Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Large Scale Component Based Development
Large Scale Component Based Development
"This book is very well written. I have never seen a book on the market that discusses these concepts as well as this book. Anyone involved with Information Technology should be familiar with this material. If not, they need to get this book ASAP and read it cover to cover." -William H. Murray, author of many...
Test and Analysis of Web Services
Test and Analysis of Web Services
The service-oriented approach has become more and more popular, now allowing highly integrated and yet heterogeneous applications. Web services are the natural evolution of conventional middleware technologies to support Web-based and enterprise-level integration.

The highly dynamic characteristics of service-oriented applications means...

ActiveMQ in Action
ActiveMQ in Action

To this day, enterprise message queuing is a concept that is not well understood by most software developers. Commercial message-oriented middleware (MOM) did not help to encourage adoption of the process; most of the MOMs on the market were closed source, were costly to buy and support, and required trained system administrators for...

The Data Access Handbook: Achieving Optimal Database Application Performance and Scalability
The Data Access Handbook: Achieving Optimal Database Application Performance and Scalability
Performance and scalability are more critical than ever in today’s enterprise database applications, and traditional database tuning isn’t nearly enough to solve the performance problems you are likely to see in those applications. Nowadays, 75-95% of the time it takes to process a data request is typically spent in the database...
Sams Teach Yourself Perl in 24 Hours (3rd Edition)
Sams Teach Yourself Perl in 24 Hours (3rd Edition)
Even if you're new to Perl, Sams Teach Yourself Perl in 24 Hours teaches you everything you need to know to begin producing useful CGI programs quickly. This book provides you with a solid foundation in the basics of the Perl language, so you can easily move on to more advanced books and techniques. Special attention is paid to those features that...
Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More
Web Services Platform Architecture: SOAP, WSDL, WS-Policy, WS-Addressing, WS-BPEL, WS-Reliable Messaging, and More
The Insider's Guide to Building Breakthrough Services with Today's New Web Services PlatformUsing today's new Web services platform, you can build services that are secure, reliable, efficient at handling transactions, and well suited to your evolving service-oriented architecture. What's more, you can do all that without compromising the...
Designing Security Architecture Solutions
Designing Security Architecture Solutions
The first guide to tackle security architecture at the software engineering level

Computer security has become a critical business concern, and, as such, the responsibility of all IT professionals. In this groundbreaking book, a security expert with AT&T Business's renowned Network Services organization explores system security
...
From P2P to Web Services and Grids: Peers in a Client/Server World
From P2P to Web Services and Grids: Peers in a Client/Server World

"From P2P to Web Services and Grids" provides a comprehensive overview of emerging distributed-systems technologies. It covers peer-to-peer (P2P) systems, which have revolutionized the way we think about distributed computing and the internet, alternative solutions, most notably web services and Grid computing, but...

Advanced Design Approaches to Emerging Software Systems: Principles, Methodologies and Tools
Advanced Design Approaches to Emerging Software Systems: Principles, Methodologies and Tools

Recently, the rapid and fundamental advances in computing technologies have been driving the role and scope of software systems to a new level. A number of new types of software systems are emerging, among which service based systems, cloud computing, pervasive computing, and Internet of Things are eminent examples. For these systems,...

RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations
RFID and Sensor Networks: Architectures, Protocols, Security, and Integrations
The escalating demand for ubiquitous computing along with the complementary and flexible natures of Radio Frequency Identification (RFID) and Wireless Sensor Networks (WSNs) have sparked an increase in the integration of these two dynamic technologies. Although a variety of applications can be observed under development and in practical use, there...
Enterprise J2ME: Developing Mobile Java Applications
Enterprise J2ME: Developing Mobile Java Applications
This book helps experienced Java developers to build high-value mobile applications that take advantage of enterprise IT infrastructures. It also helps developers to add mobility features to existing enterprise solutions. It does not repeat the same basic J2ME/MIDP API tutorial covered by many other books.

After a comprehensive analysis of the...

A Practical Guide to Trusted Computing
A Practical Guide to Trusted Computing
Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable

 

Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes...

unlimited object storage image
Result Page: 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy