Home | Amazing | Today | Tags | Publishers | Years | Search 
Embedded Java Security: Security for Mobile Devices
Embedded Java Security: Security for Mobile Devices
This book is a comprehensive presentation of embedded Java security (namely, J2ME CLDC/MIDP), in the sense that the security model of embedded Java is thoroughly explained, then a detailed analysis of this model is undertaken. It is compared with the security model of Java Standard Edition in order to view the impact of limited resources (typically...
From P2P to Web Services and Grids: Peers in a Client/Server World
From P2P to Web Services and Grids: Peers in a Client/Server World

"From P2P to Web Services and Grids" provides a comprehensive overview of emerging distributed-systems technologies. It covers peer-to-peer (P2P) systems, which have revolutionized the way we think about distributed computing and the internet, alternative solutions, most notably web services and Grid computing, but...

Avatars at Work and Play: Collaboration and Interaction in Shared Virtual Environments (Computer Supported Cooperative Work)
Avatars at Work and Play: Collaboration and Interaction in Shared Virtual Environments (Computer Supported Cooperative Work)

Avatars at Work and Play brings together contributions from leading social scientists and computer scientists who have conducted research on virtual environments used for collaboration and online gaming. They present a well-rounded and state-of-the-art overview of current applications of multi-user virtual environments, ranging...

Powering Office 2003 with XML (Power Pack Series)
Powering Office 2003 with XML (Power Pack Series)
Find out how to
  • Understand XML specification and schemas
  • Set up and complete InfoPathTMВ forms
  • Design new forms from XML data files
  • Debug InfoPath scripts
  • Tackle real-world problems with the help of case studies
  • ...
Design Patterns CD
Design Patterns CD
With the profusion of technologies, it's rare to say that a particular book is required reading for developers. Design Patterns: Elements of Reusable Object Oriented Software is one of those indispensable texts for anyone who develops software using objects. This CD-ROM edition contains a hypertext version of the book, along with...
The Essential Guide to Flex 2 with ActionScript 3.0
The Essential Guide to Flex 2 with ActionScript 3.0
Flex 2 represents something of a revolution in web applications. It is the next evolutionary step of Flash, which has grown from a web animation tool to a powerful enterprise web design and development tool. with nearly 98% of all web browsers and cellular phones running the Flash player needed to use Flash and Flex applications, knowledge of Flex...
AdvancED Flash Interface Design (Advanced Design)
AdvancED Flash Interface Design (Advanced Design)
As a competent Flash designer, youre probably comfortable with all of the basics that Flash has to offer. However, youve probably looked at some of the amazing Flash sites on the web and thought, "How'd they do that?" Well, youll find out in this book. Flash allows users to create some amazing interactive interfaces to interact with Rich...
Packet Filtering: Catching the Cool Packets
Packet Filtering: Catching the Cool Packets

This book covers the basic through advanced methods of filtering on hack traffic, ICMP traffic, IP fragments, subnet traffic and more. If you want to know how to build filters to capture specific application traffic based on its signature, this is the book for you. Includes instructions for capturing 'data theft' using signatures rather than...

Citrix Access Suite 4 for Windows Server 2003: The Official Guide, Third Edition
Citrix Access Suite 4 for Windows Server 2003: The Official Guide, Third Edition
Build, secure, scale, and maintain Citrix on Windows

New and existing Citrix engineers will learn to design and deploy an enterprise-level server-based computing (SBC) environment on Windows Server 2003 using Citrix Access Suite 4.0. This official guide explains how to maximize the suite components to enable and...

MPLS Fundamentals
MPLS Fundamentals
As an escalation engineer, I experienced the boom of Multiprotocol Label Switching (MPLS) networking first hand. I saw the first trials of MPLS in service provider networks and saw MPLS successfully expanding further into enterprise networks. In addition, I witnessed new MPLS technologies coming into existence, which the networking industry...
Python Scripting for Computational Science (Texts in Computational Science and Engineering)
Python Scripting for Computational Science (Texts in Computational Science and Engineering)
The goal of this book is to teach computational scientists and engineers how to develop tailored, flexible, and efficient working environments built from small programs (scripts) written in the easy-to-learn, very high-level language Python. The focus is on examples and applications of relevance to computational science: gluing existing...
Mobile IP Technology for M-Business
Mobile IP Technology for M-Business
Here's a first-of-its-kind book that introduces you to the next generation of mobile networks, where IP data capability and mobile communications become integrated to form new, cutting-edge Mobile IP networks. This unique resource offers you a thorough understanding of the convergence of mobile and data technology. It explains how the prospect of...
Result Page: 301 300 299 298 297 296 295 294 293 292 291 290 289 288 287 286 285 284 283 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy