Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

This comprehensive encyclopedia provides easy access to information on all aspects of cryptography and security. With an A–Z format of over 460 entries, 100+ international experts provide an accessible reference for those seeking entry into any aspect of the broad fields of cryptography and information security. Most entries in this...

Aix and Linux Interoperabilty
Aix and Linux Interoperabilty
This IBMR Redbook discusses interoperability in terms of UNIX to UNIX cross platform data sharing and user/system management. This redbook also demonstrates the similarities and differences between the AIXR and Linux operating systems.

This redbook is intended to help IT specialists who have AIX systems and Linux systems in their
...
Security of e-Systems and Computer Networks
Security of e-Systems and Computer Networks
E-based systems are ubiquitous in the modern world with applications spanning e-commerce, WLANs, health care and government organisations. The secure transfer of information has therefore become a critical area of research, development, and investment. This book presents the fundamental concepts and tools of e-based security and its range of...
Learning Windows Azure Mobile Services for Windows 8 and Windows Phone 8
Learning Windows Azure Mobile Services for Windows 8 and Windows Phone 8

A short, fast and focused guide to enhance your Windows 8 applications by leveraging the power of Windows Azure Mobile Services

Overview

  • Dive deep into Azure Mobile Services with a practical XAML-based case study game
  • Enhance your applications with Push Notifications and Notifications...
iPhone with Microsoft Exchange Server 2010 - Business Integration and Deployment
iPhone with Microsoft Exchange Server 2010 - Business Integration and Deployment
Have you been tasked with getting iPhones into the hands of your business executives, and need to ensure they can reliably and securely access corporate e-mail? This book will teach you what you need to know about getting Exchange 2010 set up and then help you deploy iPhones in a secure and manageable way.

...
Laravel Application Development Cookbook
Laravel Application Development Cookbook

Over 90 recipes to learn all the key aspects of Laravel, including installation, authentication, testing, and the deployment and integration of third parties in your application

Overview

  • Install and set up a Laravel application and then deploy and integrate third parties in your application
  • ...
Explorer's Guide to the Semantic Web
Explorer's Guide to the Semantic Web
Written for developers and programmers, this guide acquaints users with the basic technologies and their interrelations that will be instrumental in the development of the Semantic Web. Key technology areas are covered, such as knowledge modeling (RDF, Topic Maps), agents (DAML, FIPA), and Trust and Authentication. This broad introduction...
Applied ASP.NET 4 in Context
Applied ASP.NET 4 in Context

ASP.NET 4 is the latest version of Microsoft's revolutionary web technology. It is the principal technology for creating dynamic web pages on the Windows platform.

Applied ASP.NET 4 In Context sets the standard for clear, simple, hands-on advice for learning and deploying Microsoft’s dynamic web solutions....

Building Microsoft ASP.NET Applications for Mobile Devices, Second Edition
Building Microsoft ASP.NET Applications for Mobile Devices, Second Edition

Extend your programming expertise across the widest range of mobile devices with this incisive guide to Microsoft ASP.NET mobile controls. Now integrated into Microsoft Visual Studio .NET 2003, ASP.NET mobile controls enable you to build applications that render intelligently on different devices—regardless of markup language, browser, or...

Watermarking Systems Engineering
Watermarking Systems Engineering
The growth of the Internet has fueled the demand for enhanced watermarking and data hiding technologies and has stimulated research into new ways to implement watermarking systems in the real world. Watermarking Systems Engineering: Enabling Digital Assets Security and Other Applications presents the principles of watermarking system design and...
Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)
Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)

This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet...

Full-Stack React Projects: Modern web development using React 16, Node, Express, and MongoDB
Full-Stack React Projects: Modern web development using React 16, Node, Express, and MongoDB

Unleash the power of MERN stack by building diverse web applications using React, Node.js, Express, and MongoDB

Key Features

  • Create dynamic web applications with the MERN stack
  • Leverage the power of React in building interactive and complex user interfaces
  • ...
unlimited object storage image
Result Page: 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 13 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy