Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Open Systems And Standards For Software Product Development
Open Systems And Standards For Software Product Development
This groundbreaking resource offers you new insights for building and evolving open systems using the best mix of standards for your software development projects. Numerous books have been published that describe individual computer standards, but only Open Systems and Standards for Software Product Development presents a framework for...
Oracle Fusion Middleware Patterns
Oracle Fusion Middleware Patterns

Enterprise Architecture is seldom simplistic enough to be built on a single technology - it generally encompasses a wide array of technologies, including SOA, Identity Management, Business Intelligence, Performance Management, Web 2.0, Content Management, BPM, Distributed caching, Data Integration, and Application Server.

What are...

After Nationalism: Being American in an Age of Division (Radical Conservatisms)
After Nationalism: Being American in an Age of Division (Radical Conservatisms)

Nationalism is on the rise across the Western world, serving as a rallying cry for voters angry at the unacknowledged failures of globalization that has dominated politics and economics since the end of the Cold War. In After Nationalism, Samuel Goldman trains a sympathetic but skeptical eye on the trend, highlighting the deep...

Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition
Hacking Exposed: Network Security Secrets and Solutions, Sixth Edition

The world's bestselling computer security book--fully expanded and updated

"Right now you hold in your hand one of the most successful security books ever written. Rather than being a sideline participant, leverage the valuable insights Hacking Exposed 6 provides to help yourself, your company,...

ASP.NET MVC with Entity Framework and CSS
ASP.NET MVC with Entity Framework and CSS

Get up and running quickly with Microsoft ASP.NET MVC and Entity Framework as you build and deploy complex websites. By using a fully working example retail website you will learn solutions to real-world issues that developers frequently encounter.

Whether you are a novice developer or an experienced .NET developer...

Psychotherapy Relationships that Work: Volume 2: Evidence-Based Therapist Responsiveness
Psychotherapy Relationships that Work: Volume 2: Evidence-Based Therapist Responsiveness
First published in 2002, the landmark Psychotherapy Relationships That Work broke new ground by focusing renewed and corrective attention on the substantial research behind the crucial (but often overlooked) client-therapist relationship. This highly cited, widely adopted classic is now presented in two volumes: Evidence-based...
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance
PCI Compliance: Understand and Implement Effective PCI Data Security Standard Compliance

Identity theft and other confidential information theft have now topped the charts as the #1 cybercrime. In particular, credit card data is preferred by cybercriminals. Is your payment processing secure and compliant? Now in its second edition, PCI Compliance has been revised to follow the new PCI DSS standard 1.2.1. Also new to this edition:...

The Little Republic: Masculinity and Domestic Authority in Eighteenth-Century Britain
The Little Republic: Masculinity and Domestic Authority in Eighteenth-Century Britain

The relationship between men and the domestic in eighteenth-century Britain has been obscured by two well-established historiographical narratives. The first charts changes in domestic patriarchy, founded on political patriarchalism in the early modern period and transformed during the eighteenth century by new types of family relationship...

Handbook of Biometrics
Handbook of Biometrics
Biometric recognition, or simply Biometrics, is a rapidly evolving field with applications ranging from accessing one's computer to gaining entry into a country. Biometric systems rely on the use of physical or behavioral traits, such as fingerprints, face, voice and hand geometry, to establish the identity of an individual. The deployment of...
Microsoft Windows Identity Foundation Cookbook
Microsoft Windows Identity Foundation Cookbook
I still remember sitting down with my brand new copy of Writing Secure Code by Michael Howard and David LeBlanc. Having moved beyond writing relatively simple intranet web reports, (before the term "Bl" came to embody what at the time we thought was an incredibly innovative way to display call center metrics for managing...
Getting Started with RFID: Identify Objects in the Physical World with Arduino
Getting Started with RFID: Identify Objects in the Physical World with Arduino
The process of identifying physical objects is such a fundamental part of our experience that we seldom think about how we do it. We use our senses, of course: we look at, feel, pick up, shake and listen to, smell, and taste objects until we have a reference for them—then we give them a label. The whole...
What People Want: A Manager's Guide to Building Relationships That Work
What People Want: A Manager's Guide to Building Relationships That Work

What People Want, for the first time, addresses the changing demographics and differences in the workplace to highlight what matters most in employee-manager relationships. Based on first-of-its-kind research that assessed the needs of hundreds of professionals across a variety of industries, Terry Bacon explores in-depth the seven most...

unlimited object storage image
Result Page: 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy