|
|
Sams Teach Yourself Photoshop Elements 2 in 24 HoursPhotoshop Elements is a more accessible version of Adobe's flagship product, Photoshop. Elements is geared to business users, students, and home users who nonetheless want professional-looking images for their print and Web projects. Topics covered in the book include capturing and editing photos from traditional or digital cameras, correcting... | | Sams Teach Yourself BEA WebLogic Server 7.0 in 21 Days"If you're going to run enterprise Java applications in an n-tier architecture, you're going to need an applications server." -Java Pro Magazine, Fall 2001.
An application server is a crucial component of any serious J2EE application. BEA's WebLogic Server (WLS) is the leading product (34% per BEA), incorporating standard... | | JAX: Java APIs for XML Kick StartJAX: Java APIs for XML Kick Start covers the JAX APIs - fundamental for development of Java-based Web service applications as well as other e-Commerce applications requiring the exchange and manipulation of data. The book includes an overview of Web service fundamentals including SOAP, UDDI, and WSDL, all of which will be built upon in... |
|
|
|
Data Structures and Algorithms in Java (2nd Edition)Data Structures and Algorithms in Java, Second Edition is designed to be easy to read and understand although the topic itself is complicated. Algorithms are the procedures that software programs use to manipulate data structures. Besides clear and simple example programs, the author includes a workshop as a small demonstration program executable... | | HTTP Developer's Handbook (Developer's Library)HTTP is the protocol that powers the Web. As Web applications become more sophisticated, and as emerging technologies continue to rely heavily on HTTP, understanding this protocol is becoming more and more essential for professional Web developers. By learning HTTP protocol, Web developers gain a deeper understanding of the Web's architecture and... | | Maximum Security, Fourth EditionMaximum Security, Fourth Edition provides updated, comprehensive, platform-by-platform coverage of security issues, and includes clear, to the point descriptions of the most common techniques hackers use to penetrate systems. This book provides information for security administrators and others interested in... |
|
Result Page: Previous 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 Next |