in the IT department, a systems integrator, a business leader, or an end user, Fusion Applications has more of what you need, less of what you don’t, and some of what you didn’t even think possible.
...
Documenting Software Architectures: Views and Beyond
Documenting Software Architectures: Views and Beyond

"This book is of immense value. It should save you months of trials and errors, lots of undeserved hassle, and many costly mistakes that could potentially jeopardize the whole endeavor. It will become an important reference on the shelf of the software architect."—From the Foreword by Philippe Kruchten,...

Hybrid Architectures for Intelligent Systems
Hybrid Architectures for Intelligent Systems

The interaction between Fuzzy Set theory and Neural Network theory is multi-faceted and occurs at many different levels. The connection between these two concepts occurs both in the framework of real and artificial neural systems.

The brain is not just a collection of neurons grouped together at some part of the animal’s body,...

unlimited object storage image
Result Page: 89 88 87 86 85 84 83 82 81 80 79 78 77 76 75 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy