Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Refactoring to Patterns (The Addison-Wesley Signature Series)
Refactoring to Patterns (The Addison-Wesley Signature Series)

In 1994, Design Patterns changed the landscape of object-oriented development by introducing classic solutions to recurring design problems. In 1999, Refactoring revolutionized design by introducing an effective process for improving code. With the highly anticipated Refactoring to Patterns, Joshua...

Ethics of Big Data: Balancing Risk and Innovation
Ethics of Big Data: Balancing Risk and Innovation

What are your organization’s policies for generating and using huge datasets full of personal information? This book examines ethical questions raised by the big data phenomenon, and explains why enterprises need to reconsider business decisions concerning privacy and identity. Authors Kord Davis and Doug Patterson provide...

Digital Image Forensics: There is More to a Picture than Meets the Eye
Digital Image Forensics: There is More to a Picture than Meets the Eye

Photographic imagery has come a long way from the pinhole cameras of the nineteenth century. Digital imagery, and its applications, develops in tandem with contemporary society’s sophisticated literacy of this subtle medium. This book examines the ways in which digital images have become ever more ubiquitous as legal and medical...

Supply Chain Imperative, The: How to Ensure Ethical Behavior in Your Global Suppliers
Supply Chain Imperative, The: How to Ensure Ethical Behavior in Your Global Suppliers

Like many companies in all industries, yours is making an admirable new commitment to higher ethical standards. You’ve worked hard to build or restore your reputation and the trust of your stakeholders. But all your best efforts may be undermined if the many links in your supply chain do not follow suit.

The Supply Chain...

Pro NuGet (Professional Apress)
Pro NuGet (Professional Apress)

NuGet is a free, open source, package management tool for the .NET platform. It is developed by Microsoft and has been contributed to the ASP.NET Gallery on Outercurve Foundation, formerly known as the Codeplex Foundation. It also ships as part of the ASP.NET MVC 3 tooling. NuGet enables .NET developers to easily find packages, including any...

Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges
Peer-to-Peer Computing: Applications, Architecture, Protocols, and Challenges
Peer-to-peer computing, at least on a conceptual level, is a genuine paradigm shift—intelligence is at the edge, computing is completely decentralized, and the network is just there to knit the distributed intelligence together. Indeed, with advancements in hardware technology, proliferation of the open source development...
PGP & GPG: Email for the Practical Paranoid
PGP & GPG: Email for the Practical Paranoid
"...The World's first user-friendly book on email privacy...unless you're a cryptographer, or never use email, you should read this book." —Len Sassaman, CodeCon Founder

"Today, most email is sent like a postcard. We all should want to put our mail back into secure envelopes again. PGP and GPG are two of the leading tools...

Managed Code Rootkits: Hooking into Runtime Environments
Managed Code Rootkits: Hooking into Runtime Environments

We live in a world in which we can’t trust our computers. For example, how can we know for sure that our hardware manufacturer did not hide malicious code in the system’s microchip? Or that our freshly installed operating system does not contain backdoors created by a rogue developer from the OS development team?

...

Access Control Systems: Security, Identity Management and Trust Models
Access Control Systems: Security, Identity Management and Trust Models
Secure identification of users, programming agents, hosts, and networking devices is considered the core element of computing security. Rarely is anonymity a desired goal of systems, networks, and applications. This aspect is dictated largely by the extent in which computing has evolved to automate many facets of critical human activities, such as...
Oracle 12c: SQL
Oracle 12c: SQL

Now you can master the latest version of the fundamental SQL language used in all relational databases today with ORACLE 12C: SQL, 3E. Much more than a study guide, this edition helps you transform a basic knowledge of databases into proficiency with the latest SQL and Oracle concepts and techniques. You learn to use Oracle 12c SQL most...

The Transparency Edge: How Credibility Can Make or Break You in Business
The Transparency Edge: How Credibility Can Make or Break You in Business

In The Transparency Edge, leadership expert Barbara Pagano demonstrates that a clear and open business policy is a powerful management tool. Backed by exclusive research of thousands of executives at Fortune 500 companies, this comprehensive guide to what-you-see-is-what-you-get leadership shows you how to practice a transparent...

Developing Java Web Services: Architecting and Developing Secure Web Services Using Java
Developing Java Web Services: Architecting and Developing Secure Web Services Using Java
"I commend this book to you as your springboard to the future of how to make the Net work."
-from the Foreword by Simon Phipps, Chief Technology Evangelist, Sun Microsystems, Inc.

This hands-on developer's guide to Web services prepares you for the next level of distributed computing. The authors clearly show
...
Result Page: 32 31 30 29 28 27 26 25 24 23 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy