It is a great pleasure to present this book for two reason:
I know the author, Steef-Jan Wiggers, Steef is a strong technical lead developer and application architect  and specializing in many important areas, enterprise application integration, architecting, designing, and many others.
The second, this book is innovative for some aspects, it collects over 50 recipes for BizTalk developers and administrators and demonstrate the real BizTalk capabilities combined with capabilities from community- and Microsoft related BizTalk tooling.

Congrats Steef!

More info here:

http://www.packtpub.com/biztalk-server-2010-for-developers-and-administrators-cookbook/book

 

Previous articleBizTalk HL7 essential knowledge part 3
Next articleBizTalk Server 2010 Cookbook is out !!!
I have +25 years of hands-on experience in Cloud Technologies and Cybersecurity, supporting and driving global companies to adopt technologies in the most secure and profitable way. My cores expertises are Security and Cloud Governance, and I strongly believe in the conjunction of both to achieve the top result. In my career, I had the opportunity to lead global cloud infrastructures, providing guidance and leadership in Security and Cloud Governance. Security is my first passion, but I have deep experience in many other areas like Cloud Governance and Integration. I define myself as a very versatile person. In my past, I had the opportunity to work in many different areas, supporting different company roles, from technical roles to Sales, Pre-Sales and High Stakeholders. I see myself as a hands-on geek manager. I love to get my hands dirty and also be able to lead and create important things and initiatives. Mt passion for technology is also the reason for my activities in the IT community. I love sharing my experience and motivating people on engaging the technology with the right motivation and passion. I do conferences around the world, sharing my passion. I have been Microsoft MVP since 2006, Certified Ethical Hacker (CEH) and with a Master in Cybersecurity.

LEAVE A REPLY

Please enter your comment!
Please enter your name here