 |
|
|
 |  |  P2P Networking and Applications (Morgan Kaufmann Series in Networking)Peer-to-Peer (P2P) networks enable users to directly share digital content (such as audio, video, and text files) as well as real-time data (such as telephony traffic) with other users without depending on a central server. Although originally popularized by unlicensed online music services such as Napster, P2P networking has recently emerged as a... |  |  Building the Agile Enterprise: With SOA, BPM and MBM (The MK/OMG Press)In the last ten years IT has brought fundamental changes to the way the world works. Not only has it increased the speed of operations and communications, but it has also undermined basic assumptions of traditional business models and increased the number of variables. Today, the survival of major corporations is challenged by a world-wide... |
|
 Matlab for Neuroscientists: An Introduction to Scientific Computing in MatlabMatlab is the accepted standard for scientific computing, used globally in virtually all Neuroscience and Cognitive Psychology laboratories. For instance, SPM, the most used software for the analysis and manipulation of fMRI images in research and clinical practice is fully programmed in matlab, and its use of the possibility to allow for... |  |  The Definitive Guide to Grails, Second Edition (Expert's Voice in Web Development)The rise of Ruby on Rails has signified a huge shift in how we build web applications today; it is a fantastic framework with a growing community. There is, however, space for another such framework that integrates seamlessly with Java. Thousands of companies have invested in Java, and these same companies are losing out on the benefits of a... |  |  Electroceramics: Materials, Properties, ApplicationsElectroceramics, Materials, Properties, Applications, Second Edition provides a comprehensive treatment of the many aspects of ceramics and their electrical applications. The fundamentals of how electroceramics function are carefully introduced with their properties and applications also considered. Starting from elementary principles, the... |
|
 Nokia Firewall, VPN, and IPSO Configuration GuideThe Only Book and Companion Web Site Covering Nokia's Firewall/VPN Appliances, which is the #3 security appliance worldwide.
"While Nokia is perhaps most recognized for its leadership in the mobile phone market, they have successfully demonstrated their knowledge of the Internet security appliance market and its... |  |  Mobile Malware Attacks and DefenseThe Only Book for Analyzing and Mitigating Mobile Malicious Code!
Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new... |  |  Silverlight 2 in ActionThis book delivers real-world examples and in-depth walkthroughs to help you confidently enhance your web applications using Silverlight 2.
Silverlight 2 in Action devotes extensive coverage to flexible layout components, the extensible control model, the communication framework, and the data-binding features "all cornerstones of software... |
|
Result Page: 1195 1194 1193 1192 1191 1190 1189 1188 1187 1186 1185 1184 1183 1182 1181 1180 1179 1178 1177 |