Home | Amazing | Today | Tags | Publishers | Years | Search 
IBM WebSphere DataPower SOA Appliance Handbook
IBM WebSphere DataPower SOA Appliance Handbook

Expert Guide to Deploying, Using, and Managing DataPower SOA Appliances

 

IBM® WebSphere® DataPower® appliances can simplify SOA deployment, strengthen SOA security, enhance SOA performance, and dramatically improve SOA return on...

Eloquent Ruby (Addison-Wesley Professional Ruby Series)
Eloquent Ruby (Addison-Wesley Professional Ruby Series)

Do you know why experienced Ruby programmers tend to reach for basic collections and hashes while programmers from other languages go for more specialized classes? Do you know the difference between strip, chop, and chomp, and why there are three such similar methods when apparently one might suffice? (Not to mention lstrip and...

Wavelet Theory and Its Application to Pattern Recognition (Series in Machine Perception and Artificial Intelligence)
Wavelet Theory and Its Application to Pattern Recognition (Series in Machine Perception and Artificial Intelligence)

This 2nd edition is an update of the book "Wavelet Theory and Its Application to Pattern Recognition" published in 2000. Three new chapters, which are research results conducted during 2001-2008, will be added. The book consists of two parts - the first contains the basic theory of wavelet analysis and the second includes...

Stained Glass For Dummies (Sports & Hobbies)
Stained Glass For Dummies (Sports & Hobbies)

Discover the artist within and create beautiful stained glass

Beautiful stained glass isn't reserved solely for church windows-it can be used to create intricate patterns in home windows, decorate cabinet doors, patio doors, ceilings, skylights, mirrors, lighting fixtures, garden decorations, and much more. Stained...

Data Mining and Knowledge Discovery via Logic-Based Methods: Theory, Algorithms, and Applications
Data Mining and Knowledge Discovery via Logic-Based Methods: Theory, Algorithms, and Applications

There are many approaches to data mining and knowledge discovery (DM&KD), including neural networks, closest neighbor methods, and various statistical methods. This monograph, however, focuses on the development and use of a novel approach, based on mathematical logic, that the author and his research associates have worked on over the...

A History of Corporate Governance around the World: Family Business Groups to Professional Managers
A History of Corporate Governance around the World: Family Business Groups to Professional Managers
For many Americans, capitalism is a dynamic engine of prosperity that rewards the bold, the daring, and the hardworking. But to many outside the United States, capitalism seems like an initiative that serves only to concentrate power and wealth in the hands of a few hereditary oligarchies. In A History of Corporate Governance...
Exploratory Data Analysis with MATLAB (Chapman & Hall/CRC Computer Science & Data Analysis)
Exploratory Data Analysis with MATLAB (Chapman & Hall/CRC Computer Science & Data Analysis)

Exploratory data analysis (EDA) was conceived at a time when computers were not widely used, and thus computational ability was rather limited. As computational sophistication has increased, EDA has become an even more powerful process for visualizing and summarizing data before making model assumptions to generate hypotheses, encompassing...

The Cambridge Economic History of the United States 3 Volume Hardback Set: The Cambridge Economic History of the United States, Vol. 1
The Cambridge Economic History of the United States 3 Volume Hardback Set: The Cambridge Economic History of the United States, Vol. 1

Prefaces to sets of essays, such as this one, are often devoted to explaining why publication was delayed or why certain planned essays are missing from the completed book. This Preface is an exception. All of the authors met their deadlines — or near to — and they produced a very close approximation to the volume that the editors...

A Guide to Claims-Based Identity and Access Control (Patterns & Practices)
A Guide to Claims-Based Identity and Access Control (Patterns & Practices)

Claims-based identity means to control the digital experience and to use digital resources based on things that are said by one party about another. A party can be a person, organization, government, Web site, Web service, or even a device. The very simplest example of a claim is something that a party says about itself.

As the...

Professional Web Design: The Best of Smashing Magazine (Smashing Magazine Book Series)
Professional Web Design: The Best of Smashing Magazine (Smashing Magazine Book Series)

Create Fantastic Web Sites with Advice From Some of the Best in the Industry

Professional Web Design presents guidelines for professional Web development, including communicating with clients, creating a road map to a successful portfolio, rules for professional networking, and tips on designing user interfaces for business...

Handbook of Financial Cryptography and Security
Handbook of Financial Cryptography and Security

Cryptography has made a peculiar journey to become a modern science. It had long been associated with the military and with magic. The rst published work in the eld was Steganographia, by an alchemist named Trithemius. Although written earlier, the book was published in 1606. Cryptography has continued this connection with the arcane...

Grid and Cloud Database Management
Grid and Cloud Database Management

Since the 1960s, database systems have been playing a relevant role in the information technology field. By the mid-1960s, several systems were also available for commercial purposes. Hierarchical and network database systems provided two different perspectives and data models to organize data collections. In 1970, E. Codd wrote a...

Result Page: 131 130 129 128 127 126 125 124 123 122 121 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy