Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Java Message Service
Java Message Service

Java Message Service, Second Edition, is a thorough introduction to the standard API that supports "messaging" -- the software-to-software exchange of crucial data among network computers. You'll learn how JMS can help you solve many architectural challenges, such as integrating dissimilar systems and applications, increasing...

SELinux System Administration
SELinux System Administration

NSA Security-Enhanced Linux (SELinux) is a set of patches and added utilities to the Linux kernel to incorporate a strong, flexible, mandatory access control architecture into the major subsystems of the kernel. With its fine-grained yet flexible approach, it is no wonder Linux distributions are firing up SELinux as a default security...

Supply Chain Collaboration: Roles of Interorganizational Systems, Trust, and Collaborative Culture
Supply Chain Collaboration: Roles of Interorganizational Systems, Trust, and Collaborative Culture

To survive and thrive in the competition, firms have strived to achieve greater supply chain collaboration to leverage the resources and knowledge of suppliers and customers.  Internet based technologies, particularly interorganizational systems, further extend the firms’ opportunities to strengthen their supply chain partnerships...

Mast Cells: Methods and Protocols (Methods in Molecular Biology)
Mast Cells: Methods and Protocols (Methods in Molecular Biology)

A cutting-edge collection of readily reproducible techniques for the isolation, culture, and study of activation and signaling in human mast cells. These methods take advantage of the latest advances in molecular biology, technology, and information science. They include methods for the identification of mast cells, the development of mast...

Coming Full Circle: The Seneca Nation of Indians, 1848–1934 (Volume 17) (New Directions in Native American Studies Series)
Coming Full Circle: The Seneca Nation of Indians, 1848–1934 (Volume 17) (New Directions in Native American Studies Series)
The disastrous Buffalo Creek Treaty of 1838 called for the Senecas’ removal to Kansas (then part of the Indian Territory). From this low point, the Seneca Nation of Indians, which today occupies three reservations in western New York, sought to rebound. Beginning with events leading to the Seneca Revolution in 1848, which...
Cooperative Control of Nonlinear Networked Systems: Infinite-time and Finite-time Design Methods (Communications and Control Engineering)
Cooperative Control of Nonlinear Networked Systems: Infinite-time and Finite-time Design Methods (Communications and Control Engineering)

Cooperative Control of Nonlinear Networked Systems is concerned with the distributed cooperative control of multiple networked nonlinear systems in the presence of unknown non-parametric uncertainties and non-vanishing disturbances under certain communication conditions. It covers stability analysis tools and...

Agility Across Time and Space: Implementing Agile Methods in Global Software Projects
Agility Across Time and Space: Implementing Agile Methods in Global Software Projects

Rather than deciding whether or not to get involved in global sourcing, many companies are facing decisions about whether or not to apply agile methods in their distributed projects. These companies are often motivated by the opportunities to solve the coordination and communication difficulties associated with global software development....

Codes, Ciphers and Secret Writing (Test Your Code Breaking Skills)
Codes, Ciphers and Secret Writing (Test Your Code Breaking Skills)
Experiment with cryptography — the science of secret writing. Cipher and decipher codes: transposition and polyalphabetical ciphers, famous codes, typewriter and telephone codes, codes that use playing cards, knots, and swizzle sticks...even invisible writing and sending messages through outer space. Hours of intrigue and challenge. 45...
Filming the Fantastic:  A Guide to Visual Effects Cinematography
Filming the Fantastic: A Guide to Visual Effects Cinematography
Reveals industry secrets for producing professional special effects!

Don't waste valuable time and budget fixing your footage in post! Shoot the effects you want effectively and creatively the first time.

This full-color step-by step guide to visual effects cinematography empowers you to plan out and execute
...
Google on the Go: Using an Android-Powered Mobile Phone
Google on the Go: Using an Android-Powered Mobile Phone
Google on the Go

 

THE EASY, FUN, PRACTICAL GUIDE TO GOOGLE ANDROID PHONES!

So you’ve got one of those hot new Android-powered phones? Awesome! Now, get the most out of it with Google on the Go! This friendly, easy book shows exactly how...

Role-Based Access Control
Role-Based Access Control

Role-based access control (RBAC) is a technology that is attracting a great deal of attention, particularly for commercial applications, because of its potential for reducing the complexity and cost of security administration in large networked applications. Under RBAC, security administration is greatly simplified by using roles,...

Pro Exchange 2013 SP1 PowerShell Administration: For Exchange On-Premises and Office 365
Pro Exchange 2013 SP1 PowerShell Administration: For Exchange On-Premises and Office 365

Pro Exchange 2013 SP1 PowerShell Administration is your one-stop resource for both basic and advanced administration of Exchange Server 2013 Service Pack 1 and Exchange Online, Microsoft's best-selling hosted Exchange service.

The industry shift that is currently happening toward ‘the cloud’ is not just...

unlimited object storage image
Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy