 |
|
|
 C# Class Design Handbook: Coding Effective ClassesThe mission of the C# Class Design Handbook is to provide you with a critical understanding of designing classes, making you better equipped to take full advantage of C#’s power to create robust, flexible, reusable classes. This comprehensive guide lifts the lid on syntax and examines what’s really going on behind the... |  |  Java 2 Enterprise Edition 1.4 (J2EE 1.4) Bible"One stop shopping for J2EE." – Scott Ambler, Senior Consultant, Ronin International, Inc. and Author of Agile Modeling
If Java 2 Enterprise Edition 1.4 can do it, you can do it too...
You already know that Java 2 Enterprise Edition 1.4 makes your enterprise services more cost-effective, more adaptable,... |  |  Computer-Aided Intelligent Recognition Techniques and ApplicationsIntelligent recognition methods have recently proven to be indispensable in a variety of modern industries, including computer vision, robotics, medical imaging, visualization and the media. Furthermore, they play a critical role in the traditional fields such as character recognition, natural language processing and personal identification.
... |
|
 Information Security Policies and Actions in Modern Integrated SystemsInformation Security Policies and Actions in Modern Integrated Systems is an overview of current research in theoretical and practical aspects of security in distributed systems, in particular in information systems and related security tools. Issues treated in the book are security in XML-based management systems, security of multimedia data,... |  |  Network Security Technologies, Second EditionNetwork Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy, state-of-the-art, and emerging network security... |  |  Mission Critical Internet SecurityThe best security for a network segment is isolation, but that's not an option if you want your users to enjoy Internet connectivity. Mission Critical Internet Security explores your options for protecting your network from attack across the Internet, emphasizing firewall solutions from Cisco, Symantec, Microsoft, and Check Point. This... |
|
|
| Result Page: 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 |