|
|
|
|
Java Security (2nd Edition)One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is... | | | | |
|
|
Maven: The Definitive Guide
For too long, developers have worked on disorganized application projects, where every part seemed to have its own build system, and no common repository existed for information about the state of the project. Now there's help. The long-awaited official documentation to Maven is here.
Written by Maven creator... | | Enabling eBusiness - Integrating Technologies Architectures & ApplicationsThis book describes the technical architecture and components that can be integrated in order to provide a comprehensive and robust infrastructure on which to build successful e-Business. It is essential reading for technical and functional team leaders and strategists, who analyse the options, limitations and possibilities for new technology and... | | RFID for the Optimization of Business ProcessesProf. Elgar Fleisch, ETH Zürich and University of St. Gallen:
"A comprehensive, clear and practical introduction for RFID designers."
Prof. Rolf Jansen, Faculty of Logistics, Dortmund University:
"The book comprehensively deals with the topic in a solution-oriented way, expertly conveying... |
|
| | Take Control of Getting Started with DEVONthink 2
With the information-management program DEVONthink 2, you no longer have to swim in a sea of Web bookmarks, email receipts, RSS feeds, Web page snippets, Post-it notes, and phone bills. DEVONthink stores your digital documents and clippings, helps you scan and store paper documents, and serves as home base for organizing and viewing all your... | | The Definitive Guide to Interwoven TeamSite (Definitive Guides)
Adigital flood is upon us. Content inundates us. It begins as bits of content swirling everywhere—a document, an image, a written corporate procedure, a web page, or an email. The binary mist mixes, combines, and rains down on us. It pools in laptops, on desktops, and in server farms. Creeks and streams meander to corporate reservoirs.... |
|
|
Result Page: 209 208 207 206 205 204 203 202 201 200 199 198 197 196 195 194 193 192 191 |