Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Network Programming with Java
Learning Network Programming with Java

Key Features

  • Learn to deliver superior server-to-server communication through the networking channels
  • Gain expertise of the networking features of your own applications to support various network architectures such as client/server and peer-to-peer
  • Explore the issues that impact scalability,...
CCNA Exam Certification Guide (CCNA Exam 640-407)
CCNA Exam Certification Guide (CCNA Exam 640-407)
CCNA Exam Certification Guide is a comprehensive study tool for CCNA Exam #640-407. Written by a CCIE and Certified Cisco Systems Instructor and reviewed by Cisco technical experts, CCNA Exam Certification Guide helps you understand and master the exam objectives. Section-by-section objective lists keep you focused on the material...
Techniques and Tools for the Design and Implementation of Enterprise Information Systems
Techniques and Tools for the Design and Implementation of Enterprise Information Systems
Inter-organizational information systems play a major role in improving communication and integration between partnering firms to achieve an integrated global supply chain. Current research in enterprise resource planning and electronic commerce is crucial to maintaining efficient supply chain management and organizational competitiveness....
Advanced Nutrition and Human Metabolism
Advanced Nutrition and Human Metabolism

Current, comprehensive, and designed to maximize clarity of the concepts you need to know, longtime best seller ADVANCED NUTRITION AND HUMAN METABOLISM, SIXTH EDITION delivers its signature quality content in a student-friendly presentation. This text is accessible, with relevant examples, illustrations, applications, tables, and figures to...

Leadership Growth Through Crisis: An Investigation of Leader Development During Tumultuous Circumstances (Christian Faith Perspectives in Leadership and Business)
Leadership Growth Through Crisis: An Investigation of Leader Development During Tumultuous Circumstances (Christian Faith Perspectives in Leadership and Business)
This edited collection uses a biblical lens to explore how to lead effectively and grow in a crisis situation. The chapters examine topics such as communicating through crisis, developing organizations and leaders through crisis, personal crisis and leadership development, and ethics and morality in crisis. Case studies include David's...
Virtualization with Microsoft Virtual Server 2005
Virtualization with Microsoft Virtual Server 2005
A virtual evolution in IT organizations throughout the world has begun. It is estimated that currently 3% of all servers run virtually and that number is expected to grow rapidly over the next 5 years. Server Sprawl and escalating IT costs have managers and system administrators scrambling to find ways to cut costs and reduce Total Cost of...
JDBC 3: Java Database Connectivity
JDBC 3: Java Database Connectivity

JDBC 3.0 is the latest revision of Sun’s Java Database Connectivity API. Since its introduction on the market in the mid-90s, Java has evolved from a language and environment suited for applets to a rich enterprise platform. JDBC played a determinant role in Java’s maturation. JDBC is now used as a core technology...

The First 90 Days: Critical Success Strategies for New Leaders at All Levels
The First 90 Days: Critical Success Strategies for New Leaders at All Levels
Whether challenged with taking on a startup, turning a business around, or inheriting a high-performing unit, a new leader's success or failure is determined within the first 90 days on the job.

In this hands-on guide, Michael Watkins, a noted expert on leadership transitions, offers proven strategies for moving successfully into a...

Wireless Security
Wireless Security
Get full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless...
The Encyclopedia of Demons and Demonology
The Encyclopedia of Demons and Demonology

The conflict between good and evil can be found in every culture, mythical tradition, and religion throughout history. In many cases, the source of evil has been personified as demons or devils, and in many belief systems, both are considered to be real entities operating outside the boundaries of the physical world to torment people or lead...

Why Kids Kill: Inside the Minds of School Shooters
Why Kids Kill: Inside the Minds of School Shooters

Ten years after the school massacre at Columbine High School in Colorado, school shootings are a new and alarming epidemic. While sociologists have attributed the trigger of violence to peer pressure, such as bullying and social isolation, prominent...

S-BPM ONE: Setting the Stage for Subject-Oriented Business Process Management
S-BPM ONE: Setting the Stage for Subject-Oriented Business Process Management

This book constitutes the refereed proceedings of the First Workshop on Subject-Oriented Business Process Management, S-BPM ONE 2009, held in Karlsruhe, Germany, in October 2009. The papers are organized in topical sections on visionary engagements; essential capabilities; and penetration perspectives.

This volume contains a...

unlimited object storage image
Result Page: 205 204 203 202 201 200 199 198 197 196 195 194 193 192 191 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy