Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
DTrace: Dynamic Tracing in Oracle Solaris, Mac OS X and FreeBSD (Oracle Solaris Series)
DTrace: Dynamic Tracing in Oracle Solaris, Mac OS X and FreeBSD (Oracle Solaris Series)

In early 2004, DTrace remained nascent; while Mike Shapiro, Adam Leventhal, and I had completed our initial implementation in late 2003, it still had substantial gaps (for example, we had not yet completed user-level instrumentation on x86), many missing providers, and many features yet to...

C++ for Everyone
C++ for Everyone

This book is an introduction to C++ and computer programming that focuses on the essentials—and on effective learning. The book is designed to serve a wide range of student interests and abilities and is suitable for a first course in programming for computer scientists, engineers, and students in other disciplines. No prior...

Sonar Code Quality Testing Essentials
Sonar Code Quality Testing Essentials
Developers continuously strive to achieve higher levels of source code quality. It is the holy grail in the software development industry. Sonar is an all-out platform confronting quality from numerous aspects as it covers quality on seven axes, provides an abundance of hunting tools to pinpoint code defects, and continuously...
The Coder's Path to Wealth and Independence
The Coder's Path to Wealth and Independence

Developers, programmers, technical architects, and consultants: You are highly skilled and have deep commitment to your craft as well as the motivation to excel. It’s time to step away from the perceived security of a full-time salaried position, or a marginally successful solo business, and step into a world of freedom, independence,...

The Innovation Handbook: How to Profit from Your Ideas, Intellectual Property and Market Knowledge
The Innovation Handbook: How to Profit from Your Ideas, Intellectual Property and Market Knowledge


Unique features, distinctive capabilities and exclusive know-how are the surest way to stay ahead of the market for any length of time. But the way these points of difference are created and commercialized is changing. The difficulty for most organizations is not in generating ideas, but in pursuing the right one at the
...

Incident Response: A Strategic Guide to Handling System and Network Security Breaches
Incident Response: A Strategic Guide to Handling System and Network Security Breaches
The increasing complexity and diversity of systems, applications, and networks has made them more difficult to defend. As companies continue to experience losses due to security breaches, security professionals must take a new approach in protecting their assets. By using monitoring and detection measures with prompt intervention, you can...
Effective Enterprise Java
Effective Enterprise Java

If you want to build better Java enterprise applications and work more efficiently, look no further. Inside, you will find an accessible guide to the nuances of Java 2 Platform, Enterprise Edition (J2EE) development. Learn how to:

  • Use in-process or local storage to avoid the network

    ...
Objects, Components, and Frameworks with UML: The Catalysis(SM) Approach
Objects, Components, and Frameworks with UML: The Catalysis(SM) Approach

". . . We found Catalysis to be the first comprehensive object-oriented methodology to unify the concepts of objects, frameworks, and component technologies."
John McGehee, Senior Architect, Texas Instruments Works Project

Objects, Components, and Frameworks with UML: The Catalysis Approach is where you will...

J2EE and XML Development
J2EE and XML Development
Geared toward experienced developers, this reference demonstrates how Java 2 Platform, Enterprise Edition (J2EE), and XML technologies can be used together to create more robust distributed applications and software systems. The use of XML technology to extend and enhance the capabilities of the J2EE platform is covered in detail. Discussed...
Global E-government Readiness Report 2005: From E-government to E-inclusion
Global E-government Readiness Report 2005: From E-government to E-inclusion
In reaffirming the vision of a peaceful, prosperous and just world, leaders at the United Nations World Summit in 2005 outlined a vision of ‘…building a people-centred and inclusive information society, putting the potential of information and communication technologies at the service of development and addressing new challenges of the...
Deploying Cisco Wide Area Application Services (Networking Technology)
Deploying Cisco Wide Area Application Services (Networking Technology)

Design and deploy Cisco WAN optimization and application acceleration solutions for the enterprise WAN

Today, IT organizations are increasingly squeezed by competing demands. They must support more distributed users who demand greater availability and performance. They must protect their digital assets...

IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002
IT Governance: A Manager's Guide to Data Security and ISO 27001 / ISO 27002

Information is widely regarded as the lifeblood of modern business, but organizations are facing a flood of threats to such “intellectual capital” from hackers, viruses, and online fraud.  Directors must respond to increasingly complex and competing...

unlimited object storage image
Result Page: 270 269 268 267 266 265 264 263 262 261 260 259 258 257 256 255 254 253 252 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy