Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Service-Oriented Modeling (SOA): Service Analysis, Design, and Architecture
Service-Oriented Modeling (SOA): Service Analysis, Design, and Architecture
Answers to your most pressing SOA development questions

How do we start with service modeling? How do we analyze services for better reusability? Who should be involved? How do we create the best architecture model for our organization? This must-read for all enterprise leaders gives you all the answers and tools needed to develop a sound...

NHibernate in Action
NHibernate in Action
In the classic style of Manning's "In Action" series, NHibernate in Action shows .NET developers how to use the NHibernate Object/Relational Mapping tool. This book is a translation from Java to .NET, as well as an expansion, of Manning's bestselling Hibernate in Action. All traces of Java have been carefully replaced by their .NET...
Information Security Management Handbook, Volume 7
Information Security Management Handbook, Volume 7

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding...

Software Development From A to Z: A Deep Dive into all the Roles Involved in the Creation of Software
Software Development From A to Z: A Deep Dive into all the Roles Involved in the Creation of Software

Understand the big picture of the software development process. We use software every day – operating systems, applications, document editing programs, home banking – but have you ever wondered who creates software and how it’s created? This book guides you through the entire process, from conception to the finished...

Cryptology Unlocked
Cryptology Unlocked
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security.

This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic...

Serious Performance Consulting According to Rummler
Serious Performance Consulting According to Rummler

Praise for Serious Performance Consulting According to Rummler

"Before there was 'lean,' before there was TQM, before there was knowledge management, and before there were any one-minute cures, there was Geary Rummler preaching and practicing performance technology. With Serious...

Computer-Aided Intelligent Recognition Techniques and Applications
Computer-Aided Intelligent Recognition Techniques and Applications
Intelligent recognition methods have recently proven to be indispensable in a variety of modern industries, including computer vision, robotics, medical imaging, visualization and the media. Furthermore, they play a critical role in the traditional fields such as character recognition, natural language processing and personal identification.

...

Cornea and External Eye Disease: Corneal Allotransplantation, Allergic Disease and Trachoma (Essentials in Ophthalmology)
Cornea and External Eye Disease: Corneal Allotransplantation, Allergic Disease and Trachoma (Essentials in Ophthalmology)
The second volume covers a broad range of conjunctival and corneal diseases, again with particular emphasis being placed on problem management.

Various new surgical approaches are currently being evaluated in the clinical setting, an example of which is posterior lamellar keratoplasty in Fuchs endothelial
...
Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on ... (Smart Innovation, Systems and Technologies)
Advanced Computing, Networking and Informatics- Volume 2: Wireless Networks and Security Proceedings of the Second International Conference on ... (Smart Innovation, Systems and Technologies)

Advanced Computing, Networking and Informatics are three distinct and mutually exclusive disciplines of knowledge with no apparent sharing/overlap among them. However, their convergence is observed in many real world applications, including cyber-security, internet banking, healthcare, sensor networks, cognitive radio, pervasive computing...

Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Dns in Action: A Detailed And Practical Guide to Dns Implementation, Configuration, And Administration
Recently, while driving to my work, I listened to radio as usual. Because of the establishment of the new EU (European Union) domain, there was an interview with a representative of one of the Internet Service Providers. For some time the interview went on, boringly similar to other common radio interviews, but suddenly the presswoman started to...
Variations in Economic Analysis: Essays in Honor of Eli Schwartz
Variations in Economic Analysis: Essays in Honor of Eli Schwartz

For over fifty years, Eli Schwartz has inspired generations of economists through his prolific publications and dedicated in teaching. In 2008, the Martindale Center for the Study of Private Enterprise at Lehigh University invited prominent academics and practitioners—including Nobel Prize recipients, Robert Solow and Harry Markowitz, and...

Investment Banking: A Guide to Underwriting and Advisory Services
Investment Banking: A Guide to Underwriting and Advisory Services

The recent financial turmoil has raised suspects on investment banks and will certainly reshape the industry. However, the transactions traditionally managed by investment banks will still require the intervention of financial institutions, as always in the past. This book aims at providing an overview of these traditional investment banking...

unlimited object storage image
Result Page: 20 19 18 17 16 15 14 13 12 11 10 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy