Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Understanding SCA (Service Component Architecture)
Understanding SCA (Service Component Architecture)

Use SCA to Simplify the Development and Delivery of Service-Based Applications

 

Service Component Architecture (SCA) is a new programming model that enables developers to build distributed applications more efficiently and effectively than previous...

Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications
Bulletproof SSL and TLS: Understanding and Deploying SSL/TLS and PKI to Secure Servers and Web Applications

FULLY REVISED IN JUNE 2017.

Bulletproof SSL and TLS is a complete guide to using SSL and TLS encryption to deploy secure servers and web applications. Written by Ivan Ristic, the author of the popular SSL Labs web site, this book will teach you everything you need to know to protect your systems from eavesdropping and
...

Microsoft Office 2003 Editions Resource Kit
Microsoft Office 2003 Editions Resource Kit

Whether you’re a small business or a global organization, deploy and support Microsoft Office 2003 Editions with expertise direct from the Microsoft Office product team. This official Resource Kit packs the in-depth technical information you need to customize and install Office, plan and implement messaging with Microsoft...

Windows Server 2008 Unleashed
Windows Server 2008 Unleashed
Windows Server 2008 Unleashed covers the planning, design, prototype testing, implementation, migration, administration, and support of a Windows 2008 and Active Directory environment, based on more than three and a half years of early adopter experience in full production environments. This book addresses not only what is new with Windows...
Vietnam at War
Vietnam at War
For many Westerners, the Vietnam War summons images of American soldiers patrolling rice paddies, battling an elusive enemy as helicopters circle overhead. But there were, in fact, many Vietnam wars--an anti-colonial war with France, a cold war turned hot with the United States, a civil war between North and South Vietnam and among southern...
Intelligence Cooperation and the War on Terror: Anglo-American Security Relations after 9/11 (Studies in Intelligence)
Intelligence Cooperation and the War on Terror: Anglo-American Security Relations after 9/11 (Studies in Intelligence)

This book provides an in-depth analysis of UK-US intelligence cooperation in the post-9/11 world.

Seeking to connect an analysis of intelligence liaison with the wider realm of Anglo-American Relations, the book draws on a wide range of interviews and consultations with key actors in both countries. The book is centred around two...

The Pleasures of Statistics: The Autobiography of Frederick Mosteller
The Pleasures of Statistics: The Autobiography of Frederick Mosteller

From his unique perspective, renowned statistician and educator Frederick Mosteller describes many of the projects and events in his long career. From humble beginnings in western Pennsylvania to becoming the founding chairman of Harvard University’s Department of Statistics and beyond, he inspired many statisticians, scientists, and...

Stress and Suffering at Work: The Role of Culture and Society
Stress and Suffering at Work: The Role of Culture and Society

This edited collection explores different strands of social constructionist theory and methods to provide a critique of the prevailing discourse of work stress, and introduces a radical new approach to conceptualizing suffering at work. Over the last three decades, stress and other forms of suffering at work...

Onshore and Offshore Wind Energy: An Introduction
Onshore and Offshore Wind Energy: An Introduction

A highly accessible and authoritative account of wind energy’s scientific background, current technology, and international status, with an emphasis on large turbines and wind farms, both onshore and offshore

Topics covered include:

  • a brief history of wind energy
  • the...
Carry On: Sound Advice from Schneier on Security
Carry On: Sound Advice from Schneier on Security

Up-to-the-minute observations from a world-famous security expert

Bruce Schneier is known worldwide as the foremost authority and commentator on every security issue from cyber-terrorism to airport surveillance. This groundbreaking book features more than 160 commentaries on recent events including the Boston Marathon...

Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats
Enterprise Cybersecurity: How to Build a Successful Cyberdefense Program Against Advanced Threats

Enterprise Cybersecurity empowers organizations of all sizes to defend themselves with next-generation cybersecurity programs against the escalating threat of modern targeted cyberattacks. This book presents a comprehensive framework for managing all aspects of an enterprise cybersecurity program. It enables an enterprise to...

The Blockchain Alternative: Rethinking Macroeconomic Policy and Economic Theory
The Blockchain Alternative: Rethinking Macroeconomic Policy and Economic Theory

Examine what would happen if we were to deploy blockchain technology at the sovereign level and use it to create a decentralized cashless economy. This book explains how finance and economics work today, and how the convergence of various technologies related to the financial sector can help us find solutions to problems,...

unlimited object storage image
Result Page: 56 55 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy