|
|
|
|
| | | | Arthur: God and Hero in Avalon
For fifteen centuries, legends of King Arthur have enthralled us. Born in the misty past of a Britain under siege, half-remembered events became shrouded in ancient myth and folklore. The resulting tales were told and retold, until over time Arthur, Camelot, Avalon, the Round Table, the Holy Grail, Excalibur, Lancelot, and ... |
|
Cognitive Superiority: Information to Power
In a world of accelerating unending change, perpetual surveillance, and increasing connectivity, conflict has become ever more complex. Wars are no longer limited to the traditional military conflict domains?land, sea, air; even space and cyber space. The new battlefield will be the cognitive domain and the new conflict a larger... | | Visual C# .NET ProgrammingThe aim of this book is to teach you and other experienced programmers the most effective ways to program using the C# language in the environment it was designed for, the .NET Framework. To this end, the book offers plenty of strong opinions and pays special attention to one of .NET’s most prominent features: web services. ... | | Irresistible! Markets, Models, and Meta-Value in Consumer ElectronicsThe consumer electronics industry is entering an era of extraordinary growth. The industry’s best companies will ride that wave to unprecedented success. But, today, many CE companies are struggling with business models that are simply untenable. They must change to survive: they must change even more dramatically to win.
... |
|
The Accidental Leader: What to Do When You're Suddenly in ChargeThe Book You Need When You Are Unexpectedly Put in Charge
It could happen today. You are called into the office, and the boss tells you that due to unforeseen circumstances, starting today you will be in charge of a team, a project, an office, a committee, or a business unit. Without any warning (or preparation on your part) you’ve become... | | J2EE Security for Servlets, EJBs, and Web ServicesJ2EE developers have an extraordinary array of powerful options for securing their Web services, Web applications, EJB components and RMI objects. Now, expert Java architect Pankaj Kumar helps developers make sense of Java's increasingly rich security APIs, tools, patterns, and best practices-showing how to use each of them in the right place,... | | Open Source Development with CVSThe need for a modern source-code management strategy in the distributed open-source community is paramount. The benevolent dictatorship model of open-source maintainers is only quasi-stable, but it is far better than the other extreme: the chaos of democratic code development.
The best available compromise is the concurrent versioning system... |
|
Creating and Consuming Web Services in Visual BasicOne of the more confusing items about Web Services regards defining exactly what and why they are. Let's begin with why they exist.
Web Services exist to make it easier to integrate applications. Existing technologies include Java RMI, CORBA, and DCOM. All of these technologies work over networked environments and allow... | | | | |
|
|
Result Page: 947 946 945 944 943 942 941 940 939 938 937 936 935 934 933 932 931 930 929 |