• Tidak ada hasil yang ditemukan

Addison Wesley

Addison Wesley BIRT A Field Guide To Reporting 2nd Edition Jul 2008 ISBN 0321580273 pdf

Addison Wesley BIRT A Field Guide To Reporting 2nd Edition Jul 2008 ISBN 0321580273 pdf

... We want to thank Greg Doench, our acquisitions editor, who asked us to write a book about BIRT and has been supportive and enthusiastic about our success. Of course, we want to acknowledge the staff at ...

794

Addison Wesley The Pragmatic Programmer From Journeyman To Master Oct 1999 ISBN 020161622X pdf

Addison Wesley The Pragmatic Programmer From Journeyman To Master Oct 1999 ISBN 020161622X pdf

... Addison-Wesley has been brilliant, taking a couple of wet-behind-the-ears hackers and walking us through the whole book-production process, from idea to camera-ready copy. Many thanks to John Wait and Meera ...

361

Addison Wesley Enterprise Java Security Building Secure And Robust J2EE Applications Feb 2004 ISBN 0321118898

Addison Wesley Enterprise Java Security Building Secure And Robust J2EE Applications Feb 2004 ISBN 0321118898

... This book focuses on the set of security standards that support and enhance a J2EE environment, including SSL, Kerberos authentication and authorization, secret- and public-key cryptogra[r] ...

1027

Bruce E, The Essence of Object Oriented Programming with Java and UML, 2003, Addison Wesley

Bruce E, The Essence of Object Oriented Programming with Java and UML, 2003, Addison Wesley

... A Brief Introduction to Swing Handling Swing Command Events A Bunch of Options MVC: Model, View, Controller MVC with Java A Small Swing MVC GUI Framework A Simple Application Based o[r] ...

364

Addison Wesley The Design And Implementation Of The FreeBSD Operating System Aug 2004 ISBN 0201702452

Addison Wesley The Design And Implementation Of The FreeBSD Operating System Aug 2004 ISBN 0201702452

... single packet PR_ADDR protocol presents address with each message PR_CONNREQUIRED connection required for data transfer PR_WANTRCVD protocol notified on user receipt of data PR_RIGHT[r] ...

640

Addison Wesley Virtual Honeypots From Botnet Tracking To Intrusion Detection Jul 2007 ISBN 0321336321

Addison Wesley Virtual Honeypots From Botnet Tracking To Intrusion Detection Jul 2007 ISBN 0321336321

... After reading this book, you will be able to Compare high-interaction honeypots that provide real systems and services and the low-interaction honeypots that emulate them Install and c[r] ...

833

Addison Wesley The Object Oriented Thought Process 3rd Edition Sep 2008 ISBN 0672330164 pdf

Addison Wesley The Object Oriented Thought Process 3rd Edition Sep 2008 ISBN 0672330164 pdf

... 14 Classes Are Object Templates 15 Attributes 17 Methods 17 Messages 17 Using UML to Model a Class Diagram 18 Encapsulation and Data Hiding 19 Interfaces 19 Implementations 20 A Rea[r] ...

347

Addison Wesley C Plus Plus Standard Library The A Tutorial And Reference Aug 1999 ISBN 0201824701

Addison Wesley C Plus Plus Standard Library The A Tutorial And Reference Aug 1999 ISBN 0201824701

... Note that for some algorithms the C++ standard library does not specify how often function objects are called for each element, and it might happen that different copies of the function [r] ...

974

Addison Wesley RailsSpace Building A Social Networking Website With Ruby On Rails 2007 Jul ISBN 0321480791 pdf

Addison Wesley RailsSpace Building A Social Networking Website With Ruby On Rails 2007 Jul ISBN 0321480791 pdf

... The quick-and-dirty way to protect theedit_profile action is to put the protection machinery right in the function: Listing 6.20 app/controllers/user controller.rb def index unless se[r] ...

564

Addison Wesley UNIX Network Programming Volume 1 The Sockets Networking API 3rd Edition Nov 2003 ISBN 0131411551

Addison Wesley UNIX Network Programming Volume 1 The Sockets Networking API 3rd Edition Nov 2003 ISBN 0131411551

... #include int pthread_oncepthread_once_t *onceptr, void *init void; int pthread_key_createpthread_key_t *keyptr, void *destructor void *value; Both return: 0 if OK, positive Exxx valu[r] ...

1155

Addison Wesley Inside The C Plus Plus Object Model May 1996 ISBN 020183454

Addison Wesley Inside The C Plus Plus Object Model May 1996 ISBN 020183454

... Pointer to Data Member Access Optimized % Non-optimized No Inheritance 0.80 5.34 SI 3 levels 0.80 5.34 VI 1 level 1.60 5.44 VI 2 level 2.14 5.51 SI: Single Inheritance VI: Virtual Inh[r] ...

388

Addison Wesley CMMI Distilled A Practical Introduction To Integrated Process Improvement 3rd Edition May 2008 ISBN 0321461088

Addison Wesley CMMI Distilled A Practical Introduction To Integrated Process Improvement 3rd Edition May 2008 ISBN 0321461088

... In Requirements Management, for example, GP 3.1 reads as follows: "Establish and maintain the description of a defined requirements management process." By performing that practice, and [r] ...

501

Addison Wesley The New School Of Information Security Apr 2008 ISBN 0321502787

Addison Wesley The New School Of Information Security Apr 2008 ISBN 0321502787

... Companies that are involved in activities that have information security risks increasingly seem to see brand management as a good reason to spend funds on security.. At a minimum, they [r] ...

381

Addison Wesley Essential Windows Communication Foundation WCF For Dot Net Framework 3 5 Feb 2008 ISBN 0321440064 pdf

Addison Wesley Essential Windows Communication Foundation WCF For Dot Net Framework 3 5 Feb 2008 ISBN 0321440064 pdf

... Figure 8.1: Configuring IIS 7 for SSL 324 Figure 8.2: Services over corporate LAN with Windows application 341 Figure 8.3: Configuring an XML Authorization store 349 Figure 8.4: Creating[r] ...

605

Addison Wesley Crimeware Understanding New Attacks And Defenses Apr 2008 ISBN 0321501950

Addison Wesley Crimeware Understanding New Attacks And Defenses Apr 2008 ISBN 0321501950

... This backdoor might then be used to install crimeware that poisons the user's hosts file and enables a pharming attack.[3] Subsequent attempts to reach legitimate web sites will then be[r] ...

1078

Addison Wesley Perl Medic Transforming Legacy Code Mar 2004 ISBN 0201795264

Addison Wesley Perl Medic Transforming Legacy Code Mar 2004 ISBN 0201795264

... You'll discover how to: Scale existing Perl code to serve larger network, Web, enterprise, or e-commerce applications Rewrite, restructure, and upgrade any Perl program for improved pe[r] ...

522

Addison Wesley Practical BGP Jul 2004 ISBN 0321127005

Addison Wesley Practical BGP Jul 2004 ISBN 0321127005

... Redistributing Route among the Core and the Routing Domains Figure 3.16 illustrates redistribution from an attached routing domain into an iBGP core, and from the iBGP core into the int[r] ...

772

Apache Hadoop Yarn Processing Addison Wesley 165 pdf  pdf

Apache Hadoop Yarn Processing Addison Wesley 165 pdf pdf

... Contents x Queues 156 Hierarchical Queues 156 Key Characteristics 157 Scheduling Among Queues 157 Defining Hierarchical Queues 158 Queue Access Control 159 Capacity Management wit[r] ...

337

Addison Wesley Ruby Phrasebook Sep 2008 ISBN 0672328976 pdf

Addison Wesley Ruby Phrasebook Sep 2008 ISBN 0672328976 pdf

... vii Contents Serializing Objects with YAML 156 Network Objects with Distributed Ruby 158 Using Net::HTTP 159 Using Webrick 160 14 Working with Threads 163 Creating a Thread 164 U[r] ...

218

Addison Wesley JSP And XML Integrating XML And Web Services In Your JSP Application Mar 2002 ISBN 0672323540

Addison Wesley JSP And XML Integrating XML And Web Services In Your JSP Application Mar 2002 ISBN 0672323540

... For example, let's look at namespaces using the following small XML document: When this is invoked on the Element node representing the BLOCK element, the following occur: ge[r] ...

817

Show all 66 documents...

Related subjects