Home | Amazing | Today | Tags | Publishers | Years | Search 
Information Modeling Methods and Methodologies (Advanced Topics of Database Research)
Information Modeling Methods and Methodologies (Advanced Topics of Database Research)
The purpose of this book is to disseminate the research results and best practice from researchers and practitioners interested in and working on modeling methods and methodologies. Though the need for such studies is well recognized, there is a paucity of such research in the literature. What specifically distinguishes this book is that it looks...
Advanced Rails
Advanced Rails
Ready to go to the next level with Rails? From examining the parts of Ruby that make this framework possible to deploying large Rails applications, Advanced Rails offers you an in-depth look at techniques for dealing with databases, security, performance, web services and much more. Chapters in this book help you understand not only the tricks and...
Visualizing Data
Visualizing Data
Enormous quantities of data go unused or underused today, simply because people can't visualize the quantities and relationships in it. Using a downloadable programming environment developed by the author, Visualizing Data demonstrates methods for representing data accurately on the Web and elsewhere, complete with user interaction, animation, and...
IP Telephony with H.323: Architectures for Unified Networks and Integrated Services
IP Telephony with H.323: Architectures for Unified Networks and Integrated Services
A comprehensive introduction to the protocols and architecture everyone must know in order to implement H.323-based IP telephony

IP Telephony with H.323

Internet Protocol (IP) telephony is changing the way business gets done, allowing multimedia messages such as voice, data, and video to be transmitted over standard routers,...

Sun ONE Messaging Server: Practices and Techniques for Enterprise Customers
Sun ONE Messaging Server: Practices and Techniques for Enterprise Customers
The Sun™ ONE Messaging Server Practices and Techniques for Enterprise Customers book is published under the auspices of the Sun BluePrints™ program. This book is a collection of practices and techniques for deploying a messaging system. These practices and techniques have been gathered from many...
Pyramid Algorithms: A Dynamic Programming Approach to Curves and Surfaces for Geometric Modeling
Pyramid Algorithms: A Dynamic Programming Approach to Curves and Surfaces for Geometric Modeling

"Ron Goldman is a leading expert who knows the fundamental concepts and their interconnectedness, as well as the small details. The elegance of the writing and of the methods used to present the material allows us to get a deep understanding of the central concepts of CAGD. In its simplicity and pure beauty, the theory indeed resembles the...

ScreenOS Cookbook
ScreenOS Cookbook
Written by key members of Juniper Network's ScreenOS development team, this one-of-a-kind Cookbook helps you troubleshoot secure networks that run ScreenOS firewall appliances. Scores of recipes address a wide range of security issues, provide step-by-step solutions, and include discussions of why the recipes work, so you can easily set up and keep...
Mac OS X Leopard: The Missing Manual
Mac OS X Leopard: The Missing Manual
With Leopard, Apple has unleashed the greatest version of Mac OS X yet, and David Pogue is back with another meticulous Missing Manual to cover the operating system with a wealth of detail. The new Mac OS X 10.5, better known as Leopard, is faster than its predecessors, but nothing's too fast for Pogue and this Missing Manual. It's just one of...
Enterprise Security with EJB and CORBA(r)
Enterprise Security with EJB and CORBA(r)
"Leveraging their strong implemention and standards committee experience, the authors have delivered the definitive guide to enterprise distributed object security."–Wing K. Lee, Sprint

Enterprise Security with EJB and CORBA

With e-business and distributed components comes the need for a bold new approach to...

Cognitively Informed Systems: Utilizing Practical Approaches to Enrich Information Presentation and Transfer
Cognitively Informed Systems: Utilizing Practical Approaches to Enrich Information Presentation and Transfer
We dance around in a circle and suppose, while the secret sits in the middle and knows. (Frost, 1971)

It is the laborious life of scientific research that requires us to continually presume, then find support for our presumptions, which either stand the test of time or fall prey to falsifying evidence only to be replaced by new ideas and
...
Automated Defect Prevention: Best Practices in Software Management
Automated Defect Prevention: Best Practices in Software Management
Improve Productivity by Integrating Automation and Defect Prevention into Your Software Development Process

This book presents an approach to software management based on a new methodology called Automated Defect Prevention (ADP). The authors describe how to establish an infrastructure that functions as a software "production line"...

Windows Server 2008 Unleashed
Windows Server 2008 Unleashed
Windows Server 2008 Unleashed covers the planning, design, prototype testing, implementation, migration, administration, and support of a Windows 2008 and Active Directory environment, based on more than three and a half years of early adopter experience in full production environments. This book addresses not only what is new with Windows...
Result Page: 183 182 181 180 179 178 177 176 175 174 173 172 171 170 169 168 167 166 165 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy