|
|
|
|
JBoss in Action: Configuring the JBoss Application ServerJBoss in Action is the first book to focus on teaching readers in detail how to use the JBoss application server. Unlike other titles about JBoss, the authors of JBoss in Action go deeper into the advanced features and configuration of the server. In particular, it focuses on enterprise-class topics, such as high availability,... | | Programming Microsoft Dynamics NAV 2009Microsoft Dynamics NAV is a well established Enterprise Resource Planning (ERP) application, part of the Microsoft Dynamics family. Dynamics NAV is installed worldwide, with well over one million users. Version 2009 contains many major new features and structures, requiring even experienced Dynamics NAV developers to refresh their NAV development... | | Force.com Developer Certification Handbook (DEV401)
When migrating to the new wave of cloud-based applications, we now think about business logic, we think about automating processes, and we think about how we can make the systems better. Force.com is a cloud-based platform that is used to build and deploy enterprise applications on the cloud with minimum coding. Demand for Force.com experts... |
|
|
Oracle SQL Developer
Learn Database design, development,and administration using the feature-rich SQL Developer 4.1 interface
About This Book
-
Explore all the SQL Developer 4.1 features useful for Oracle database developers, architects, and administrators
-
Understand how this free tool from Oracle has evolved...
| | SOA Made Simple
Discover the true meaning behind the buzzword that is 'Service Oriented Architecture'
-
Get to grips with clear definitions of 'Service' and 'Architecture' to understand the full SOA picture
-
Read about SOA in simple terms from Oracle ACE Directors for SOA and Middleware in this book and...
| | Wireless Security HandbookThis book was written to give the reader a well-rounded understanding of wireless network security. It looks at wireless from multiple perspectives, ranging from auditor, to security architect, to hacker. This wide scope benefits anyone who has to administer, secure, hack, or participate on a wireless network. Going through this... |
|
Software Architecture Design Patterns in Java Partha Kuchana is an experienced enterprise systems architect. He understands that patterns are not about things that are just good ideas, but that patterns are about capturing knowledge bred from experience. This hard-won knowledge is what Partha is sharing with readers of his book. Here are some of the things I really like about what he has... | | Java(TM) EE 5 Tutorial, The (3rd Edition) (The Java Series)The Java™ EE 5 Tutorial, Third Edition, is the definitive, task-oriented, example-driven guide to programming server-side applications with Sun Microsystems' new Java(TM) EE 5 platform. Written by members of Sun's Java EE 5 platform team, this book enables new and intermediate Java programmers to build... | | Syngress Force 2006 Emerging Threat Analysis: From Mischief to MaliciousOver the last seven years, Internet Security Systems' (ISS) elite X-Force has discovered more high-risk vulnerabilities than all other research groups and vendors combined, including the vulnerability that led to the recent, widespread Zotob worm. For the first time ever, follow the X-Force team as they analyze potential vulnerabilities and... |
|
|
Result Page: 229 228 227 226 225 224 223 222 221 220 219 218 217 216 |