Shows you how to leverage IntelliJ’s tools to develop clean, efficient Java applications. The last portion of the book ...
Lire la suiteBeginning JSP™, JSF™, and Tomcat™ Web Development is all you need to develop dynamic web applications using JSP, connect ...
Lire la suiteYou love it as the world's most popular desktop Linux distribution, and now Ubuntu is available at a server near you. Embracing ...
Lire la suiteThe primary goal of this book is to demonstrate Visual Web Developer 2005 Expresss effectiveness when developing applications. ...
Lire la suiteThis book explores bioeconomy and bioenergy policies across South America, Asia and Europe. It discusses how a transition ...
Lire la suiteThe use of computers to recognize humans from physical and behavioral traits dates back to the digital computer evolution ...
Lire la suiteThis book constitutes the refereed proceedings of the 6th International Conference on Case-Based Reasoning, ICCBR 2005, held ...
Lire la suitehis volume of Lecture Notes in Computer Science contains the proceedings of the rd 3 Working Conference on Component Deployment ...
Lire la suiteThough multiagent systems (MASs) are being increasingly used, few methods exist to ensure survivability of MASs. All existing ...
Lire la suiteThis book constitutes the refereed post-proceedings of the Second International Workshop on Construction and Analysis of ...
Lire la suiteControl of Traffic Systems in Buildings presents the state of the art in the analysis and control of transportation systems ...
Lire la suiteThis book constitutes the refereed proceedings of the Third International Conference on Cooperative Design, Visualization, ...
Lire la suiteThis book on data mining details the unique steps of the knowledge discovery process that prescribe the sequence in which ...
Lire la suiteThis book on data mining details the unique steps of the knowledge discovery process that prescribe the sequence in which ...
Lire la suiteThe IoT presents unique challenges in implementing security and Intel has both CPU and Isolated Security Engine capabilities ...
Lire la suiteThis tutorial book gives an overview of the current state of the art in measuring the different aspects of dependability ...
Lire la suiteWhether building a console application, a web service, or a smart client, you eventually need to distribute your finished ...
Lire la suiteThis book constitutes the refereed proceedings of the Third International Conference on Detection of Intrusions and Malware, ...
Lire la suiteExplore software lifecycle best practices Use DevSecOps methodologies to facilitate software development and delivery Understand ...
Lire la suiteIn DevOps for Digital Leaders, deep collective experience on both sides of the dev–ops divide informs the global thought ...
Lire la suite