|
|
|
|
J2EE Security for Servlets, EJBs, and Web ServicesJ2EE developers have an extraordinary array of powerful options for securing their Web services, Web applications, EJB components and RMI objects. Now, expert Java architect Pankaj Kumar helps developers make sense of Java's increasingly rich security APIs, tools, patterns, and best practices-showing how to use each of them in the right place,... | | Mastering Scientific and Medical Writing: A Self-help Guide
You may ask why anyone would want to write yet another book about scientific
writing. There are many books on the subject, some more useful than others,
and the abundance of literature on this topic may confuse rather than guide.
I felt that this book was necessary for several reasons. During the past
years, I... | | WebRTC Blueprints
Develop your very own media applications and services using WebRTC
Overview
-
Create interactive web applications using WebRTC
-
Get introduced to advanced technologies such as WebSocket and Erlang
-
Develop your own secure web applications and services with practical projects
... |
|
|
Informatics: 10 Years Back. 10 Years Ahead (Lecture Notes in Computer Science)From August 27 to 31, 2000, the International Conference and Research Center for Computer Science in Schloss Dagstuhl, Dagstuhl for short, celebrated its 10th anniversary. Since its founding in 1990, the objective of the Center has been to promote world-class research in computer science, support leading-edge continuing education, and promote the... | | Living The 80/20 Way : Work Less, Worry Less, Succeed More, Enjoy MoreThis compelling book focuses on how to succeed personally and professionally by doing less. The author offers ideas and strategies for minimizing our activities and concerns to lead a "less is more" life.
There is a way to relax, enjoy life, put loved ones first, express yourself to the max, and also achieve your dreams.... | | Peer-to-Peer : Harnessing the Power of Disruptive Technologies
The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and... |
|
| | My Motorola Atrix 4G
Step-by-step instructions with callouts to Motorola Atrix 4G photos so that you can see exactly what to do
Help when you run into Motorola Atrix 4G problems or limitations
... | | |
|
|
Result Page: 63 62 61 60 59 58 57 56 55 54 53 52 51 |