Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java Servlet Programming
Java Servlet Programming
A few years ago, the hype surrounding applets put Java on the map as a programming language for the Web. Today, Java servlets stand poised to take Java to the next level as a Web development language. The main reason is that servlets offer a fast, powerful, portable replacement for CGI scripts.

The Java Servlet API, introduced as the
...
EDGE for Mobile Internet
EDGE for Mobile Internet
This ground-breaking resource offers you a detailed treatment of EDGE and its critical role in the development of the mobile Internet. The book explains how this global radio based high-speed mobile data standard can be introduced into GSM/GPRS networks, improving data transmission speeds to support multimedia services. It enables you to become...
Web Engineering: Principles and Techniques
Web Engineering: Principles and Techniques
Since the advent of the Web, every aspect of our lives and organizational activities has changed dramatically. Organizations’ expectations and dependencies on the use of Web technologies have increased rapidly over the years. Most organizations have conceived these Web technologies as a critical instrument for enhancing their performance;...
Satellite Communication Engineering
Satellite Communication Engineering
Because of the immense importance of signal processing and the fastgrowing demands of business and industry, this series on signal processing serves to report up-to-date developments and advances in the field. The topics of interest include but are not limited to the following.
  • Signal theory and analysis
  • ...
Hacking Exposed Cisco Networks
Hacking Exposed Cisco Networks

Implement bulletproof Cisco security the battle-tested Hacking Exposed way

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised...

Digital Image Processing (2nd Edition)
Digital Image Processing (2nd Edition)
Interest in digital image processing methods stems from two principal application
areas: improvement of pictorial information for human interpretation; and
processing of image data for storage, transmission, and representation for autonomous
machine perception.This chapter has several objectives: (1) to define
the scope of the
...
Ajax and REST Recipes: A Problem-Solution Approach
Ajax and REST Recipes: A Problem-Solution Approach

Ajax and REST Recipes: A Problem-Solution Approach will serve all of your Ajax needs, by providing adaptable solutions for common tasks you'll want to implement on web sites using the next generation of Ajax and REST techniques. As a JavaScript developer, your time is precious, so you'll want to solve problems that present themselves in...

Data Mining Using SAS Enterprise Miner (Wiley Series in Computational Statistics)
Data Mining Using SAS Enterprise Miner (Wiley Series in Computational Statistics)
Data Mining Using SAS Enterprise Miner introduces the readers to data mining using SAS Enterprise Miner v4. This book will reveal the power and ease of use of the powerful new module in SAS that will introduce the readers to the various configuration settings and subsequent results that are generated from the various nodes in Enterprise Miner that...
Cryptology Unlocked
Cryptology Unlocked
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security.

This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic...

Inside Microsoft® SQL Server(TM) 2005: Query Tuning and Optimization
Inside Microsoft® SQL Server(TM) 2005: Query Tuning and Optimization
Dive deep into the internals of query tuning and optimization in SQL Server 2005 with this comprehensive reference. Understanding the internals of SQL Server helps database developers and administrators to better create, access, and effectively process information from enterprise data. Written by experts on SQL Server, this volume from the Inside...
Beginning Perl for Bioinformatics
Beginning Perl for Bioinformatics
With its highly developed capacity to detect patterns in data, Perl has become one of the most popular languages for biological data analysis. But if you're a biologist with little or no programming experience, starting out in Perl can be a challenge. Many biologists have a difficult time learning how to apply the language to bioinformatics. The...
Remote Sensing: The Image Chain Approach
Remote Sensing: The Image Chain Approach
Remote Sensing deals with the fundamental ideas underlying the rapidly growing field of remote sensing. John Schott explores energy-matter interaction, radiation propagation, data dissemination, and described the tools and procedures required to extract information from remotely sensed data using the image chain approach. Organizations and...
unlimited object storage image
Result Page: 781 780 779 778 777 776 775 774 773 772 771 770 769 768 767 766 765 764 763 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy