|
|
|
|
A UML Pattern Language (Macmillan Technology Series)This book is about how to model software systems and how to use those models. It is rooted in that emerging intellectual "ecosystem" comprising the various networks (the Internet, intranets, extranets, and so on), distributed objects, piecemeal development based on short development cycles, and something called... | | Macromedia Flash MX 2004 Killer TipsThe hottest collection of cool tips and hidden secrets for the Flash MX 2004 user who needs results fast! In today's economy, time is money. Flash MX 2004 Killer Tips is all about speed, showing users how to get more work done in less time. This book is designed to increase productivity (and... | | Practical C++ Programming, Second EditionThis book is devoted to practical C++ programming. It teaches you not only the mechanics of the language, but also style and debugging. The entire life cycle of a program is discussed, including conception, design, writing, debugging, release, documentation, maintenance, and revision.
Style is emphasized.... |
|
Introduction to Computer SecurityIn this authoritative book, widely respected practitioner and teacher Matt Bishop presents a clear and useful introduction to the art and science of information security. Bishop's insights and realistic examples will help any practitioner or student understand the crucial links between security theory and the day-to-day security... | | Learning SQL on SQL Server 2005Anyone who interacts with today's modern databases needs to know SQL (Structured Query Language), the standard language for generating, manipulating, and retrieving database information. In recent years, the dramatic rise in the popularity of relational databases and multi-user databases has fueled a healthy demand for... | | Electronic Monitoring in the Workplace: Controversies and SolutionsDue to the use of new technologies, coupled with the fact that there is an increasing amount of work being done online, whether on the Internet, intranets, LANs or other networks, extensive employee monitoring by employers is inexpensive and easy. Employers have legitimate concerns about the efficiency of their employees and the quality of the... |
|
Data Compression: The Complete ReferenceGiambattista della Porta, a Renaissance scientist, was the author in 1558 of Magia Naturalis (Natural Magic), a book in which he discusses many subjects, including demonology, magnetism, and the camera obscura. The book mentions an imaginary device that has since become known as the “sympathetic telegraph.” This device was to have... | | The Rise and Decline of the StateThe state, which since the middle of the seventeenth century has been the most important and most characteristic of all moderninstitutions, is in decline. From Western Europe to Africa, either voluntarily or involuntarily, many existing states are either combining into larger communities or falling apart. Regardless of whether they fall apart or... | | Resource Management in Wireless NetworkingThis is the first book that provides readers with a deep technical overview of recent advances in resource management for wireless networks at different layers of the protocol stack. The subject is explored in various wireless networks, such as ad hoc wireless networks, 3G/4G cellular, IEEE 802.11, and Bluetooth personal area networks. ... |
|
|
|
Result Page: 874 873 872 871 870 869 868 867 866 865 864 863 862 861 860 859 858 857 856 |