 |
|
 JBoss AS 5 Performance Tuning
Packed with practical examples, this book looks at a different aspect of performance tuning in each chapter and shows the reader how to apply them to their existing Java applications. Written to version 5.1, this book also has information about the upcoming 6.0 release and how you can upgrade your existing applications. This book is for Java... |  |  The Enterprise and Scrum
This book is for those who want to use Scrum throughout their enterprise for product development. Right now, you might have pockets within your enterprise that use Scrum, and they are more effective than elsewhere. You are at least partially convinced that using Scrum throughout the enterprise might be a way to make the whole enterprise more... |  |  Visual Data Mining: Techniques and Tools for Data Visualization and Mining
Business intelligence solutions transform business data into conclusive, fact-based, and actionable information and enable businesses to spot customer trends, create customer loyalty, enhance supplier relationships, reduce financial risk, and uncover new sales opportunities. The goal of business intelligence is to make sense of change-to... |
|
 Flash 10 Multiplayer Game Essentials
Multiplayer web-based games are more popular than any others, and developing your own is an exciting challenge. But developing multiplayer games is a complex task. There are few resources that explain how to build multiplayer games from the ground up.
This comprehensive guide is packed with practical examples and insights into... |  |  Deploying Microsoft Forefront Protection 2010 for Exchange Server
When we began this project, our intent was to create a real-world scenario that would guide IT professionals in using Microsoft best practices to deploy Microsoft Forefront Protection for Exchange Server (FPE) 2010. We hope you find that we have achieved that goal. We’ve also included a thorough explanation of the architectural... |  |  Eleventh Hour CISSP: Study Guide (Syngress Eleventh Hour)
Our job as information security professionals is to evaluate risks against our critical assets and deploy safeguards to mitigate them. We work in various roles as firewall engineers, penetration testers, auditors, management, and the like. The common thread is risk: It is part of our job description.
The Information Security... |
|
 WordPress 3 Plugin Development Essentials
By picking up this book, there's a good chance that you fall into one of two categories: an existing WordPress user / hobbyist programmer who is interested in building your own plugins for the platform, or a seasoned developer who is new to WordPress and need to complete a project for a client.
In either case, this book is... |  |  Beginning Oracle Application Express 4
Welcome to the wonderful world of Oracle Application Express (APEX). You’re about to learn how to use a tool that we believe will revolutionize the way you think about and approach writing web-based Oracle systems. It certainly has for us.
Prior to the advent of APEX, developing fully interactive web based systems over data... |  |  |
|
|
Result Page: 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 |