Home | Amazing | Today | Tags | Publishers | Years | Search 
Communicating Process Architectures 2005 (Concurrent Systems Engineering Series)
Communicating Process Architectures 2005 (Concurrent Systems Engineering Series)
The awareness of the ideas characterized by Communicating Processes Architecture and their adoption by industry beyond their traditional base in safety-critical systems and security is growing. The complexity of modern computing systems has become so great that no one person – maybe not even a small team – can understand all aspects and...
Engineering Wireless-Based Software Systems And Applications
Engineering Wireless-Based Software Systems And Applications
This comprehensive resource offers professionals detailed guidance on the engineering aspects of building software for wireless communications. From design and architecture to security and testing, the book shows how to overcome every engineering challenge encountered in successfully developing wireless software. Filled with open-source code...
Beginning Groovy and Grails: From Novice to Professional (Beginning from Novice to Professional)
Beginning Groovy and Grails: From Novice to Professional (Beginning from Novice to Professional)
The year 2005 was a traumatic year for the Java web application development community. It was under fire for the unnecessary “fat” architecture of Java Platform, Enterprise Edition (Java EE) systems compared to the new kids on the block like Ruby on Rails and Django. The search began for Java’s answer to these frameworks. I had an...
Alternate Data Storage Forensics
Alternate Data Storage Forensics
Digital forensics is probably the most intricate part of the cyber crime investigation process. It is often where the strongest evidence will come from. Digital forensics is the scientific acquisition, analysis, and preservation of data contained in electronic media whose information can be used as evidence in a court of law.The practice of Digital...
Intelligence and Security Informatics: Techniques and Applications (Studies in Computational Intelligence)
Intelligence and Security Informatics: Techniques and Applications (Studies in Computational Intelligence)
The book is organized in four major areas. The first unit focuses on the terrorism informatics and data mining. The second unit discusses the intelligence and crime analysis. The third unit covers access control, infrastructure protection, and privacy. The fourth unit presents surveillance and emergency response.

Readers will find the book...

IP Network Design Guide
IP Network Design Guide

This redbook identifies some of the basic design aspects of IP networks and explains how to deal with them when implementing new IP networks or redesigning existing IP networks. This project focuses on internetwork and transport layer issues such as address and name management, routing, network management, security, load...

Java in a Nutshell (The Java Series)
Java in a Nutshell (The Java Series)

The bestselling Java in a Nutshell has been updated to cover Java 1.1. If you're a Java programmer who is migrating to 1.1, this second edition contains everything you need to get up to speed on the new features of Java 1.1. Or if you are just now jumping on the Java bandwagon, Java in a Nutshell still has all of the...

Oracle Distributed Systems
Oracle Distributed Systems
Any organization that uses the Oracle relational database management system (RDBMS) these days needs to use multiple databases. There are many reasons to use more than a single database in a distributed database system:
  • Different databases may be associated with particular business functions, such as manufacturing or...
Mobile Computing Principles: Designing and Developing Mobile Applications with UML and XML
Mobile Computing Principles: Designing and Developing Mobile Applications with UML and XML
Written to address technical concerns that mobile developers face regardless of platform, this book explores the differences between mobile and stationary applications and the architectural and software development concepts needed to build mobile applications. Using UML, Reza B'far guides the developer through the development process, from design...
Architectures for E-Business Systems: Building the Foundation for Tomorrow's Success
Architectures for E-Business Systems: Building the Foundation for Tomorrow's Success
As dot.com companies grapple with rigid market conditions and we keep hearing how the big technology players are being punished on Wall Street, it becomes easy to think of the Internet as a fad. The Internet frenzy may have subsided, but interest in the Internet as a business and marketing tool is still strong. It will continue to impact...
How to Do Everything with Adobe Acrobat 7.0
How to Do Everything with Adobe Acrobat 7.0
Create and distribute PDF (Portable Document Format) files using Adobe Acrobat 7.0. This easy-to-follow guide shows you how to generate Adobe PDF files that retain the look and feel of the original documents, share PDFs, initiate and participate in PDF document reviews, and prepare PDFs for print or the Web. You’ll also learn to develop...
The Old New Thing: Practical Development Throughout the Evolution of Windows
The Old New Thing: Practical Development Throughout the Evolution of Windows
Why does Windows work the way it does? Why is Shut Down on the Start menu? (And why is there a Start button, anyway?) How can I tap into the dialog loop? Why does the GetWindowText function behave so strangely? Why are registry files called "hives"?

Many of Windows' quirks have perfectly logical explanations, rooted in...

Result Page: 351 350 349 348 347 346 345 344 343 342 341 340 339 338 337 336 335 334 333 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy