Home | Amazing | Today | Tags | Publishers | Years | Search 
Java: Practical Guide for Programmers
Java: Practical Guide for Programmers
The purpose of this book is to help you quickly learn the essentials of the Java language.
After its release in 1995, Java was initially used to execute programs from a Web page by
means of applets. However, Java is also a general-purpose, object-oriented programming
language. Java is used for developing applications as diverse as
...
CodeNotes for J2EE: EJB, JDBC, JSP, and Servlets
CodeNotes for J2EE: EJB, JDBC, JSP, and Servlets
CodeNotes provides the most succinct, accurate, and speedy way for a developer to ramp up on a new technology or language. Unlike other programming books, CodeNotes drills down to the core aspects of a technology, focusing on the key elements needed in order to understand it quickly and implement it immediately. It...
Real Web Project Management: Case Studies and Best Practices from the Trenches
Real Web Project Management: Case Studies and Best Practices from the Trenches

The process of designing and building today's dynamic Web applications comes with a host of challenges not typically solved by traditional project management methodologies. A wealth of practical resources, Real Web Project Management: Case Studies and Best Practices from the Trenches is a book of solutions...

Lotus Domino 6 for Linux
Lotus Domino 6 for Linux
This IBM Redbook describes how to run the IBM Lotus Domino 6 server on the Linux platform. While Lotus Domino 6 is platform-independent, some specific knowledge about the platform and configuration is required to ensure that the Domino 6 server is running most efficiently.

The book provides detailed instructions for installing Linux and
...
Linux on IBM eserver zSeries and S/390: Best Security Practices
Linux on IBM eserver zSeries and S/390: Best Security Practices
This IBM® Redbook discusses best security practices for running Linux as a z/VM® guest on IBM Eserver® zSeries® and S/390® machines. This publication is intended for system administrators and IT architects responsible for deploying secure Linux servers running under z/VM. We consider both z/VM and Linux security topics.
...
Java Persistence with Hibernate
Java Persistence with Hibernate

Summary

Java Persistence with Hibernate, Second Edition explores Hibernate by developing an application that ties together hundreds of individual examples. In this revised edition, authors Christian Bauer, Gavin King, and Gary Gregory cover Hibernate 5 in detail with the Java Persistence 2.1 standard (JSR...

Itanium Architecture for Programmers: Understanding 64-Bit Processors and EPIC Principles
Itanium Architecture for Programmers: Understanding 64-Bit Processors and EPIC Principles
  • Step-by-step guide to assembly language for the 64-bit Itanium processors, with extensive examples
  • Details of Explicitly Parallel Instruction Computing (EPIC): Instruction set, addressing, register stack engine, predication, I/O, procedure calls, floating-point operations, and more
  • Learn how to comprehend...
Streaming Media: Building and Implementing a Complete Streaming System
Streaming Media: Building and Implementing a Complete Streaming System
A complete toolkit to successfully develop and implement streaming media on the Web

From hands-on training and distance learning to teleconferencing and product demonstrations, streaming media is providing businesses with a whole new world of opportunity. Written by one of the leading experts in the field, this book will provide you with all...

Production Rendering
Production Rendering

In the past, rendering systems used a range of different approaches, each compatible and able to handle certain kinds of images. However, the last few years have seen the development of practical techniques, which bring together many areas of research into stable, production ready rendering tools. Written by experienced graphics software...

CISSP For Dummies (Computer/Tech)
CISSP For Dummies (Computer/Tech)

Cramming for the CISSP exam? This friendly test-prep guide makes studying a snap! Prepared by two CISSP-certified experts, it gets you up to speed on the latest changes to the exam and gives you proven test-taking tips. You’ll find complete coverage of all ten domains of the (ISC)2 Common Body of Knowledge to help you pass with flying...

Option Pricing Models and Volatility Using Excel-VBA (Wiley Finance)
Option Pricing Models and Volatility Using Excel-VBA (Wiley Finance)
T his book constitutes a guide for implementing advanced option pricing models and volatility in Excel/VBA. It can be used by MBA students specializing in finance and risk management, by practitioners, and by undergraduate students in their final year. Emphasis has been placed on implementing the models in VBA, rather than on the theoretical...
Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication
Statistical Methods in Counterterrorism: Game Theory, Modeling, Syndromic Surveillance, and Biometric Authentication
"Counterterrorism is an important research area for national security and defense, and an area where statisticians can provide insights and tools to improve the standard practice. As funding and governmental interest in these areas continues to grow, this book will provide a stepping stone for those interested in this emerging area of...
Result Page: 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy