Home | Amazing | Today | Tags | Publishers | Years | Search 
Strategic Planning for Information Systems
Strategic Planning for Information Systems
Since the second edition of this book appeared in 1996, we have seen
Information Technology (IT) become an increasingly integral component
of everyone’s working life and personal environment. IT is now
ubiquitous and enables a degree of connectivity that was difficult to
envisage even 10 years ago. The technology has
...
The Jini(TM) Specifications, Edited by Ken Arnold (2nd Edition)
The Jini(TM) Specifications, Edited by Ken Arnold (2nd Edition)
Built on top of the Java™ software infrastructure, Jini™ technology enables all types of services and devices to work together in a community--organized without extensive planning, installation, or human intervention. Jini technology allows the lines to blur between what is hardware and what is software by representing all hardware and...
Designing Component-Based Applications
Designing Component-Based Applications

In the late 1990s, the widespread availability of low-cost computers and access to global connectivity have fueled the demand for a new kind of application: the highly distributed application. Highly distributed applications are used by extremely large numbers of people around the world who are connected to many application and data servers...

MySQL, Second Edition (Visual QuickStart Guide)
MySQL, Second Edition (Visual QuickStart Guide)
With the Web extending into every nook and cranny of modern life, there are plenty of folks out there who have data storage issues that need to be addressed-Qbut no million-dollar budgets to do so. Luckily for them, there's MySQL. Offering Oracle-like power without the huge price tag, MySQL offers a networked database that can be accessed in...
Beginning XML, Second Edition
Beginning XML, Second Edition
Extensible Markup Language (XML) is a rapidly maturing technology with powerful real-world applications, particularly for the management, display, and transport of data. Together with its many related technologies, it has become the standard for data and document delivery on the Web.

This book teaches you all you need to know about XML –...

Mastering Algorithms with C
Mastering Algorithms with C
This book offers robust solutions for everyday programming tasks, providing all the necessary information to understand and use common programming techniques. It includes implementations and real-world examples of each data structure in the text and full source...
Virtual Machine Design and Implementation in C/C++ (With CD-ROM)
Virtual Machine Design and Implementation in C/C++ (With CD-ROM)
This guide provides an in-depth look at the construction and underlying theory of a fully functional virtual machine and an entire suite of related development tools.

With the emergence of multiplatform production systems and network-centric computing, the software industry has witnessed the resurgence of the virtual machine. Rather than...

XML Programming  (Core Reference)
XML Programming (Core Reference)

When first exposed to the Extensible Markup Language (XML), you might ask yourself how it fits in the overall picture of Web-related items. This is the same question developers, managers, and presidents ask, not only of their peers, but of themselves as well. Ironically, this is the same question people in those roles asked themselves years ago...

Java Frameworks and Components: Accelerate Your Web Application Development
Java Frameworks and Components: Accelerate Your Web Application Development

This book is a practical tool for Java programmers. It provides the necessary information for them to find, evaluate, and select suitable application frameworks. This work explains in plain language the benefits of frameworks and component technologies, specifically in relation to web application development. It is unique in that it does not...

The Shellcoder's Handbook: Discovering and Exploiting Security Holes
The Shellcoder's Handbook: Discovering and Exploiting Security Holes
Uncover, exploit, and close security holes in any software or operating system

Every day, patches are created to cover up security holes in software applications and operating systems. But by the time you download a patch, it could be too late. A hacker may have already taken advantage of the hole and wreaked havoc on your system. This...

Simply Scheme - 2nd Edition: Introducing Computer Science
Simply Scheme - 2nd Edition: Introducing Computer Science
There are two schools of thought about teaching computer science. We might caricature the two views this way:

· The conservative view: Computer programs have become too large and complex to encompass in a human mind.
Therefore, the job of computer science education is to teach people how to discipline their work in such a way
...
Developing Applications with Java and UML
Developing Applications with Java and UML

Developing Applications with Java™ and UML focuses on the craft of creating quality Java software. The book introduces the fundamentals of the Unified Modeling Language (UML) and demonstrates how to use this standard object-oriented notation to build more robust Java applications that fulfill user requirements and...

Result Page: 419 418 417 416 415 414 413 412 411 410 409 408 407 406 405 404 403 402 401 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy