Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
SOA Design Patterns (The Prentice Hall Service-Oriented Computing Series from Thomas Erl)
SOA Design Patterns (The Prentice Hall Service-Oriented Computing Series from Thomas Erl)
“The concept of service oriented architecture has long promised visions of agile organizations being able to swap out interfaces and applications as business needs change. SOA also promises incredible developer and IT productivity, with the idea that key services would be candidates for cross-enterprise sharing or reuse. But many...
Practical API Architecture and Development with Azure and AWS: Design and Implementation of APIs for the Cloud
Practical API Architecture and Development with Azure and AWS: Design and Implementation of APIs for the Cloud
Learn the business and technical importance of API design and architecture using the available cloud services from Azure and AWS.

This book starts off with an introduction to APIs and the concept of API Economy from a business and organizational perspective. You'll decide on a sustainable API strategy and API
...
Project Management Practitioner's Handbook
Project Management Practitioner's Handbook
Well into the swiftly approaching millennium, project management will continue to be a highly desired skill
in the midst of great change. Because rigid organizational boundaries and responsibilities have blurred and
new technologies are changing the ways of doing business, results must be delivered more quickly and
accurately than
...
Analysis Patterns: Reusable Object Models (The Addison-Wesley Object Technology Series)
Analysis Patterns: Reusable Object Models (The Addison-Wesley Object Technology Series)

This innovative book recognizes the need within the object-oriented community for a book that goes beyond the tools and techniques of the typical methodology book. In Analysis Patterns: Reusable Object Models, Martin Fowler focuses on the end result of object-oriented analysis and design - the models themselves. He shares with...

Applied Security Visualization
Applied Security Visualization
APPLIED SECURITY VISUALIZATION

 

“Collecting log data is one thing, having relevant information is something else. The art to transform all kinds of log data into meaningful security information is the core of this book. Raffy illustrates in a...

PostgreSQL 11 Server Side Programming Quick Start Guide: Effective database programming and interaction
PostgreSQL 11 Server Side Programming Quick Start Guide: Effective database programming and interaction

Extend PostgreSQL using PostgreSQL server programming to create, test, debug, and optimize a range of user-defined functions in your favorite programming language

Key Features

  • Learn the concepts of PostgreSQL 11 with lots of real-world datasets and examples
  • Learn queries,...
Synchronizing Internet Protocol Security (SIPSec) (Advances in Information Security)
Synchronizing Internet Protocol Security (SIPSec) (Advances in Information Security)
The open design of the internet has not only opened many new opportunities for communications, but it has also opened many new avenues for attacks against organizational network and computing resources. Information security has become a major concern in recent times, as more and more computers are being connected to the global internet. With so...
Evaluating Information Systems: Public and Private Sector
Evaluating Information Systems: Public and Private Sector
Companies make a huge investment of 4 to 10% of their turnover on IT - this book reveals how this is evaluated and measured.

The adoption of Information Technology (IT) and Information Systems (IS) represents significant financial investments, with alternative perspectives to the evaluation domain coming from both the public
...
Information Assurance: Managing Organizational IT Security Risks
Information Assurance: Managing Organizational IT Security Risks
Written by two INFOSEC experts, this book provides a systematic and practical approach for establishing, managing and operating a comprehensive Information Assurance program. It is designed to provide ISSO managers, security managers, and INFOSEC professionals with an understanding of the essential issues required to develop and apply a targeted...
Infonomics for Distributed Business and Decision-Making Environments: Creating Information System Ecology
Infonomics for Distributed Business and Decision-Making Environments: Creating Information System Ecology
The information economy continues to challenge businesses in many ways with information technologies and globalization leading to blurred the organizational boundaries. Infonomics for Distributed Business and Decision-Making Environments: Creating Information System Ecology provides greater understanding of issues, challenges,...
How Learning Works: Seven Research-Based Principles for Smart Teaching
How Learning Works: Seven Research-Based Principles for Smart Teaching

Distilling the research literature and translating the scientific approach into language relevant to a college or university teacher, this book introduces seven general principles of how students learn. The authors have drawn on research from a breadth of perspectives (cognitive, developmental, and social psychology; educational research;...

Translating Statistics to Make Decisions: A Guide for the Non-Statistician
Translating Statistics to Make Decisions: A Guide for the Non-Statistician

Examine and solve the common misconceptions and fallacies that non-statisticians bring to their interpretation of statistical results. Explore the many pitfalls that non-statisticians―and also statisticians who present statistical reports to non-statisticians―must avoid if statistical results are to be correctly used for...

unlimited object storage image
Result Page: 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy