Understanding Broadband over Power Line explores all aspects of the emerging technology that enables electric utilities to provide support for high-speed data communications via their power infrastructure. This book examines the two methods used to connect consumers and businesses to the Internet through the utility infrastructure: the existing...
Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure...
Over the past 20 years, businesses around the world have undergone rapid change. No longer are customers happy with their ‘status quo’ products or services: they expect businesses to adapt rapidly to the changing environment by providing more offerings, cheaper and faster than before. This rate of change has forced businesses to...
Microsoft provides its software solutions with user's guides that give the most complete information for Microsoft applications. Documentation sets describe both advantages and some basic features along with answers to the most frequently asked questions.
A guide to preparing for the Microsoft Certified Professional Exam...
Using Joomla! Templates with HTML and CSS allows you to give a unique look and feel to your site, present a "fresh face" to your pre-existing content, ensure that your site design is consistent with your brand, and build a site layout that suits your unique needs. A quality web site is easily within your grasp using these cutting-edge...
This book on the Twitter API is geared to the programmer who is just a bit past
beginner—who knows the basics of LAMP, including how to set up a basic server,
PHP, JavaScript, HTML, and CSS. You do not have to be an expert programmer to
use this book, but you should know how to look things up. In writing this book, we
have tried...
With the rapid development of the data mining and knowledge discovery, a key
issue which could significantly affect the real world applications of data mining is
the reliability issues of knowledge discovery. It is natural that people will ask if the
discovered knowledge is reliable. Why do we trust the discovered knowledge? How...
Modern cryptography has evolved dramatically since the 1970s. With the rise of new network architectures and services, the field encompasses much more than traditional communication where each side is of a single user. It also covers emerging communication where at least one side is of multiple users. New Directions of Modern...
BDD in Action teaches you the Behavior-Driven Development model and shows you how to integrate it into your existing development process. First you'll learn how to apply BDD to requirements analysis to define features that focus your development efforts on underlying business goals. Then,...
The explosive growth of the Internet economy over the past several years and new IP-based enterprise applications has heightened requirements for continuous availability of mission-critical data. Today's network administrators and managers are under big pressure to satisfy ever-increasing demands from customers, suppliers,...
If 3ds max 4 can do it, you can do it, too … Take 3ds max 4 to the max — and join the ranks of the pros who've created animations for some of today's hottest games, movies, and TV shows. Packed with expert advice, time-saving tips, and more than 150 step-by-step tutorials, this all-in-one guide gets you up to speed quickly on the...