When the U.S. liberated the Philippines from Spanish rule in 1898, the exploit was hailed at home as a great moral victory, an instance of Uncle Sam freeing an oppressed country from colonial tyranny. The next move, however, was hotly contested: should the U.S. annex the archipelago? The disputants did agree on one point: that the United...
Quickly take advantage of Visual Basic .NET to implement a wide range of programming tasks. Packed with practical advice and hundreds of ready-to-run programs, this powerful resource will show you how to maximize the .NET environment to create professional-quality real-world solutions. Covers key...
The objectives of this book are to provide a solid foundation for the classical the
ory of sequential algorithms and to cover some of the most important recent al
gorithmic developments, including the rapidly advancing theory of parallel and
distributed algorithms. The book is intended to serve as a text for a core upper...
This book explores the different strategies regarding limited feedback information. The book analyzes the impact of quantization and the delay of CSI on the performance. The author shows the effect of the reduced feedback information and gives an overview about the feedback strategies in the standards. This volume presents theoretical...
Quickly find solutions to dozens of common programming problems encountered while building Java applications. Content is presented in the popular problem-solution format. Look up the programming problem that you want to resolve. Read the solution. Apply the solution directly in your own code. Problem solved!
Network Security is a comprehensive resource written for anyone who plans or implements network security measures, including managers and practitioners. It offers a valuable dual perspective on security: how your network looks to hackers who want to get inside, and how you need to approach it on the inside to keep them at bay.
SOA is about architecture, not products and SOA enables you to create better business processes faster than ever. While BizTalk Server 2009 is a powerful tool, by itself it cannot deliver long-lasting, agile solutions unless we actively apply tried and tested service-oriented principles.
The current BizTalk Server books are all for the...
This text provides an introduction to the science that governs the interaction of light and matter (in the gas phase). It provides readers with the basic knowledge to exploit the light-matter interaction to develop quantitative tools for gas analysis (i.e. optical diagnostics) and understand and interpret the results of spectroscopic...
Cocoon is one of the showpieces of the Apache XML project. It is a powerful framework that allows developers to more efficiently set up, create, and maintain sophisticated Web-oriented applications. It has attracted widespread attention because it solves a substantial problem for Web developers. Yet Cocoon's reliance on a wide array of open source...
The notion that the corporation is changing fundamentally has been around for decades – dating back to Peter Drucker’s seminal work in the 1980s on ‘The New Organization’. In 1992, I discussed what I called ‘The New Enterprise’ in my book Paradigm Shift, saying ‘the corporation of old simply...
Learn everything you need to know to become a professional security and penetration tester. It simplifies hands-on security and penetration testing by breaking down each step of the process so that finding vulnerabilities and misconfigurations becomes easy. The book explains how to methodically locate, exploit, and professionally...