|
|
|
|
Learning Network Programming with Java
Key Features
-
Learn to deliver superior server-to-server communication through the networking channels
-
Gain expertise of the networking features of your own applications to support various network architectures such as client/server and peer-to-peer
-
Explore the issues that impact scalability,
... | | CCNA Exam Certification Guide (CCNA Exam 640-407)CCNA Exam Certification Guide is a comprehensive study tool for CCNA Exam #640-407. Written by a CCIE and Certified Cisco Systems Instructor and reviewed by Cisco technical experts, CCNA Exam Certification Guide helps you understand and master the exam objectives. Section-by-section objective lists keep you focused on the material... | | |
|
|
JDBC 3: Java Database ConnectivityJDBC 3.0 is the latest revision of Sun’s Java Database Connectivity API. Since its introduction on the market in the mid-90s, Java has evolved from a language and environment suited for applets to a rich enterprise platform. JDBC played a determinant role in Java’s maturation. JDBC is now used as a core technology... | | The First 90 Days: Critical Success Strategies for New Leaders at All LevelsWhether challenged with taking on a startup, turning a business around, or inheriting a high-performing unit, a new leader's success or failure is determined within the first 90 days on the job.
In this hands-on guide, Michael Watkins, a noted expert on leadership transitions, offers proven strategies for moving successfully into a... | | Wireless SecurityGet full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless... |
|
The Encyclopedia of Demons and DemonologyThe conflict between good and evil can be found in every culture, mythical tradition, and religion throughout history. In many cases, the source of evil has been personified as demons or devils, and in many belief systems, both are considered to be real entities operating outside the boundaries of the physical world to torment people or lead... | | Why Kids Kill: Inside the Minds of School Shooters
Ten years after the school massacre at Columbine High School in Colorado, school shootings are a new and alarming epidemic. While sociologists have attributed the trigger of violence to peer pressure, such as bullying and social isolation, prominent... | | S-BPM ONE: Setting the Stage for Subject-Oriented Business Process Management
This book constitutes the refereed proceedings of the First Workshop on Subject-Oriented Business Process Management, S-BPM ONE 2009, held in Karlsruhe, Germany, in October 2009. The papers are organized in topical sections on visionary engagements; essential capabilities; and penetration perspectives.
This volume contains a... |
|
|
Result Page: 205 204 203 202 201 200 199 198 197 196 195 194 193 192 191 |