Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Developing Web Services with Apache Axis
Developing Web Services with Apache Axis
If you'd like to learn how to create web services (in particular, using Apache Axis) and make some sense of various standards like SOAP, WSDL, JAX-RPC, SOAP with attachments, WS-Security, XML Encryption and XML Signature, then this book is for you. It has a tutorial style that walks you through in a step-by-step manner to create working code. The...
Professional XML Development with Apache Tools : Xerces, Xalan, FOP, Cocoon, Axis, Xindice
Professional XML Development with Apache Tools : Xerces, Xalan, FOP, Cocoon, Axis, Xindice

If you’re a Java Programmer working with XML, you probably already use some of the tools developed by the Apache Software Foundation. This book is a code-intensive guide to the Apache XML tools that are most relevant for Java developers, including Xerces, Xalan, FOP, Cocoon, Axis, and Xindice.

Theodore Leung, a founding member of...

The Story of Spin
The Story of Spin
All atomic particles have a particular "spin," analogous to the earth's rotation on its axis. The quantum mechanical reality underlying spin is complex and still poorly understood. Sin-itiro Tomonaga's The Story of Spin remains the most complete and accessible treatment of spin, and is now available in English translation....
Least Privilege Security for Windows 7, Vista, and XP
Least Privilege Security for Windows 7, Vista, and XP

Least Privilege Security is the practice of assigning users and programs the minimum permissions required to complete a given task. Implementing this principle in different versions of Microsoft Windows requires careful planning and a good understanding of Windows security. While there are benefits in implementing Least Privilege Security on...

Quickstart Apache Axis2
Quickstart Apache Axis2
A new architecture for Axis2 was introduced during the first Axis2 summit, which was held in 2004 in Colombo, Sri Lanka. This new architecture is more flexible, efficient, and configurable in comparison to Axis1.x architecture. Some well established concepts from Axis 1.x, like handlers, have been preserved in the
new architecture.
...
Aerodynamics of Wind Turbines
Aerodynamics of Wind Turbines

Aerodynamics of Wind Turbines is the established essential text for the fundamental solutions to efficient wind turbine design. Now in its second edition, it has been entirely updated and substantially extended to reflect advances in technology, research into rotor aerodynamics and the structural response of the wind turbine structure.
...

Principles of Turbomachinery - Second Edition
Principles of Turbomachinery - Second Edition
Pumps, fans, compressors and turbines are essential components in all engineering complexes. This book explains the basic fluid mechanics and thermodynamics underlying their design in a clear and uncomplicated way, with many examples and worked exercises. A wealth of problems and solutions are also included in the book to assist students....
Graph Classification and Clustering Based on Vector Space Embedding
Graph Classification and Clustering Based on Vector Space Embedding
Due to the ability of graphs to represent properties of entities and binary relations at the same time, a growing interest in graph based object repre sentation can be observed in science and engineering. Yet, graphs are still not the common data structure in pattern recognition and related fields. The reason for this is twofold. First,...
Principles of Molecular Neurosurgery (Progress in Neurological Surgery, Vol. 18)
Principles of Molecular Neurosurgery (Progress in Neurological Surgery, Vol. 18)

The future of neurosurgery will be characterized by less invasive, molecular technologies that promise to revolutionize the field of neurosurgery and impact the treatment of additional neurological disorders, including neurometabolic diseases, stroke, dementias, affective and psychiatric diseases, movement disorders, epilepsy, and others....

Deadly Imbalances
Deadly Imbalances
At the height of its power in the summer of 1942, Hitlerite Germany had enslaved four hundred million people; its empire stretched from the Mediterranean to the Arctic, from the English Channel to the Black Sea and almost to the Caspian. Between the Ukrainian steppes and the Pyrenees only Switzerland remained free. Even Mussolini, whom Hitler once...
Diseases of the Thyroid in Childhood and Adolescence (Pediatric and Adolescent Medicine, Vol. 11)
Diseases of the Thyroid in Childhood and Adolescence (Pediatric and Adolescent Medicine, Vol. 11)

This volume presents the latest global knowledge of thyroid disorders in infancy, childhood, and adolescence and represents experience and views from a panel of the world’s most renowned authorities on thyroid pathophysiology and clinical entities in the pediatric population. Both basic science and clinical aspects of thyroid disease...

Geometry for Computer Graphics: Formulae, Examples and Proofs
Geometry for Computer Graphics: Formulae, Examples and Proofs
Geometry is the cornerstone of computer graphics and computer animation, and provides the framework and tools for solving problems in two and three dimensions. This may be in the form of describing simple shapes such as a circle, ellipse, or parabola, or complex problems such as rotating 3D objects about an arbitrary axis. Geometry for Computer...
Result Page: 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy