Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
GlassFish Security
GlassFish Security

Security was, is, and will be one of the most important aspects of Enterprise Applications and one of the most challenging areas for architects, developers, and administrators. It is mandatory for Java EE application developers to secure their enterprise applications using Glassfish security features.

Learn to secure Java EE...

Microsoft BizTalk Server 2010 Unleashed
Microsoft BizTalk Server 2010 Unleashed

Microsoft BizTalk Server 2010 Unleashed is the 100% new, 100% practical developer’s guide to Microsoft’s most powerful version of BizTalk Server. Written by an expert team of Microsoft insiders and BizTalk MVPs, it reflects unsurpassed experience with all phases of BizTalk enterprise solutions...

Borges, Buddhism and World Literature: A Morphology of Renunciation Tales (Literatures of the Americas)
Borges, Buddhism and World Literature: A Morphology of Renunciation Tales (Literatures of the Americas)
This book follows the renunciation story in Borges and beyond, arguing for its centrality as a Borgesian compositional trope and as a Borgesian prism for reading a global constellation of texts. The renunciation story at the heart of Buddhism, that of a king who leaves his palace to become an ascetic, fascinated Borges because of its...
The Complete Reference to Professional SOA with Visual Studio 2005
The Complete Reference to Professional SOA with Visual Studio 2005
Service Oriented Architecture has the potential to be the next great paradigm that will once and for all change computing as we know it. The main promise of Service Oriented Architecture is that business systems can be used by anyone, from anywhere, at any time and on any system.

The popularity in Service Oriented Architecture is largely
...
Trusted Information - The New Decade Challenge (International Federation for Information Processing, Volume 193)
Trusted Information - The New Decade Challenge (International Federation for Information Processing, Volume 193)
With the explosive growth of data exchange and the availability of access to services over the Web, the Trusted Information requirement is more and more an issue to providers and users of these services.
Addressing this security issue, this volume is divided into eleven parts covering the essentials of information security technologies,
...
Control Engineering: A Guide for Beginners
Control Engineering: A Guide for Beginners

Automatic control is becoming more and more important in this age of automation. In manufacturing processes it ensures that certain parameters, such as temperature, pressure, speed cc voltage, take up specific constant values recognized as the optimum. or are maintained in a particular relationship to other variables. In other words, the duty...

Distributed Database Management Systems: A Practical Approach
Distributed Database Management Systems: A Practical Approach

This book addresses issues related to managing data across a distributed database system. It is unique because it covers traditional database theory and current research, explaining the difficulties in providing a unified user interface and global data dictionary. The book gives implementers guidance on hiding discrepancies across systems and...

Software Architecture with Spring 5.0: Design and architect highly scalable, robust, and high-performance Java applications
Software Architecture with Spring 5.0: Design and architect highly scalable, robust, and high-performance Java applications

Discover how different software architectural models can help you solve problems, and learn best practices for the software development cycle

Key Features

  • Learn concepts related to software architecture and embrace them using the latest features of Spring 5
  • Discover...
QlikView 11 for Developers: Effective analytics techniques for modern Business Intelligence
QlikView 11 for Developers: Effective analytics techniques for modern Business Intelligence

Gain an in-depth understanding of how to build applications for Business Intelligence using QlikView

Key Features

  • Learn to build applications for Business Intelligence while following a practical case - HighCloud Airlines. Each chapter develops parts of the application and it evolves throughout the book...
MCITP Developer: Microsoft SQL Server 2005 Database Solutions Design
MCITP Developer: Microsoft SQL Server 2005 Database Solutions Design
Welcome to what is probably the most difficult exam in the current range of SQL Server 2005 exams available, the “Designing Database Solutions by Using Microsoft SQL Server 2005” 70-441 exam.

The reason why it is such a difficult exam is because it has both a breadth and a depth that
...
JQuery UI Themes Beginner's Guide
JQuery UI Themes Beginner's Guide

Welcome to jQuery UI Themes: Beginner's Guide. This introductory text will get you started with developing your own themes for jQuery UI applications. Starting with the general concepts of user interface themes, this book walks the reader through everything from the most basic ideas in jQuery UI to more advanced topics such as icons...

Architecting Secure Software Systems
Architecting Secure Software Systems
Through the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX, .NET, Java, mobile, and Web environments, and they...
unlimited object storage image
Result Page: 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy