Home | Amazing | Today | Tags | Publishers | Years | Search 
Java Development with Ant
Java Development with Ant
This book is about Ant, the award-winning Java build tool. Ant has become the centerpiece of so many projects’ build processes because it is easy to use, is platform independent, and addresses the needs of today’s projects to automate testing and deployment. From its beginnings as a helper application to compile Tomcat, Sun’s (now...
Network Control and Engineering for QOS, Security and Mobility, III
Network Control and Engineering for QOS, Security and Mobility, III
This volume contains the proceedings of the Third International Conference on Network Control and Engineering for Quality of Service, Security and Mobility (Net-Con’2004), celebrated in Palma de Mallorca (Illes Balears, Spain) during November 2-5, 2004. This IFIP TC6 Conference was organized by the Universitat de les Illes Balears and...
Software Project Secrets: Why Software Projects Fail
Software Project Secrets: Why Software Projects Fail
Previously a mentor at Exoftware, where his role took him to a variety of organizations, David Putnam has acted as an advisor on the management of software development projects to companies in three continents. Now the manager of CentaurNet, part of Centaur Publishing, David still regularly presents papers, workshops, and tutorials on the...
Pro SQL Server 2005 Database Design and Optimization
Pro SQL Server 2005 Database Design and Optimization

Pro SQL Server 2005 Database Design and Optimization will teach you effective strategies for designing proper databases. It covers everything from how to gather business requirements to logical data modeling and normalization. It then shows you how to implement your design on SQL Server 2005.

The authors also describe how to...

Multimedia Messaging Service: An Engineering Approach to MMS
Multimedia Messaging Service: An Engineering Approach to MMS
The Multimedia Messaging Service (MMS) is regarded as the best-of-the breed of proven messaging technologies, surpassing SMS and electronic mail to offer a truly multimedia experience to mobile users. The first commercial solutions appeared on the market in 2002 and the penetration rate of MMS is now quickly approaching the required level for...
Sams Teach Yourself J2EE in 21 Days
Sams Teach Yourself J2EE in 21 Days

J2EE has become required knowledge for any serious Java developer, but learning this large and complex specification requires a substantial investment of time and energy. Sams Teach Yourself J2EE in 21 Days presents the enterprise Java architecture in accessible, easy-to-comprehend lessons, describing how each J2EE tool solves the challenges of...

Fuzzy Databases: Modeling, Design And Implementation
Fuzzy Databases: Modeling, Design And Implementation
Fuzzy Databases: Modeling, Design and Implementation focuses on some semantic aspects which have not been studied in previous works and extends the EER model with fuzzy capabilities. The exposed model is called FuzzyEER model, and some of the studied extensions are: fuzzy attributes, fuzzy aggregations and different aspects on specializations, such...
PHP Game Programming
PHP Game Programming
"PHP Game Programming" offers you the introduction you need to begin creating your own online games. You?ll be amazed at the games you can create with this powerful?and completely free?development tool! Dive right in as you begin with coverage of server configuration and the major features of PHP. Then you?re off and running as you use...
Advanced Animation with DirectX
Advanced Animation with DirectX
Welcome to Advanced Animation with DirectX® ! This book is your guide to getting past the basics of DirectX graphics and into the bigger world of advanced animation! Take the information you already know and learn how to expand it into a vast array of various eyepopping graphical effects.

Keep
...
Incident Response: Computer Forensics Toolkit
Incident Response: Computer Forensics Toolkit
Your in-depth guide to detecting network breaches, uncovering evidence, and preventing future attacks

Whether it’s from malicious code sent through an e-mail or an unauthorized user accessing company files, your network is vulnerable to attack. Your response to such incidents is critical. With this comprehensive guide, Douglas Schweitzer...

Nature's Keepers: The Remarkable Story of How the Nature Conservancy Became the Largest Environmental Group in the World
Nature's Keepers: The Remarkable Story of How the Nature Conservancy Became the Largest Environmental Group in the World
Learn the Management and Leadership Lessons of the World's Largest Environmental Organization

"Nature's Keepers is a remarkable book about a remarkable organization—and a ripping yarn about groups and people who make a difference against all odds. Beyond that, it is a matchless tale of a half-century of organizational growth and...

Microsoft Visual Studio 2005 Unleashed
Microsoft Visual Studio 2005 Unleashed

Microsoft Visual Studio 2005 Unleashed is a deep dive into the Visual Studio 2005 tool. Specifically, it will provide you with solid guidance and education that will allow you to squeeze the ultimate productivity and use out of the Visual Studio 2005 development environment. This...

Result Page: 203 202 201 200 199 198 197 196 195 194 193 192 191 190 189 188 187 186 185 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy