|
|
|
|
CodeIgniter 1.7 professional development
CodeIgniter is an open source PHP framework with a small footprint and exceptional performance. It gives you a rich set of libraries for common tasks, with a simple interface to access them. There are several unexplored aspects of CodeIgniter that can help developers build applications more easily and quickly. In this book, you will learn the... | | Spring Security 3
Security is of critical importance to all web applications. Vulnerable applications are easy prey for hackers. This book is the perfect tool for Java developers looking to repel attacks against their web applications using the proven Spring Security library to achieve this.
A comprehensive guide to Spring Security 3. You will learn... | | Oracle Application Express 3.2: The Essentials and More
Developing data-centric web applications can be a real challenge as it is a multi-disciplinary process. There are many technologies involved in the client side (HTML, CSS, JavaScript, and so on); the interaction with the database, on the server side; the typeless nature of the web environment; and above all, the need to put it all together.... |
|
HTTP Programming Recipes for C# Bots
The Hypertext Transfer Protocol (HTTP) allows information to be exchanged between a web server and a web browser. C# allows you to program HTTP directly. HTTP programming allows you to create programs that access the web much like a human user would. These programs, which are called bots, can collect information or automate common web... | | web2py
The official web2py manual. 3rd Edition. Includes many new pages (537 total).
web2py was launched in 2007 and now, after three years of continuous development, we have reached a very much needed third edition of this book. During this time web2py has managed to win the affection of many knowledgeable users and developers who share... | | Elements of Computer Security (Undergraduate Topics in Computer Science)
As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future.
... |
|
Result Page: 51 50 49 48 47 46 45 44 43 42 |