 |
|
 Enterprise 2.0
The notion that the corporation is changing fundamentally has been around for decades – dating back to Peter Drucker’s seminal work in the 1980s on ‘The New Organization’. In 1992, I discussed what I called ‘The New Enterprise’ in my book Paradigm Shift, saying ‘the corporation of old simply... |  |  .NET Compact Framework 3.5 Data Driven Applications
Both the SQL Server Lite and Oracle Lite mobile databases are covered in detail, from data access to data synchronization. The book explains how device features such as Bluetooth, SMS, telephony, Infrared, and Windows Contacts can be accessed via .NET CF in a real-world example, namely the mobile sales-force application. It also explains.NET... |  |  Pentaho 3.2 Data Integration: Beginner's Guide
Pentaho Data Integration (a.k.a. Kettle) is a full-featured open source ETL (Extract, Transform, and Load) solution. Although PDI is a feature-rich tool, effectively capturing, manipulating, cleansing, transferring, and loading data can get complicated.
This book is full of practical examples that will help you to take advantage of... |
|
 Principles of Cybercrime
We live in a digital age. The proliferation of digital technology, and the convergence of computing and communication devices, has transformed the way in which we socialise and do business. While overwhelmingly positive, there has also been a dark side to these developments. Proving the maxim that crime follows opportunity, virtually every... |  |  |  |  WPF 4 Unleashed
The #1 WPF Book--Now Updated for WPF 4!
Full Color: Code samples appear as they do in Visual Studio!
Thorough, authoritative coverage, practical examples, clear writing, and... |
|
 Hacking Exposed Wireless, Second Edition
The latest wireless security solutions
Protect your wireless systems from crippling attacks using the detailed security information in this comprehensive volume. Thoroughly updated to cover today's established and emerging wireless technologies, Hacking Exposed Wireless, second edition reveals how attackers use readily... |  |  Computational Intelligence in Telecommunications Networks
Telecommunications has evolved and grown at an explosive rate in recent years and will undoubtedly continue to do so. As its functions, applications, and technology grow, it becomes increasingly complex and difficult, if not impossible, to meet the demands of a global network using conventional computing technologies. Computational... |  |  JUnit in Action, Second Edition
When JUnit was first introduced a decade ago by Kent Beck and Erich Gamma, the Agile movement was in its infancy, "Test Driven Development" was unknown, and unit testing was just starting to move into the typical developer's vocabulary. Today, most developers acknowledge the benefits of unit testing and rely on the... |
|
|
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 |