Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Developing Middleware in Java EE 8: Build robust middleware solutions using the latest technologies and trends
Developing Middleware in Java EE 8: Build robust middleware solutions using the latest technologies and trends

Use Java features such as JAX-RS, EJBs, and JPAs to build powerful middleware for newer architectures such as the cloud

Key Features

  • Explore EJBs to build middleware solutions for enterprise and distributed applications
  • Understand middleware designs such as event-based and...
A Theory of Distributed Objects
A Theory of Distributed Objects

Distributed and communicating objects are becoming ubiquitous. In global, Grid and Peer-to-Peer computing environments, extensive use is made of objects interacting through method calls. So far, no general formalism has been proposed for the foundation of such systems.

Caromel and Henrio are the first to define a calculus for distributed...

Microsoft® Office Publisher 2007 Step by Step
Microsoft® Office Publisher 2007 Step by Step
Work at your own pace through the easy numbered steps, practice files on CD, helpful hints, and troubleshooting tips to master the fundamentals of communicating your message effectively with the latest version of Office Publisher. Youll learn how to create professional-looking marketing and business materials, such as cards, flyers, and...
Experiment-Driven Product Development: How to Use a Data-Informed Approach to Learn, Iterate, and Succeed Faster
Experiment-Driven Product Development: How to Use a Data-Informed Approach to Learn, Iterate, and Succeed Faster

Improving your craft is a key skill for product and user experience professionals working in the digital era. There are many established methods of product development to inspire and focus teams—Sprint, Lean, Agile, Kanban—all of which focus on solutions to customer and business problems. Enter XDPD, or Experiment-Driven...

Hacking Exposed Linux
Hacking Exposed Linux
GNU-Linux is the ultimate hacker’s playground. It’s a toy for the imagination, not unlike a box of blocks or a bag of clay. Whether someone is an artist or a scientist, the possibilities are endless. Anything that you want to try to do and build and make with a computer is subject only to your creativity. This is why so many people are...
Macworld iPhone Superguide, Second Edition
Macworld iPhone Superguide, Second Edition
For iPhone, iPod, iPod touch, Mac and Windows users, this book details and simplifies the best use of your iPhone features. This Second Edition brings back the popular iPhone Superguide, updated for iPhone, iPhone 3G, and iPod touch.

 

Our experts share how to master hidden features easily, connect to nearby...

Understanding Cryptography: A Textbook for Students and Practitioners
Understanding Cryptography: A Textbook for Students and Practitioners

Cryptography is now ubiquitous – moving beyond the traditional environments, such as government communications and banking systems, we see cryptographic techniques realized in Web browsers, e-mail programs, cell phones, manufacturing systems, embedded software, smart buildings, cars, and even medical implants. Today's designers need a...

Send Me a Message: A Step-by-Step Approach to Business and Professional Writing (Student Book)
Send Me a Message: A Step-by-Step Approach to Business and Professional Writing (Student Book)

With the expansion of global business and the Internet, communicating clearly in written English has become essential. The step-by-step approach in Send Me A Message allows students to develop a core set of expressions and techniques that they can use to communicate clearly and appropriately in a variety of formats.

...
Designing Security Architecture Solutions
Designing Security Architecture Solutions
The first guide to tackle security architecture at the software engineering level

Computer security has become a critical business concern, and, as such, the responsibility of all IT professionals. In this groundbreaking book, a security expert with AT&T Business's renowned Network Services organization explores system security
...
Formal Methods for Concurrency
Formal Methods for Concurrency

The aim of this work is to provide a practical introduction to the formal specification of concurrent and real-time systems. It is intended for those with some basic knowledge or experience of computing but does not assume knowledge of the particular problems of concurrent and real-time systems. It concentrates on one group of languages,...

Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Practical Cyber Intelligence: How action-based intelligence can be an effective response to incidents
Your one stop solution to implement a Cyber Defense Intelligence program in to your organisation.
Key Features
  • Intelligence processes and procedures for response mechanisms
  • Master F3EAD to drive processes based on intelligence
  • Threat modeling and intelligent frameworks
  • ...
Marketing Your Consulting Services : A Business of Consulting Resource
Marketing Your Consulting Services : A Business of Consulting Resource
"Elaine Biech keeps her promises. Just open Marketing Your Consulting Services to the preface, and you see that she promises practical. Then she immediately delivers— on the very same page! Flip to any page, and the same is true. That's a stunning achievement. And Elaine's advice works. I tried one of her first fourteen...
unlimited object storage image
Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy