 |
|
 Software Architecture Design Patterns in Java Partha Kuchana is an experienced enterprise systems architect. He understands that patterns are not about things that are just good ideas, but that patterns are about capturing knowledge bred from experience. This hard-won knowledge is what Partha is sharing with readers of his book. Here are some of the things I really like about what he has... |  |  Agile Software Construction This book is about exploiting as many features of the agile movement as possible to enhance our software development processes. It is about selling you the concept o fagile software development. It is about how to make your projects agile. It is about what tools you should use to become agile.
This book is about not rejecting... |  |  Implementing SSH: Strategies for Optimizing the Secure Shell Secure Shell (SSH) is a utility that can be described in many different ways. It can be described as a protocol, an encryption tool, a client/server application, or a command interface. Along with its various descriptions, SSH provides various functions with a single package. SSH’s diverse set of services and the ability to... |
|
 RF Mems Circuit Design for Wireless CommunicationsThis book examines the recent progress made in the emerging field of microelectromechanical systems (MEMS) technology in the context of its imminent insertion and deployment in radio frequency (RF) and microwave wireless applications. In particular, as the potential of RF MEMS to enable the implementation of sophisticated, yet low-power, portable... |  |  Software Project Secrets: Why Software Projects FailPreviously a mentor at Exoftware, where his role took him to a variety of organizations, David Putnam has acted as an advisor on the management of software development projects to companies in three continents. Now the manager of CentaurNet, part of Centaur Publishing, David still regularly presents papers, workshops, and tutorials on the... |  |  From Java to Ruby: Things Every Manager Should KnowAs I drove across the central Texas landscape, my excitement and anxiety were both building. I was driving to a new client that would change everything for me. This short trip would take me an hour south to a small college town, but symbolically I was beginning a much longer journey. I was going from Java to Ruby.
The past year, I had... |
|
 The Healthy PC: Preventive Care and Home Remedies for Your ComputerKeep Your PC Running Smoothly--Without Spending a Lot of Money!
Solve everyday PC problems, improve performance and speed, and protect yourself from malicious attacks with the helpful tips in this user-friendly guide. Easy-to-follow "recipes" show you, click-by-click, how to prevent computer catastrophes and recover completely... |  |  ImageMagick Tricks: Web Image Effects from the Command Line and PHPUnleash the power of ImageMagick with this fast, friendly guide. It's packed with examples of photo manipulations, logo creation, animations, and complete web projects. With this book up your sleeve, you'll be creating spellbinding images from code in no time. ImageMagick is a free software suite to create, edit, and compose bitmap images using... |  |  Network Security Technologies, Second EditionNetwork Security Technologies, Second Edition presents key security technologies from diverse fields, using a hierarchical framework that enables understanding of security components, how they relate to one another, and how they interwork. The author delivers a unique presentation of major legacy, state-of-the-art, and emerging network security... |
|
 Underwater Concreting and RepairThe construction of a wide range of structures including bridge piers, harbours, sea and river defences over many decades, and more recently the development of offshore oil fields, has required placement of concrete underwater. This process can be successfully carried out and sound, good quality concrete produced if sufficient attention is paid to... |  |  A Business Guide to Information SecurityThis book was designed, and is intended to be used, as both a digital and an analogue (that is, dual online and hardcopy) resource. The speed of evolution in computing and of the internet means that any book on information security starts going out of date fairly quickly. On top of that, there is a six- to eight-month gap between completing the... |  |  Database SystemsThe main aim of this work is to provide one readable text of essential core material for further education, higher education and commercial courses on database systems. The current volume is designed to form a consolidated, introductory text on modern database technology and the development of database systems.
It is undoubtedly true... |
|
Result Page: 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 |