Home | Amazing | Today | Tags | Publishers | Years | Search 
Component Software: Beyond Object-Oriented Programming (2nd Edition)
Component Software: Beyond Object-Oriented Programming (2nd Edition)
There has been an explosive growth in component software technologies since the first edition of this classic book was published. The advent of EJB, J2EE, CORBA 3, COM+ and the .NET framework are evidence of a maturing market in component software that goes 'beyond OOP'.

Clemens Szyperski gives us an objective survey of the component landscape,...

RFID Technology and Applications
RFID Technology and Applications
This book is addressed to business management and project managers as well as researchers who are evaluating the use of radio frequency identification (RFID) for tracking uniquely identified objects. In an effort to make RFID project management less of an art form and more of a science RFID Technology and Applications brings together pioneering...
Sams Teach Yourself Red Hat Linux 8 in 24 Hours
Sams Teach Yourself Red Hat Linux 8 in 24 Hours
An easy-to-understand, step-by-step guide to installing, configuring, and using Red Hat Linux. Red Hat Linux is the most popular choice among Linux users in the U.S., with about 80% of the U.S. Linux market. Includes complete coverage of the new features of the upgrade to Red Hat, due out in Fall 2002. Assumes no prior knowledge of Linux and is an...
.NET Wireless Programming
.NET Wireless Programming

Microsoft’s .NET strategy embraces a vision for integrating diverse elements of computing technology and data services. The wireless Internet and mobile devices are core components of that strategy. Visual Studio .NET includes a powerful set of toolsthe Mobile Internet Toolkitfor developing websites and applications...

Sams Teach Yourself Linux Security Basics in 24 Hours
Sams Teach Yourself Linux Security Basics in 24 Hours
This book is an introductory, tutorial-style text designed to give the reader a strong foundational knowledge of securing a Linux system. This book teaches the reader how to securely install and run Linux as it comes shipped from most Linux distributors. Most other titles in this market focus on the use of tools and software not normally included...
Wireless Networking (The Morgan Kaufmann Series in Networking)
Wireless Networking (The Morgan Kaufmann Series in Networking)
Convenient one-stop view of wireless networking including cellular networks, WiFi and WiMax, ad hoc networks, sensor networks, mesh networking, and the full range of options in between.

Over the past decade, the world has witnessed an explosion in the development and deployment of new wireless network technologies. From
...
Petascale Computing: Algorithms and Applications (Chapman & Hall/Crc Computational Science Series)
Petascale Computing: Algorithms and Applications (Chapman & Hall/Crc Computational Science Series)
Although the highly anticipated petascale computers of the near future will perform at an order of magnitude faster than today’s quickest supercomputer, the scaling up of algorithms and applications for this class of computers remains a tough challenge. From scalable algorithm design for massive concurrency toperformance analyses and...
Security for Mobile Networks and Platforms (Artech House Universal Personal Communications)
Security for Mobile Networks and Platforms (Artech House Universal Personal Communications)
With viruses, spyware, and a seemingly unending onslaught of new cyber-threats, security is a crucial and constant concern for all networking professionals. This is especially true for mobile networking professionals, who are all too aware of mobile technology's special vulnerability. This indispensable reference turns mobile network developers,...
JSTL: Practical Guide for JSP Programmers (The Practical Guides)
JSTL: Practical Guide for JSP Programmers (The Practical Guides)
An invaluable reference for any JSP developer's library. Sue makes the complicated seem simple with her conversational writing style and well thought out examples and analogies.

-Matt Houser, J2EE Developer with The Washington Post and former Sun Microsystems Java Instructor.

Web developers and page
...
Microsoft Dynamics CRM 4.0 Unleashed
Microsoft Dynamics CRM 4.0 Unleashed
Microsoft® Dynamics CRM 4.0 Unleashed presents start-to-finish guidance for planning, customizing, deploying, integrating, and managing Dynamics CRM in your unique business and technical environment. Authored by two leading Microsoft Dynamics implementers, this book systematically explains how the system...
Optical Fiber Telecommunications V B, Fifth Edition: Systems and Networks (Optics and Photonics Series)
Optical Fiber Telecommunications V B, Fifth Edition: Systems and Networks (Optics and Photonics Series)
Optical Fiber Telecommunications V (A&B) is the fifth in a series that has chronicled the progress in the research and development of lightwave communications since the early 1970s. Written by active authorities from academia and industry, this edition not only brings a fresh look to many essential topics but also focuses on network...
SOA Security
SOA Security
SOA is one of the latest technologies enterprises are using to tame their software costs - in development, deployment, and management. SOA makes integration easy, helping enterprises not only better utilize their existing investments in applications and infrastructure, but also open up new business opportunities. However, one of the big stumbling...
Result Page: 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 96 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy