Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java 2 Enterprise Edition 1.4 (J2EE 1.4) Bible
Java 2 Enterprise Edition 1.4 (J2EE 1.4) Bible
"One stop shopping for J2EE."
– Scott Ambler, Senior Consultant, Ronin International, Inc. and Author of Agile Modeling

If Java 2 Enterprise Edition 1.4 can do it, you can do it too...

You already know that Java 2 Enterprise Edition 1.4 makes your enterprise services more cost-effective, more adaptable,...

Europe in Crisis: Bolt from the Blue?
Europe in Crisis: Bolt from the Blue?

This book analyzes the European Great Recession of 2008-12, its economic and social causes, its historical roots, and the policies adopted by the European Union to find a way out of it. It contains explicit debates with several economists and analysts on some of the most controversial questions about the causes of the crisis and the policies...

Java(TM) EE 5 Tutorial, The (3rd Edition) (The Java Series)
Java(TM) EE 5 Tutorial, The (3rd Edition) (The Java Series)

The Java™ EE 5 Tutorial, Third Edition, is the definitive, task-oriented, example-driven guide to programming server-side applications with Sun Microsystems' new Java(TM) EE 5 platform. Written by members of Sun's Java EE 5 platform team, this book enables new and intermediate Java programmers to build...

Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Over the last seven years, Internet Security Systems' (ISS) elite X-Force has discovered more high-risk vulnerabilities than all other research groups and vendors combined, including the vulnerability that led to the recent, widespread Zotob worm. For the first time ever, follow the X-Force team as they analyze potential vulnerabilities and...
Wireless Security
Wireless Security
Get full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless...
NetBeans  Ruby and Rails IDE with JRuby (FirstPress)
NetBeans Ruby and Rails IDE with JRuby (FirstPress)

As Ruby and Rails continues to grow, and more and more jobs are coming online that require you to effectively develop Ruby and Rails in the web tier. Beyond the Rails framework, there are still very few proven tools and IDEs to get the job done, at least until now. The NetBeans Ruby and Rails IDE, according to some, is by far the best and...

Database Programming with JDBC and Java
Database Programming with JDBC and Java

Java and databases make a powerful combination. Getting the two sides to work together, however, takes some effort--largely because Java deals in objects while most databases do not.

This book describes the standard Java interfaces that make portable object-oriented access to relational databases possible and offers a robust
...

Maximizing ASP.NET Real World, Object-Oriented Development
Maximizing ASP.NET Real World, Object-Oriented Development

Using ASP.NET, you can build Web applications that deliver unprecedented power and performance. But to make the most of ASP.NET, Web developers need to think and work very differently from the ways they've programmed in the past. In Maximizing ASP.NET Jeffrey Putz helps you make the transitionand reap the rewards.

...
SEO Warrior
SEO Warrior

I was compelled to write SEO Warrior for many reasons. Every day, thousands of sites are born in the hopes of making it big. Most of them will fail before achieving their goals. Many site owners create their sites blindly, without conducting proper research. Many site owners do not even know what search engine optimization (SEO) is and what its...

Enterprise Security with EJB and CORBA(r)
Enterprise Security with EJB and CORBA(r)
"Leveraging their strong implemention and standards committee experience, the authors have delivered the definitive guide to enterprise distributed object security."–Wing K. Lee, Sprint

Enterprise Security with EJB and CORBA

With e-business and distributed components comes the need for a bold new approach to...

eDirectory Field Guide
eDirectory Field Guide

eDirectory Field Guide is a handy reference for configuring, troubleshooting, and optimizing Novells eDirectory on NetWare, Linux, Unix, and Windows. Along with Sun ONE Directory Server and Microsoft Active Directory, Novells eDirectory is a leader in directory server software, the specialized database that enterprises employ to store...

Microsoft .NET for Visual FoxPro Developers
Microsoft .NET for Visual FoxPro Developers
I asked myself this question when early releases of .NET first arrived on the scene. Visual FoxPro allowed me to do pretty much anything I wanted, from building single-tier applications with a VFP back end, all the way to building distributed Internet applications accessing clientserver data.

Then, I started to dive into the .NET
...
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy