Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Sams Teach Yourself J2EE in 21 Days
Sams Teach Yourself J2EE in 21 Days

J2EE has become required knowledge for any serious Java developer, but learning this large and complex specification requires a substantial investment of time and energy. Sams Teach Yourself J2EE in 21 Days presents the enterprise Java architecture in accessible, easy-to-comprehend lessons, describing how each J2EE tool solves the challenges of...

France since 1945
France since 1945
`a very thoughtful and stimulating analysis ... He is acute about the ways in which France today needs to change to meet the challenges of its new role in the world.' John Ardagh

The last fifty years of French history have seen immense challenges for the French: constructing a new European order, building a modern economy,
...
Windows Server 2012: Up and Running
Windows Server 2012: Up and Running
Windows Server 2012 is not only the most significant update to the Windows Server operating system in recent years, but it is also all about cloud computing and the underlying technology for building clouds: virtualization.

Many features familiar to administrators of Server 2008 R2 and other legacy
...
iOS Application Security: The Definitive Guide for Hackers and Developers
iOS Application Security: The Definitive Guide for Hackers and Developers
Eliminating security holes in iOS apps is critical for any developer who wants to protect their users from the bad guys. In iOS Application Security, mobile security expert David Thiel reveals common iOS coding mistakes that create serious security problems and shows you how to find and fix them.

After a crash course
...
Network Security Technologies, Second Edition
Network Security Technologies, Second Edition

Network Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy, state-of-the-art, and emerging network security...

SOA-Based Enterprise Integration: A Step-by-Step Guide to Services-based Application
SOA-Based Enterprise Integration: A Step-by-Step Guide to Services-based Application

Foreword by Ray Harishankar, IBM Fellow

"There are many books on the market on the topic of SOA and SOA's business and technology value. This book focuses on one of the key technical values of SOA and does an excellent job of describing SOA-based application integration by clarifying the relationship and patterns of SOA with other...

LEP - The Lord of the Collider Rings at CERN 1980-2000: The Making, Operation and Legacy of the World's Largest Scientific Instrument
LEP - The Lord of the Collider Rings at CERN 1980-2000: The Making, Operation and Legacy of the World's Largest Scientific Instrument

Housed by a 4 m diameter tunnel of 27 km circumference, with huge underground labs and numerous surface facilities, and set up with a precision of 0.1 mm per kilometer, the Large Electron-Positron Collider (LEP) was not only the largest but also one of the most sophisticated scientific research instruments ever created by Man. Located at CERN,...

Market Liberalism and Economic Patriotism in the Capitalist World-System (International Political Economy Series)
Market Liberalism and Economic Patriotism in the Capitalist World-System (International Political Economy Series)
This volume broadens the scope of 'comparative capitalism' within the Varieties of Capitalism (VoC) tradition. It endorses the employment of multiple perspectives, including critical political economy, institutionalist systems of capitalism, structuralist-dependency scholarship and world-systems theory. The contributors deal with the...
Using XML with Legacy Business Applications
Using XML with Legacy Business Applications

"This volume offers relentlessly pragmatic solutions to help your business applications get the most out of XML, with a breezy style that makes the going easy. Mike has lived this stuff; he has a strong command of the solutions and the philosophy that underlies them.">-Eve Maler, XML Standards Architect, Sun...

Web-to-Host Connectivity
Web-to-Host Connectivity
Nobody can dispute the incredible impact that the Web continues to have on the way in which people work, shop, research, play, and communicate. In the span of just a few short years, enterprises in nearly every industry and market have had to reevaluate the way in which they do business with their business partners and end customers. Having a...
Professional Refactoring in C# & ASP.NET (Wrox Programmer to Programmer)
Professional Refactoring in C# & ASP.NET (Wrox Programmer to Programmer)

Refactoring is an effective way to quickly uncover problematic code and fix it. In this first book to provide a hands-on approach to refactoring in C# and ASP.NET, you'll discover to apply refactoring techniques to manage and modify your code. Plus, you'll learn how to build a prototype application from scratch and discover how to refactor the...

Citrix MetaFrame For Windows Server 2003: The Official Guide
Citrix MetaFrame For Windows Server 2003: The Official Guide

Design and deploy an enterprise-level server-based computing (SBC) environment on Windows Server 2003 using Citrix MetaFrame Access Suite. Authorized by Citrix Systems, Inc., this invaluable guide shows you how to maximize the suite components to enable and manage secure access to applications and data across the Internet, intranets,...

unlimited object storage image
Result Page: 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy