Home | Amazing | Today | Tags | Publishers | Years | Search 
Catalyst 5.8: the Perl MVC Framework
Catalyst 5.8: the Perl MVC Framework

Many web applications are implemented in a way that makes developing them difficult and repetitive. Catalyst is an open source Perl-based Model-View-Controller framework that aims to solve this problem by reorganizing your web application to design and implement it in a natural, maintainable, and testable manner, making web development fun,...

Security and Privacy in Mobile Information and Communication Systems: First International ICST Conference, MobiSec 2009
Security and Privacy in Mobile Information and Communication Systems: First International ICST Conference, MobiSec 2009

MobiSec 2009 was the first ICST conference on security and privacy in mobile information and communication systems. With the the vast area of mobile technology research and application, the intention behind the creation of MobiSec was to make a small, but unique contribution to build a bridge between top-level research and large scale...

PHP 5 E-commerce Development
PHP 5 E-commerce Development

The popularity of online shopping has increased dramatically over the past few years. There are plenty of options available if you not are planning to build your own e-commerce solution but sometimes it's better to use your own solutions. It may be easy to find an e-commerce system but when it comes to extending it or using it you might...

Seven Deadliest Web Application Attacks (Syngrass Seven Deadlest Attacks)
Seven Deadliest Web Application Attacks (Syngrass Seven Deadlest Attacks)

Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover...

CCNA Security Lab Manual
CCNA Security Lab Manual

The only authorized Lab Portfolio for the new Cisco Networking Academy CCNA Security Course

  • Gives CCNA Security students a comprehensive, printed and bound lab resource containing all of the course's labs, for use whenever Internet access isn't available
  • Handy printed...
Pro ODP.NET for Oracle Database 11g
Pro ODP.NET for Oracle Database 11g

This book is a comprehensive and easy-to-understand guide for using the Oracle Data Provider (ODP) version 11g on the .NET Framework. It also outlines the core GoF (Gang of Four) design patterns and coding techniques employed to build and deploy high-impact mission-critical applications using advanced Oracle database features through the...

CodeIgniter 1.7 professional development
CodeIgniter 1.7 professional development

CodeIgniter is an open source PHP framework with a small footprint and exceptional performance. It gives you a rich set of libraries for common tasks, with a simple interface to access them. There are several unexplored aspects of CodeIgniter that can help developers build applications more easily and quickly. In this book, you will learn the...

Spring Security 3
Spring Security 3

Security is of critical importance to all web applications. Vulnerable applications are easy prey for hackers. This book is the perfect tool for Java developers looking to repel attacks against their web applications using the proven Spring Security library to achieve this.

A comprehensive guide to Spring Security 3. You will learn...

Oracle Application Express 3.2: The Essentials and More
Oracle Application Express 3.2: The Essentials and More

Developing data-centric web applications can be a real challenge as it is a multi-disciplinary process. There are many technologies involved in the client side (HTML, CSS, JavaScript, and so on); the interaction with the database, on the server side; the typeless nature of the web environment; and above all, the need to put it all together....

HTTP Programming Recipes for C# Bots
HTTP Programming Recipes for C# Bots

The Hypertext Transfer Protocol (HTTP) allows information to be exchanged between a web server and a web browser. C# allows you to program HTTP directly. HTTP programming allows you to create programs that access the web much like a human user would. These programs, which are called bots, can collect information or automate common web...

web2py
web2py

The official web2py manual. 3rd Edition. Includes many new pages (537 total).

web2py was launched in 2007 and now, after three years of continuous development, we have reached a very much needed third edition of this book. During this time web2py has managed to win the affection of many knowledgeable users and developers who share...

Elements of Computer Security (Undergraduate Topics in Computer Science)
Elements of Computer Security (Undergraduate Topics in Computer Science)

As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future.

...

Result Page: 51 50 49 48 47 46 45 44 43 42 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy