 |
|
 The Art of Community: Building the New Age of Participation (Theory in Practice)Online communities offer a wide range of opportunities today, whether you're supporting a cause, marketing a product or service, or developing open source software. The Art of Community will help you develop the broad range of talents you need to recruit members to your community, motivate and manage them, and help them become active... |  |  Beautiful Data: The Stories Behind Elegant Data SolutionsIn this insightful book, you'll learn from the best data practitioners in the field just how wide-ranging -- and beautiful -- working with data can be. Join 39 contributors as they explain how they developed simple and elegant solutions on projects ranging from the Mars lander to a Radiohead video.
|  |  |
|
 Open Source SOAYou can build a world-class SOA infrastructure entirely using popular, and mature, open-source applications. Unfortunately, the technical documentation for most open-source projects focuses on a specific product, the big SOA picture. You're left to your own devices to figure out how to cobble together a full solution from the various bits. In... |  |  Water Management in 2020 and Beyond (Water Resources Development and Management)Water is intertwined in the daily life of humans in countless ways. The importance of water as a driver for health, food security, and quality of life and as a pillar for economic development is unique. As water affects human lives, the mankind also effects the hydrological cycle, in all dimensions from the local to the global scale. Food... |  |  |
|
 Encyclopedia of CybercrimeThe first comprehensive encyclopedia to examine all aspects of the mysterious world of cybercrime
There are today no more compelling sets of crime and security threats facing nations, communities, organizations, groups, families and individuals than those encompassed by cybercrime. For over fifty years crime enabled by computing and... |  |  Scalable VoIP Mobility: Integration and DeploymentToday's businesses, big and small, are faced with the large scale restructuring concerning daily communications. Enterprises are moving from the standard wired telephony to wired and wireless communication via internet protocol (IP), Wi-Fi, and cellular services. With the stabilization of these networks and the availability of dual-mode handsets... |  |  Chained Exploits: Advanced Hacking Attacks from Start to FinishThe complete guide to today’s hard-to-defend chained attacks: performing them and preventing them
Nowadays, it’s rare for malicious hackers to rely on just one exploit or tool; instead, they use “chained” exploits that integrate multiple forms of attack to achieve... |
|
 Building Enterprise Ready Telephony Systems with sipXecs 4.0Open source telephony systems are making big waves in the communications industry. Moving your organization from a lab environment to production system can seem like a daunting and inherently risky proposition. Building Enterprise Ready Telephony Systems with sipXecs delivers proven techniques for deploying reliable and robust communications... |  |  Zend Framework in ActionFrom rather humble beginnings as the Personal Home Page scripting language, PHP has found its way into almost every server, corporation, and dev shop in the world. On an average day, somewhere between 500,000 and 2 million coders do something in PHP. Even when you use a well-understood language like PHP, building a modern web application... |  |  Information Resources in Toxicology, Fourth EditionThis latest version of Information Resources in Toxicology (IRT) continues a tradition established in 1982 with the publication of the first edition in presenting an extensive itemization, review, and commentary on the information infrastructure of the field. This book is a unique wide-ranging, international, annotated bibliography and compendium... |
|
Result Page: 119 118 117 116 115 114 113 112 111 110 |