Home | Amazing | Today | Tags | Publishers | Years | Search 
GlassFish Security
GlassFish Security

Security was, is, and will be one of the most important aspects of Enterprise Applications and one of the most challenging areas for architects, developers, and administrators. It is mandatory for Java EE application developers to secure their enterprise applications using Glassfish security features.

Learn to secure Java EE...

Django 1.2 e-commerce
Django 1.2 e-commerce

Django is a high-level Python web framework that was developed by a fast-moving online-news operation to meet the stringent twin challenges of newsroom deadlines and the needs of web developers. It provides an excellent basis to build e-commerce websites because it can be deployed fast and it responds quickly to changes due to its ability to...

Pro SharePoint 2010 Solution Development: Combining .NET, SharePoint, and Office
Pro SharePoint 2010 Solution Development: Combining .NET, SharePoint, and Office

This book takes a practical problem-solution approach to common business challenges. You’ll not only encounter interesting code samples, but also see how to combine these examples with the Microsoft collaboration platform’s services. The book’s solutions focus on using Visual Studio 2008 and its built-in Office development...

Twitter Power 2.0: How to Dominate Your Market One Tweet at a Time
Twitter Power 2.0: How to Dominate Your Market One Tweet at a Time

Get the business leader's guide to using Twitter to gain competitive advantage.

Since 2006, forward-thinking companies like Apple, JetBlue, Whole Foods, and GM have discovered the instant benefits of leveraging the social media phenomenon known as Twitter to reach consumers directly, build their brand, and increase sales....

Internet Management for Nonprofits: Strategies, Tools and Trade Secrets
Internet Management for Nonprofits: Strategies, Tools and Trade Secrets

The essential guide for nonprofits wanting to manage their Internet applications in a coordinated, cost-effective, and efficient manner

The rapid onset of increasingly advanced and complex technologies has challenged nonprofits to invest with their sparse resources in attempting, and failing, to keep pace with for-profit...

CEH Certified Ethical Hacker Study Guide
CEH Certified Ethical Hacker Study Guide

Prepare for the new version of CEH certification with this advanced guide

Once you learn the thought processes of unethical hackers, you can figure out how to secure your computer systems to defend against them. That's the philosophy behind ethical hacking, and it's a growing field. Prepare for certification in this...

Software Business: First International Conference, ICSOB 2010
Software Business: First International Conference, ICSOB 2010

This book contains the refereed proceedings of the First International Conference on Software Business (ICSOB) in Jyväskylä, Finland, in June 2010. This inaugural conference brought together a strong international community from 17 countries from the Americas, Europe, India and Australia with research disciplines from various fields...

Trauma
Trauma

The most trusted, widely used guide to managing the trauma patient--now in a 2-color format with added algorithms

A Doody's Core Title ESSENTIAL PURCHASE!

4 STAR DOODY'S REVIEW
"Practitioners at any level will benefit from this work originating from major trauma programs in the
...

Standard Handbook of Machine Design
Standard Handbook of Machine Design

The definitive machine design handbook for mechanical engineers, product designers, project engineers, design engineers, and manufacturing engineers covers every aspect of machine construction and operation. The 3rd edition of the Standard Handbook of Machine Design will be redesigned to meet the challenges of a new mechanical engineering...

Silverlight Recipes: A Problem-Solution Approach, Second Edition
Silverlight Recipes: A Problem-Solution Approach, Second Edition

Silverlight Recipes: A Problem-Solution Approach, Second Edition is your practical companion to developing rich, interactive web applications with Microsoft’s latest technology. This book tackles common problems and scenarios that on-the-job developers face every day by revealing code and detailed solutions. You’ll...

Microsoft Outlook 2010 Step by Step
Microsoft Outlook 2010 Step by Step

Bill Gates’s dream of “a computer on every desktop” is becoming more and more of a reality—many people today work (and play) on computers both in the office and at home. But desktop computers are even becoming a thing of the past. Laptops, netbooks, and other portable computers, as well as Windows Mobile devices,...

Smart Things: Ubiquitous Computing User Experience Design
Smart Things: Ubiquitous Computing User Experience Design

The world of smart shoes, appliances, and phones is already here, but the practice of user experience (UX) design for ubiquitous computing is still relatively new. Design companies like IDEO and frogdesign are regularly asked to design products that unify software interaction, device design and service design -- which are all the key...

Result Page: 230 229 228 227 226 225 224 223 222 221 220 219 218 217 216 215 214 213 212 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy