Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java EE 8 and Angular: A practical guide to building modern single-page applications with Angular and Java EE
Java EE 8 and Angular: A practical guide to building modern single-page applications with Angular and Java EE

Learn how to build high-performing enterprise applications using Java EE powered by Angular at the frontend

Key Features

  • Leverage Java EE 8 features to build robust back end for your enterprise applications
  • Use Angular to build a single page frontend and combine it with...
Microsoft Dynamics NAV 2009 Programming Cookbook
Microsoft Dynamics NAV 2009 Programming Cookbook

Microsoft Dynamics NAV 2009 is a business management solution that helps simplify and streamline highly specialized business processes such as finance, manufacturing, customer relationship management, supply chains, analytics, and electronic commerce for small and medium-sized enterprises. ERP systems like NAV thus become the center of a...

SOA Principles of Service Design (The Prentice Hall Service-Oriented Computing Series from Thomas Erl)
SOA Principles of Service Design (The Prentice Hall Service-Oriented Computing Series from Thomas Erl)
Over the past few years I’ve been exposed to many different IT environments as part of a wide range of SOA initiatives for clients in both private and public sectors. While doing some work on a project for a client in the defense industry, I had an opportunity to learn more about not just their technical landscape, but also the various...
CompTIA Network+ Certification Study Guide, Fourth Edition (Certification Press)
CompTIA Network+ Certification Study Guide, Fourth Edition (Certification Press)
If you are new to certifications, we have some good news and some bad news. The good news is that a computer industry certification is one of the most valuable credentials you can earn. It sets you apart from the crowd and marks you as a valuable asset to your employer. You will gain the respect of your peers, and certification can have a...
The Bully at Work: What You Can Do to Stop the Hurt and Reclaim Your Dignity on the Job
The Bully at Work: What You Can Do to Stop the Hurt and Reclaim Your Dignity on the Job

A landmark book that blazed light on one of the business world's dirtiest secrets, The Bully at Work exposed the destructive, silent epidemic of workplace bullying that devastates the lives, careers, and families of millions. In this completely updated new edition based on an updated survey of workplace issues, the authors explore...

Pro VB 2005 and the .NET 2.0 Platform, Second Edition
Pro VB 2005 and the .NET 2.0 Platform, Second Edition
The initial release of the .NET platform (circa 2001) caused quite a stir within the Visual Basic programming community. One the one hand, many die-hard VB 6.0 developers were up in arms at the major differences between VB 6.0 and Visual Basic .NET. Individuals in this group were a bit stunned to see that VB .NET was not in fact “VB...
APIs: A Strategy Guide
APIs: A Strategy Guide
APIs are a big deal and they are getting bigger. Pioneering companies such as Google, Facebook, Apple, and Twitter have exposed amazing technological solutions to the public, transforming existing businesses and creating new industries. Central to these companies’ successes are the APIs that link people and...
Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals
Managing Catastrophic Loss of Sensitive Data: A Guide for IT and Security Professionals
The loss of sensitive data continues to be a signifi cant concern for both organizations as well as individuals whose information may be at risk of a breach. Organizations that experience a data breach can suffer reputational damage, loss of customer and constituent confi dence, legal and regulatory scrutiny, and the direct costs of managing an...
Cyberbullying Prevention and Response: Expert Perspectives
Cyberbullying Prevention and Response: Expert Perspectives

Just as the previous generation was raised in front of televisions, adolescents at the turn of the 21st century are being raised in an internet-enabled world where blogs, social networking, and instant messaging are competing with face-to-face and telephone communication as the dominant means through which personal interaction takes place....

Complexity and Cryptography : An Introduction
Complexity and Cryptography : An Introduction
This book originated in a well-established yet constantly evolving course on
Complexity and Cryptography which we have both given to final year Mathematics
undergraduates at Oxford for many years. It has also formed part of an
M.Sc. course on Mathematics and the Foundations of Computer Science, and
has been the basis for a more
...
Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase
Implementing Database Security and Auditing: Includes Examples for Oracle, SQL Server, DB2 UDB, Sybase
"Today, databases house our 'information crown jewels', but database security is one of the weakest areas of most information security programs. With this excellent book, Ben-Natan empowers you to close this database security gap and raise your database security bar!" Bruce W. Moulton. CISO/VP, Fidelity Investments (1995 - 2001)...
Project Management Simulation with PTB Project Team Builder
Project Management Simulation with PTB Project Team Builder

“The Project Team Builder (PTB) meets the need for an effective teaching and training tool of project management. The software introduces the user to the full dynamics of project planning, monitoring and control, moving scenario-wise from the easy, fundamental issues to the more involved, complex ones. Based on a sound conceptual...

unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy