Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Embedded Java Security: Security for Mobile Devices
Embedded Java Security: Security for Mobile Devices
This book is a comprehensive presentation of embedded Java security (namely, J2ME CLDC/MIDP), in the sense that the security model of embedded Java is thoroughly explained, then a detailed analysis of this model is undertaken. It is compared with the security model of Java Standard Edition in order to view the impact of limited resources (typically...
QuickBase: The Missing Manual
QuickBase: The Missing Manual

Ready to put Intuit's QuickBase to work? Our new Missing Manual shows you how to capture, modify, share, and manage data and documents with this web-based data-sharing program quickly and easily. No longer do you have to coordinate your team through a blizzard of emails or play frustrating games of "guess which document is...

Web Wisdom: How to Evaluate and Create Information Quality on the Web, Third Edition
Web Wisdom: How to Evaluate and Create Information Quality on the Web, Third Edition

The World Wide Web has undergone tremendous growth since the first edition of Web Wisdom: How to Evaluate and Create Information Quality on the Web was conceived and written in the mid to late 1990s. The phenomenal global expansion of the internet, together with the increasing sophistication of online technologies and software...

Java 11 and 12 – New Features: Learn about Project Amber and the latest developments in the Java language and platform
Java 11 and 12 – New Features: Learn about Project Amber and the latest developments in the Java language and platform

Enhance your development skills with Java's state-of-the-art features and projects to make your applications leaner and faster

Key Features

  • Overcome the challenges involved in migrating to new versions of Java
  • Discover how Oracle has bridged the gap between Java and...
Data Mining Patterns: New Methods and Applications
Data Mining Patterns: New Methods and Applications
Since its definition a decade ago, the problem of mining patterns is becoming a very active research area, and efficient techniques have been widely applied to problems either in industry, government or science. From the initial definition and motivated by real applications, the problem of mining patterns not only addresses the finding of itemsets...
Carpal Tunnel Syndrome
Carpal Tunnel Syndrome
Carpal tunnel syndrome is the most common hand problem, affecting as much as 5% of the adult population; yet in the large majority of cases, the condition is idiopathic. While surgical treatment often results in improvement, residual loss of function and some persistence of symptoms are common. Clinicians still disagree as to...
Design Patterns for Embedded Systems in C: An Embedded Software Engineering Toolkit
Design Patterns for Embedded Systems in C: An Embedded Software Engineering Toolkit
The predominate language for the development of embedded systems is clearly C. Other languages certainly have their allure, but over 80% of all embedded systems are developed in this classic language. Many of the advances in the industry assume the use of object-oriented languages, web clients, and technologies that are either...
Practical Model-Based Testing: A Tools Approach
Practical Model-Based Testing: A Tools Approach
Software testing is vitally important in the software development process, as illustrated by the growing market for automated testing tools. Moreover, software testing generally consumes between 30 and 60 percent of the overall development effort.

Many companies are already using automated test execution tools. Modelbased testing pushes
...
Java EE 6 Development with NetBeans 7
Java EE 6 Development with NetBeans 7

Java EE 6, the latest version of the Java EE specification, adds several new features to simplify enterprise application development. New versions of existing Java EE APIs have been included in this latest version of Java EE. JSF 2.0 greatly simplifies web application development. JPA 2.0 features a new criteria API and several other...

How to Write Essays & Assignments (Smarter Study Guides)
How to Write Essays & Assignments (Smarter Study Guides)
Welcome to How to Write Essays and Assignments. We’re pleased that you’ve chosen this book and we hope it will help you with all your academic writing tasks. Our aim has been to provide practical tips to guide you from planning to submission, with help along the way on topics like punctuation, spelling and grammar, so...
Base SAS Guide to Information Maps
Base SAS Guide to Information Maps
A SAS Information Map is business metadata about your data. Information maps are user-friendly metadata definitions of data sources and enable your business users to query data in order to meet specific business needs. Metadata is information about the structure and...
Space Time Coding for Broadband Wireless Communications
Space Time Coding for Broadband Wireless Communications
This is the first book on space-time coding for wireless communications, one of the most promising techniques for ensuring bandwidth efficiency. The text describes theoretical principles as well as engineering applications; discusses key criteria in the design of practical space-time codes; and covers single-carrier and multi-carrier transmission...
unlimited object storage image
Result Page: 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy