Home | Amazing | Today | Tags | Publishers | Years | Search 
WS-BPEL 2.0 for SOA Composite Applications with IBM WebSphere 7
WS-BPEL 2.0 for SOA Composite Applications with IBM WebSphere 7

I am quite honored that the authors of this book asked me if I could write the foreword. They have a long and concrete experience in implementing business processes, and we have interacted together in the context of telecommunication operators, where they delivered successful business process implementation.

What I would like to...

Security Strategy: From Requirements to Reality
Security Strategy: From Requirements to Reality

Addressing the diminished understanding of the value of security on the executive side and a lack of good business processes on the security side, Security Strategy: From Requirements to Reality explains how to select, develop, and deploy the security strategy best suited to your organization. It clarifies the purpose and...

Information Retrieval and Mining in Distributed Environments (Studies in Computational Intelligence)
Information Retrieval and Mining in Distributed Environments (Studies in Computational Intelligence)

At DART'09, held in conjunction with the 2009 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2009) and Intelligent Agent Technology (IAT 2009) in Milan (Italy), practitioners and researchers working on pervasive and intelligent access to web services and distributed information retrieval met to compare their work ad...

Emerging Business Online: Global Markets and the Power of B2B Internet Marketing
Emerging Business Online: Global Markets and the Power of B2B Internet Marketing

We live in an age of information overload, significantly facilitated by the Internet. Anyone from almost anywhere can send, access, and post information across the globe in a matter of seconds. As applications and technologies continue to evolve, our ability to leverage the Internet will continue to impact the way we work and live.

...

Making Great Games: An Insider's Guide to Designing and Developing the World's Greatest Video Games
Making Great Games: An Insider's Guide to Designing and Developing the World's Greatest Video Games

Join videogame industry veteran Michael Thornton Wyman on a series of detailed, behind-the-scenes tours with the teams that have made some of the most popular and critically acclaimed videogames of the modern era. Drawing on insider's perspectives from a wide variety of teams, learn about the creation of a tiny, independent game project...

Secrets of Corel Painter Experts: Tips, Techniques, and Insights for Users of All Abilities
Secrets of Corel Painter Experts: Tips, Techniques, and Insights for Users of All Abilities

Step inside the studios of some of today's top artists, illustrators, designers, and photographers working with digital art tools. Secrets of Corel Painter Experts: Tips, Techniques, and Insights for Users of All Abilities allows you one-on-one access to the creative and technical process of professional artists who use Painter in...

Fearless Flash: Use Adobe InDesign CS5 and the Tools You Already Know to Create Engaging Web Documents
Fearless Flash: Use Adobe InDesign CS5 and the Tools You Already Know to Create Engaging Web Documents

InDesign CS5 opens the door to a new world: with the addition of exciting animation tools and deeper multimedia support. It's now a viable interactive authoring tool. Designers want to create engaging interactive content, but may resist making the transition from page layout to timeline-based thinking. But now it's much easier:...

Demystifying Embedded Systems Middleware
Demystifying Embedded Systems Middleware

This practical technical guide to embedded middleware implementation offers a coherent framework that guides readers through all the key concepts necessary to gain an understanding of this broad topic. Big picture theoretical discussion is integrated with down-to-earth advice on successful real-world use via step-by-step examples of each type...

Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS
Computer Network Security: 5th International Conference, on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS

This book constitutes the refereed proceedings of the 5th International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security, MMM-ACNS 2010, held in St. Petersburg, Russia in September 2010. The 16 revised full papers and 6 revised short papers presented together with 5 invited papers were carefully...

Practical SQL Queries for Microsoft SQL Server 2008 R2
Practical SQL Queries for Microsoft SQL Server 2008 R2

400+ ready-to-use, powerful SQL queries

Learn powerful techniques for surfacing and delivering actionable business intelligence using SQL. Practical SQL Queries for Microsoft SQL Server 2008 R2 contains more than 400 downloadable SQL queries you can use to extract meaningful insights from large amounts of data. The...

JavaScript by Example (2nd Edition)
JavaScript by Example (2nd Edition)

The World’s Easiest Java Script Tutorial–Fully Updated!

 

JavaScript by Example, Second Edition, is the easiest, most hands-on way to learn JavaScript. Legendary programming instructor Ellie Quigley has thoroughly...

Documenting Software Architectures: Views and Beyond (2nd Edition)
Documenting Software Architectures: Views and Beyond (2nd Edition)

“This new edition is brighter, shinier, more complete, more pragmatic, more focused than the previous one, and I wouldn’t have thought it possible to improve on the original. As the field of software architecture has grown over these past decades, there is much more to be said, much more that we know, and much more that we can...

Result Page: Previous 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 Next 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy