Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
RESTful Java with JAX-RS 2.0
RESTful Java with JAX-RS 2.0

Learn how to design and develop distributed web services in Java, using RESTful architectural principles and the JAX-RS 2.0 specification in Java EE 7. By focusing on implementation rather than theory, this hands-on reference demonstrates how easy it is to get started with services based on the REST architecture.

With...

Programming Microsoft. NET XML Web services
Programming Microsoft. NET XML Web services

Get the in-depth reference and guidance you need to create and consume high-performance, cross-platform Web solutions in the Microsoft .NET environment. This exhaustive resource cuts to the heart of developing XML Web services and their clients—offering expert insights on the relevant standards, .NET classes, and key design and...

Java Cryptography (Java Series)
Java Cryptography (Java Series)
Cryptography, the science of secret writing, is the biggest, baddest security tool in the application
programmer's arsenal. Cryptography provides three services that are crucial in secure programming.
These include a cryptographic cipher that protects the secrecy of your data; cryptographic certificates,
which prove identity
...
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
Hardware-based Computer Security Techniques to Defeat Hackers: From Biometrics to Quantum Cryptography
The protection of critical information and systems is a major component of today's electronic business community. This valuable reference presents the primary hardware-based computer security approaches in an easy-to-read toolbox format. The techniques discussed show readers how to perform their own evaluation of new and emerging security...
Web Application Security, A Beginner's Guide
Web Application Security, A Beginner's Guide

Security Smarts for the Self-Guided IT Professional

“Get to know the hackers—or plan on getting hacked. Sullivan and Liu have created a savvy, essentials-based approach to web app security packed with immediately applicable tools for any information security practitioner sharpening his or her tools or just starting...

Security in Wireless Ad Hoc and Sensor Networks
Security in Wireless Ad Hoc and Sensor Networks
This book provides an in-depth guide to security in wireless ad hoc and sensor networks

Security in Wireless Ad Hoc and Sensor Networks introduces the reader to the fundamentals and key issues related to wireless ad hoc networking, with an emphasis on security. It discusses the security attacks and...

Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine
Platform Embedded Security Technology Revealed: Safeguarding the Future of Computing with Intel Embedded Security and Management Engine

Platform Embedded Security Technology Revealed is an in-depth introduction to Intel’s platform embedded solution: the security and management engine. The engine is shipped inside most Intel platforms for servers, personal computers, tablets, and smartphones. The engine realizes advanced security and management...

Administering and Securing the Apache Server
Administering and Securing the Apache Server

Apache is the most popular Web server in the world, hosting 50 percent of all Web sites! With Apache, you will get excellent performance at a low cost. The server, plus all of its source code, is freely available and you can modify it to your specific needs. With this book, you will learn how to install, configure, and troubleshoot the Apache...

A Technical Guide to IPSec Virtual Private Networks
A Technical Guide to IPSec Virtual Private Networks

This book details the suite of IP security protocols and their interaction with users, systems, and devices. It includes in-depth descriptions of the various IPSec communications and key management protocols that provide the foundation of secure communications. It presents examples of implementation and real world experience and their comparison...

Java Security Solutions
Java Security Solutions
Your complete guide to the what, why, where, and how of Java Security

In this unique guide, two Java security experts show you how to take full advantage of Java security technologies–cryptography, algorithms, and architecture. They explain today’s Java security tools, concepts, protocols, and specifications, including ECC, RSA,...

Pro Web 2.0 Application Development with GWT (Expert's Voice in Web Development)
Pro Web 2.0 Application Development with GWT (Expert's Voice in Web Development)
This book is for developers who are ready to move beyond small proof–of–concept sample applications and want to look at the issues surrounding a real deployment of GWT. If you want to see what the guts of a full–fledged GWT application look like, this is the book for you.

GWT 1.5 is a game–changing technology, but it...

Implementing Samba 4
Implementing Samba 4

Exploit the real power of Samba 4 Server by leveraging the benefits of an Active Directory Domain Controller

Overview

  • Understand the different roles that Samba 4 Server can play on the network
  • Implement Samba 4 as an Active Directory Domain Controller
  • Step-by-step and...
unlimited object storage image
Result Page: 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy