 |
|
|
 The Java Web Services TutorialThe Java(TM) Web Services Tutorial is a comprehensive, example-driven, "roll up your sleeves and dive in" guide to building Web services applications with Java(TM) technology. This edition provides a head start on using the Java Web Services Developer Pack (WSDP) from Sun... |  |  Free as in Freedom: Richard Stallman's Crusade for Free SoftwareIn 1984, Richard Stallman launched the GNU Project for the purpose of developing a complete UNIX-like operating system that would allow for free software use. What he developed was the GNU operating system. (GNU is a recursive acronym for "GNU's Not UNIX,'' and it is pronounced guh-NEW. Linux is a variant of the GNU operating system.) This... |  |  XSLT for DummiesHarness the power of XSLT to transform XML documents
Get tips on result trees, HTML transformations, and XPath functions
The fun and easy way to exploit Extensible Stylesheet Language Transformations
With XSLT, XSL, and XPath, you can transform XML documents into HTML pages or different XML documents. With expert... |
|
 Compressed Video CommunicationsCompressed Video Communications addresses the compression and transmission of coded video streams over mobile IP networks. By analysing a broad spectrum of compression techniques and error resilience algorithms this book provides realistic solutions to the problems of quality degradation and transmission error.
Features include: ... |  |  Building the Data Warehouse (3rd Edition)Learn the most recent advances in data warehousing technology from the "Father of Data Warehousing"
Since it was first published in 1990, W. H. Inmon’s Building the Data Warehouse has become the bible of data warehousing–– the first and best introduction to the subject. A lot has changed in data warehousing... |  |  Biometrics: Identity Verification in a Networked WorldAn in-depth look at biometrics, focused on critical issues such as accuracy, privacy, technology capabilities, and cost-effective deployment
No longer a science fiction solution, biometric technologies are being deployed by thousands of companies and public agencies to increase security, protect personal information, and reduce... |
|
 Java Tools: Using XML, EJB, CORBA, Servlets and SOAPUsing XML, EJB, Corba, Servlets and SOAP, it is possible to develop very complex and powerful applications. This book shows how to design and implement distributed internet applications based on these Java technologies. Its emphasis is on how to combine the strengths of these different technologies in order to create the best possible... |  |  Absolute Beginner's Guide to DatabasesAbsolute Beginner's Guide to Databases brings the elements of a database together using easy to understand language, perfect for the true beginner. It not only gives specific hands on practice, but also provides an overview of designing, maintaining and using a database. This book covers what databases are used for, why databases are... |  |  Designing Security Architecture SolutionsThe first guide to tackle security architecture at the software engineering level Computer security has become a critical business concern, and, as such, the responsibility of all IT professionals. In this groundbreaking book, a security expert with AT&T Business's renowned Network Services organization explores system security... |
|
Result Page: Previous 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 Next |