|
|
|
|
|
Oracle BAM 11gR1 Handbook
An integral component of Oracle SOA and BPM Suite, Oracle BAM Business
Activity Monitoring (BAM) ultimately empowers business executives to react
quickly to the changing business situations. BAM enables business service and
process monitoring through real-time data streaming and operational reports,
and this book helps you to... | | Geospatial Services and Applications for the InternetThe use of geospatial technologies has become ubiquitous since the leading Internet vendors delivered a number of popular map websites. Today, businesses are either migrating location-specific capabilities into their information systems, or expanding existing Geospatial Information Systems (GIS) implementation into enterprise-wide solutions.... | | |
|
Professional Pen Testing for Web Applications (Programmer to Programmer)There is no such thing as "perfect security" when it comes to keeping all systems intact and functioning properly. Good penetration (pen) testing creates a balance that allows a system to be secure while simultaneously being fully functional. With this book, you'll learn how to become an effective penetrator (i.e., a white hat or ethical... | | Java Message ServiceJava Message Service, Second Edition, is a thorough introduction to the standard API that supports "messaging" -- the software-to-software exchange of crucial data among network computers. You'll learn how JMS can help you solve many architectural challenges, such as integrating dissimilar systems and applications, increasing... | | SOA SecuritySOA is one of the latest technologies enterprises are using to tame their software costs - in development, deployment, and management. SOA makes integration easy, helping enterprises not only better utilize their existing investments in applications and infrastructure, but also open up new business opportunities. However, one of the big stumbling... |
|
Architecting Secure Software SystemsThrough the use of examples, this volume defines a myriad of security vulnerabilities and their resultant threats. It details how to do a security requirement analysis and outlines the security development lifecycle. The authors examine security architectures and threat countermeasures for UNIX, .NET, Java, mobile, and Web environments, and they... | | Getting Started with Oracle BPM Suite 11gR1 - A Hands-On Tutorial
This fully illustrated step-by-step tutorial is based on proven training content that has been highly praised by hundreds of developers in product training courses given as part of the BPM Suite 11g rollout. You will learn how to build a business process application project iteratively with each chapter introducing new technology components... | | Open Source SOAYou can build a world-class SOA infrastructure entirely using popular, and mature, open-source applications. Unfortunately, the technical documentation for most open-source projects focuses on a specific product, the big SOA picture. You're left to your own devices to figure out how to cobble together a full solution from the various bits. In... |
|
|
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |