 |
|
 Virtualization Security (EC-Council Disaster Recovery Professional)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  Information Modeling for Internet Applications
Different kinds of objects containing data are found on the Internet, including structured (e.g., relational) databases, collections of documents, and search engines. On the one hand, creating, storing, manipulating, and retrieving Internet documents can benefit from techniques known from the databases and data modeling... |  |  |
|
 Pro Spring Batch
Since its release, Spring Framework has transformed virtually every aspect of Java development including web applications, security, aspect-oriented programming, persistence, and messaging. Spring Batch, one of its newer additions, now brings the same familiar Spring idioms to batch processing. Spring Batch addresses the needs of any batch... |  |  Web Engineering: A Practioner's Approach
As we began to plan this book, we worried that it would become lost in the
hundreds—no, thousands—of volumes that have been written on “Web design,”
HTML, Java, XML, or any of the myriad technologies that must be understood
to build successful Web-based systems and applications (WebApps). To our surprise,
we... |  |  Database Systems: Design, Implementation, and Management
For many reasons, few books survive to reach their eighth edition. Authors and publishers who let the success of their
earlier work produce the comfort of complacency usually pay the price of watching the marketplace dismantle their creations.
This database systems book has been successful through seven editions because we–the... |
|
|
|
Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 |