Home | Amazing | Today | Tags | Publishers | Years | Search 
Mastering ColdFusion MX
Mastering ColdFusion MX
This book is designed to teach you how to develop sophisticated, dynamic, and interactive websites by using ColdFusion.

ColdFusion, launched in 1995 by Allaire Corporation (now owned by Macromedia), was the first web application server available for Windows NT–based web servers. ColdFusion is now in a new version named MX, which is
...
OS X Exploits and Defense
OS X Exploits and Defense
Long believed to be a sanctuary of computer security, the Macintosh OS X operating system is increasingly under fire, making it as vulnerable to attack as Windows or Linux operating systems.

Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an
...
B2B Integration: A Practical Guide to Collaborative E-Commerce
B2B Integration: A Practical Guide to Collaborative E-Commerce
...this guide reveals the key elements of successful B2B integration and collaborative e-commercie by highlighting business needs, technologies and development strategies

Comprehensive guide reveals the key elements of successful B2B integration and collaborative e-commerce, by highlighting business needs, technologies,
...
Innovative Technologies for Information Resources Management (Premier Reference Source)
Innovative Technologies for Information Resources Management (Premier Reference Source)
As information resources management becomes increasingly dependent on emerging technologies to combat its challenges and decipher its effective strategies, the demand builds for a critical mass of research in this area.

Innovative Technologies for Information Resources Management brings together compelling content related to...

Solaris: System Administration Guide: No.7
Solaris: System Administration Guide: No.7
Covers a broad range of Solaris system administration topics such as managing user accounts and groups; managing server and client support; shutting down and booting a system; managing removable media (CDs, diskettes, and PCMCIA cards); managing software (packages and patches); managing disks and devices; managing file systems, backing up and...
Web 2.0 Heroes: Interviews with 20 Web 2.0 Influencers
Web 2.0 Heroes: Interviews with 20 Web 2.0 Influencers
If you are interested in learning about Web 2.0 and the history of its development, Web 2.0 Heroes: Interviews with 20 Web 2.0 Influencers contains all the information you need to understand Web 2.0 and its importance. Read first person accounts from industry leaders and innovators, who describe the influence and potential of Web 2.0, a...
Mechanics of User Identification and Authentication: Fundamentals of Identity Management
Mechanics of User Identification and Authentication: Fundamentals of Identity Management
User identification and authentication are essential parts of information security. Users must authenticate as they access their computer systems at work or at home every day. Yet do users understand how and why they are actually being authenticated, the security level of the authentication mechanism that they are using, and the potential impacts...
SQL Server 2008 Transact-SQL Recipes: A Problem-Solution Approach (Recipes: a Problem-Solution Approach)
SQL Server 2008 Transact-SQL Recipes: A Problem-Solution Approach (Recipes: a Problem-Solution Approach)
SQL Server 2008 Transact–SQL Recipes: A Problem–Solution Approach is an example–based guide to the Transact–SQL language that is at the core of SQL Server 2008. Learn to create databases, insert and update data, generate reports, secure your data, and more. Author Joseph Sack takes common...
IP-Traffic Theory and Performance (Signals and Communication Technology)
IP-Traffic Theory and Performance (Signals and Communication Technology)
This book presents different approaches in IP traffic theory and classifies them, especially towards applications in the Internet. It comprises the state of the art in this area, which is currently presented only by numerous research papers and overview articles.

The book provides an ideal starting point for detailed studies of traffic analysis...

Programming .NET 3.5
Programming .NET 3.5

.NET 3.5 will help you create better Windows applications, build Web Services that are more powerful, implement new Workflow projects and dramatically enhance the user's experience. But it does so with what appears to be a collection of disparate technologies. In Programming .NET 3.5, bestselling...

Component Software: Beyond Object-Oriented Programming (2nd Edition)
Component Software: Beyond Object-Oriented Programming (2nd Edition)
There has been an explosive growth in component software technologies since the first edition of this classic book was published. The advent of EJB, J2EE, CORBA 3, COM+ and the .NET framework are evidence of a maturing market in component software that goes 'beyond OOP'.

Clemens Szyperski gives us an objective survey of the component landscape,...

Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit
Mobile Agents: Basic Concepts, Mobility Models, and the Tracy Toolkit
"I think this book will be the first standard introductory book on mobile agents." José M. Vidal, University of South Carolina
Mobile agents are software nomads that act as your personal representative, working autonomously through networks. They are able to visit network nodes directly using available computing power and are
...
Result Page: 400 399 398 397 396 395 394 393 392 391 390 389 388 387 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy