Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Reactive Design Patterns
Reactive Design Patterns

Summary

Reactive Design Patterns is a clearly written guide for building message-driven distributed systems that are resilient, responsive, and elastic. In this book you'll find patterns for messaging, flow control, resource management, and concurrency, along with practical issues like test-friendly...

Dynamic Web Programming and HTML5
Dynamic Web Programming and HTML5

With organizations and individuals increasingly dependent on the Web, the need for competent, well-trained Web developers and maintainers is growing. Helping readers master Web development, Dynamic Web Programming and HTML5 covers specific Web programming languages, APIs, and coding techniques and provides an...

Cyber-Physical Systems: Advances in Design & Modelling (Studies in Systems, Decision and Control)
Cyber-Physical Systems: Advances in Design & Modelling (Studies in Systems, Decision and Control)
This book presents new findings on cyber-physical systems design and modelling approaches based on AI and data-driven techniques, identifying the key industrial challenges and the main features of design and modelling processes. To enhance the efficiency of the design process, it proposes new approaches based on the concept of digital twins....
Building Client/Server Applications with VB.NET: An Example-Driven Approach
Building Client/Server Applications with VB.NET: An Example-Driven Approach

Building Client/Server Applications with VB .NET: An Example-Driven Approach is based on Release 1.0 of the .NET Framework / Release 1.0 of Visual Studio .NET + .NET Framework Service Pack 1. Jeff Levinson walks readers through how to write a complete application-no "snippets" of code- and will show readers examples of...

Enterprise JavaBeans (3rd Edition)
Enterprise JavaBeans (3rd Edition)
EnterpriseJavaBeans, 3rd edition, has been thoroughly revised to include complete coverage of three major changes in the EJB 2.0 specification: A new version of container-managed persistence; local interfaces; and a totally new kind of bean called the "message driven bean." The 3rd edition...
Behold a Pale Horse
Behold a Pale Horse
Sometime ago I had the opportunity to meet William Cooper and his wife Annie. It was part of my job to verify whether this man did indeed speak the truth or was just another person seeking fame and fortune. What I found was a rugged, bulldog, driven individual who was kind, thoughtful and tenderhearted. He was truly concerned about you and your...
Professional haXe and Neko
Professional haXe and Neko
Professional haXe and Neko

haXe is an exciting new programming language, as well as a compiler and a framework, that can be used to build web applications and write code aimed at multiple platforms on an array of operating systems. Neko is a fast, flexible, and reliable cross-platform virtual machine that allows for the...

Applied SOA: Service-Oriented Architecture and Design Strategies
Applied SOA: Service-Oriented Architecture and Design Strategies
You need more than theory to make SOA work.

You need this practical guide.

The challenge today's IT professionals face is not how to build a service. It's how to build a quality service, based on solid design principles and integrated into an architecture that enhances overall business...

Electronics System Design Techniques for Safety Critical Applications (Lecture Notes in Electrical Engineering)
Electronics System Design Techniques for Safety Critical Applications (Lecture Notes in Electrical Engineering)
The main purpose of the present manuscript addresses the development of techniques for the evaluation and the hardening of designs implemented on SRAM-based Field Programmable Gate Arrays against the radiation induced effects such as Single Event Upsets (SEUs) or Soft-Errors (SEs). The perspective of the analysis and the design flows proposed in...
Questioning the Veil: Open Letters to Muslim Women
Questioning the Veil: Open Letters to Muslim Women

Across much of the world today, Muslim women of all ages are increasingly turning to wearing the veil. Is this trend a sign of rising piety or a way of asserting Muslim pride? And does the veil really provide women freedom from sexual harassment? Written in the form of letters addressing all those interested in this issue, Questioning the...

The Fractal Structure of Data Reference: Applications to the Memory Hierarchy
The Fractal Structure of Data Reference: Applications to the Memory Hierarchy
For purposes of understanding its performance, a computer system is traditionally viewed as a processor coupled to one or more disk storage devices, and driven by externally generated requests (typically called transactions). Over the past several decades, very powerful techniques have become available to the performance analyst attempting to...
Protecting Your Mobile App IP: The Mini Missing Manual
Protecting Your Mobile App IP: The Mini Missing Manual

Learn four cost-effective ways to protect the applications you develop for mobile devices. The methods described in this Mini Missing Manual won't stop people from misappropriating your secrets, stealing your name, and copying your code. But if any of those things do...

unlimited object storage image
Result Page: 192 191 190 189 188 187 186 185 184 183 182 181 180 179 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy