Home | Amazing | Today | Tags | Publishers | Years | Search 
Application Architecture for WebSphere: A Practical Approach to Building WebSphere Applications
Application Architecture for WebSphere: A Practical Approach to Building WebSphere Applications

Architect IBM® WebSphere® Applications for Maximum Performance, Security, Flexibility, Usability, and Value Successful, high-value WebSphere applications begin with effective architecture. Now, one of IBM’s leading WebSphere and WebSphere Portal architects offers a hands-on,...

Software Engineering: A Practitioner's Approach
Software Engineering: A Practitioner's Approach

When computer software succeeds—when it meets the needs of the people who use it, when it performs flawlessly over a long period of time, when it is easy to modify and even easier to use—it can and does change things for the better. But when software fails—when its users are dissatisfied, when it is error prone, when...

Microsoft Windows 7: Comprehensive (Shelly Cashman)
Microsoft Windows 7: Comprehensive (Shelly Cashman)

The Shelly Cashman Series® offers the fi nest textbooks in computer education. We are proud of the fact that our Microsoft Windows 3.1, Microsoft Windows 95, Microsoft Windows 98, Microsoft Windows 2000, Microsoft Windows XP, and Microsoft Windows Vista books have been so well received by students and instructors. With each new...

Adobe Photoshop CS3: Introductory Concepts and Techniques
Adobe Photoshop CS3: Introductory Concepts and Techniques

The Shelly Cashman Series® offers the finest textbooks in computer education. We are proud of the fact that our textbook series has been the most widely used in education. Adobe® Photoshop® CS3: Introductory Concepts and Techniques continues with the innovation, quality, and reliability that you have come to expect from the...

Visualize This: The FlowingData Guide to Design, Visualization, and Statistics
Visualize This: The FlowingData Guide to Design, Visualization, and Statistics

Think of all the popular data visualization works out there—the ones that you always hear in lectures or read about in blogs, and the ones that popped into your head as you were reading this sentence. What do they all have in common? They all tell an interesting story. Maybe the story was to convince you of something. Maybe it was to...

UMTS Network Planning, Optimization, and Inter-Operation with GSM
UMTS Network Planning, Optimization, and Inter-Operation with GSM

The continuing explosive growth in mobile communication is demanding more spectrally efficient radio access technologies than the prevalent second generation (2G) systems such as GSM to handle just the voice traffic. We are already witnessing high levels of mobile penetration exceeding 70% in some countries. It is anticipated that by...

Secure Coding in C and C++
Secure Coding in C and C++

"The security of information systems has not improved at a rate consistent with the growth and sophistication of the attacks being made against them. To address this problem, we must improve the underlying strategies and techniques used to create our systems. Specifically, we must build security in from the start, rather than append...

GeoSpatial Semantics: 4th International Conference, GeoS 2011, Brest, France, May 12-13, 2011
GeoSpatial Semantics: 4th International Conference, GeoS 2011, Brest, France, May 12-13, 2011

The fourth edition of the International Conference on Geospatial Semantics (GeoS 2011) was held in Brest, France, during May 12–13, 2011.

Geospatial semantics (GEOS) is an emerging research area in the domain of geographic information science. It aims at exploring strategies, computational methods, and tools to support...

I. M. Wright's "Hard Code": A Decade of Hard-Won Lessons from Microsoft (Best Practices)
I. M. Wright's "Hard Code": A Decade of Hard-Won Lessons from Microsoft (Best Practices)

Get the brutal truth about coding, testing, and project management—from a Microsoft insider who tells it like it is. I. M. Wright's deliberately provocative column "Hard Code" has been sparking debate amongst thousands of engineers at Microsoft for years. And now (despite our better instincts), we're making...

Mobile Opportunistic Networks: Architectures, Protocols and Applications
Mobile Opportunistic Networks: Architectures, Protocols and Applications

The widespread availability of mobile devices coupled with recent advancements in networking capabilities make opportunistic networks one of the most promising technologies for next-generation mobile applications. Are you ready to make your mark?

Featuring the contributions of prominent researchers from academia and industry,...

Crime Scene Photography, Second Edition
Crime Scene Photography, Second Edition

This textbook is designed for two principal photography student types. One group is the student in an academic setting. Students are expected to acquire a solid grasp of the theories and concepts of their various courses. This is the Knowledge point of the “KSAs” frequently required by employers. Students in an academic...

The Digital Consumer Technology Handbook: A Comprehensive Guide to Devices, Standards, Future Directions, and Programmable Logic Solutions
The Digital Consumer Technology Handbook: A Comprehensive Guide to Devices, Standards, Future Directions, and Programmable Logic Solutions

Studying the history of consumer electronics is nothing short of fascinating. The landscape is filled with countless stories of product successes and failures— fickle consumer adoptions, clever marketing campaigns that outsmart the best technologies, better packaging winning over better technology, and products that are simply...

Result Page: 249 248 247 246 245 244 243 242 241 240 239 238 237 236 235 234 233 232 231 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy