|
|
|
|
Open Systems And Standards For Software Product DevelopmentThis groundbreaking resource offers you new insights for building and evolving open systems using the best mix of standards for your software development projects. Numerous books have been published that describe individual computer standards, but only Open Systems and Standards for Software Product Development presents a framework for... | | Oracle Fusion Middleware Patterns
Enterprise Architecture is seldom simplistic enough to be built on a single technology - it generally encompasses a wide array of technologies, including SOA, Identity Management, Business Intelligence, Performance Management, Web 2.0, Content Management, BPM, Distributed caching, Data Integration, and Application Server.
What are... | | After Nationalism: Being American in an Age of Division (Radical Conservatisms)
Nationalism is on the rise across the Western world, serving as a rallying cry for voters angry at the unacknowledged failures of globalization that has dominated politics and economics since the end of the Cold War. In After Nationalism, Samuel Goldman trains a sympathetic but skeptical eye on the trend, highlighting the deep... |
|
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
The world's bestselling computer security book--fully expanded and updated
"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,... | | ASP.NET MVC with Entity Framework and CSS
Get up and running quickly with Microsoft ASP.NET MVC and Entity Framework as you build and deploy complex websites. By using a fully working example retail website you will learn solutions to real-world issues that developers frequently encounter.
Whether you are a novice developer or an experienced .NET developer... | | |
|
| | | | Handbook of BiometricsBiometric recognition, or simply Biometrics, is a rapidly evolving field with applications ranging from accessing one's computer to gaining entry into a country. Biometric systems rely on the use of physical or behavioral traits, such as fingerprints, face, voice and hand geometry, to establish the identity of an individual. The deployment of... |
|
|
|
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 |