|
|
|
|
|
|
Drools JBoss Rules 5.0 Developer's GuideBusiness rules can help your business by providing a level of agility and flexibility. As a developer, you will be largely responsible for implementing these business rules effectively, but implementing them systematically can often be difficult due to their complexity. Drools, or JBoss Rules, makes the process of implementing these rules quicker... | | The Tao of Network Security Monitoring : Beyond Intrusion DetectionEvery network can be compromised. There are too many systems, offering too many services, running too many flawed applications. No amount of careful coding, patch management, or access control can keep out every attacker. If prevention eventually fails, how do you prepare for the intrusions that will eventually happen?
... | | Your Body: The Missing ManualWhat, exactly, do you know about your body? Do you know how your immune system works? Or what your pancreas does? Or the myriad -- and often simple -- ways you can improve the way your body functions?
This full-color, visually rich guide answers these questions and more. Matthew MacDonald, noted author of Your Brain:... |
|
Beginning Java EE 6 with GlassFish 3, Second Edition
Java Enterprise Edition (Java EE) continues to be one of the leading Java technologies and platforms from Oracle (previously Sun). Beginning Java EE 6 Platform with GlassFish 3, Second Edition is this first tutorial book on the final (RTM) version of the Java EE 6 Platform.
Step by step and easy to follow, this book... | | Advances in Multimedia Information Processing - PCM 2005: 6th Pacific Rim Conference on Multimedia, Jeju Island, Korea, November 11-13, 2005
We are delighted to welcome readers to the proceedings of the 6th Pacific-Rim
Conference on Multimedia (PCM). The first PCM was held in Sydney, Australia, in
2000. Since then, it has been hosted successfully by Beijing, China, in 2001, Hsinchu,
Taiwan, in 2002, Singapore in 2003, and Tokyo, Japan, in 2004, and finally Jeju, one... | | Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011
These are the proceedings of TCC 2011, the 8th Theory of Cryptography Conference, which was held in Brown University, Providence, RI, during March 28–30, 2011. The conference was sponsored by the International Association for Cryptologic Research (IACR). The General Chair was Anna Lysyanskaya.
The Program Committee,... |
|
|
Result Page: 28 27 26 25 24 23 22 21 20 19 18 17 16 |