|
|
Enterprise Messaging Using JMS and IBM WebSphereThe real-world guide to JMS messaging with IBM WebSphere technologiesThis book offers start-to-finish guidance for building reliable, high-performance JMS-based messaging infrastructure with IBM WebSphere technologies.IBM expert Kareem Yusuf systematically introduces the latest versions of JMS—both 1.1 and 1.02b. Once you've thoroughly... | | | | Performance by Design: Computer Capacity Planning By ExamplePractical systems modeling: planning performance, availability, security, and more
Computing systems must meet increasingly strict Quality of Service (QoS) requirements for performance, availability, security, and maintainability. To achieve these goals, designers, analysts, and capacity planners need a far more thorough understanding of... |
|
|
| | Linux(R) Quick Fix Notebook (Bruce Perens Open Source)An indispensable guide for every Linux administrator
Instant access to precise, step-by-step solutions for every essential Linux administration task
From basic configuration and troubleshooting to advanced security and optimization
If you're responsible for delivering results with Linux, Linux® Quick Fix Notebook brings... | | C++ GUI Programming with Qt 3 (Bruce Peren's Open Source)The first official Trolltech guide to Qt 3.2 programming!
Straight from Trolltech, this book covers all you need to build industrial-strength applications with Qt 3.2.x and C++--applications that run natively on Windows, Linux/Unix, Mac OS X, and embedded Linux with no source code changes! The book teaches solid Qt programming practices; it is... |
|
| | Rapid Application Development with MozillaA must-have read for anybody interested in learning to build sophisticated applications with the Mozilla application framework. —Mitchell Baker, President, The Mozilla Foundation
Mozilla has grown to become a powerful framework for building cutting-edge web applications. Rapid Application Development with...
| | J2EE Security for Servlets, EJBs, and Web ServicesJ2EE developers have an extraordinary array of powerful options for securing their Web services, Web applications, EJB components and RMI objects. Now, expert Java architect Pankaj Kumar helps developers make sense of Java's increasingly rich security APIs, tools, patterns, and best practices-showing how to use each of them in the right place,... |
|
Result Page: 54 53 52 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 |