Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
BEA WebLogic Workshop 8.1 Kick Start: Simplifying Java Web Applications and J2EE
BEA WebLogic Workshop 8.1 Kick Start: Simplifying Java Web Applications and J2EE

BEA WebLogic Workshop 8.1 Kick Start shows you how to make J2EE programming easier, providing the fastest path to productivity with BEA WebLogic Workshop 8.1. The authors show how Workshop leverages the power of BEA WebLogic Platform 8.1, including WebLogic Server, WebLogic Portal, and...

Real World Linux Security (2nd Edition)
Real World Linux Security (2nd Edition)

 

Stop today's most vicious Internet attackers—right in their tracks!

Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or...

JavaScript Application Cookbook
JavaScript Application Cookbook
Seasoned Java coders will find the JavaScript Application Cookbook compiled just for them. Written in the same vein as the old-style programmer "toolbox" titles, this book sheds the usual tutorial presentation and simply introduces a series of JavaScript applications you can use on your own sites.

The cookbook begins with...

eDirectory Field Guide
eDirectory Field Guide

eDirectory Field Guide is a handy reference for configuring, troubleshooting, and optimizing Novells eDirectory on NetWare, Linux, Unix, and Windows. Along with Sun ONE Directory Server and Microsoft Active Directory, Novells eDirectory is a leader in directory server software, the specialized database that enterprises employ to store...

Zen and the Art of Information Security
Zen and the Art of Information Security
While security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable...
MySpace Unraveled: What it is and how to use it safely
MySpace Unraveled: What it is and how to use it safely
Do you know what your children are up to on MySpace? MySpace Unraveled: What it is and how to use it safely discusses the booming MySpace social-networking phenomenon and shows you exactly what you need know about MySpace and how to create a safe online experience for your kids. Written by Larry Magid and Anne Collier of Family Tech...
Enabling Technologies for Mobile Services: The MobiLife Book
Enabling Technologies for Mobile Services: The MobiLife Book
This book’s emphasis is on describing a complete architectural framework, which combines theory and practice in a way that gives a realistic view of the opportunities and challenges in the applications and services area, including results from both extensive user evaluations and technical evaluations. It will cover topics in the B3G area that...
Applied Graph Theory in Computer Vision and Pattern Recognition (Studies in Computational Intelligence)
Applied Graph Theory in Computer Vision and Pattern Recognition (Studies in Computational Intelligence)
This book will serve as a foundation for a variety of useful applications of graph theory to computer vision, pattern recognition, and related areas. It covers a representative set of novel graph-theoretic methods for complex computer vision and pattern recognition tasks. The first part of the book presents the application of graph theory to...
Building XNA 2.0 Games: A Practical Guide for Independent Game Development
Building XNA 2.0 Games: A Practical Guide for Independent Game Development
Building XNA 2.0 Games: A Practical Guide for Independent Game Development is written by James Silva, who recently won the prestigious Microsoft Dream Build Play game competition with his award–winning title, The Dishwasher: Dead Samurai.

Building XNA 2.0 Games: A Practical Guide for Independent Game...

Machine Translation: Its Scope and Limits
Machine Translation: Its Scope and Limits
Machine Translation (MT) is both an engineering technology and a measure of all things to do with languages and computers—whenever a new theory of language or linguistics is offered, an important criteria for its success is whether or not it will improve machine translation.

This book presents a history of machine translation (MT) from...

The Man Who Loved Only Numbers
The Man Who Loved Only Numbers

An affectionate if impressionistic portrayal of one of the century's greatest and strangest mathematicians. Though little known among nonmathematicians, Erdos, who died in 1996 at age 83, was a legend among his colleagues. According to Hoffman (Archimedes' Revenge, 1988), the Hungarian was so devoted to mathematics that he went without...

Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets
Inside the Minds: Security Matters - Industry Leaders from eBay, Inc., Motorola, Internet Security Systems & More on Protecting Your Most Valuable Assets
Inside the Minds: Security Matters is an authoritative, insider's perspective on the ins and outs of the security industry and the future of the business, on a global scale. Featuring CEOs, Presidents, and Chief Information Security Officers, all representing some of the nation's top companies, this book provides a broad, yet comprehensive...
unlimited object storage image
Result Page: 932 931 930 929 928 927 926 925 924 923 922 921 920 919 918 917 916 915 914 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy