Home | Amazing | Today | Tags | Publishers | Years | Search 
The Definitive Guide to SOA: Oracle® Service Bus, Second Edition
The Definitive Guide to SOA: Oracle® Service Bus, Second Edition
The Definitive Guide to SOA: Oracle® Service Bus, Second Edition targets professional software developers and architects who know enterprise development but are new to enterprise service buses (ESBs) and service–oriented architecture (SOA) development. This is the first book to cover a practical approach to SOA using the BEA...
Canning Spam: You've Got Mail (That You Don't Want)
Canning Spam: You've Got Mail (That You Don't Want)
We've all seen it — the e-mails that come to us from a sender we don't know and promise a frog that jumps across our screen, a low mortgage rate or a medical miracle pill. These e-mails are otherwise known as spam. Your inbox gets cluttered or worse, your computer is infected with a virus as you scratch your head, wondering how it ever...
i -Net+ Study Guide
i -Net+ Study Guide

Here's the book you need to prepare for CompTIA's i-Net+ Exam. This Sybex Study Guide provides:

  • Full coverage of every exam objective
  • Practical information on network hardware
  • Hundreds of challenging review questions, in the book...
Gravity from the Ground Up: An Introductory Guide to Gravity and General Relativity
Gravity from the Ground Up: An Introductory Guide to Gravity and General Relativity
"...the text is...inviting, with exercises that have real-world application, such as exploring the energy of photons that cause sunburn." Stuart J. Goldman, Sky & Telescope

"Delightfully throrough yet easy to read." American Scientist

This book provides an accessible introduction to
...
Principles of Embedded Networked Systems Design
Principles of Embedded Networked Systems Design
"...this volume represents a real mine of information...anyone working in the field would benefit from owning a copy." IEEE Communications Engineer

Embedded network systems (ENS) provide a set of technologies that can link the physical world to large-scale networks in applications, such as monitoring of borders,
...
Hacking Exposed Linux
Hacking Exposed Linux
GNU-Linux is the ultimate hacker’s playground. It’s a toy for the imagination, not unlike a box of blocks or a bag of clay. Whether someone is an artist or a scientist, the possibilities are endless. Anything that you want to try to do and build and make with a computer is subject only to your creativity. This is why so many people are...
Secure Multi-Party Non-Repudiation Protocols and Applications (Advances in Information Security)
Secure Multi-Party Non-Repudiation Protocols and Applications (Advances in Information Security)
Research oriented non-repudiation protocols have been active since the beginning of this millennium. It is time to take a step forward and realize that in many applications there are more than two entities. Secure Multi-Party Non-Repudiation Protocols and Applications supports this statement.

This volume provides state of the art in...

Biometric System and Data Analysis: Design, Evaluation, and Data Mining
Biometric System and Data Analysis: Design, Evaluation, and Data Mining
Biometric systems are being used in more places and on a larger scale than ever before. As these systems mature, it is vital to ensure the practitioners responsible for development and deployment, have a strong understanding of the fundamentals of tuning biometric systems.  The focus of biometric research over the past four decades has...
Embracing Insanity: Open Source Software Development
Embracing Insanity: Open Source Software Development
In this book, you will learn where the Open Source movement comes from and what motivates its adherents. You will be introduced to the culture that fuels the movement, as well as the personalities and organizations that promote its growth. You will also understand the strengths of the Open Source movement and how it changes the way in which...
Professional Linux Kernel Architecture (Wrox Programmer to Programmer)
Professional Linux Kernel Architecture (Wrox Programmer to Programmer)
Find an introduction to the architecture, concepts and algorithms of the Linux kernel in Professional Linux Kernel Architecture, a guide to the kernel sources and large number of connections among subsystems. Find an introduction to the relevant structures and functions exported by the kernel to userland, understand the theoretical and...
Cellular Authentication for Mobile and Internet  Services
Cellular Authentication for Mobile and Internet Services
An invaluable reference discussing the Generic Authentication   Architecture (GAA), its infrastructure, usage and integration into existing networks

Cellular Authentication for Mobile and Internet Services introduces the reader into the field of secure communication for mobile applications, including secure...

PHP Object-Oriented Solutions
PHP Object-Oriented Solutions
With the surge of popularity of PHP 5, and with PHP 6 just around the corner, Object-Oriented Programming is now an important consideration for PHP developers. This version-neutral book is a gentle introduction to Object-Oriented Programming (OOP) that wont overburden you with complex theory. It teaches you the essential basics of OOP that youll...
Result Page: 668 667 666 665 664 663 662 661 660 659 658 657 656 655 654 653 652 651 650 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy