 |
|
|
|
 Java 2: The Complete Reference, Fifth Edition
The past few years document the following fact: The Web has irrevocably recast
the face of computing and programmers unwilling to master its environment will
be left behind.
The preceding is a strong statement. It is also true. More and more, applications
must interface to the Web. It no longer matters much what the... |  |  Java Programming
Java Programming, Fifth Edition provides the beginning programmer with a guide to developing applications
using the Java programming language. Java is popular among professional programmers because it
can be used to build visually interesting graphical user interface (GUI) and Web-based applications. Java
also provides an excellent... |  |  Nagios: System and Network Monitoring
Good system administrators recognize problems long before anyone asks, "Hey, is the Internet down?" Nagios, an open source system and network monitoring tool, has emerged as the most popular solution for sys admins in organizations of all sizes. It's robust but also complex, and Nagios: System and Network Monitoring, 2nd... |
|
 Mastering IBM i: The Complete Resource for Today's IBM i System
The IBM i operating system running on IBM Power Systems is a platform in transition.
Many think the system is obsolete, largely due to its infamous green screen. Nothing,
though, could be further from the truth. When IBM embraced open-source software such
as Linux, MySQL, and Zend PHP, the system cemented a formidable position in... |  |  Sams Teach Yourself the Twitter API in 24 Hours (Sams Teach Yourself -- Hours)
This book on the Twitter API is geared to the programmer who is just a bit past
beginner—who knows the basics of LAMP, including how to set up a basic server,
PHP, JavaScript, HTML, and CSS. You do not have to be an expert programmer to
use this book, but you should know how to look things up. In writing this book, we
have tried... |  |  The Chief Information Security Officer
The role of the Chief Information Security Officer has evolved enormously in recent years in response to security threats and a challenging business environment. Instead of being primarily a master technician, today s CISO has to be a trusted advisor to senior management. Read this pocket guide and ...
|
|
Result Page: 364 363 362 361 360 359 358 357 356 355 354 353 352 351 350 349 348 347 346 |