Combining coverage of both XSLT 2.0 and XPath 2.0, this book is the definitive reference to the final recommendation status versions of both specifications. The authors start by covering the concepts in XSLT and XPath, and then delve into elements, operators, expressions with syntax, usage, and examples. Some of the specific topics covered include XSLT processing model, stylesheet structure, serialization, extensibility, and many others. In addi ...
Hands-on information to help you fully exploit the capabilities of MIDP 2.0 on Symbian OS (including MMA, WMA and Bluetooth). This practical guide will walk you through developing example applications illustrating key functionality and explain how to install these applications onto real devices. Focuses on J2ME MIDP 1.0 and 2.0, as this platform has become the Java standard for phones Covers the optional J2ME APIs that Symbian OS Java is current ...
Learn how to successfully implement trustworthy computing tasks using aspect-oriented programming This landmark publication fills a gap in the literature by not only describing the basic concepts of trustworthy computing (TWC) and aspect-oriented programming (AOP), but also exploring their critical interrelationships. The author clearly demonstrates how typical TWC tasks such as security checks, in-and-out conditions, and multi-threaded safety c ...
The latest techniques and principles of parallel and grid database processing The growth in grid databases, coupled with the utility of parallel query processing, presents an important opportunity to understand and utilize high-performance parallel database processing within a major database management system (DBMS). This important new book provides readers with a fundamental understanding of parallelism in data-intensive applications, and demon ...
The eagerly awaited Pattern-Oriented Software Architecture (POSA) Volume 4 is about a pattern language for distributed computing. The authors will guide you through the best practices and introduce you to key areas of building distributed software systems. POSA 4 connects many stand-alone patterns, pattern collections and pattern languages from the existing body of literature found in the POSA series. Such patterns relate to and are useful for d ...
Go deep into Windows security tools to implement more robust protocols and processes Windows Security Monitoring goes beyond Windows admin and security certification guides to provide in-depth information for security professionals. Written by a Microsoft security program manager, DEFCON organizer and CISSP, this book digs deep into the underused tools that help you keep Windows systems secure. Expert guidance brings you up to speed on Windows a ...
The world’s favorite guide to everything AutoCAD and AutoCAD LT—updated for 2019! Mastering AutoCAD 2019 and AutoCAD LT 2019 is the world’s all-time best-selling guide to the world’s most popular drafting software. Packed with tips, tricks, techniques, and tutorials, this guide covers every inch of AutoCAD and AutoCAD LT—including certification. This new edition has been fully updated to align with the software’s 2019 update, featuring the same ...
The explosive growth of multimedia data transmission has generated a critical need for efficient, high-capacity image databases, as well as powerful search engines to retrieve image data from them. This book brings together contributions by an international all-star team of innovators in the field who share their insights into all key aspects of image database and search engine construction. Readers get in-depth discussions of the entire range o ...
Image processing-from basics to advanced applications Learn how to master image processing and compression with this outstanding state-of-the-art reference. From fundamentals to sophisticated applications, Image Processing: Principles and Applications covers multiple topics and provides a fresh perspective on future directions and innovations in the field, including: * Image transformation techniques, including wavelet transformation and develop ...