Pro Hibernate 3 is the first book to offer complete coverage of the open source lightweight Hibernate 3 and its new features. Authors Dave Minter and Jeff Linwood discuss the new persistence layer and share design tips and best practices. And the duo goes beyond just explaining "how to" use parts of Hibernate; they probe well...
This comprehensive and innovative handbook covers aspects of biometrics from the perspective of recognizing individuals at a distance, in motion, and under a surveillance scenario. Features: Starts with a thorough introductory chapter; Provides topics from a range of different perspectives offered by an international collection of leading...
PrimeFaces is a lightweight open source component suite for Java Server Faces (JSF), a Java-based web application framework. Java developers use PrimeFaces for front end UI development, and it can also be applied to both mobile and web applications. It allows users to customize, create, and further develop application features.
PowerPoint 2016 is a presentation program that presents information in the form of slides. This program is developed by Microsoft and was originally called “Presenter” released by another company Forethought Inc. It was originally launched in May 1990 and was and always been a part of the Microsoft Suite. It is popularly known as...
This is a book about patterns for resource management in software systems. The patterns provide solutions for problems that are typically encountered by software architects and developers when trying to provide an effective and efficient means of managing resources in a software system. Efficient management of resources is critical in the...
With this practical guide to design tools and packaging, professionals and academics can create the sensors they need for a complete range of next generation applications.
Here's the book to keep handy when you have to overcome obstacles in design, simulation,...
The production and service of the 21st century is based on distributed or networked organizations. The denomination of these organizations can be different (extended-, virtual-, smart-organization, etc.), but there are some main important common characteristics. In this type of organizations, flexible, independent organizational and production...
The mightiest fortresses in the world can fail, and when that happens all you can do (you being the person responsible for castle security) is figure out what went wrong, what damage was done, and by whom. If the castle was located in the right kind of kingdom--to take a metaphor too far--you can hope to prosecute the perpetrator. Computer...
This book introduces the origins of important teachings that form the basis of medicine and related healing professions. Reinforcing the humanistic side of patient care, this book replicates the tips, anecdotes and aphorisms often related by mentors and educators to medical students, residents, and young physicians. This book provides...
A major limitation of conventional web sites is their unorganized and isolated contents, which is created mainly for human consumption. This limitation can be addressed by organizing and publishing data, using powerful formats that add structure and meaning to the content of web pages and link related data to one another. Computers can...
Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...