Home | Amazing | Today | Tags | Publishers | Years | Search 
Making Use of JSP
Making Use of JSP
Quickly learn how to create dynamic Web content with this step-by-step guide to using JSP technology

Web developers and designers are bringing new life to the Web by using JavaServer Pages (JSP) to create and maintain dynamic content that leverages existing business systems. This powerful technology lets you change the overall
...
Data Structures and Algorithms in Java
Data Structures and Algorithms in Java
Fundamental data structures in a consistent object-oriented framework

Now revised to reflect the innovations of Java 5.0, Goodrich and Tamassia’s Fourth Edition of Data Structures and Algorithms in Java continues to offer accessible coverage of fundamental data structures, using a consistent...

M Commerce: Technologies, Services, and Business Models
M Commerce: Technologies, Services, and Business Models
Presenting the first book ever to provide a complete introduction to m-Commerce!

Mobile Commerce, or m-Commerce, is part of an explosion of new usage scenarios that overcome the limitations of mobile devices in support of highly personalized and time-critical activities for consumers and enterprises alike. With tens of millions
...
Grid Computing for Bioinformatics and Computational Biology (Wiley Series in Bioinformatics)
Grid Computing for Bioinformatics and Computational Biology (Wiley Series in Bioinformatics)
The only single, up-to-date source for Grid issues in bioinformatics and biology

Bioinformatics is fast emerging as an important discipline for academic research and industrial applications, creating a need for the use of Grid computing techniques for large-scale distributed applications. This book successfully presents Grid algorithms and...

IT Compliance and Controls: Best Practices for Implementation
IT Compliance and Controls: Best Practices for Implementation
Praise for IT Compliance and Controls

"James DeLuccia outlines a comprehensive, integrated strategy for achieving regulatory and legislative compliance. This approach is vastly superior, both in scalability and in sustainability, to the siloed compliance strategies that are often seen."
—Dr. Richard Reiner, founder,
...

Internet Based Workflow Management: Towards a Semantic Web
Internet Based Workflow Management: Towards a Semantic Web
Today, an ever-expanding set of human activities, ranging from business processes to healthcare to education and research, is dependent upon the Internet. Most processes involve a workflow, the coordinated execution of multiple activities. In a given application, once the key stages of the workflow have been isolated, an infrastructure to...
Mac OS X Leopard Bible
Mac OS X Leopard Bible
Get up to speed on Mac OS X Leopard with this in-depth guide

The beauty of Leopard is that there is so much more than meets the eye, including over 300 new enhancements and its ability to run on both Intel PCs and PowerPC Macs. This comprehensive reference is your best guide on how to tame this powerful new cat. You'll find...

Java the UML Way
Java the UML Way
This textbook was designed for higher education in technological fields where Java and object-orientation form the basis of programming education. This book covers both basic and more advanced programming.

The book assumes a general familiarity with computers, operating systems, and the most common tools (such as, for example, word
...
Operating Systems Concepts with Java
Operating Systems Concepts with Java
An operating system is a program that acts as an intermediary between the user of a computer and the computer hardware. The purpose of an operating system is to provide an environment in which a user can execute programs in a convenient and efficient manner.

Understanding the evolution of operating systems gives us an appreciation for
...
Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control
Implementing NAP and NAC Security Technologies: The Complete Guide to Network Access Control
Prevent hacker exploits with this comprehensive implementation guide

You're ready to see through the misconceptions and misinformation about NAP/NAC that might come your way. Here is an excellent resource for uncovering the actual vulnerabilities and exploits that the various NAP/NAC types can address. You'll find...

Architecture-Independent Programming for Wireless Sensor Networks (Wiley Series on Parallel and Distributed Computing)
Architecture-Independent Programming for Wireless Sensor Networks (Wiley Series on Parallel and Distributed Computing)
New automated, application-independent methodology for designing and deploying sensor networks

Following this book's clear explanations, examples, and illustrations, domain experts can design and deploy nontrivial networked sensing applications without much knowledge of the low-level networking aspects of deployment. This new approach is based...

Atmospheric Chemistry and Physics: From Air Pollution to Climate Change
Atmospheric Chemistry and Physics: From Air Pollution to Climate Change
The only single-source reference available on atmospheric chemistry, aerosols, and atmospheric models

This fully revised and expanded version of John H. Seinfeld's successful Atmospheric Chemistry and Physics of Air Pollution provides a rigorous, comprehensive treatment of the chemistry of the atmosphere. With new chapters on such important...

Result Page: 230 229 228 227 226 225 224 223 222 221 220 219 218 217 216 215 214 213 212 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy