Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Enterprise Java 2 Security: Building Secure and Robust J2EE Applications
Enterprise Java 2 Security: Building Secure and Robust J2EE Applications
    The purpose of this book is to illustrate the applicability of Java 2 Platform, Enterprise Edition (J2EE), and Java 2 Platform, Standard Edition (J2SE), security technologies in building a secure enterprise infrastructure containing Java-based enterprise applications. With a pragmatic approach, the book explains why Java security...
Guidelines for Human Embryonic Stem Cell Research
Guidelines for Human Embryonic Stem Cell Research
(National Research Council and Institute of Medicine) Presents the Committee on Guidelines for Human Embryonic Stem Cell Research's findings and recommendations. The guidelines are intended to enhance the integrity of privately funded research and covers the ethical concerns surrounding hES cell research and what scientists can do to...
Testing for EMC Compliance: Approaches and Techniques
Testing for EMC Compliance: Approaches and Techniques
A unique regulatory testing and troubleshooting guide for engineers and technicians

In today’s growing high-technology environment, engineering product designers are regularly faced with the problem of electromagnetic interference that can affect optimal product performance and prevent compliance with today’s stringent regulatory...

Cryptography and Network Security
Cryptography and Network Security
The Internet, as a worldwide communication network, has changed our daily life in many ways. A new paradigm of commerce allows individuals to shop online. The World Wide Web (WWW) allows people to share information. The E-mail technology conned people in far-flung corners of the world. 'ITiis inevitable evolution has also cre-...
Oracle GoldenGate 11g Implementer's guide
Oracle GoldenGate 11g Implementer's guide

Data replication is an important part of any database system that is growing due to today's demand for real-time reporting and regulatory requirements. GoldenGate has recently become Oracle's strategic real-time data replication solution. Until now, very little has been written about how to implement GoldenGate in a production...

IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks
IPSec: The New Security Standard for the Internet, Intranets, and Virtual Private Networks

The Internet connects millions of people around the world and allows for immediate communication and access to a seemingly limitless amount of information. Data, video, and voice, almost every single type of communication, travels across the Internet. Some of this communication is private.

The language...

Seeing Data : Designing User Interfaces for Database Systems Using .NET
Seeing Data : Designing User Interfaces for Database Systems Using .NET

Nowadays, users and clients demand exceptionally usable software. But few developers are trained to create high-quality user interfaces, and few .NET books offer much help—until now.

In Seeing Data...

Smart Technologies for Safety Engineering
Smart Technologies for Safety Engineering
Smart technologies comprise a dynamic new interdisciplinary research field that encompasses a wide spectrum of engineering applications including, but not limited to, intelligent structures and materials, actuators, sensors and structural observability, control systems and software tools for the design of adaptive structures. Smart technologies...
Defensive Database Programming with SQL Server
Defensive Database Programming with SQL Server

Resilient T-SQL code is code that is designed to last, and to be safely reused by others. The goal of defensive database programming, the goal of this book, is to help you to produce resilient T-SQL code that robustly and gracefully handles cases of unintended use, and is resilient to common changes to the database environment. Too often as...

Geeks and Geezers
Geeks and Geezers
We were drawn to thinking and then ultimately writing about geeks and geezers from very different starting points. Coauthoring a book isn’t quite like synchronized swimming. It’s more like gaining perspective and depth through incongruity. Through writing and arguing in what seemed like endless and percussive...
UNIX Fault Management: A Guide for System Administrators
UNIX Fault Management: A Guide for System Administrators

If you're responsible for maintaining the integrity and availability of a mission-critical UNIX system, then you need UNIX Fault Management: A Guide for System Administrators, the first book that brings together all of the monitoring and fault management information. Expert UNIX system management...

Attitudes and Opinions
Attitudes and Opinions
Notable advances resulting from new research findings, measurement approaches, widespread uses of the Internet, and increasingly sophisticated approaches to sampling and polling, have stimulated a new generation of attitude scholars. This extensively revised edition captures this excitement, while remaining grounded in scholarly research....
unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy