|
|
|
|
Applications of Information Systems to Homeland Security And DefenseA range of threats in the areas of safety and security, from natural disasters to terrorism to conventional warfare, involve complex interactions that are beyond the scope and capabilities of traditional problem solving techniques. Applications of Information Systems to Homeland Security and Defense provides an overview of complex systems’... | | Beginning Java EE 6 Platform with GlassFish 3: From Novice to ProfessionalWhile Java EE 5 is considered by everyone to be the most important enterprise release, Java EE 6 has a lot in store for you and every server-side Java developer. The most widely spread technology to write enterprise-class applications just got better with enhanced EJB 3.1, Java Persistence API (JPA) 2.0, the new, yet already very successful, Java... | | Digital Interface Handbook, Third EditionFor those who need to get to grips with digital audio and video systems, this book sheds light on the differences between audio interfaces and shows how to make devices 'talk to each other' in the digital domain despite their subtle differences.
The Digital Interface Handbook is a thoroughly detailed manual for those who need to get to... |
|
|
| | Adopting a Pet For DummiesDevelop a loving relationship with your adopted pet
Your fun and easy guide to the challenges and rewards of adopting a pet
Thinking about adopting or rescuing an animal? This friendly guide gives you a no-nonsense introduction to the process and helps you select the right companion for you and your family. You'll see how to... | | ASP.NET MVC Framework UnleashedIn this book, world-renowned ASP.NET expert and member of the Microsoft ASP.NET team Stephen Walther shows experienced developers how to use Microsoft’s new ASP.NET MVC Framework to build web applications that are more powerful, flexible, testable, manageable, scalable, and extensible.
... |
|
SHARKS in the MOAT: How to Create Truly Secure Software
Believe it or not, there is a striking similarity between medieval castle design and how we protect networks and data in the 21st century. By examining how our ancestors fought off invading armies, it becomes much easier to understand the latest strategies for keeping hackers at-bay. This book is designed for anyone who wants to understand how... | | Understanding the IBM WebFacing Tool: A Guided Tour (IBM Illustrated Guide series)Written for IBM eServer iSeries programmers responsible for converting applications to a web-based interface, this book takes users through WebFacing a sample green screen application using IBM WebSphere Development Studio Client. How to use the different features of the tool to enhance the application after the initial conversion is demonstrated,... | | The Myths of InnovationHow do you know whether a hot technology will succeed or fail? Or where the next big idea will come from? The best answers come not from the popular myths we tell about innovation, but instead from time-tested truths that explain how we've made it this far. This book shows the way. In The Myths of Innovation, bestselling... |
|
|
Result Page: 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 |