Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Developing Web Services with Apache Axis
Developing Web Services with Apache Axis
If you'd like to learn how to create web services (in particular, using Apache Axis) and make some sense of various standards like SOAP, WSDL, JAX-RPC, SOAP with attachments, WS-Security, XML Encryption and XML Signature, then this book is for you. It has a tutorial style that walks you through in a step-by-step manner to create working code. The...
The Primal Kitchen Cookbook: Eat Like Your Life Depends On It!
The Primal Kitchen Cookbook: Eat Like Your Life Depends On It!

Mark Sisson, bestselling author, award-winning blogger, and founder of PRIMAL KITCHEN, teams up with over 50 leading icons in the primal community to amass 130 mouth-watering recipes in this ultimate paleo recipe collection.

Learn how to whip up Primal Kitchen’s uncompromisingly delicious, high quality, nutrient dense sauces...

Cisco Secure Intrusion Detection System
Cisco Secure Intrusion Detection System

Organizations continue to deploy firewalls as their central gatekeepers to prevent unauthorized users from entering their networks. However, network security is in many ways similar to physical security in that no one technology serves all needs-rather, a layered defense provides the best results. Organizations are increasingly looking to...

Advances in Biometrics: Third International Conferences, ICB 2009, Alghero, Italy, June 2-5, 2009, Proceedings
Advances in Biometrics: Third International Conferences, ICB 2009, Alghero, Italy, June 2-5, 2009, Proceedings

It is a pleasure and an honour both to organize ICB 2009, the 3rd IAPR/IEEE International Conference on Biometrics. This will be held 2–5 June in Alghero, Italy, hosted by the Computer Vision Laboratory, University of Sassari. The conference series is the premier forum for presenting research in biometrics and its allied technologies:...

xUnit Test Patterns: Refactoring Test Code (The Addison-Wesley Signature Series)
xUnit Test Patterns: Refactoring Test Code (The Addison-Wesley Signature Series)
Automated testing is a cornerstone of agile development. An effective testing strategy will deliver new functionality more aggressively, accelerate user feedback, and improve quality. However, for many developers, creating effective automated tests is a unique and unfamiliar challenge.

xUnit Test Patterns is the...

Your Best Just Got Better: Work Smarter, Think Bigger, Make More
Your Best Just Got Better: Work Smarter, Think Bigger, Make More

Imagine if your best just got better every single day

In Your Best Just Got Better, productivity expert Jason Womack teaches readers that working longer hours doesn't make up for a flawed approach to productivity and performance. Workers need to clarify their habits, build mindset-based strategies, and be...

Implementing Lean Software Development: From Concept to Cash (The Addison-Wesley Signature Series)
Implementing Lean Software Development: From Concept to Cash (The Addison-Wesley Signature Series)
In 2003, Mary and Tom Poppendieck's Lean Software Development introduced breakthrough development techniques that leverage Lean principles to deliver unprecedented agility and value. Now their widely anticipated sequel and companion guide shows exactly how to implement Lean software development, hands-on.

This new book draws on the...

Hackers Beware: The Ultimate Guide to Network Security
Hackers Beware: The Ultimate Guide to Network Security

Hackers Beware starts with a roadmap of the various areas of hacking but quickly delves into the details of how specific attacks work and how to protect against them. Since most attacks we hear about either occur or are perceived to come from hackers, people are very interested "in how they do that" - the techniques hackers use to...

Biometrics: Identity Verification in a Networked World
Biometrics: Identity Verification in a Networked World

An in-depth look at biometrics, focused on critical issues such as accuracy, privacy, technology capabilities, and cost-effective deployment

No longer a science fiction solution, biometric technologies are being deployed by thousands of companies and public agencies to increase security, protect personal information, and reduce...

Java 9 for Programmers (4th Edition) (Deitel Developer Series)
Java 9 for Programmers (4th Edition) (Deitel Developer Series)

The professional programmer’s Deitel® guide to Java® 9 and the powerful Java platform

 

Written for programmers with a background in another high-level language, this book applies the...

C: How to Program, 7th Edition
C: How to Program, 7th Edition

For introductory courses in C Programming. Also for courses in Programming for Engineers, Programming for Business, and Programming for Technology.

The Deitels' How to Program series offers unparalleled breadth and depth of object-oriented programming concepts and intermediate-level topics for further study. Using the...

Expert Oracle, Signature Edition Programming Techniques and Solutions for Oracle 7.3 through 8.1.7
Expert Oracle, Signature Edition Programming Techniques and Solutions for Oracle 7.3 through 8.1.7

This special signature edition includes a CD that contains a searchable PDF version of the book and a sample chapter from the forthcoming 10g edition which will be released in fall 2005.

This remains the defining book on the older 8i Oracle database if you are a developer or DBA who works with Oracle-driven database...

unlimited object storage image
Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy