 |
|
 Engineering Wireless-Based Software Systems And ApplicationsThis comprehensive resource offers professionals detailed guidance on the engineering aspects of building software for wireless communications. From design and architecture to security and testing, the book shows how to overcome every engineering challenge encountered in successfully developing wireless software. Filled with open-source code... |  |  Digital Accounting: The Effects of the Internet And Erp on AccountingDigital Accounting: The Effects of the Internet and ERP on Accounting provides a foundation in digital accounting by covering fundamental topics such as accounting software, XBRL (eXtensible Business Reporting Language), and EDI. The effects of the Internet and ERP on accounting are classified and presented for each accounting cycle, along with a... |  |  Aspect-Oriented Programming with AspectJIn a November 2001 Java Pro magazine article, noted Java pundit Daniel Savarese states, "The days of Object-Oriented Programming may be numbered, One day we may all be using Aspect-Oriented Programming ." While this may be hyperbole, the AOP bring certain needed improvements to the OOP. AspectJ is a Java-based tool that allows... |
|
 Constraint Logic Programming using Eclipse
Constraint logic programming lies at the intersection of logic programming, optimisation and artificial intelligence. It has proved a successful tool in many areas including production planning, transportation scheduling, numerical analysis and bioinformatics. Eclipse is one of the leading software systems that realise its underlying... |  |  Modern Operating Systems (3rd Edition) (GOAL Series)A presentation of the basics of both distributed and single-processor computer systems, this book reflects real-world experience that provides practical, hands- on information in constructing and understanding modern operating systems. This book discusses the key principles of both kinds of systems — including MS- DOS, UNIX, Amoeba, and... |  |  Living Together: A Legal Guide for Unmarried Couples (13th Edition)Living together out of wedlock can mean anything, especially in court -- unlike married couples, most unmarried couples don't automatically inherit or receive protection under the law. Consequently, you must document everything from property ownership and children to wills and other estate plans.
An essential resource for any unmarried couple,... |
|
|
 Cybersecurity Operations HandbookCybersecurity Operations Handbook is the first book for daily operations teams who install, operate and maintain a range of security technologies to protect corporate infrastructure. Written by experts in security operations, this book provides extensive guidance on almost all aspects of daily operational security, asset protection, integrity... |  |  Fuzzing: Brute Force Vulnerability DiscoveryThe concept of fuzzing has been around for almost two decades but has only recently captured widespread attention. In 2006, we saw a plague of new vulnerabilities emerge that affected popular client-side applications including Microsoft Internet Explorer, Microsoft Word and Microsoft Excel; a large portion of these vulnerabilities were discovered... |  |  |
|
| Result Page: 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 |