Home | Amazing | Today | Tags | Publishers | Years | Search 
Web Services Explained: Solutions and Applications for the Real World
Web Services Explained: Solutions and Applications for the Real World

Web services for decision makers: strategic insights and actionable recommendations.

  • How Web services will transform the way software is built, sold, implemented, and managed
  • All you need to know to plan an intelligent Web services strategy
  • Risks and pitfalls in current WebsServices...
Observing the User Experience: A Practitioner's Guide to User Research
Observing the User Experience: A Practitioner's Guide to User Research

The gap between who designers and developers imagine their users are, and who those users really are can be the biggest problem with product development. Observing the User Experience will help you bridge that gap to understand what your users want and need from your product, and whether they'll be able to use what you've created.

...
Perl Database Programming
Perl Database Programming
Here’s your in-depth guide to creating database-driven applications using Perl.

In this authoritative reference, Perl expert Brent Michalski uses plenty of examples to help you master Perl’s capabilities in database applications with MySQL, PostgreSQL, and Oracle. Along the way, he explores practical applications for cutting-edge...

CMMI Distilled: A Practical Introduction to Integrated Process Improvement, Second Edition
CMMI Distilled: A Practical Introduction to Integrated Process Improvement, Second Edition

Capability Maturity Model IntegrationSM (CMMI) has rapidly become a preferred means of improving organizational processes in industry and government. Building on a decade of work with process improvement models, including the Capability Maturity Model® (CMM®) for Software and the Systems Engineering Capability Model, a team of over two...

Policy Routing Using Linux
Policy Routing Using Linux
Traditional IPv4 routing is summarized as "All routing is a destination driven process". When a router looks at an IPv4 packet it cares only about the destination address in the header of the packet. It uses this destination address to make a decision on where to forward the packet. But what if you want to route packets differently...
Solaris System Management
Solaris System Management

Solaris System Management provides the system manager with the information they need to make the critical, higher level, "architectural" decisions such as large project rollouts and their impact.

Philcox addresses the specific needs of the system manager working in a Solaris environment focusing on task-oriented solutions for...

Pair Programming Illuminated
Pair Programming Illuminated

Pair programming is a simple, straightforward concept. Two programmers work side-by-side at one computer, continuously collaborating on the same design, algorithm, code, and test. It produces a higher quality of code in about half the time than that produced by the summation of their solitary efforts. However, nothing is simple...

Internet & Intranet Security
Internet & Intranet Security

This extensively revised, new edition of the 1998 Artech House classic, Internet and Intranet Security, offers you an up-to-date and comprehensive understanding of the technologies that are available to secure TCP/IP-based networks, such as corporate intranets or the Internet, and their associated applications. It addresses firewall...

The Rational Unified Process: An Introduction, Third Edition
The Rational Unified Process: An Introduction, Third Edition

The Rational Unified Process, Third Edition, is a concise introduction to IBM's Web-enabled software engineering process. Rational Unified Process®, or RUP®, Lead Architect Philippe Kruchten quickly and clearly describes the concepts, structure, content, and motivation that are central to the RUP. Readers will...

Enterprise JavaBeans Component Architecture: Designing and Coding Enterprise Applications
Enterprise JavaBeans Component Architecture: Designing and Coding Enterprise Applications

Proven techniques and patterns for enterprise development.

  • Design guidelines for EJB 2.0 component architecture
  • Powerful patterns for enterprise application design
  • Extensive real-world code examples
  • Covers every type of component, including message-driven beans

This...

Memory as a Programming Concept in C and C++
Memory as a Programming Concept in C and C++

The overwhelming majority of program bugs and computer crashes stem from problems of memory access, allocation, or deallocation. Such memory-related problems are also notoriously difficult to debug. Yet the role that memory plays in C and C++ programming is a subject often overlooked in courses and books because it requires specialized knowledge...

Microsoft Internet Security and Acceleration (ISA) Server 2004 Unleashed
Microsoft Internet Security and Acceleration (ISA) Server 2004 Unleashed
Hit the ground running with the detailed, road-tested deployment scenarios featured in Microsoft Internet Security and Acceleration (ISA) Server 2004 Unleashed. Written by best-selling authors Michael Noel, who has been involved with the early beta of ISA Server 2004, and ...
Result Page: 2279 2278 2277 2276 2275 2274 2273 2272 2271 2270 2269 2268 2267 2266 2265 2264 2263 2262 2261 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy