Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java Security (2nd Edition)
Java Security (2nd Edition)
One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is...
Agility by ARIS Business Process Management: Yearbook Business Process Excellence 2006/2007
Agility by ARIS Business Process Management: Yearbook Business Process Excellence 2006/2007
Agility and Execution – Organizational Success Through Flexible Business Processes

Only a company which is flexible, agile and responsive will be successful. The secret to success is agility, meaning the ability to quickly adapt company processes. Against this backdrop, IT is of particular importance as it is virtually the machine
...
The Postcolonial Enlightenment: Eighteenth-century Colonialism and Postcolonial Theory
The Postcolonial Enlightenment: Eighteenth-century Colonialism and Postcolonial Theory
Over the last thirty years, postcolonial critiques of European imperial practices have transformed our understanding of colonial ideology, resistance, and cultural contact. The Enlightenment has played a complex but often unacknowledged role in this discussion, alternately reviled and venerated as the harbinger of colonial dominion and avatar of...
Domain-Specific Model-Driven Testing
Domain-Specific Model-Driven Testing

Software reuse and software quality are increasingly important topics in today's software engineering both for researchers and for practitioners. The design and implementation of tests is especially challenging when tests are conceptualized for different variants and versions of an application. Stefan Baerisch applies a combination of...

Fundamental Approaches to Software Engineering: 14th International Conference, FASE 2011
Fundamental Approaches to Software Engineering: 14th International Conference, FASE 2011

FASE (Fundamental Approaches to Software Engineering) is concerned with the foundations on which software engineering is built. Its focus is on novel techniques and the way in which they contribute to making software engineering a more mature and soundly based discipline. This year, we particularly encouraged contributions that combine the...

4G: Deployment Strategies and Operational Implications
4G: Deployment Strategies and Operational Implications

Specific operational requirements drive early network architectural and design decisions for 4G networks. 4G: Deployment Strategies and Operational Implications evaluates the specific design and deployment options and strategies for LTE network business development. LTE is a...

Maven: The Definitive Guide
Maven: The Definitive Guide

For too long, developers have worked on disorganized application projects, where every part seemed to have its own build system, and no common repository existed for information about the state of the project. Now there's help. The long-awaited official documentation to Maven is here.

Written by Maven creator
...

Enabling eBusiness - Integrating Technologies Architectures & Applications
Enabling eBusiness - Integrating Technologies Architectures & Applications
This book describes the technical architecture and components that can be integrated in order to provide a comprehensive and robust infrastructure on which to build successful e-Business. It is essential reading for technical and functional team leaders and strategists, who analyse the options, limitations and possibilities for new technology and...
RFID for the Optimization of Business Processes
RFID for the Optimization of Business Processes
Prof. Elgar Fleisch, ETH Zürich and University of St. Gallen:

"A comprehensive, clear and practical introduction for RFID designers."

Prof. Rolf Jansen, Faculty of Logistics, Dortmund University:

"The book comprehensively deals with the topic in a solution-oriented way, expertly conveying...

Imaging for Forensics and Security: From Theory to Practice (Signals and Communication Technology)
Imaging for Forensics and Security: From Theory to Practice (Signals and Communication Technology)
Imaging for Forensics and Security: From Theory to Practice provides a detailed analysis of new imaging and pattern recognition techniques for the understanding and deployment of biometrics and forensic techniques as practical solutions to increase security. It contains a collection of the recent advances in the technology ranging from...
Take Control of Getting Started with DEVONthink 2
Take Control of Getting Started with DEVONthink 2

With the information-management program DEVONthink 2, you no longer have to swim in a sea of Web bookmarks, email receipts, RSS feeds, Web page snippets, Post-it notes, and phone bills. DEVONthink stores your digital documents and clippings, helps you scan and store paper documents, and serves as home base for organizing and viewing all your...

The Definitive Guide to Interwoven TeamSite (Definitive Guides)
The Definitive Guide to Interwoven TeamSite (Definitive Guides)

Adigital flood is upon us. Content inundates us. It begins as bits of content swirling everywhere—a document, an image, a written corporate procedure, a web page, or an email. The binary mist mixes, combines, and rains down on us. It pools in laptops, on desktops, and in server farms. Creeks and streams meander to corporate reservoirs....

unlimited object storage image
Result Page: 209 208 207 206 205 204 203 202 201 200 199 198 197 196 195 194 193 192 191 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy