This revised second edition features more coverage of ActiveX component development, data transfer, and Internet scripting, while retaining the easy-to-use, "bite-sized chunks" philosophy of teaching good COM programming practices. This book makes COM and ActiveX easy to understand . . . and comfortable to use. The CD-ROM contains 9.5 MB of working sample code to cut and paste into applications.
Finally, OLE explained the right way--simply, elegantly and consistently. Well-organized to make sure readers understand simple aspects of OLE before moving on to more complex tasks, this book helps programmers understand OLE's organizing principles. Each chapter includes self-study programming exercises with detailed instructions.
This convenient workbook makes COM and ActiveX easy to understand, and comfortable to use. This new edition has been updated with 200 pages of new coverage, including Visual C++ 6, Visual J++ 6, IDL, monikers, Windows 2000 threads, and more. The CD-ROM contains all sample code from the book.
With its comprehensive overview of core technology areas, "MCSD in a Nutshell" is the perfect study guide and resource to help developers master technologies with which they relatively are inexperienced.
This book constitutes the refereed proceedings of the 11th International Conference on Advanced Information Systems Engineering, CAiSE'99 held in Heidelberg, Germany in June 1999. The 27 revised full papers presented together with 12 short research papers and two invited contributions were carefully selected from a total of 168 submissions. The papers are organized in topical sections on components, information systems management, method engineering, data warehouses, process modeling, CORBA and distributed information systems, workflow systems, heterogeneous databases, and information systems dynamics.
Considered the gold-standard reference on information security, the Information Security Management Handbook provides an authoritative compilation of the fundamental knowledge, skills, techniques, and tools required of today's IT security professional. Now in its sixth edition, this 3200 page, 4 volume stand-alone reference is organized under the CISSP Common Body of Knowledge domains and has been updated yearly. Each annual update, the latest is Volume 6, reflects the changes to the CBK in response to new laws and evolving technology.
This book covers invariant probabilities for a large class of discrete-time homogeneous Markov processes known as Feller processes. These Feller processes appear in the study of iterated function systems with probabilities, convolution operators, and certain time series. From the reviews: "A very useful reference for researchers wishing to enter the area of stationary Markov processes both from a probabilistic and a dynamical point of view." --MONATSHEFTE FÜR MATHEMATIK
DCOM Explained describes what services DCOM provides, both development and runtime. Thus the aim of the book is not to teach how to program using DCOM, but to explain what DCOM does so readers will become better able to use it more effectively, understand the options available when using DCOM, and understand the types of applications that can be built by using DCOM. This book describes: what each of the services mean, including load balancing, security, guaranteed delivery, deferred delivery, broadcasting and multi-casting, and session handling what the service aims to do, such as saving time and effort or providing a secure, resilient, reliable, high performance network how the service could be provided, and what other solutions exist for achieving the same end how Microsoft has tackled the problem Provides a complete, easy to understand, and compact picture of all the services of DCOM Written from a designer or manager's point of view Compares DCOM with other middleware
PCMag.com is a leading authority on technology, delivering Labs-based, independent reviews of the latest products and services. Our expert industry analysis and practical solutions help you make better buying decisions and get more from technology.