Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
XML, Web Services, and the Data Revolution (Technology Series)
XML, Web Services, and the Data Revolution (Technology Series)

"Frank Coyle's XML,Web Services, and the Data Revolution does a great job of explaining the XML phenomenon by clearly describing where it came from, why it has proved so useful, and where it is likely to take us."—Michael Champion

XML, Web Services, and the Data Revolution presents a...

Wireless Data Technologies Reference Handbook
Wireless Data Technologies Reference Handbook
Wireless Technologies in general have been growing at a rate that out shadows the public advent of the Internet. Fueling the increased interest in Wireless Local Area Networks (WLANs) is the relative and growing ease of availability of wireless Internet access for notebook computers, handhelds, such as the Palm and iPAQ's, and the increasingly...
Play Framework Cookbook
Play Framework Cookbook

Looking at the past years of application development, as a developer you might have noticed a significant shift from desktop applications to web applications. The Web has evolved as the major platform for applications and is going to take over many facets—not only in development but also in everyday life, resulting in this shift...

Object-Oriented System Development
Object-Oriented System Development
Object-oriented (OO) programming has a growing number of converts. Many people believe that object orientation will put a dent in the software crisis. There is a glimmer of hope that OO software development will become more like engineering. Objects, whatever they are now, may become for software what nuts, bolts and beams are for construction...
OpenGL Shading Language (3rd Edition)
OpenGL Shading Language (3rd Edition)

OpenGL® Shading Language, Third Edition, extensively updated for OpenGL 3.1, is the experienced application programmer’s guide to writing shaders. Part reference, part tutorial, this book thoroughly explains the shift from fixed-functionality graphics hardware to the new era of programmable...

Handbook of Critical Information Systems Research: Theory And Application
Handbook of Critical Information Systems Research: Theory And Application
This important Handbook provides a unique overview of information systems (IS) research by focusing on the increasing interest in critical-related issues. Representing a significant step forward in the development of critical perspectives on the IS field, the Handbook draws together original contributions from leading authors who offer alternatives...
Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide
Cloud Computing and SOA Convergence in Your Enterprise: A Step-by-Step Guide

Massive, disruptive change is coming to IT as Software as a Service (SaaS), SOA, mashups, Web 2.0, and cloud computing truly come of age. Now, one of the world’s leading IT innovators explains what it all means—coherently, thoroughly, and authoritatively.

Writing for IT executives, architects, and developers
...

The Oxford Handbook of Philosophy of Physics (Oxford Handbooks)
The Oxford Handbook of Philosophy of Physics (Oxford Handbooks)

This Oxford Handbook provides an overview of many of the topics that currently engage philosophers of physics. It surveys new issues and the problems that have become a focus of attention in recent years. It also provides up-to-date discussions of the still very important problems that dominated the field in the past.

...

Introduction to Information Security: A Strategic-Based Approach
Introduction to Information Security: A Strategic-Based Approach

Most introductory texts provide a technology-based survey of methods and techniques that leaves the reader without a clear understanding of the interrelationships between methods and techniques. By providing a strategy-based introduction, the reader is given a clear understanding of how to provide overlapping defenses for critical...

Applied Cryptanalysis: Breaking Ciphers in the Real World
Applied Cryptanalysis: Breaking Ciphers in the Real World
The book is designed to be accessible to motivated IT professionals who want to learn more about the specific attacks covered. In particular, every effort has been made to keep the chapters independent, so if someone is interested in has function cryptanalysis or RSA timing attacks, they do not necessarily need to study all of the previous material...
Historical Archaeology of Gendered Lives (Contributions To Global Historical Archaeology)
Historical Archaeology of Gendered Lives (Contributions To Global Historical Archaeology)

During the last half of the nineteenth century, a number of social and economic factors converged that resulted in the rural village of Deerfield, Massachusetts becoming almost entirely female. This drastic shift in population presents a unique lens through which to study gender roles and social relations in the late nineteenth and early...

Digital Design with CPLD Applications and VHDL
Digital Design with CPLD Applications and VHDL
Ideal for a first course in digital electronics, yet comprehensive enough for use by students at the senior design project level and EET professionals, Digital Design with CPLD Applications and VHDL uses programmable logic as the primary vehicle for instructing readers in the principles of digital design. More specifically, emphasis is on Complex...
unlimited object storage image
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy