 |
|
|
 Spring in ActionSpring in Action 2E is an expanded, completely updated second edition of the best selling Spring in Action. Written by Craig Walls, one of Manning's best writers, this book covers the exciting new features of Spring 2.0, which was released in October 2006.
Spring is a lightweight container framework that represents an... |  |  J2EE AntiPatterns"The insights in this book are based on proven solutions from experts. They will ensure the success of your J2EE implementations." —Bill Brown, AntiPattern Evangelist
All too often delivered software is full of bugs and poorly performing processes. Unfortunately, uncovering exactly what has gone wrong and what needs to... |  |  Mobile Internetworking with IPv6: Concepts, Principles and PracticesInternet access and mobility continue to change our perception of communications and computing. We are becoming more dependent on both, as can be seen by the continued proliferation of mobile telephones, personal digital assistants (PDAs), and laptop computers. Improvements in miniaturization and higher-speed communications media are creating an... |
|
 PBX Systems for IP TelephonyThe most efficient (and economical) ways to bring enterprise communication systems into the Digital Age are in this guide, written by the foremost analyst in the markret space. In PBX Systems for IP Telephony, Allan Sulkin--consultant and advisor to Avaya, Siemens, Cisco, NEC, Alcatel and other world-class companies--evaluates... |  |  Patterns for Computer-Mediated Interaction (Wiley Software Patterns Series)The Internet has changed the way we interact and communicate. Two to three decades ago the only way to stay in touch with people was to see them in person, write letters, or use a fixed network phone. At work, we had video conferencing and fax, but that was basically it. The Internet was available, but only few of us actually had an e-mail... |  |  Securing Ajax Applications: Ensuring the Safety of the Dynamic WebAjax applications should be open yet secure. Far too often security is added as an afterthought. Potential flaws need to be identified and addressed right away. This book explores Ajax and web application security with an eye for dangerous gaps and offers ways that you can plug them before they become a problem. By making security part of the... |
|
|
| Result Page: 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 |