 |
|
 Beginning Google Web Toolkit: From Novice to ProfessionalThe open source, lightweight Google Web Toolkit (GWT) is a framework that allows Java developers to build Rich Internet Applications (RIA), more recently called Ajax applications, in Java. Typically, writing these applications requires a lot of JavaScript development. However, Java and JavaScript are very distinctively different languages (although... |  |  Documentary in the Digital AgeIf you want to learn from the leading lights of today's revolution in documentary filmmaking Maxine Baker has written the guide you need to own. You'll discover the many different and innovative approaches to documentary form and style arising from the use of innovative new technology. A tribute to the mavericks of creativity, inside you will find... |  |  OFDM Towards Fixed and Mobile Broadband Wireless AccessPresenting the state of the art in broadband wireless access technology, this unique resource methodically presents the fundamentals of OFDM(A) technology--the cornerstone of the next generation of broadband wireless access offerings. In addition, this book succinctly depicts the future landscape of mobile broadband wireless access and the... |
|
 Voice over Internet Protocol (VoIP) Security"Voice Over Internet Protocol Security is both unique and timely. Ransome and Rittinghouse expertly describe the technical fundamentals, salient business drivers, and converged network infrastructure security risks and challenges IT and security professionals encounter when implementing enterprise-level VoIP systems." - William M.... |  |  Security of e-Systems and Computer NetworksE-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of... |  |  Official (ISC)2 Guide to the CISSP CBKThe Official (ISC)² Guide to the CISSP CBK is ideal not only for information security professionals attempting to achieve CISSP certification but also for those who are trying to decide which, if any, certification to pursue. Executives and organizational managers who want a more complete understanding of all the elements that are required in... |
|
|
 |  |  Changing Software Development: Learning to Become Agile
“Successful companies have known the importance of continuous change and learning for a long time; this is the first book that describes these concepts in an organic way in the context of software development. A must read for everybody involved in this business.”
Giovanni Asproni, Director, Asprotunity... |  |  Creating Web Sites BibleBuild your business or personal Web site in a 2.0 world
If you want to build your own Web site in a 2.0 world, you've come to right place. From facing HTML without fear to adding new ?air with multimedia, interactivity, and blogging, this comprehensive guide provides you with everything you need.... |
|
Result Page: 116 115 114 113 112 111 110 109 108 107 106 105 104 |