Home | Amazing | Today | Tags | Publishers | Years | Search 
Information Systems Transformation: Architecture-Driven Modernization Case Studies
Information Systems Transformation: Architecture-Driven Modernization Case Studies

Every major enterprise has a significant installed base of existing software systems that reflect the tangled IT architectures that result from decades of patches and failed replacements. Most of these systems were designed to support business architectures that have changed dramatically. At best, these systems hinder agility and...

Java Internationalization (Java Series)
Java Internationalization (Java Series)

On the Internet, there are almost no barriers against international commerce. Except for language. Unfortunately, most software is still written in English. Java Internationalization shows how to write software that is truly multi-lingual, using Java's very sophisticated Unicode internationalization facilities. This book explores...

Towards Hardware-Intrinsic Security: Foundations and Practice (Information Security and Cryptography)
Towards Hardware-Intrinsic Security: Foundations and Practice (Information Security and Cryptography)

Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time....

Model Driven Architecture for Reverse Engineering Technologies: Strategic Directions and System Evolution
Model Driven Architecture for Reverse Engineering Technologies: Strategic Directions and System Evolution

The software industry has evolved to tackle new approaches aligned with the Internet, object-orientation, distributed components and new platforms. However, the majority of the large information systems running today in many organizations were developed many years ago with technologies that are now obsolete. These old systems, known as legacy...

Mac OS X for Unix Geeks (Leopard)
Mac OS X for Unix Geeks (Leopard)

Once upon a time, Unix came with only a few standard utilities. If you were lucky, it included a C compiler. When setting up a new Unix system, you’d have to crawl the Net looking for important software: Perl, gcc, bison, flex, less, Emacs, and other utilities and languages. That was a lot of software to download through a 28.8-Kbps...

Pro Oracle SQL (Expert's Voice in Oracle)
Pro Oracle SQL (Expert's Voice in Oracle)

Pro Oracle SQL unlocks the power of SQL in the Oracle Database—one of the most potent SQL implementations on the market today. To master it requires a three-pronged approach: learn the language features, learn the supporting features that Oracle provides to help use the language effectively, and learn to think and work in...

Developer's Guide to Microsoft Enterprise Library, Visual Basic Edition (Patterns & Practices)
Developer's Guide to Microsoft Enterprise Library, Visual Basic Edition (Patterns & Practices)

You are holding in your hands a book that will make your life as an enterprise developer a whole lot easier.

It’s a guide on Microsoft Enterprise Library and it’s meant to guide you through how to apply .NET for enterprise development. Enterprise Library, developed by the patterns & practices group, is a collection...

Drupal Intranets with Open Atrium
Drupal Intranets with Open Atrium

In today's global society, online collaboration has gained tremendous importance as businesses look for ways to share ideas and collaborate easily. Open Atrium is a powerful and flexible Drupal installation that provides intranet solutions to businesses and organizations for sharing ideas. It is used to create intranets where co-workers...

Business Modeling and Data Mining (The Morgan Kaufmann Series in Data Management Systems)
Business Modeling and Data Mining (The Morgan Kaufmann Series in Data Management Systems)

Following a seminar presentation, a member of the audience approached me to follow up on a point I had addressed. He explained that he worked in a bank, and also taught a graduate-level data mining course. He asked if I had any advice about how to turn the business description of a problem into a form that could be answered...

Facebook and Twitter For Seniors For Dummies
Facebook and Twitter For Seniors For Dummies

A fun and easy social media guide for the over-55 set

People over 55 were the fastest-growing user group on Facebook in the first half of 2009, and they’re flocking to Twitter at a faster rate than their under-20 grandchildren. From basic information about establishing an Internet connection to rediscovering old...

Microsoft Exchange Server 2010 Inside Out
Microsoft Exchange Server 2010 Inside Out

Welcome to my tenth book covering the technology in Microsoft Exchange Server and its surrounding ecosystem. I seem to have been constantly writing about Exchange since before its introduction as version 4.0 in March 1996 in books and many articles printed in the redoubtable Windows IT Pro magazine (http://www.windowsitpro.com). All my...

Multidimensional Databases: Problems and Solutions
Multidimensional Databases: Problems and Solutions

The term "multidimensional data" generally refers to data in which a given fact is quantified by a set of measures, obtained by applying one more or less complex aggregative function (from count or sum to average or percent, and so on) to raw data. Such measures are...

Result Page: 202 201 200 199 198 197 196 195 194 193 192 191 190 189 188 187 186 185 184 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy