Pro Hibernate 3 is the first book to offer complete coverage of the open source lightweight Hibernate 3 and its new features. Authors Dave Minter and Jeff Linwood discuss the new persistence layer and share design tips and best practices. And the duo goes beyond just explaining "how to" use parts of Hibernate; they probe well...
This book covers the basic through advanced methods of filtering on hack traffic, ICMP traffic, IP fragments, subnet traffic and more. If you want to know how to build filters to capture specific application traffic based on its signature, this is the book for you. Includes instructions for capturing 'data theft' using signatures rather than...
This book covers the CherryPy library for Python web development from its history and installation through its main features and core concepts to its integration with Python and other products to construct, test, and deploy a sample photoblog application. The author Sylvain Hellegouarch is dedicated to the development of free software projects and...
This book constitutes the refereed joint proceedings of ten international workshops held in conjunction with the 4th International Symposium on Parallel and Distributed Processing and Applications, ISPA 2006, held in Sorrento, Italy in December 2006 (see LNCS 4330).
The 116 revised full papers presented were carefully reviewed and selected from...
"An easy-to-follow yet comprehensive introduction to the practice of meditation."
—John Gray, author of Men Are from Mars, Women Are from Venus
Research has proven that meditation relaxes the body, calms the mind, reduces stress, and enhances overall health and well-being. Whether you're new to meditation...
A comprehensive guide to the best common practices for Internet service providersLearn the best common practices for configuring routers on the Internet from experts who helped build the InternetGain specific advice through comprehensive coverage of all Cisco routers and current versions of Cisco IOS SoftwareUnderstand the Cisco IOS tools essential...
Networked information technology (NIT) systems are synonymous with network-centric or net-centric systems and constitute the cornerstone of the fast-growing information age. NIT systems' field of application ranges from the traditional worldwide telecommunication systems, banking and financial transactions, on-line travel reservation...
Computers were once thought of as number-crunching machines; but for most of us it is their ability to create worlds and process words that have made them into a nearly indispensable part of life. As Jacques Leslie puts it, if computers are everywhere, it is because they have grown into "poetry machines." The term "cyberspace"...
This book presents different approaches in IP traffic theory and classifies them, especially towards applications in the Internet. It comprises the state of the art in this area, which is currently presented only by numerous research papers and overview articles.
The book provides an ideal starting point for detailed studies of traffic analysis...
This concise book contains detailed information about Oracle internals -- information that's not readily available to Oracle customers. It lays a foundation for advanced performance tuning of the Oracle database. Based on Oracle8i release 8.1, the book describes many of the secrets of Oracle's internal services: data structures, algorithms, and...
The first fuel cell theory and application resource written for students and professionals.
With the field of fuel cells growing at a rapid pace, there is a powerful need for a single guide to the myriad disciplines related to the technology. Fuel Cell Engines provides a comprehensive and detailed introduction to the...
Although web standards-based websites can scale effectively—and basic CSS will give you basic results—there are considerations and obstacles that high traffic websites must face to keep your development and hosting costs to a minimum. There are many tips and tricks, as well as down-to-earth best practice information, to make sure...