Home | Amazing | Today | Tags | Publishers | Years | Search 
Semantic Web for Business: Cases and Applications
Semantic Web for Business: Cases and Applications
"This title provides real-life cases illustrating the benefits of Semantic Web technologies as applied to e-business and e-commerce scenarios." --Book News Inc. (February 2009)

The Semantic Web has been around for some years with recent advances in mature technologies and applications. Lately, its development has been
...
Coding and Cryptology: Proceedings of the International Workshop, Wuyi Mountain, Fujian, China, 11-15 June 2007
Coding and Cryptology: Proceedings of the International Workshop, Wuyi Mountain, Fujian, China, 11-15 June 2007
The rst International Workshop on Coding and Cryptology was held in Wuyi Mountain, Fujian, China, June 11 - 15, 2007. The workshop was organised by Fujian Normal University, China and Nanyang Technological University, Singapore. We acknowledge with gratitude the nancial support from the Key Laboratory of Network Security and Cryptology, Fujian...
Pro Silverlight for the Enterprise (Books for Professionals by Professionals)
Pro Silverlight for the Enterprise (Books for Professionals by Professionals)

Microsoft Silverlight 2 is a new development platform designed to make the development of Rich Internet Applications (RIAs) far easier than has previously been possible. Pro Silverlight for the Enterprise addresses the question of how you can bring Silverlight 2 to your company to provide rich Internet experiences that will interface...

Head First Networking
Head First Networking
Frustrated with networking books so chock-full of acronyms that your brain goes into sleep mode? Head First Networking's unique, visually rich format provides a task-based approach to computer networking that makes it easy to get your brain engaged. You'll learn the concepts by tying them to on-the-job tasks, blending practice and theory...
Pro Hyper-V (Expert's Voice in Virtualization)
Pro Hyper-V (Expert's Voice in Virtualization)
Companies of all sizes worldwide are looking to virtualization to change the way data centers operate. Server consolidation, energy efficiency, simpler management, and deployment and increased capacity are all tangible benefits to be gained from a move to virtual servers and virtually hosted services. Microsoft has introduced Hyper–V, a...
Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks (Wiley Series on Communications Networking & Distributed Systems)
Inter-Asterisk Exchange (IAX): Deployment Scenarios in SIP-Enabled Networks (Wiley Series on Communications Networking & Distributed Systems)
Find out how IAX can complement SIP to overcome complications encountered in current SIP-based communications

Written by an expert in the field of telecommunications, this book describes the Inter-Asterisk Exchange protocol (IAX) and its operations, discussing the main characteristics of the protocol including NAT traversal,...

Engineering Service Oriented Systems: A Model Driven Approach
Engineering Service Oriented Systems: A Model Driven Approach
Despite pressures of economic slowdown and the e-commerce bubble burst, moving towards e-services is a compelling necessity for todays organizations. Companies that are reluctant to adopt a service oriented architecture in their IT systems will be missing out on unprecedented opportunities to create business value with relatively small IT...
Java ME on Symbian OS: Inside the Smartphone Model (Symbian Press)
Java ME on Symbian OS: Inside the Smartphone Model (Symbian Press)
In Java ME on Symbian OS, the authors expose the opportunities for application developers wishing to use Java ME on Symbian OS.

Written by a team of experts from Symbian, Nokia and Sun Microsystems Java ME on Symbian OS reveals what can be found “under-the-hood” of the world’s leading smartphone...

Database Archiving: How to Keep Lots of Data for a Very Long Time (The MK/OMG Press)
Database Archiving: How to Keep Lots of Data for a Very Long Time (The MK/OMG Press)
This book is about archiving database data. It is not a general purpose book about archiving. It is also not a book about archiving any or all kinds of data. It is about archiving data in traditional IT databases (e.g., relational databases, hierarchical databases, and structured data in computer files). Examples of source data for archiving are...
The Complete Idiot's Guide to Starting an eBay Business, 2nd Edition (Complete Idiot's Guide to...(Computer))
The Complete Idiot's Guide to Starting an eBay Business, 2nd Edition (Complete Idiot's Guide to...(Computer))
The buck starts here!

eBay® is the Internet’s premier auction site and everyone’s favorite place to shop. It’s also the place to start a business and make money from the comfort of one’s home. Completely revised, this new edition will help readers create the eBay® business they
...
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
Virtualization for Security: Including Sandboxing, Disaster Recovery, High Availability, Forensic Analysis, and Honeypotting
One of the biggest buzzwords in the IT industry for the past few years, virtualization has matured into a practical requirement for many best-practice business scenarios, becoming an invaluable tool for security professionals at companies of every size. In addition to saving time and other resources, virtualization affords unprecedented means for...
Picture Yourself Learning Corel Paint Shop Pro X2
Picture Yourself Learning Corel Paint Shop Pro X2
Harness the power of Paint Shop Pro Photo and discover all the fun and practical techniques you can use to perfect your photographs and create dynamic graphic elements. "Picture Yourself Learning Corel Paint Shop Pro Photo X2" introduces you to the tools you need to correct and enhance photographs, beginning with the basics of working...
Result Page: 365 364 363 362 361 360 359 358 357 356 355 354 353 352 351 350 349 348 347 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy