Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
WebSphere Application Server 7.0 Administration Guide
WebSphere Application Server 7.0 Administration Guide
As an administrator you need a secure, scalable, resilient application infrastructure to support the developers building and managing J2EE applications and Service Oriented Architecture services. WebSphere application server, a product from IBM, is optimized to ease administration and improve runtime performance. It helps you run applications and...
Programming the Semantic Web
Programming the Semantic Web
With this book, the promise of the Semantic Web -- in which machines can find, share, and combine data on the Web -- is not just a technical possibility, but a practical reality. Programming the Semantic Web demonstrates several ways to implement semantic web applications, using existing and emerging standards and technologies. You'll learn how to...
Beginning Spring 2: From Novice to Professional
Beginning Spring 2: From Novice to Professional
Spring has made a remarkable rise since its conception in 2002. Users find Spring the ideal framework to build their applications in J2EE environments. Beginning Spring 2 is the first and only Spring-authorized book that takes you through the first steps of using Spring, and requires no prior J2EE experience. It discusses relevant...
Hands-On RESTful API Design Patterns and Best Practices: Design, develop, and deploy highly adaptable, scalable, and secure RESTful web APIs
Hands-On RESTful API Design Patterns and Best Practices: Design, develop, and deploy highly adaptable, scalable, and secure RESTful web APIs

Build effective RESTful APIs for enterprise with design patterns and REST framework's out-of-the-box capabilities

Key Features

  • Understand advanced topics such as API gateways, API securities, and cloud
  • Implement patterns programmatically with easy-to-follow...
Pro DNS and BIND
Pro DNS and BIND
Every time you get e-mail, every time you access a web page, you use the Domain Name
System (DNS). In fact, over 2 billion such requests hit the DNS root-servers alone every day.
Every one of those 2 billion requests originate from a DNS that supports a group of local users,
and every one of them is finally answered by a DNS server
...
Wireless Information Networks (Wiley Series in Telecommunications and Signal Processing)
Wireless Information Networks (Wiley Series in Telecommunications and Signal Processing)
Towards location aware mobile ad hoc sensors

A Systems Engineering Approach to Wireless Information Networks

The Second Edition of this internationally respected textbook brings readers fully up to date with the myriad of developments in wireless communications. When first published in 1995, wireless communications was synonymous...

Nature As Teacher: How I Discovered New Principles in the Working of Nature (Eco-Technology Series)
Nature As Teacher: How I Discovered New Principles in the Working of Nature (Eco-Technology Series)
At the time of writing the world is being engulfed by increasingly cataclysmicmanifestations of the disturbance and disruption of Nature's otherwise orderly processes. From reports received almost daily, both nationally and from around the world, we are increasingly forced to become aware of certain life-threatening irregularities in the...
Cost Optimal and Nearly Zero-Energy Buildings (nZEB): Definitions, Calculation Principles and Case Studies
Cost Optimal and Nearly Zero-Energy Buildings (nZEB): Definitions, Calculation Principles and Case Studies

Cost optimal and nearly zero energy performance levels are principles initiated by the European Union’s (EU) Energy Performance of Buildings Directive which was recast in 2010. These will be major drivers in the construction sector in the next few years, because all new buildings in the EU from 2021 onwards are expected to be nearly...

Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Real 802.11 Security: Wi-Fi Protected Access and 802.11i

"Real 802.11 Security provides clear descriptions of current and emerging security techniques. The authors handle complex topics nicely, and offer significant clarification of IEEE draft standards."
-Russ Housley, IETF Security Area Director and founder of Vigil Security, LLC

"This...

Managing the Windows NT Registry
Managing the Windows NT Registry

The Windows NT Registry is the repository for all hardware, software, and application configuration settings, and Managing the Windows NT Registry is the system administrator's guide to maintaining, monitoring, and updating the Registry database. The book addresses four main areas:

  • What is the...
Training Guide Programming in HTML5 with JavaScript and CSS3 (MCSD) (Microsoft Press Training Guide)
Training Guide Programming in HTML5 with JavaScript and CSS3 (MCSD) (Microsoft Press Training Guide)

Designed to help experienced programmers develop real-world, job-role-specific skills—this Training Guide focuses on creating applications with HTML5, JavaScript, and CSS3. Build hands-on expertise through a series of lessons, exercises, and suggested practices—and help maximize your performance on the job.

Stylish F#: Crafting Elegant Functional Code for .NET and .NET Core
Stylish F#: Crafting Elegant Functional Code for .NET and .NET Core

Why just get by in F# when you can program in style! This book goes beyond syntax and into design. It provides F# developers with best practices, guidance, and advice to write beautiful, maintainable, and correct code.

Stylish F# covers every design decision that a developer makes in constructing F#...

unlimited object storage image
Result Page: 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy