Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Information Systems Reengineering and Integration
Information Systems Reengineering and Integration
The strategic importance of information systems is now widely accepted, and over the last three decades these systems have received considerable investment. Systems have evolved from file systems, through database systems, to the emergence of Management Information Systems (MIS) and more recently Executive Information Systems (EIS). With the...
DWR Java AJAX Applications
DWR Java AJAX Applications
AJAX enables a rich desktop-like user interface in the browser and enables interactive interfaces that can even replace traditional user interfaces. Communication between browser and server is done in the background and because only the data is transferred between the browser and the server, AJAX applications seem to be, and are actually, fast and...
Reverse Engineering: An Industrial Perspective (Springer Series in Advanced Manufacturing)
Reverse Engineering: An Industrial Perspective (Springer Series in Advanced Manufacturing)
Reverse engineering is the process of discovering the technological principles of an object or component through analysis of its structure and function. Such analysis can then be used to redesign the object very quickly using computer-aided design in concert with rapid-manufacturing processes to produce small numbers of components adapted to the...
Hacking Exposed Wireless
Hacking Exposed Wireless

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute...

Decompiling Java
Decompiling Java
WHEN COREL BOUGHT WordPerfect for almost $200 million from the Novell Corporation in the mid 1990s, nobody would have thought that in a matter of months they would have been giving away the source code free. However, when Corel ported WordPerfect to Java and released it as a beta product, a simple program called Mocha1 could...
Ruby Data Processing: Using Map, Reduce, and Select
Ruby Data Processing: Using Map, Reduce, and Select
Gain the basics of Ruby’s map, reduce, and select functions and discover how to use them to solve data-processing problems. This compact hands-on book explains how you can encode certain complex programs in 10 lines of Ruby code, an astonishingly small number. You will walk through problems and solutions which are effective...
Measuring Information Systems Delivery Quality
Measuring Information Systems Delivery Quality
After years of experience with building systems, the information systems (IS)
community is still challenged by systems delivery, that is, planning the implementation
project, determining system features and requirements, sourcing and
deploying the software, and managing its evolution. High-quality systems are
still elusive. Yet
...
Mastering Reverse Engineering: Re-engineer your ethical hacking skills
Mastering Reverse Engineering: Re-engineer your ethical hacking skills

Implement reverse engineering techniques to analyze software, exploit software targets, and defend against security threats like malware and viruses.

Key Features

  • Analyze and improvise software and hardware with real-world examples
  • Learn advanced debugging and patching...
XML Programming: Web Applications and Web Services With JSP and ASP
XML Programming: Web Applications and Web Services With JSP and ASP

A fast-moving, concise introduction to XML technologies for all programmers, no matter what their programming language (Java, VB, VBScript, C, C++, Python, and JavaScript), with exercises and solutions in every chapter.

This book is for programmers—people who are used to reading, writing, and debugging code. We assume that
...
Practical Mobile Forensics - Third Edition: A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms
Practical Mobile Forensics - Third Edition: A hands-on guide to mastering mobile forensics for the iOS, Android, and the Windows Phone platforms

Investigate, analyze, and report iOS, Android, and Windows devices

Key Features

  • Get hands-on experience in performing simple to complex mobile forensics techniques
  • Retrieve and analyze data stored not only on mobile devices but also through the cloud and other connected...
Chronic Fatigue Syndrome (Diseases and Disorders)
Chronic Fatigue Syndrome (Diseases and Disorders)

Examines the symptoms, treatment options, and mystery of chronic fatigue syndrome, ongoing research into its causes, and how to live with this disease.

CHARLES BEST, ONE of the pioneers in the search for a cure for diabetes, once explained what it is about medical research that intrigued him so. “It’s not just the...

Mastering UML with Rational Rose 2002
Mastering UML with Rational Rose 2002
Design More Efficient Applications with the Leading Visual Modeler

Mastering UML with Rational Rose 2002 offers expert instruction in both areas you need to master if you want to develop flexible object-oriented applications: the Unified Modeling Language and the latest version of Rational Rose, the world’s...

unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy