Home | Amazing | Today | Tags | Publishers | Years | Search 
Pro EDI in BizTalk Server 2006 R2: Electronic Document Interchange Solutions
Pro EDI in BizTalk Server 2006 R2: Electronic Document Interchange Solutions
The EDI capabilities of BizTalk Server 2006 R2 are a new implementation of an old technology. EDI originated in the 1970s to facilitate the delivery of data between businesses. Rather than diminishing in scope, however, EDI continues to play a major role in commerce today. Because of this, an extensive engine has been added to BizTalk Server to...
PHP Objects, Patterns, and Practice, Second Edition
PHP Objects, Patterns, and Practice, Second Edition

Backed by a tireless development community, PHP has been a model of language evolution over its 10+ year history. Borne from a contract developer’s pet project, these days you’ll find PHP powering many of the world’s largest web sites, including Yahoo!, Digg, EA Games, and Lycos.

PHP Objects, Patterns, and...

SharePoint 2007: The Definitive Guide
SharePoint 2007: The Definitive Guide
Why did I write this book? Actually, it took an army to write this book (read all of the names on the front cover if you don’t believe me). While I’m credited as the “lead author,” the experience and expertise of everyone who authored content for SharePoint 2007: The Definitive Guide is what is at the center of this work....
Mac OS X Leopard: Beyond the Manual
Mac OS X Leopard: Beyond the Manual
Mac OS X is quickly becoming one of the most popular operating systems for power users. Mac OS X’s ability to mesh an easy-to-use and attractive interface with a Unix back end has attracted average and power users to the Mac. In 2007, Apple releases the next version of Mac OS X: Leopard.

Mac OS X Leopard: Beyond the Manual is...

Penetration Tester's Open Source Toolkit, Volume 2
Penetration Tester's Open Source Toolkit, Volume 2
Penetration testing a network requires a delicate balance of art and science. A penetration tester must be creative enough to think outside of the box to determine the best attack vector into his own network, and also be expert in using the literally hundreds of tools required to execute the plan. This second volume adds over 300 new pen testing...
OSWorkflow: A guide for Java developers and architects to integrating open-source Business Process Management
OSWorkflow: A guide for Java developers and architects to integrating open-source Business Process Management
This book covers all aspects of OSWorkflow for Java developers and system architects, from basics of Business Process Management and installing OSWorkflow to developing complex Java applications and integrating this open-source Java workflow engine with the third-party components Drools for business rules, Quartz for task scheduling, and Pentaho...
Foundation Flash Cartoon Animation
Foundation Flash Cartoon Animation
Whether you are an experienced Flash designer or developer looking for a guide to doing animation in Flash, or a novice to Flash who is looking for an effective way to create and distribute animations, this book will prove invaluable to you. Covering every aspect of Flash animation, the book is a fast-paced yet thorough review of the Flash...
The Best Damn Exchange, SQL and IIS Book Period
The Best Damn Exchange, SQL and IIS Book Period
Exchange, SQL and IIS are at the core of most Microsoft enterprise servers. The 2007 releases of these products, along with the release of Windows Vista and Windows 2008 Server, represents the biggest overhaul of Windows enterprise products since Windows 2000. The dramatic changes to security tools and the addition of features that support...
Open Source Fuzzing Tools
Open Source Fuzzing Tools
A "fuzzer" is a program that attempts to discover security vulnerabilities by sending random data to an application. If that application crashes, then it has deffects to correct. Security professionals and web developers can use fuzzing for software testing--checking their own programs for problems--before hackers do it!

Open...

Internet Multimedia Communications Using SIP: A Modern Approach Including Java® Practice
Internet Multimedia Communications Using SIP: A Modern Approach Including Java® Practice
Session Initiation Protocol (SIP) was conceived in 1996 as a signaling protocol for inviting users to multimedia conferences. With this development, the next big Internet revolution silently started. That was the revolution which would end up converting the Internet into a total communication system which would allow people to talk to each other,...
jQuery Reference Guide
jQuery Reference Guide
This detailed reference guide to jQuery, an open-source JavaScript library that shields web developers from browser inconsistencies, simplifies adding dynamic, interactive elements, and reduces development time, covers the syntax of every jQuery method, function, and selector with detailed discussions to help readers get the most from jQuery. After...
How to Cheat at Configuring VmWare ESX Server
How to Cheat at Configuring VmWare ESX Server
This book will detail the default and custom installation of VMwares ESX server as well as basic and advanced virtual machine configurations. It will then walk the reader through post installation configurations including installation and configuration of VirtualCenter. From here, readers will learn to efficiently create and deploy virtual machine...
Result Page: 308 307 306 305 304 303 302 301 300 299 298 297 296 295 294 293 292 291 290 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy