|
|
|
|
JXTA: Java P2P ProgrammingJXTA: Java P2P Programming provides an invaluable introduction to this new technology, filled with useful information and practical examples. It was created by members of the JXTA community, sharing their real-world experience to introduce developers to JXTA. It starts with the fundamentals of P2P and... | | Linux Cluster Architecture (Kaleidoscope)Cluster computers provide a low-cost alternative to multiprocessor systems for many applications. Building a cluster computer is within the reach of any computer user with solid C programming skills and a knowledge of operating systems, hardware, and networking. This book leads you through the design and assembly of such a system, and shows you how... | | Sams Teach Yourself Macromedia Flash MX in 24 HoursSince its introduction in 1996, Macromedia Flash has become the standard for delivering high impact, vector-based graphics to the Web. Flash is deceptively simple at first, yet has great depth and flexibility.Sams Teach Yourself Macromedia Flash 5 in 24 Hours offers a clearly written, well-organized introduction to this powerful product, and gives... |
|
The XML Schema Complete ReferenceWith the successful implementation of XML Schema, developers are learning how to increase productivity, improve software reliability, minimize development time, and decrease time to market. This in-depth reference is an all-in-one resource designed to help developers leverage the power and potential of XML schemas by offering a complete... | | Maximum Apache Security (Maximum Security)The Maximum Security series, which debuted in 1997, has thus far enjoyed relative success. I use the term “relative success,” because security title sales have historically trickled, rather than gushed. For altering this and fostering a new market, Sams editors deserve kudos. Their insights have proven providential: Today, Maximum... | | Maximum Mac OS X SecurityWhile Mac OS X is becoming more and more stable with each release, its UNIX/BSD underpinnings have security implications that ordinary Mac users have never before been faced with. Mac OS X can be used as both a powerful Internet server, or, in the wrong hands, a very powerful attack launch point.
Yet most Mac OS X books are generally... |
|
Result Page: Previous 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 Next |