Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hands-On Software Engineering with Python: Move beyond basic programming and construct reliable and efficient software with complex code
Hands-On Software Engineering with Python: Move beyond basic programming and construct reliable and efficient software with complex code

Explore various verticals in software engineering through high-end systems using Python

Key Features

  • Master the tools and techniques used in software engineering
  • Evaluates available database options and selects one for the final Central Office system-components
  • ...
XML, Web Services, and the Data Revolution (Technology Series)
XML, Web Services, and the Data Revolution (Technology Series)

"Frank Coyle's XML,Web Services, and the Data Revolution does a great job of explaining the XML phenomenon by clearly describing where it came from, why it has proved so useful, and where it is likely to take us."—Michael Champion

XML, Web Services, and the Data Revolution presents a...

Computer Networking: A Top-Down Approach Featuring the Internet
Computer Networking: A Top-Down Approach Featuring the Internet
The most up-to-date introduction to the field of computer networking, this book's top-down approach starts at the application layer and works down the protocol stack. It also uses the Internet as the main example of networks. This all creates a book relevant to those interested in networking today. By starting at the application-layer and...
Security Engineering: A Guide to Building Dependable Distributed Systems
Security Engineering: A Guide to Building Dependable Distributed Systems

For generations, people have defined and protected their property and their privacy using locks, fences, signatures, seals, account books, and meters. These have been supported by a host of social constructs ranging from international treaties through national laws to manners and customs.

This is changing, and quickly. Most records...

Beginning ASP.NET 1.1 E-Commerce: From Novice to Professional
Beginning ASP.NET 1.1 E-Commerce: From Novice to Professional
WELCOME TO BeginningASRNET 1.1 E-Commerce!The explosive growth ofretail over the Internet is encouraging more small- to medium-sized businesses to consider the benefits of setting up e-commerce web sites. While there are great and obvious advantages to trading online, there are also many hidden pitfalls that may be encountered...
Understanding PKI: Concepts, Standards, and Deployment Considerations, Second Edition
Understanding PKI: Concepts, Standards, and Deployment Considerations, Second Edition
PKI (public-key infrastructure) enables the secure exchange of data over otherwise unsecured media, such as the Internet. PKI is the underlying cryptographic security mechanism for digital certificates and certificate directories, which are used to authenticate a message sender. Because PKI is the standard for authenticating commercial electronic...
Spring Python 1.1
Spring Python 1.1

Spring Python captures the concepts of the Spring Framework and Spring Security and brings them to the world of Python and provides many functional parts to assemble applications. Spring Python is all about using the many useful features of Spring to the fullest and making these features available when working with Python.

Get to...

Clojure Web Development Essentials
Clojure Web Development Essentials

Develop your own web application with the effective use of the Clojure programming language

About This Book

  • Use Clojure to create robust, ready-to-be deployed web applications
  • Get to grips with Clojure through successive implementation of applications using new features
  • ...
COM+ Programming: A Practical Guide Using Visual C++ and ATL
COM+ Programming: A Practical Guide Using Visual C++ and ATL

Maximizing COM/COM+ reuse and scalability: practical, enterprise-class solutions!

If you’re ready to develop COM/COM+ enterprise applications, start with this practical, solutions-focused guide! Using case studies and real-world code examples, Hewlett-Packard COM/COM+ expert Pradeep Tapadiya presents COM and COM+ in detail,...

Intrusion Detection and Prevention
Intrusion Detection and Prevention

In today’s converged networking environment, cyber crime is on the rise and getting more sophisticated every day. Malicious hackers lurk in dark corners, scanning for vulnerable systems and launching debilitating attacks. Intrusion Detection & Prevention shows you, step-by-step, how to mount a comprehensive defense,...

Transactions on Data Hiding and Multimedia Security VI
Transactions on Data Hiding and Multimedia Security VI
This issue consists mainly of a Special Section on “Content Protection and Forensics” with four papers edited by Sabu Emmanuel, Mohan S. Kankanhalli, Shih-Fu Chang, Regunathan Radhakrishnan, Fulong Ma and Li Zhao. For a detailed introduction of these four papers, please refer to the Preface written by the organizers...
Java Persistence with Hibernate
Java Persistence with Hibernate

Summary

Java Persistence with Hibernate, Second Edition explores Hibernate by developing an application that ties together hundreds of individual examples. In this revised edition, authors Christian Bauer, Gavin King, and Gary Gregory cover Hibernate 5 in detail with the Java Persistence 2.1 standard (JSR...

unlimited object storage image
Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy