Home | Amazing | Today | Tags | Publishers | Years | Search 
Extreme Programming with Ant: Building and Deploying Java Applications with JSP, EJB, XSLT, XDoclet, and JUnit (Developers Library)
Extreme Programming with Ant: Building and Deploying Java Applications with JSP, EJB, XSLT, XDoclet, and JUnit (Developers Library)
You've heard about Extreme Programming. You might have read articles or books describing the XP process, but what next? How do you implement XP principles into an actual Java project? This unique book explains everything you need for XP development, starting with Ant, the popular Java build tool. The authors describe every stage of a real-world...
Sams Teach Yourself Mac OS X Panther All In One
Sams Teach Yourself Mac OS X Panther All In One
Sams Teach Yourself Mac OS X Panther All in One is designed to teach, in one big book, the new Mac user how to easily work with his hardware, his operating system, and all the applications he is likely to want to use to work with digital media. The book does not assume the reader wants to learn how to use just one product, but covers multiple...
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices
Nagios is an Open Source network, hardware, and application monitoring program. It is designed to inform system administrators of problems on their networks before their clients, end-users or managers do. Nagios is a SysAdmin's best friend. Nagios is installed on over 300,000 machines worldwide, and truly is a global product: approximately 25.6% of...
Wikipedia: The Missing Manual
Wikipedia: The Missing Manual
What made you write the book? In November 2006 I started working on an index for editors of Wikipedia – a single page that had links to all relevant policies, guidelines, how-to pages, reference pages, tools, and other things that an editor might conceivably want to read. The more I worked on the index, the...
Web Services Security and E-business
Web Services Security and E-business
Many techniques, algorithms, protocols, and tools have been developed in the different aspects of cyber-security, namely, authentication, access control, availability, integrity, privacy, confidentiality, and non-repudiation as they apply to both networks and systems. Web Services Security and E-Business focuses on architectures and protocols,...
Information Technology Ethics: Cultural Perspectives
Information Technology Ethics: Cultural Perspectives
Information Technology Ethics: Cultural Perspectives takes a global approach to the diverse ethical issues created by information and communication technologies and their possible resolutions. Comprehensive chapters describe the problems and possibilities of genuinely global information ethics, which are urgently needed as information and...
The Golden Ratio: The Story of Phi, the World's Most Astonishing Number
The Golden Ratio: The Story of Phi, the World's Most Astonishing Number
Throughout history, thinkers from mathematicians to theologians have pondered the mysterious relationship between numbers and the nature of reality. In this fascinating book, Mario Livio tells the tale of a number at the heart of that mystery: phi, or 1.6180339887...This curious mathematical relationship, widely known as "The Golden...
Rape Investigation Handbook
Rape Investigation Handbook
"This book is easy to read and follows a logical progression from the initial call to the courts. Anyone involved in dealing with sexual assault cases in any capacity would benefit from having this book in their library of reference texts." - www.crimeandclues.com

An unprecedented collaborative work -- the first
...
Sams Teach Yourself Visual C++.NET in 21 Days (2nd Edition)
Sams Teach Yourself Visual C++.NET in 21 Days (2nd Edition)
Sams Teach Yourself Visual C++.NET in 21 Days, 2nd Edition is a time-saving guide walking you through Visual C++ tools and wizards for building applications and places VC++ in the context of the new Visual Studio.NET environment. This book emphasizes using Visual C++ tools and wizards to generate code. Code examples are augmented with C++ language...
Virtual Realism
Virtual Realism
From the simple VR games found in upscale video arcades, to the ultimate "immersion"--the CAVE, a surround screen, surround sound system that projects 3 D computer graphics into a ten-foot high cube--virtual reality has introduced what is literally a new dimension of reality to daily life. But it is not without controversy. Indeed, some...
An Introduction to Neural Networks
An Introduction to Neural Networks
Covers: artificial neurons as models of their real counterparts; the geometry of network action in pattern space; gradient descent methods, including back-propagation; associative memory and Hopfield nets; and self-organization and feature maps.

This book grew out of a set of course notes for a neural networks module given as part of a
...
UNIX and Linux Forensic Analysis DVD Toolkit
UNIX and Linux Forensic Analysis DVD Toolkit
The only Forensic Analysis book covering UNIX, which runs 37% of network servers worldwide.

This book addresses topics in the area of forensic analysis of systems running on variants of the UNIX operating system, which is the choice of hackers for their attack platforms. According to a 2007 IDC report, UNIX servers account
...
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy