Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Enterprise JavaBeans 3.0 (5th Edition)
Enterprise JavaBeans 3.0 (5th Edition)

This book explains and demonstrates the fundamentals of the EJB 3.0 and Java Persistence programming models. Although EJB makes application development much simpler, it is still a complex technology that requires a great deal of time and study to master. This book provides a straightforward, no-nonsense explanation of the...

Principles and Models of Biological Transport
Principles and Models of Biological Transport
Transport processes are ubiquitous in the living organism, underlying nerve conduction and muscle contraction, digestion, kidney function and the nourishment of every cell in the body. The mechanisms by which these processes take place, and the models that describe them, are the subject of Principles and Models of Biological Transport,...
Spring 2.5 Aspect Oriented Programming
Spring 2.5 Aspect Oriented Programming

Developing powerful web applications with clean, manageable code makes the maintenance process much easier. Aspect-Oriented Programming (AOP) is the easiest and quickest way to achieve such results. Spring is the only Java framework to offer AOP features. The combined power of Spring and AOP gives a powerful and flexible platform to develop and...

Modeling and Verification of Real-time Systems
Modeling and Verification of Real-time Systems
This title is devoted to presenting some of the most important concepts and techniques for describing real-time systems and analyzing their behavior in order to enable the designer to achieve guarantees of temporal correctness.

Topics addressed include mathematical models of real-time systems and associated formal verification techniques...

North Korea's Military-Diplomatic Campaigns, 1966-2008 (Routledge Security in Asia Pacific Series)
North Korea's Military-Diplomatic Campaigns, 1966-2008 (Routledge Security in Asia Pacific Series)

This book examines North Korea’s nuclear diplomacy over a long time period from the early 1960s, setting its dangerous brinkmanship in the wider context of North Korea’s military and diplomatic campaigns to achieve its political goals. It argues that the last four decades of military adventurism demonstrates Pyongyang’s...

Android Malware (SpringerBriefs in Computer Science)
Android Malware (SpringerBriefs in Computer Science)

Mobile devices, such as smart phones, have achieved computing and networking capabilities comparable to traditional personal computers. Their successful consumerization has also become a source of pain for adopting users and organizations. In particular, the widespread presence of information-stealing applications and other types of mobile...

Atherosclerosis: Diet and Drugs (Handbook of Experimental Pharmacology)
Atherosclerosis: Diet and Drugs (Handbook of Experimental Pharmacology)

Cardiovascular diseases continue to be the leading cause of death in the - jority of industrialized countries. The most frequent underlying pathology, namely atherosclerosis, and its clinical sequelae, namely coronary heart d- ease, cerebrovascular disease and peripheral artery disease, remain common although for a long time we have been made...

Music-Inspired Harmony Search Algorithm: Theory and Applications (Studies in Computational Intelligence)
Music-Inspired Harmony Search Algorithm: Theory and Applications (Studies in Computational Intelligence)

Calculus has been used in solving many scientific and engineering problems. For optimization problems, however, the differential calculus technique sometimes has a drawback when the objective function is step-wise, discontinuous, or multi-modal, or when decision variables are discrete rather than continuous. Thus, researchers have...

Agile Career Development: Lessons and Approaches from IBM
Agile Career Development: Lessons and Approaches from IBM
Supercharge Performance by Linking Employee-Driven Career Development with Business Goals

 

How do you make career development work for both the employee and the business? IBM® has done it by tightly linking employee-driven career development programs with corporate...

Computational Red Teaming: Risk Analytics of Big-Data-to-Decisions Intelligent Systems
Computational Red Teaming: Risk Analytics of Big-Data-to-Decisions Intelligent Systems

Written to bridge the information needs of management and computational scientists, this book presents the first comprehensive treatment of Computational Red Teaming (CRT).  The author describes an analytics environment that blends human reasoning and computational modeling to design risk-aware and evidence-based smart decision making...

Statistical Signal Processing: Frequency Estimation (SpringerBriefs in Statistics)
Statistical Signal Processing: Frequency Estimation (SpringerBriefs in Statistics)

Signal processing may broadly be considered to involve the recovery of information from physical observations. The received signal is usually disturbed by thermal, electrical, atmospheric or intentional interferences. Due to the random nature of the signal, statistical techniques play an important role in analyzing the signal. Statistics is...

Integrated Cisco and UNIX Network Architectures (Cisco Press Networking Technology)
Integrated Cisco and UNIX Network Architectures (Cisco Press Networking Technology)

UNIX gateways introduce massive performance possibilities at a fraction of the price of dedicated proprietary appliances by performing network tasks entirely in software. With Cisco Systems routers dominating the Internet and enterprise networking and UNIX routing and gateway solutions spreading from within server farms and data...

unlimited object storage image
Result Page: 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy