 |
|
 Practical Web 2.0 Applications with PHPWant to assert yourself as a cutting-edge PHP web developer? Take a practical approach, learning by example from author Quentin Zervaas, and discover how to bring together the many technologies needed to create a successful, modern web application.
In Practical PHP Web 2.0 Applications, PHP, MySQL, CSS, XHTML, and... |  |  Service-Oriented Architecture: SOA Strategy, Methodology, and TechnologyAggressively being adopted by organizations in all markets, service-oriented architecture (SOA) is a framework enabling business process improvement for gaining competitive advantage. Service-Oriented Architecture (SOA): Strategy, Methodology, and Technology guides you through the challenges of deploying SOA. It demonstrates conclusively that... |  |  Analysis and Design of Information SystemsIn any software design project, the analysis stage - documenting and designing technical requirements for the needs of users - is vital to the success of the project.
This third edition of the successful Analysis and Design of Information Systems provides a comprehensive introduction and user-friendly survey to all aspects of business... |
|
 Penetration Tester's Open Source Toolkit, Volume 2Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pen testing... |  |  Professional Windows Vista Gadgets Programming (Programmer to Programmer)Professional Windows Vista Gadgets Programming
As an easy-to-use application that provides information at a glance, a gadget basically takes the concept of portal dashboards and moves them to the more accessible Windows desktop where users can quickly and easily obtain weather information, RSS news feeds, and much more. In... |  |  Medical Response to Terrorism: Preparedness and Clinical PracticeEven two decades ago, few would have imagined that terrorism would be planned and carried out on such an enormous scale as it is today. Terrorist attacks rely on horror and surprise, invoking different times, places, victims, and methods. Their purpose is to cause widespread confusion, fear, injury, and death. They disrupt security, ... |
|
|
 Professional Plone DevelopmentThis book teaches Plone development best practices, focusing on Plone 3.0. It covers setting up a development environment, customizing Plone's look and feel, creating new content types and forms, connecting to external databases, managing users and groups intelligently, configuring a production-ready server, LDAP authentication, and caching. Aimed... |  |  Flex Solutions: Essential Techniques for Flex 2 and 3 DevelopersFlex is the quickest and most effective technology for the creation of Rich Internet Applications for the Web. Its extensive library of components and totally customizable framework, combined with the ubiquity of Flash Player, has guaranteed its success.
The ecosystem of products that rotate around Flex 2 and Flex 3 is really broad. Flex... |  |  Manual of OrthopaedicsThe sixth edition of the Manual of Orthopaedics continues the recent trend of altering the content and the format to be of greater use to a wider audience of students and practicing physicians. This is the second edition which uses this title, which was changed from the Manual of Acute... |
|
| Result Page: 250 249 248 247 246 245 244 243 242 241 240 239 238 237 236 235 234 233 232 |