Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Macromedia® Flash MX 2004 ActionScript: Training from the Source
Macromedia® Flash MX 2004 ActionScript: Training from the Source

ActionScript is the programming language that enables you to use Macromedia's popular Flash to create highly interactive multimedia-based Web sites, product demos, teaching materials, and more. If you're familiar with the logic of other programming languages, especially JavaScript or Java, ActionScript will seem quite...

Software Fortresses: Modeling Enterprise Architectures
Software Fortresses: Modeling Enterprise Architectures

This book introduces a new approach for modeling large enterprise systems: the software fortress model. In the software fortress model, an enterprise architecture is viewed as a series of self-contained, mutually suspicious, marginally cooperating software fortresses interacting with each other through carefully crafted and meticulously managed...

Unix Unleashed: Internet Edition
Unix Unleashed: Internet Edition
The first edition of Unix Unleashed provided a thick, comprehensive guide to the basic tools of the Unix trade, covering everything from system administration to the windowing system to the compiler environments. The guide also featured information on other tools, such as the vi editor, the command shells, the AWK, PERL, C and C++...
.NET Framework Security
.NET Framework Security
Welcome! The book you hold in your hands is a comprehensive guide and roadmap to the security infrastructure of the Microsoft .NET Framework. The .NET Framework is Microsoft's new cross-language development environment for building rich client applications and XML Web Services. One of the key features of the .NET Framework is a robust security...
Security Monitoring with Cisco Security MARS (Networking Technology: Security)
Security Monitoring with Cisco Security MARS (Networking Technology: Security)
Learn the differences between various log aggregation and correlation systems
  • Examine regulatory and industry requirements
  • Evaluate various deployment scenarios
  • Properly size your deployment
  • Protect the Cisco Security MARS appliance from attack
  • Generate reports,...
Agility by ARIS Business Process Management: Yearbook Business Process Excellence 2006/2007
Agility by ARIS Business Process Management: Yearbook Business Process Excellence 2006/2007
Agility and Execution – Organizational Success Through Flexible Business Processes

Only a company which is flexible, agile and responsive will be successful. The secret to success is agility, meaning the ability to quickly adapt company processes. Against this backdrop, IT is of particular importance as it is virtually the machine
...
The Definitive Guide to Linux Network Programming (Expert's Voice)
The Definitive Guide to Linux Network Programming (Expert's Voice)

This book is…one nice and convenient package that I will keep on the shelf as a reference manual.

The Definitive Guide to Linux Network Programming offers a clear, concise treatment of creating clients and servers under the Linux operating system. This book assumes that you know C and have experience developing code on...

Beyond 3G - Bringing Networks, Terminals and the Web Together: LTE, WiMAX, IMS, 4G Devices and the Mobile Web 2.0
Beyond 3G - Bringing Networks, Terminals and the Web Together: LTE, WiMAX, IMS, 4G Devices and the Mobile Web 2.0
Giving a sound technical introduction to 3GPP LTE and SAE, this book explains the decisions taken during standardization while also examining the likely competition for LTE such as HSPA+ and WiMAX. As well as looking at next generation network technologies, Beyond 3G - Bringing Networks, Terminals and the Web Together describes the latest...
Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
Web Security Testing Cookbook: Systematic Techniques to Find Problems Fast
Among the tests you perform on web applications, security testing is perhaps the most important, yet it's often the most neglected. The recipes in the Web Security Testing Cookbook demonstrate how developers and testers can check for the most common web security issues, while conducting unit tests, regression tests, or exploratory tests. Unlike ad...
Software Verification and Analysis: An Integrated, Hands-On Approach
Software Verification and Analysis: An Integrated, Hands-On Approach
This book addresses the most important techniques in improving the correctness of software, including correctness by construction (top-down refinement), program proving, static analysis and dynamic, execution-based analysis (testing and debugging).

Three major software verification techniques are discussed: Semantic program synthesis and...

Categorical Data Analysis With Sas and Spss Applications
Categorical Data Analysis With Sas and Spss Applications

This book is primarily designed for a senior undergraduate class in Categorical Data Analysis and for majors in biomedical, biostatistics and statistics programs, but can also be used as reference text for researchers working in the area, and /or for an introductory text in a graduate course on the subject. A prerequisite of a one year...

The Data Warehouse ETL Toolkit: Practical Techniques for Extracting, Cleanin
The Data Warehouse ETL Toolkit: Practical Techniques for Extracting, Cleanin

The Extract-Transform-Load (ETL) system is the foundation of the data warehouse. A properly designed ETL system extracts data from the source systems, enforces data quality and consistency standards, conforms data so that separate sources can be used together, and finally delivers data in a presentation-ready format so that...

unlimited object storage image
Result Page: 335 334 333 332 331 330 329 328 327 326 325 324 323 322 321 320 319 318 317 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy