Home | Amazing | Today | Tags | Publishers | Years | Search 
Cocoon 2 Programming: Web Publishing with XML and Java
Cocoon 2 Programming: Web Publishing with XML and Java
Thanks to the tireless efforts of open-source developers, Cocoon has quickly gained visibility as the preeminent XML-based Web publishing framework. Unfortunately, its documentation remains a significant shortcoming. If you’re new to Cocoon, gaining a sense of exactly what you can do with it can be difficult, and actually...
Pay Per Click Search Engine Marketing For Dummies (Computer/Tech)
Pay Per Click Search Engine Marketing For Dummies (Computer/Tech)
Plan and launch your PPC campaign and keep track of its progress

If you want potential customers to form a traffic jam at your Web site, Pay Per Click just might do the trick. This book will help you decide! It tells you all about Google AdWords and Yahoo! Sponsored Search, targeting your customers, watching out for fraud, assessing the pros...

Maximum Apache Security (Maximum Security)
Maximum Apache Security (Maximum Security)
The Maximum Security series, which debuted in 1997, has thus far enjoyed relative success. I use the term “relative success,” because security title sales have historically trickled, rather than gushed. For altering this and fostering a new market, Sams editors deserve kudos. Their insights have proven providential: Today, Maximum...
Internet Technologies Handbook: Optimizing the IP Network
Internet Technologies Handbook: Optimizing the IP Network
The Internet is an amazing communication medium. Its predecessor network, the ARPANET, was developed over three decades ago, yet many of the fundamental algorithms and protocols are still in use today. Granted, we don’t have to run these protocols on a refrigerator-sized computer; our laptop or palmtop PC will do quite well. But think of it -...
Security of e-Systems and Computer Networks
Security of e-Systems and Computer Networks
E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of...
Service Orient or Be Doomed!: How Service Orientation Will Change Your Business
Service Orient or Be Doomed!: How Service Orientation Will Change Your Business
Introducing service orientation as a vision and philosophy that can impact a business, this innovative new book equips the reader to:
  • Best use technology resources to meet goals
  • Unleash their "inner nerd" to embrace IT as part of their business as a whole
  • Address the "mother of all business...
Secure Multi-Party Non-Repudiation Protocols and Applications (Advances in Information Security)
Secure Multi-Party Non-Repudiation Protocols and Applications (Advances in Information Security)
Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize that in many applications there are more than two entities. Secure Multi-Party Non-Repudiation Protocols and Applications supports this statement.

This volume provides state of the art in...

WPF Recipes in C# 2008: A Problem-Solution Approach (Expert's Voice in .Net)
WPF Recipes in C# 2008: A Problem-Solution Approach (Expert's Voice in .Net)
WPF offers amazing new opportunities to .NET programmers in terms of the user interfaces they can deliver to their customers. But this significant technological advance comes with a steep learning curve, requiring the programmer to learn new classes, new syntax, and an entirely new approach to UI development.

Although WPF has been generally...

Itanium Architecture for Software Developers
Itanium Architecture for Software Developers
"Reading the Itanium Architecture for Software Developers book saved us days, maybe weeks on project development." -- Dong Wei, System Architect for Servers, Hewlett-Packard

Product Description
This unique description of the Intel® Itanium™ application architecture helps
...
Crypto Anarchy, Cyberstates, and Pirate Utopias
Crypto Anarchy, Cyberstates, and Pirate Utopias

In Crypto Anarchy, Cyberstates, and Pirate Utopias, Peter Ludlow extends the approach he used so successfully in High Noon on the Electronic Frontier, offering a collection of writings that reflects the eclectic nature of the online world, as well as its tremendous energy and creativity. This time the subject is the emergence...

An Introduction to Web Design and Programming
An Introduction to Web Design and Programming
Combining viewpoints from a Department of Computer Science (Paul Wang) and a School of Visual Communication Design (Sanda Katila), this innovative book covers the design and technology aspects of Web site development in an integrated manner. The balanced perspective leads to an understanding of the artistic design, visual communication, information...
Encyclopedia of Data Warehousing and Mining, Second Edition
Encyclopedia of Data Warehousing and Mining, Second Edition
The Encyclopedia of Data Warehousing and Mining provides a comprehensive, critical and descriptive examination of concepts, issues, trends, and challenges in this rapidly expanding field of data warehousing and mining (DWM). This encyclopedia consists of more than 350 contributors from 32 countries, 1,800 terms and definitions, and more than 4,400...
Result Page: 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy