Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
J2EE Security for Servlets, EJBs, and Web Services
J2EE Security for Servlets, EJBs, and Web Services

J2EE developers have an extraordinary array of powerful options for securing their Web services, Web applications, EJB components and RMI objects. Now, expert Java architect Pankaj Kumar helps developers make sense of Java's increasingly rich security APIs, tools, patterns, and best practices-showing how to use each of them in the right place,...

Mastering Scientific and Medical Writing: A Self-help Guide
Mastering Scientific and Medical Writing: A Self-help Guide
You may ask why anyone would want to write yet another book about scientific writing. There are many books on the subject, some more useful than others, and the abundance of literature on this topic may confuse rather than guide.

I felt that this book was necessary for several reasons. During the past years, I
...
WebRTC Blueprints
WebRTC Blueprints

Develop your very own media applications and services using WebRTC

Overview

  • Create interactive web applications using WebRTC
  • Get introduced to advanced technologies such as WebSocket and Erlang
  • Develop your own secure web applications and services with practical projects
  • ...
Designing a Wireless Network
Designing a Wireless Network
Wireless network design presents the IT professional with unique obstacles. Your network requires the seamless and secure distribution of information, in spite of competing communication protocols, incompatible hardware platforms, and narrow bandwidths. This book is an introduction to developing efficient means of wireless transport in order to...
Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions
Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions

The Handbook of Research on Computational Forensics, Digital Crime, and Investigation: Methods and Solutions addresses a broad range of electronic devices and software for crime prevention and investigation. This defining body of research covers a wide spectrum of topics useful to a broad cross-sectional and multi-disciplinary...

CCA Citrix Metaframe: Citrix Metaframe XP 1.0 Administration
CCA Citrix Metaframe: Citrix Metaframe XP 1.0 Administration
Here's the book you need to prepare for exam 220, Citrix MetaFrame XP 1.0 for Windows Administration. This study guide provides:

In-depth coverage of every exam objective Practical information on administering MetaFrame XP 1.0 for Windows Hundreds of challenging review questions, in the book and on the CD Leading-edge exam preparation software,...

Informatics: 10 Years Back. 10 Years Ahead (Lecture Notes in Computer Science)
Informatics: 10 Years Back. 10 Years Ahead (Lecture Notes in Computer Science)
From August 27 to 31, 2000, the International Conference and Research Center for Computer Science in Schloss Dagstuhl, Dagstuhl for short, celebrated its 10th anniversary. Since its founding in 1990, the objective of the Center has been to promote world-class research in computer science, support leading-edge continuing education, and promote the...
Living The 80/20 Way : Work Less, Worry Less, Succeed More, Enjoy More
Living The 80/20 Way : Work Less, Worry Less, Succeed More, Enjoy More
This compelling book focuses on how to succeed personally and professionally by doing less. The author offers ideas and strategies for minimizing our activities and concerns to lead a "less is more" life.

There is a way to relax, enjoy life, put loved ones first, express yourself to the max, and also achieve your dreams....

Peer-to-Peer : Harnessing the Power of Disruptive Technologies
Peer-to-Peer : Harnessing the Power of Disruptive Technologies

The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and...

Understanding Wap : Wireless Applications, Devices, and Services (Artech House Telecommunications Library)
Understanding Wap : Wireless Applications, Devices, and Services (Artech House Telecommunications Library)
Over the last five years or so a revolution has taken place, and continues to do so, that is changing the way we communicate and interact with each other and our environment. The advent of the Internet and the ubiquitous presence of mobile personal communications systems are the most prominent examples of this. The Internet has made it possible to...
My Motorola Atrix 4G
My Motorola Atrix 4G

Step-by-step instructions with callouts to Motorola Atrix 4G photos so that you can see exactly what to do

 

Help when you run into Motorola Atrix 4G problems or limitations

 

...

Energy-Based Control of Electromechanical Systems: A Novel Passivity-Based Approach (Advances in Industrial Control)
Energy-Based Control of Electromechanical Systems: A Novel Passivity-Based Approach (Advances in Industrial Control)

This book introduces a passivity-based approach which simplifies the controller design task for AC-motors. It presents the application of this novel approach to several classes of AC motors, magnetic levitation systems, microelectromechanical systems (MEMS) and rigid robot manipulators actuated by AC motors.

The novel
...
unlimited object storage image
Result Page: 63 62 61 60 59 58 57 56 55 54 53 52 51 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy