 |
|
|
 Oracle Database 11gR2 Performance Tuning Cookbook
People use databases to organize and to manage their data. Oracle Database is the leader
in the relational database management systems market, with a broad adoption in many
industries. Using the best tool is not enough to be sure that the results of our efforts will be
satisfactory—driving the fastest car in a Formula 1... |  |  Oracle Service Bus 11g Development Cookbook
The Oracle Service Bus 11g (OSB) is a scalable SOA integration platform that delivers an
efficient, standards-based infrastructure for high-volume, mission critical SOA environments. It
is designed to connect, mediate, and manage interactions between heterogeneous services,
legacy applications, packaged applications, and multiple... |  |  Apache Tomcat 7
The first edition of this book covered the then-new Jakarta Tomcat 4. Tomcat has come a long way from
there, becoming Apache Tomcat in the process, with version 7 released in January 2011. During this
time, Tomcat has become the most popular and used Java servlet container on the market. Other open
source application servers also... |
|
 Professional JavaScript for Web Developers
SOME CLAIM THAT JAVASCRIPT is now the most popular programming language in the world, running
any number of complex web applications that the world relies on to do business, make purchases,
manage processes, and more.
JavaScript is very loosely based on Java, an object-oriented programming language popularized
for... |  |  JBoss AS 7 Configuration, Deployment and Administration
As the Java EE standard has evolved and matured, the API has become increasingly rich and complex. The next generation of application servers needs to be modular and configurable to run only specific services or containers. JBoss AS 7 promises to meet those requirements but the configuration of a complex application server is composed of a mix... |  |  Network Defense: Perimeter Defense Mechanisms
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |
|
 Food Chemical Risk Analysis (Food Science & Safety Series)
The recognition that chemicals in food, whatever their origin, might
present a risk to the consumer has long been recognised. However, early
food regulations at the beginning of the century were primarily aimed at
prevention of adulteration and fraud rather than directed at consumer
safety. It is only in the second half of the century... |  |  Microsoft Project 2010 Inside Out
Welcome to Microsoft Project 2010 Inside Out. This book is your comprehensive Project
2010 reference, in which you can learn not only the essentials, but also the intermediate
topics and advanced techniques for using Project 2010 like a power user.
Conquer Microsoft Project 2010—from the inside out!
... |  |  Agile Business Rule Development: Process, Architecture, and JRules Examples
According to Wordnet, a rule is “a principle or condition that customarily
governs behavior” or “a prescribed guide for conduct or action.” Businesses, and
organizations in general, operate under a number of rules: rules about what services
to offer and to whom; rules about how much to charge for those services;... |
|
Result Page: 242 241 240 239 238 237 236 235 234 233 232 231 230 229 228 227 226 225 224 |