Home | Amazing | Today | Tags | Publishers | Years | Search 
Practical UML Statecharts in C/C++, Second Edition: Event-Driven Programming for Embedded Systems
Practical UML Statecharts in C/C++, Second Edition: Event-Driven Programming for Embedded Systems
Streamline your embedded code projects with just one book - Miro Samek presents UML statecharts - a practical, time-saving design methodology!

Practical UML Statecharts in C/C++ Second Edition bridges the gap between high-level abstract concepts of the Unified Modeling Language (UML) and the actual programming aspects of modern
...
php|architect's Guide to E-Commerce Programming with Magento
php|architect's Guide to E-Commerce Programming with Magento
This highly anticipated book will give you the insight you need to successfully manage and customize your Magento Commerce installation. php|architect's Guide to Programming with Magento takes you from installation to deployment of this popular e-commerce open source software. Magentos flexibility and Zend Framework-based structure have made it...
Seam in Action
Seam in Action
JBoss Seam is an exciting new application framework based on the Java EE platform that is used to build rich, web-based business applications. Seam is rapidly capturing the interest of Java enterprise developers because of its focus on simplicity, ease of use, transparent integration, and scalability.

Seam in Action offers a...

Software Defined Radio: Architectures, Systems and Functions (Wiley Series in Software Radio)
Software Defined Radio: Architectures, Systems and Functions (Wiley Series in Software Radio)

Software defined radio (SDR) is a hot topic in the telecommunications field, with regard to wireless technology. It is one of the most important topics of research in the area of mobile and personal communications. SDR is viewed as the enabler of global roaming and a platform for the introduction of new technologies and services into existing...

Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Security in Wireless Mesh Networks (Wireless Networks and Mobile Communications)
Wireless mesh networks (WMN) encompass a new area of technology set to play an important role in the next generation wireless mobile networks. WMN is characterized by dynamic self-organization, self-configuration, and self-healing to enable flexible integration, quick deployment, easy maintenance, low costs, high scalability, and reliable services....
Implementing a Digital Asset Management System: For Animation, Computer Games, and Web Development
Implementing a Digital Asset Management System: For Animation, Computer Games, and Web Development
"It's certainly a challenging read, but one that's worth spending some brain power on if you're keen to create a successful computer-based production company. Getting into such a competitive market means doing some research, and for aspiring imageers this is a great first step." - Advanced Photoshop

In situations
...
Information Assurance: Managing Organizational IT Security Risks
Information Assurance: Managing Organizational IT Security Risks
Written by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program. It is designed to provide ISSO managers, security managers, and INFOSEC professionals with an understanding of the essential issues required to develop and apply a targeted...
Understanding IPv6, Second Edition
Understanding IPv6, Second Edition
Now updated for Windows Server 2008 and Windows Vista, this guide delivers in-depth technical information on Internet Protocol version 6 (IPv6). IPv6 greatly improves on IPv4, the current protocol, by vastly increasing the number of available addresses and by adding enhancements for security, multimedia traffic management, routing, and network...
Maximum Linux Security (2nd Edition)
Maximum Linux Security (2nd Edition)
Presents in-depth configuration tips and techniques to help eliminate security threats to your LINUX-based computer or network, as delivered by an experienced computer hacker who is now a writer, and security consultant. Softcover. CD-ROM included.

Maximum Linux Security helps Linux administrators identify and plug security holes
...
Professional CodeIgniter
Professional CodeIgniter
If you’re a PHP developer, you can build Rails-like applications without learning a new language by following the hands-on tutorials in Professional CodeIgniter. In this book, find an overview of MVC and agile technologies, model and schema for products, helpers and libraries, Ajax and Scriptaculous, and explanations of the creation...
The OPEN Process Framework: An Introduction
The OPEN Process Framework: An Introduction
The OPEN Process Framework provides a template for generating flexible, yet disciplined, processes for developing high-quality software and system applications within a predictable schedule and budget. Using this framework as a starting point, you can create and tailor a process to meet the specific needs of the project.

If you are a project...

Network Security: A Practical Guide (Computer Weekly Professional)
Network Security: A Practical Guide (Computer Weekly Professional)
Network Security: a practical guide provides a comprehensive review of network security issues, with relevance to corporate networks, from
both an administrative and user perspective. It is particularly suited to IS executives, administrators and managers who wish to review their own network security procedures or for those
...
Result Page: 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy