Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Secure Java: For Web Application Development
Secure Java: For Web Application Development

Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure...

Deploying OpenStack
Deploying OpenStack

This book is aimed at developers, technologists, and system administrators eager to understand and deploy cloud computing infrastructure projects based upon OpenStack software. It is intended to provide the reader with a solid understanding of the Open- Stack project goals, details of specific OpenStack software components,...

Engineering Secure Software and Systems: Third International Symposium
Engineering Secure Software and Systems: Third International Symposium

It is our pleasure to welcome you to the third edition of the International Symposium on Engineering Secure Software and Systems.

This unique event aims at bringing together researchers from software engineering and security engineering, which might help to unite and further develop the two communities in this and future...

Iris Biometric Model for Secured Network Access
Iris Biometric Model for Secured Network Access

In the last few years, biometric techniques have proven their ability to provide secure access to shared resources in various domains. Furthermore, software agents and multi-agent systems (MAS) have shown their efficiency in resolving critical network problems.

Iris Biometric Model for Secured Network Access proposes a
...

Effective Modern C++: 42 Specific Ways to Improve Your Use of C++11 and C++14
Effective Modern C++: 42 Specific Ways to Improve Your Use of C++11 and C++14

Coming to grips with C++11 and C++14 is more than a matter of familiarizing yourself with the features they introduce (e.g., auto type declarations, move semantics, lambda expressions, and concurrency support). The challenge is learning to use those features effectively—so that your software is correct, efficient,...

Big Data Application Architecture Q&A: A Problem - Solution Approach (Expert's Voice in Big Data)
Big Data Application Architecture Q&A: A Problem - Solution Approach (Expert's Voice in Big Data)

Big Data Application Architecture Pattern Recipes provides an insight into heterogeneous infrastructures, databases, and visualization and analytics tools used for realizing the architectures of big data solutions. Its problem-solution approach helps in selecting the right architecture to solve the problem at hand. In the process of...

Adobe Photoshop CS6 Digital Classroom
Adobe Photoshop CS6 Digital Classroom

A complete training package on the newest version of Photoshop! The Digital Classroom series combines a full-color book with a full-featured DVD, resulting in a complete training package written by expert instructors. Photoshop is the industry standard for image editing, and this guide gets photographers, commercial designers, web developers,...

Iterating Infusion: Clearer Views of Objects, Classes, and Systems (Expert's Voice in Development)
Iterating Infusion: Clearer Views of Objects, Classes, and Systems (Expert's Voice in Development)

Iterating Infusion: Clearer Views of Objects, Classes, and Systems is a one-of-a-kind book, not dependent on any single technology. Rather, it provides a way to integrate the most efficient techniques from a variety of programming methods, in a manner that makes designing and programming software look easy.

Iterating...

Agile Software Development Teams (Progress in IS)
Agile Software Development Teams (Progress in IS)

This book explores how agile development practices, in particular pair programming, code review and automated testing, help software development teams to perform better. Agile software engineering has become the standard software development paradigm over the last decade, and the insights provided here are taken from a large-scale survey of...

Closed-Loop Control of Blood Glucose (Lecture Notes in Control and Information Sciences)
Closed-Loop Control of Blood Glucose (Lecture Notes in Control and Information Sciences)

This book presents closed-loop blood glucose control in a simple manner, which includes the hardware and "software" components that make up the control system. It provides examples on how mathematical models are formulated as well as the control algorithms that stem from mathematical exercises. The book also describes the basic...

Building Intelligent .NET Applications: Agents, Data Mining, Rule-Based Systems, and Speech Processing
Building Intelligent .NET Applications: Agents, Data Mining, Rule-Based Systems, and Speech Processing

Artificial intelligence (AI) has been in existence almost as long as computers. However, only recently have AI techniques been widely incorporated by companies to enhance

traditional business applications.

Building Intelligent .NET Applications is...

Learning Java (The Java Series)
Learning Java (The Java Series)

This book is about the Java™ language and programming environment. If you've been at all active on the Internet in the past few years, you've heard a lot about Java. It's one of the most exciting developments in the history of the Internet, rivaling the creation of the World Wide Web. Java became the darling of the Internet programming...

unlimited object storage image
Result Page: 665 664 663 662 661 660 659 658 657 656 655 654 653 652 651 650 649 648 647 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy