Authoring this book involved nearly a year of writing, research, and staying on top of a subject matter that is constantly expanding its reach and importance. Although the majority of the chapters focus on service-oriented architecture from a vendor
C程序设计教程,绝对经典之作。 The C programming Language By Brian W. Kernighan and Dennis M. Ritchie. Published by Prentice-Hall in 1988 Preface The computing world has undergone a revolution since the publication of The C Programming Language in 1978. Big comput
Chapter 1, Sample Code This chapter is designed to allow you to quickly experiment with and use μC/OS-II. The chapter starts by showing you how to install the distribution diskette and describe the directories created. I then explain some of the cod
The methods of functional analysis have helped solve diverse real-world problems in optimization, modeling, analysis, numerical approximation, and computer simulation. Applied Functional Analysis presents functional analysis results surfacing repeat
Geometric Modeling (GM) plays a significant role in the construction, design and manufacture of various objects. In addition to its critical importance in the traditional fields of automo- bile and aircraft manufacturing, shipbuilding, and general p
Insider Attack and Cyber Security: Beyond the Hacker defines the nature and scope of insider problems as viewed by the financial industry. This edited volume is based on the first workshop on Insider Attack and Cyber Security, IACS 2007. The worksho
Abstract—Based on demands in proxy pattern, this article proposes informatization solution of proxy pattern which includes enterprise management, proxy management, franchisee management and supply chain management, then discusses basic functions, sy
Sleepycat Software makes Berkeley DB, the most widely used open source developer database in the world with over 200 million deployments. Customers such as Amazon.com, AOL, Cisco Systems, EMC, Google, Hitachi, HP, Motorola, RSA Security, Sun Microsy
In short, not too good. Software projects are usually late, are usually over budget, are likely to be cancelled, and if not then the final software rarely meets the expectations of their users. Why is this? Is it the compilers that you are using? Th
Welcome to the Cloud Security Alliance’s initial report, “Security Guidance for Critical Areas of Focus in Cloud Computing”. From our first organizing meeting in Silicon Valley in early December of 2008, we have moved rapidly to garner industry supp
Welcome to the Cloud Security Alliance’s initial report, “Security Guidance for Critical Areas of Focus in Cloud Computing”. From our first organizing meeting in Silicon Valley in early December of 2008, we have moved rapidly to garner industry supp
Expertly presents, from start to finish, the process of programming commercially viable computer games! This is the kind of book that you won’t let out of our sight. From page one, Mike McShaffry, a leading programmer for Origin Systems (Makers of W
This series is based on the idea that there is a need for studies that break barriers. It is dedicated to innovative studies of language use and language learning in educational settings worldwide. It provides a forum for work that crosses tradition
一本揭示高效程序员的思考模式,一本告诉你如何缩短你与优秀程序员的差距 Anyone who develops software for a living needs a proven way to produce it better, faster, and cheaper. The Productive Programmer offers critical timesaving and productivity tools that you can adopt right away, n
Cairngorm is the lightweight micro-architecture for Rich Internet Applications built in Flex or AIR. A collaboration of recognized design patterns, Cairngorm exemplifies and encourages best-practices for RIA development advocated by Adobe Consulting