Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
How to Build a Business Rules Engine: Extending Application Functionality through Metadata Engineering
How to Build a Business Rules Engine: Extending Application Functionality through Metadata Engineering
Business rules engines can make organizations more agile by allowing them to manage diverse sets of operating rules, such as many different contracts for goods and services with different clients. For example, business rules engines can contain interfaces that allow users to define business rules to add specific functionality to software...
Information Quality (Advances in Management Information Systems)
Information Quality (Advances in Management Information Systems)
Like the lament of Coleridge’s ancient mariner who finds himself adrift at sea surrounded by water yet dying of thirst, many organizations find they are surrounded by data, yet much of it does not truly satisfy their information needs. Today we have at our disposal vast stores of information that come in a variety of forms: records,...
Information Brokering Across Heterogeneous Digital Data: A Metadata-based Approach
Information Brokering Across Heterogeneous Digital Data: A Metadata-based Approach
Information intermediation is the foundation stone of some of the most successful Internet companies, and is perhaps second only to the Internet Infrastructure companies. On the heels of information integration and interoperability, this book on information brokering discusses the next step in information interoperability and integration. The...
Legislative XML for the Semantic Web: Principles, Models, Standards for Document Management
Legislative XML for the Semantic Web: Principles, Models, Standards for Document Management

The Internet already is the broadest and most used source of legal information: in the web one can find most statutory texts (all in some jurisdictions), a vast amount of case law, huge repertoires of doctrinal contributions, many blogs and fora discussing different legal issues. Moreover, as legal activities (legislative,...

Essential Windows Workflow Foundation (Microsoft .NET Development Series)
Essential Windows Workflow Foundation (Microsoft .NET Development Series)

Windows Workflow Foundation (WF) is a groundbreaking approach to writing and executing programs. WF programs are assembled out of resumable program statements called activities, which provide encapsulation of both domainspecific logic and control flow patterns reflective of real-world...

Book: A Futurist's Manifesto: A Collection of Essays from the Bleeding Edge of Publishing
Book: A Futurist's Manifesto: A Collection of Essays from the Bleeding Edge of Publishing

The ground beneath the book publishing industry dramatically shifted in 2007, the year the Kindle and the iPhone debuted. Widespread consumer demand for these and other devices has brought the pace of digital change in book publishing from "it might happen sometime" to "it’s happening right now"—and it...

Hardboiled Web Design
Hardboiled Web Design

Every web designer harbours tales of frustration, limitation and despair. Web design requires skills and knowledge beyond mere manipulation of form, shape, language, colour, message and meaning. What users don’t see behind those visuals is just as important as what they do see. We have to think about moving parts and engineering...

JDBC 3: Java Database Connectivity
JDBC 3: Java Database Connectivity

JDBC 3.0 is the latest revision of Sun’s Java Database Connectivity API. Since its introduction on the market in the mid-90s, Java has evolved from a language and environment suited for applets to a rich enterprise platform. JDBC played a determinant role in Java’s maturation. JDBC is now used as a core technology...

Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques
Hacking Web Intelligence: Open Source Intelligence and Web Reconnaissance Concepts and Techniques

Open source intelligence (OSINT) and web reconnaissance are rich topics for infosec professionals looking for the best ways to sift through the abundance of information widely available online. In many cases, the first stage of any security assessment―that is, reconnaissance―is not given enough attention by security professionals,...

Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
REST API Design Rulebook
REST API Design Rulebook

In today’s market, where rival web services compete for attention, a well-designed REST API is a must-have feature. This concise book presents a set of API design rules, drawn primarily from best practices that stick close to the Web’s REST architectural style. Along with rules for URI design and HTTP use, you’ll...

Peer-to-Peer : Harnessing the Power of Disruptive Technologies
Peer-to-Peer : Harnessing the Power of Disruptive Technologies

The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and...

Result Page: 19 18 17 16 15 14 13 12 11 10 9 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy