Home | Amazing | Today | Tags | Publishers | Years | Search 
Oracle Application Server 10g Essentials
Oracle Application Server 10g Essentials
This new guide provides the perfect introduction to the Oracle Application Server for users of any level. Divided into three concise sections, the book covers server basics, core components, and server functionality. Designed to be the ideal first OracleAS book, Oracle Application Server 10g Essentials offers...
Software Factories: Assembling Applications with Patterns, Models, Frameworks, and Tools
Software Factories: Assembling Applications with Patterns, Models, Frameworks, and Tools

Many of the challenges currently facing software developers are symptoms of problems with software development practices. Software Factories solves these problems by integrating critical innovations that have been proven over the last ten years but have not yet been brought together.

A team of industry experts led by Jack Greenfield...

PDF Hacks : 100 Industrial-Strength Tips &Tools
PDF Hacks : 100 Industrial-Strength Tips &Tools

Many people think of Adobe's Portable Document Format (PDF) as a proprietary format for delivering unchangeable content that readers can print out or view on-screen conveniently. That may be how most people work with it, but you can do many more things with PDF, with or without Adobe's tools.

PDF has...

Open Source .NET Development : Programming with NAnt, NUnit, NDoc, and More
Open Source .NET Development : Programming with NAnt, NUnit, NDoc, and More

Perhaps the most revolutionary aspect of the arrival of Microsoft's .NET platform is the standardization of C# and the Common Language Runtime. Now, for the first time, programmers can develop and use open-source projects that are based on a language that is an international standard as well as compatible with both Microsoft and...

Trojans, Worms, and Spyware, First Edition : A Computer Security Professional's Guide to Malicious Code
Trojans, Worms, and Spyware, First Edition : A Computer Security Professional's Guide to Malicious Code
One of the biggest headaches that comes along with networked and Internetconnected
computers is the absolute requirement of dealing with malicious
code attacks. There is no choice; if your systems are not equipped in some way
with antivirus protection, sooner or later some bug will eat them. There is also
very little to be
...
WDM Technologies: Optical Networks, First Edition (Optics and Photonics Series)
WDM Technologies: Optical Networks, First Edition (Optics and Photonics Series)
These volumes are about wavelength-division multiplexing (WDM), the
most recent technology innovation in optical fiber communications. In the
past two decades, optical communications has totally changed the way we
communicate. It is a revolution that has fundamentally transformed the
core of telecommunications, its basic
...
Return on Software : Maximizing the Return on Your Software Investment
Return on Software : Maximizing the Return on Your Software Investment

Is your organization maximizing the return on its investments of money, time, and personnel? Probably not, because most software professionals don't know how to consider the business aspects of their software decisions. Most don't even know that it's important to do so. Business consequences should play a critical role in all...

Active Directory Best Practices 24seven: Migrating, Designing, and Troubleshooting
Active Directory Best Practices 24seven: Migrating, Designing, and Troubleshooting
Advanced Coverage for Experienced Network Administrators

Active Directory Best Practices 24seven is written specifically to build on the practical and conceptual knowledge you’ve already earned. Taking a "just the facts, ma'am" approach this book provides targeted instruction and insider tips to...

Broadband Powerline Communications: Network Design
Broadband Powerline Communications: Network Design
Broadband Powerline Communications: Network Design covers the applications of broadband PLC systems in low-voltage supply networks, a promising candidate for the realization of cost effective solutions for "last mile" communications networks. There are many activities surrounding the development and application of PLC technology...
Co-verification of Hardware and Software for ARM SoC Design (Embedded Technology)
Co-verification of Hardware and Software for ARM SoC Design (Embedded Technology)
This book is the first to document and teach important information about the verification technique known as hardware/software co-verification. Traditional embedded system design has evolved into single chip designs that are pushing past 1M logic gates and headed toward 10M gates. In this era of SoC design, chips now include microprocessors and...
Tomcat 5 Unleashed
Tomcat 5 Unleashed
Welcome to Apache Tomcat. The goal of this book is to
present everything you ever wanted to know about Apache
Tomcat. I’m not just interested in a mere recitation of facts,
however. My goal is to provide the information you need to
use Tomcat effectively. I want to show you how to run Tomcat
in real-world situations
...
Infrared Spectroscopy: Fundamentals and Applications (Analytical Techniques in the Sciences)
Infrared Spectroscopy: Fundamentals and Applications (Analytical Techniques in the Sciences)
Analytical Techniques in the Sciences

This series of books provides coverage of all of the major analytical techniques and their application in the most important areas of physical, life and materials science. Each text is presented in an open learning/distance learning style, in which the learning objectives are clearly identified. The...

Result Page: Previous 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy