Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java Message Service
Java Message Service
The Java Message Service (JMS) provides a way for the components of a distributed application to talk asynchronously, or for welding together legacy enterprise systems. Think of it as application-to-application e-mail. Unlike COM, JMS uses one or more JMS servers to handle the messages on a store-and-forward basis, so that the loss of one or more...
Content Computing: Advanced Workshop on Content Computing, AWCC 2004
Content Computing: Advanced Workshop on Content Computing, AWCC 2004

This book constitutes the refereed proceedings of the Advanced Workshop on Content Computing, AWCC 2004, held in Zhen Jiang, Jiang Su, China in November 2004.

The 26 revised full papers and 36 revised short papers presented were carefully reviewed and selected from 194 submissions. The papers are organized in topical sections on mobile...

Complex Dynamics in Communication Networks (Understanding Complex Systems)
Complex Dynamics in Communication Networks (Understanding Complex Systems)
Computer and communication networks are among society's most important infrastructures. The internet, in particular, is a giant global network of networks with central control or administration. It is a paradigm of a complex system, where complexity may arise from different sources: topological structure, network evolution, connection and node...
Beginning Windows 8 Application Development – XAML Edition
Beginning Windows 8 Application Development – XAML Edition

Beginning Windows 8 Application Development – XAML Edition introduces you to the Windows 8 modern app design paradigm and the new Windows 8 programming model developed around this paradigm.  You'll learn to build rich, immersive applications designed to run on the many devices that will be powered by Windows 8.

...
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach
Analyzing Computer Security: A Threat / Vulnerability / Countermeasure Approach

“In this book, the authors adopt a refreshingly new approach to explaining the intricacies of the security and privacy challenge that is particularly well suited to today’s cybersecurity challenges. Their use of the threat–vulnerability–countermeasure paradigm combined with...

Three Laws of Nature: A Little Book on Thermodynamics
Three Laws of Nature: A Little Book on Thermodynamics
A short and entertaining introduction to thermodynamics that uses real-world examples to explain accessibly an important but subtle scientific theory
 
A romantic description of the second law of thermodynamics is that the universe becomes increasingly disordered. But what does that actually mean? Starting with
...
Polymers in Drug Delivery
Polymers in Drug Delivery

Together, the nano explosion and the genomic revolution are ushering in a new frontier in drug delivery. In recent years we’ve seen how polymers can play a crucial role in controlling the rate of drug release, enhancing solubility and uptake, and limiting degradation and toxicity. In the very near future, they may well be used to...

Software Verification and Analysis: An Integrated, Hands-On Approach
Software Verification and Analysis: An Integrated, Hands-On Approach
This book addresses the most important techniques in improving the correctness of software, including correctness by construction (top-down refinement), program proving, static analysis and dynamic, execution-based analysis (testing and debugging).

Three major software verification techniques are discussed: Semantic program synthesis and...

Learning Penetration Testing with Python
Learning Penetration Testing with Python

Utilize Python scripting to execute effective and efficient penetration tests

About This Book

  • Understand how and where Python scripts meet the need for penetration testing
  • Familiarise yourself with the process of highlighting a specific methodology to exploit an environment to fetch...
The Java Web Services Tutorial
The Java Web Services Tutorial

The Java(TM) Web Services Tutorial is a comprehensive, example-driven, "roll up your sleeves and dive in" guide to building Web services applications with Java(TM) technology. This edition provides a head start on using the Java Web Services Developer Pack (WSDP) from Sun...

MPEG-4 Beyond Conventional Video Coding: Object Coding, Resilience and Scalability
MPEG-4 Beyond Conventional Video Coding: Object Coding, Resilience and Scalability
MPEG-4 (with a formal ISO/IEC designation ISO/IEC 14496) standardization was initiated in 1994 to address the requirements of the rapidly converging telecommunication, computer, and TV/film industries. MPEG-4 had a mandate to standardize algorithms for audiovisual coding in multimedia applications, digital television, interactive graphics, and...
Handbook of Constraint Programming (Foundations of Artificial Intelligence)
Handbook of Constraint Programming (Foundations of Artificial Intelligence)
This encyclopedic work covers twenty-plus years of research in constraint programming in a readable, accessible and appealing way. For someone outside the field wondering what Constraint Programming is all about, this is the perfect introduction, and the book will remain useful as a reference for years.
Michael Trick, Professor of Operations
...
unlimited object storage image
Result Page: 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy