Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SOA Security
SOA Security
SOA is one of the latest technologies enterprises are using to tame their software costs - in development, deployment, and management. SOA makes integration easy, helping enterprises not only better utilize their existing investments in applications and infrastructure, but also open up new business opportunities. However, one of the big stumbling...
The Man Who Knew Infinity: A Life of the Genius Ramanujan
The Man Who Knew Infinity: A Life of the Genius Ramanujan
'An exquisite portrait...the rarest of literary achievements...Ramanujan's tale is the stuff of fable' LOS ANGELES TIMES 'an exciting and thoughtful book... should catch the imagination of any reader- even the reader with little mathematical background.' INDEPENDENT 'This is a fine example of a work of popularising mathematics, and deserves a wide...
Architecting Secure Software Systems
Architecting Secure Software Systems
Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX, .NET, Java, mobile, and Web environments, and they...
Encyclopedia of India (4 Volume Set)
Encyclopedia of India (4 Volume Set)

Home to a fifth of the world's population and the largest democracy in the world, India holds a prominent place in current events yet remains misunderstood in many ways by students, professionals and others who seek a single, authoritative source for information on this important region. The Encyclopedia of India meets this need,...

No Beast So Fierce: The Terrifying True Story of the Champawat Tiger, the Deadliest Animal in History
No Beast So Fierce: The Terrifying True Story of the Champawat Tiger, the Deadliest Animal in History

The astonishing true story of the man-eating tiger that claimed a record 437 human lives

“Thrilling. Fascinating. Exciting.” Wall Street Journal • "Riveting. Haunting.” —Scientific American

Nepal, c....

Advances in Biometrics: Sensors, Algorithms and Systems
Advances in Biometrics: Sensors, Algorithms and Systems

Biometrics technology continues to stride forward with its wider acceptance and its real need in various new security facets of modern society. From simply logging on to a laptop to crossing the border of a country, biometrics is being called upon to meet the growing challenges of identity management.

With contributions from academia and...

LWUIT 1.1 for Java ME Developers
LWUIT 1.1 for Java ME Developers
Writing appealing cross-device applications today in Java ME is challenging as implementation differences in fonts, layout, and menus can make your application look and behave very differently on different devices. So far, the only way out has been low-level programming with its associated complexity.

The Lightweight UI Toolkit (LWUIT),
...
WAP, Bluetooth, and 3G Programming: Cracking the Code (With CD-ROM)
WAP, Bluetooth, and 3G Programming: Cracking the Code (With CD-ROM)
Cracking the Code WAP, Bluetooth, and 3G Programming Create Tomorrow's Mobile Applications Today In this unique guide, a crack team of software engineers delivers the programming solutions and source code you need to jump start a wide range of mobile advertising, commerce, and audio-video streaming projects. Using flow charts and line-by-line...
Combinatorial Optimization and Applications: Second International Conference, COCOA 2008, St. John's, NL, Canada, August 21-24, 2008, Proceedings
Combinatorial Optimization and Applications: Second International Conference, COCOA 2008, St. John's, NL, Canada, August 21-24, 2008, Proceedings
The papers in this volume were presented at the Second International Conference on Combinatorial Optimization and Applications (COCOA 2008), held August 21–24, 2008, in St. John’s, Newfoundland, Canada. The topics cover most areas in combinatorial optimization and applications.

A total of 84 papers were submitted, of which 44
...
Afghanistan: A History from 1260 to the Present
Afghanistan: A History from 1260 to the Present
Located at the intersection of Asia and the Middle East, Afghanistan has been strategically important for thousands of years. Its ancient routes and strategic position between India, Inner Asia, China, Persia, and beyond has meant the region has been subject to frequent invasions, both peaceful and military. As a result, modern...
Sams Teach Yourself Shell Programming in 24 Hours
Sams Teach Yourself Shell Programming in 24 Hours
The vast majority of users utilize the Korn Shell or some variant of the Bourne Shell, such as bash. Sams Teach Yourself Shell Programming in 24 Hours covers these shells. It begins with a generalized tutorial of Unix and tools and then moves into detailed coverage of shell programming. Sams Teach Yourself Shell Programming in 24...
Race, Religion and Law in Colonial India: Trials of an Interracial Family
Race, Religion and Law in Colonial India: Trials of an Interracial Family

How did British rule in India transform persons from lower social classes? Could Indians from such classes rise in the world by marrying Europeans and embracing their religion and customs? This book explores such questions by examining the intriguing story of an interracial family who lived in southern India in the mid-nineteenth century. The...

unlimited object storage image
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy