Debra S. Isaac, Michael J. Isaac

The SSCP Prep Guide: Mastering the Seven Key Areas of System Security


* SSCP (System Security Certified Practitioner) is the companion test to CISSP, appealing to the practitioners who implement the security policies that the CISSP-certified professionals create * Organized exactly like the bestselling The CISSP ...


Doug Tidwell

XSLT


Originally created for page layout, XSLT has grown into one of the core technologies for processing XML. XSLT brings XSLT's many functions together in a concise, comprehensive treatment of the technology. This book covers XSLT and XPath, a ...

Michael Keating, Pierre Bricaud

Reuse Methodology Manual for System-On-A-Chip Designs


Reuse Methodology Manual for System-on-a-Chip Designs, Third Edition outlines a set of best practices for creating reusable designs for use in an SoC design methodology. These practices are based on the authors' experience in developing reusable ...

Paul Allen, Stuart Frost

Component-Based Development for Enterprise Systems : Applying the SELECT Perspective (SIGS: Managing Object Technology)


This ground-breaking book distills the experience of the authors in dealing with problems in industry that can be solved by using the SELECT Perspective. A pragmatic, component-based approach for the development of enterprise systems, the SELECT ...


<<<  W. T. Singleton. The Mind at Work             Richard Hyman. Understanding European Trade Unionism: Between Market, ... >>>




На главную



Хостинг от uCoz