Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Core Security Patterns: Best Practices and Strategies for J2EE(TM), Web Services, and Identity Management
Core Security Patterns: Best Practices and Strategies for J2EE(TM), Web Services, and Identity Management
Core Security Patterns is the hands-on practitioner™s guide to building robust end-to-end security into J2EE™ enterprise applications, Web services, identity management, service provisioning, and personal identification solutions. Written by three leading Java security architects, the patterns-driven approach...
Eclipse: Step by Step
Eclipse: Step by Step

Just as Eclipse is one of the greatest breakthroughs in programming since the graphical user interface, this book may be the greatest breakthrough you will experience in learning a new programming environment. The systematic, step-by-step approach will get you started in the least amount of time possible, and will give you a tremendous...

Risk Management in Software Development Projects (Computer Weekly Professional)
Risk Management in Software Development Projects (Computer Weekly Professional)
A recent paper by the author, ‘Risk in Software Projects’ (in Management Services, October 2001), briefly referred to risk mitigation and its role in the risk management process. Publication of this paper prompted considerable discussion and requests for further information, particularly on software projects in...
The Business Analyst's Handbook
The Business Analyst's Handbook

The Business Analyst (BA) plays an important role as liaison between business stakeholders and the technical team (software developers, vendors, etc.), ensuring that business needs are reflected in any software solution. Despite the importance of the job, there is currently no book specifically designed as a comprehensive reference manual for...

Preparing the Perfect CV: How to Make a Great Impression and Get the Job You Want (Career Success)
Preparing the Perfect CV: How to Make a Great Impression and Get the Job You Want (Career Success)

Every job hunter needs an impressive CV that describes their educational and professional history. A well-prepared and individually tailored CV is invaluable and can greatly improve your chances of getting the job you want. "Preparing The Perfect CV" provides sample CVs for job seekers of different abilities applying for various...

A Practical Guide to Information Systems Process Improvement
A Practical Guide to Information Systems Process Improvement
When you invest in expensive technology and systems, you want to get the most out of them. Process improvement has been used for years as an effective strategy to reduce costs, shorten cycle times, improve quality, and increase user satisfaction in other areas of business such as Quality, Manufacturing, and Engineering. While there are many books...
Managing Humans: Biting and Humorous Tales of a Software Engineering Manager
Managing Humans: Biting and Humorous Tales of a Software Engineering Manager

The humor and insights in the 2nd Edition of Managing Humans are drawn from Michael Lopp's management experiences at Apple, Netscape, Symantec, and Borland, among others. This book is full of stories based on companies in the Silicon Valley where people have been known to yell at each other and occasionally throw...

Windows Phone 7 Secrets
Windows Phone 7 Secrets

Listen up! Bestselling author Paul Thurrott whispers little know Windows Phone 7 tips, tricks, and advice...

Database Systems: Design, Implementation and Management (Book Only)
Database Systems: Design, Implementation and Management (Book Only)

DATABASE SYSTEMS: DESIGN, IMPLEMENTATION, AND MANAGEMENT, NINTH EDITION, a market-leader for database texts, gives readers a solid foundation in practical database design and implementation. The book provides in-depth coverage of database design, demonstrating that the key to successful database implementation is in proper design of databases...

Optimal Routing Design
Optimal Routing Design
The definitive guide to optimizing large-scale IP routing operation and managing network growth Build scalability into new designs and optimize existing, overly complex networks with design best practices presented in this book Learn from real-world case studies leveraging the authors' vast design and support experience Understand the latest...
MCSE Planning a Windows Server 2003 Network Infrastructure Study Guide (Exam 70-293)
MCSE Planning a Windows Server 2003 Network Infrastructure Study Guide (Exam 70-293)
Get the book that shows you not only what--but how--to study
  • 100% complete coverage of all official objectives for exam 70-293
  • Exam Readiness checklist at the front of the book--you're ready for the exam when all objectives on the list are checked off
  • Step-by-step exercises are linked to...
Computer Forensics: Computer Crime Scene Investigation (Networking Series)
Computer Forensics: Computer Crime Scene Investigation (Networking Series)
The Most Comprehensive, Up-to-Date, Reference on Computer Forensics! Using personal computers as their weapons, hackers and criminals (some only 11 years old) have attacked the Internet, government agencies, financial companies, small businesses, and the credit card accounts of unsuspecting individuals. This completely updated book/CD package...
unlimited object storage image
Result Page: 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy