|
|
|
|
|
|
Java Enterprise Best PracticesUntil Java Enterprise Best Practices, advanced Java developers relied on the advice of a loose-knit community of fellow developers, time-consuming online searches for examples or suggestions for the immediate problem they faced, and tedious trial-and-error. But Java has grown to include a huge number of APIs,... | | Hack I.T.: Security Through Penetration TestingPenetration testing--in which professional, "white hat" hackers attempt to break through an organization's security defenses--has become a key defense weapon in today's information systems security arsenal. Through penetration testing, I.T. and security professionals can take action to prevent true "black hat" hackers from... | | Principles of Computer Organization and Assembly Language
This is a book on the organization and architecture of theJava Virtual Machine(JVM), the
software at the heart of the Java language and is found inside most computers,Web browsers,
PDAs, and networked accessories. It also covers general principles of machine organization and
architecture, with llustrations from other popular (and... |
|
|
|
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 |