Home | Amazing | Today | Tags | Publishers | Years | Search 
Mastering Web Services Security
Mastering Web Services Security
Quickly learn how to build a secure Web services system using available programming tools, models, and specifications

Web services promise to simplify business programming and to improve interoperability, but they won’t deliver on these promises without effective security. Written by the leading security experts in the field, this...

Project Management for Telecommunications Managers
Project Management for Telecommunications Managers
This book on Project Management is intended as a quick reference
covering important aspects of project management that should be understood
by managers in the telecommunications environment.

This book is organized with an introduction, which introduces the value
chain in telecommunications and illustrates the type of
...
CCSA NG: Check Point Certified Security Administrator Study Guide
CCSA NG: Check Point Certified Security Administrator Study Guide
Here’s the book you need to prepare for Check Point’s VPN-1/FireWall-1 Management I NG exam, #156-210. Written by a Check Point security expert who knows exactly what it takes to pass the test, this study guide provides:
  • Assessment testing to focus and direct your studies
  • In-depth...
Java Web Services
Java Web Services
Java Web Services shows you how to use SOAP to perform remote method calls and message
passing; how to use WSDL to describe the interface to a web service or understand
the interface of someone else's service; and how to use UDDI to advertise (publish) and look
up services in each local or global registry. Java Web Services also
...
Linux+ Study Guide: Exam XKO 001 (With CD-ROM)
Linux+ Study Guide: Exam XKO 001 (With CD-ROM)
Here's the book you need to prepare for CompTIA's updated Linux+ exam, #XK0-002. This Study Guide was developed to meet the exacting requirements of today's certification candidates. In addition to the consistent and accessible instructional approach that has earned Sybex the reputation as the leading publisher for...
The Warren Buffett Way, Second Edition
The Warren Buffett Way, Second Edition
PRAISE FOR THE WARREN BUFFETT WAY
FIRST EDITION

"Nobody has described what Buffett practices better than Hagstrom."
--Time

"Simply the most important new stock book . . . If you think you know all about Warren Buffett, you have a lot to learn from this book."
--Forbes

"It’s...

Windows Server 2003 Weekend Crash Course
Windows Server 2003 Weekend Crash Course
Get Up to Speed on Windows Server 2003 – in a Weekend!

The big day is Monday. The day you get to show off what you know about Windows Server 2003. The problem is, you’re not really up to speed. Maybe it’s been a while since you administered a Windows network. Perhaps you’re new to .NET. Or maybe you just like a...

CDMA Systems Capacity Engineering
CDMA Systems Capacity Engineering
The code division multiple access (CDMA) communication system is a wellestablished
technology in the sense that it is one of technically proven methods to
transmit voice information for multiple users via wireless communications during
the last decade. Further, CDMA is an emerging technology for next generation multimedia...
JavaServer Pages, Second Edition
JavaServer Pages, Second Edition
Filled with useful examples and the depth, clarity, and attention to detail that made the first
edition so popular with web developers, JavaServer Pages, 2nd Edition is completely revised
and updated to cover the substantial changes in the 1.2 version of the JSP specifications, and
includes coverage of the new JSTL Tag libraries-an
...
Embedded Software for SoC
Embedded Software for SoC
The evolution of electronic systems is pushing traditional silicon designers
into areas that require new domains of expertise. In addition to the design of
complex hardware, System-on-Chip (SoC) design requires software development,
operating systems and new system architectures. Future SoC designs
will resemble a miniature
...
Wi-Fi Security
Wi-Fi Security
COMPLETE COVERAGE OF THE TECHNOLOGY THAT’S MAKING WIRELESS COMMUNICATIONS VIRTUALLY IMMUNE TO HACKERS!

Wireless technology offers businesses a world of strategic advantages — and a host of security problems. But thanks to McGraw-Hill’s WiFi Security, your company’s mission-critical data can be...

Discovering Knowledge in Data : An Introduction to Data Mining
Discovering Knowledge in Data : An Introduction to Data Mining
Learn Data Mining by doing data mining

Data mining can be revolutionary—but only when it's done right. The powerful black box data mining software now available can produce disastrously misleading results unless applied by a skilled and knowledgeable analyst. Discovering Knowledge in Data: An Introduction to Data Mining provides both the...

Result Page: 221 220 219 218 217 216 215 214 213 212 211 210 209 208 207 206 205 204 203 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy