Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Documenting Software Architectures: Views and Beyond
Documenting Software Architectures: Views and Beyond

"This book is of immense value. It should save you months of trials and errors, lots of undeserved hassle, and many costly mistakes that could potentially jeopardize the whole endeavor. It will become an important reference on the shelf of the software architect."—From the Foreword by Philippe Kruchten,...

.NET-A Complete Development Cycle
.NET-A Complete Development Cycle

"The authors excel in presenting all aspects of the .NET development cycle in a format accessible to the beginner, and as a primer and reference for the experienced developer. This book is not only educational and informative, but working through it is fun!"
—Dr. Oliver Downs, Chief Scientist, Analytical
...

The Art of Computer Virus Research and Defense
The Art of Computer Virus Research and Defense

Symantec's chief antivirus researcher has written the definitive guide to contemporary virus threats, defense techniques, and analysis tools. Unlike most books on computer viruses, The Art of Computer Virus Research and Defense is a reference written strictly...

Programming Ruby: The Pragmatic Programmers' Guide, Second Edition
Programming Ruby: The Pragmatic Programmers' Guide, Second Edition
Ruby is an increasingly popular, fully object-oriented dynamic programming language, hailed by many practitioners as the finest and most useful language available today. When Ruby first burst onto the scene in the Western world, the Pragmatic Programmers were there with the definitive reference manual, Programming Ruby: The Pragmatic...
Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Real 802.11 Security: Wi-Fi Protected Access and 802.11i

"Real 802.11 Security provides clear descriptions of current and emerging security techniques. The authors handle complex topics nicely, and offer significant clarification of IEEE draft standards."
-Russ Housley, IETF Security Area Director and founder of Vigil Security, LLC

"This...

Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More
Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More
The Insider's Guide to Building Breakthrough Services with Today's New Web Services PlatformUsing today's new Web services platform, you can build services that are secure, reliable, efficient at handling transactions, and well suited to your evolving service-oriented architecture. What's more, you can do all that without compromising the...
Aspect-Oriented Analysis and Design: The Theme Approach
Aspect-Oriented Analysis and Design: The Theme Approach

"Developers who are using aspect-oriented programming will appreciate this contribution to aspect-oriented analysis and design. The authors are pioneers in this area and have elaborated on past research to produce a detailed methodology and notation for early aspects."

Ron Bodkin, Chief...

The Unusually Useful Web Book
The Unusually Useful Web Book

The Unusually Useful Web Book is the only book you need to find out everything you need to know about web sites. In fact, it's 2 books in 1. You can skim the sidebars and checklists for tips and techniques you can use right away. Or you can follow along with the main text for a detailed discussion of planning, designing, building,...

The Big User-Friendly Cyber Security Gaint - Palo Alto Networks: An Ultimate Guide To Secure Your Cloud And On-Premise Networks
The Big User-Friendly Cyber Security Gaint - Palo Alto Networks: An Ultimate Guide To Secure Your Cloud And On-Premise Networks
alo Alto Networks, Inc. (NYSE: PANW) is an international cybersecurity organization located in Santa Clara, California. Its essential products include an integrated firewall framework and cloud-based offerings that expand sure firewalls to cover other protection issues. About 70,000 businesses in 150 countries utilize the...
Securing Office 365: Masterminding MDM and Compliance in the Cloud
Securing Office 365: Masterminding MDM and Compliance in the Cloud
Understand common security pitfalls and discover weak points in your organization’s data security, and what you can do to combat them. This book includes the best approaches to managing mobile devices both on your local network and outside the office.

Data breaches, compliance fines,  and
...
Applied C++: Practical Techniques for Building Better Software
Applied C++: Practical Techniques for Building Better Software

"I really like the software engineering advice given here. As the chief engineer/architect for a large development group, I can say with certainty that the advice given in this book about how real-world projects must work is right on the mark."
-Steve Vinoski, coauthor of Advanced CORBA Programming with C++,
...

Object-Oriented Programming with ActionScript 2.0 (Voices That Matter)
Object-Oriented Programming with ActionScript 2.0 (Voices That Matter)

Master the principles of object-oriented programming as it is used with the most recent version of ActionScripting.

  • Object-Oriented Programming revolutionizes the way Flash developers interact with Flash.

  • This book provides...

unlimited object storage image
Result Page: 62 61 60 59 58 57 56 55 54 53 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy