Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Implementing SOA Using Java EE
Implementing SOA Using Java EE

The Practitioner’s Guide to Implementing SOA with Java EE Technologies

 

This book brings together all the practical insight you need to successfully architect enterprise solutions and implement them using SOA and Java...

Formal Methods for Software Architectures: Third International School on Formal Methods for the Design of Computer
Formal Methods for Software Architectures: Third International School on Formal Methods for the Design of Computer

In the past ten years or so, software architecture has emerged as a central notion in the development of complex software systems. Software architecture is now accepted in the software engineering research and development community as a manageable and meaningful abstraction of the system under development and is applied throughout the...

Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance
Engineering Information Security: The Application of Systems Engineering Concepts to Achieve Information Assurance

Information security is the act of protecting information from unauthorized access, use, disclosure, disruption, modification, or destruction. This book discusses why information security is needed and how security problems can have widespread impacts. It covers the complete security lifecycle of products and services, starting with...

Antenna Design for Mobile Devices (Wiley - IEEE)
Antenna Design for Mobile Devices (Wiley - IEEE)

Expanded and updated, this practical guide is a one-stop design reference containing all an engineer needs when designing antennas

  • Integrates state-of-the-art technologies with a special section for step-by-step antenna design
  • Features up-to-date bio-safety and electromagnetic compatibility regulation...
CISSP(r): Certified Information Systems Security Professional Study Guide, 2nd Edition
CISSP(r): Certified Information Systems Security Professional Study Guide, 2nd Edition
Here's the book you need to prepare for the challenging CISSP exam from (ISC)2. This revised edition was developed to meet the exacting requirements of today's security certification candidates. In addition to the consistent and accessible instructional approach that earned...
Digital Frequency Synthesis Demystified : DDS and Fractional-N PLLs (Demystified)
Digital Frequency Synthesis Demystified : DDS and Fractional-N PLLs (Demystified)
“a comprehensive overview of both DDS architectures and fractional-N frequency synthesizers.” Microwave Journal said this book “is aimed specifically at practical designers and utilizes many intuitive explanations and design examples.” Microwaves & RF magazine

"Bar-Giora Goldberg should
...
Oracle JD Edwards EnterpriseOne 9.0: Supply Chain Management Cookbook
Oracle JD Edwards EnterpriseOne 9.0: Supply Chain Management Cookbook
Oracle's JD Edwards EnterpriseOne Supply Chain Management (SCM) application suite aids your business in enhancing your interactions with Enterprise suppliers, and this practical cookbook provides essential implementation sequences to make the most of the suite. The functionality across the application described in this...
Managing Your Outsourced IT Services Provider: How to Unleash the Full Potential of Your Global Workforce
Managing Your Outsourced IT Services Provider: How to Unleash the Full Potential of Your Global Workforce

Managing Your Outsourced IT Services Provider teaches executives and managers of organizations how to unleash the full potential of their outsourced IT services workforce and IT-enabled business processes safely and profitably. Drawing on two decades of experience managing client relationships for global IT services companies,...

Risk Management and Capital Adequacy
Risk Management and Capital Adequacy

A Step-by-Step Approach for Integrating Market, Credit, and Operational Risk Management--While Complying with New Basel Accord Guidelines

For financial institutions around the world, the work involved in managing market, credit, and operational risk exposures--as well as the capital required to support such...

ASP.NET 1.1 Solutions Toolkit
ASP.NET 1.1 Solutions Toolkit

Throughout this book we’ll be developing a set of solutions (in the form of custom controls most of the time) designed to tackle the more common needs of Web Application development. These range from simple and self-contained controls, like the Spinner control developed in Chapter 2, to more advanced and complex solutions, such as the...

McGraw-Hill Education PTCE Review
McGraw-Hill Education PTCE Review
A rigorous study guide for the PTCE?with strategies, review questions and 4 full-length practice tests

Passing the Pharmacy Technician Certification Exam is essential for all future pharmacy technicians. Give yourself an edge on this test by boosting your exam-day confidence with the best possible study guide. This
...
Virtualization with Microsoft Virtual Server 2005
Virtualization with Microsoft Virtual Server 2005
A virtual evolution in IT organizations throughout the world has begun. It is estimated that currently 3% of all servers run virtually and that number is expected to grow rapidly over the next 5 years. Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of...
unlimited object storage image
Result Page: 169 168 167 166 165 164 163 162 161 160 159 158 157 156 155 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy