Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Amazon Web Services with Node.js
Beginning Amazon Web Services with Node.js

Beginning Amazon Web Services with Node.js teaches any novice Node.js developer to configure, deploy, and maintain scalable small to large scale Node.js applications in Amazon Web Services. Hosting a Node.js application in a production environment usually means turning to PaaS hosting, but this approach brings problems. Deploying...

Introduction to Distributed Algorithms
Introduction to Distributed Algorithms

The lower cost and increased flexibility and availability of computer networks means that they are rapidly replacing centralized 'mainframes'. The implementation of networked systems and the control of applications running in them require, however, the design of new techniques and methods: collectively known as distributed algorithms....

Practical Hadoop Security
Practical Hadoop Security

Practical Hadoop Security is an excellent resource for administrators planning a production Hadoop deployment who want to secure their Hadoop clusters. A detailed guide to the security options and configuration within Hadoop itself, author Bhushan Lakhe takes you through a comprehensive...

Web Applications (Hacking Exposed)
Web Applications (Hacking Exposed)

"This book goes a long way in making the Web a safer place to do business." -- Mark Curphey, Chair of the Open Web Application Security Project

Unleash the hackers' arsenal to secure your Web applications

In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as...

The Definitive Guide to Samba 3
The Definitive Guide to Samba 3

If you're familiar with Unix administration, TCP/IP networking, and other common Unix servers, and you want to learn how to deploy Samba, this book is ideal for you. With this book as a guide, you can quickly configure a basic Samba server and then move on to learn about Samba's more exotic features, including those new to Samba 3.0. The...

OpenVPN 2 Cookbook
OpenVPN 2 Cookbook

OpenVPN is one of the world's most popular packages for setting up a Virtual Private Network (VPN). OpenVPN provides an extensible VPN framework which has been designed to ease site-specific customization, such as providing the capability to distribute a customized installation package to clients, or supporting alternative authentication...

Microsoft Application Architecture Guide (Patterns & Practices)
Microsoft Application Architecture Guide (Patterns & Practices)

Get the definitive guide on designing applications on the Microsoft application platform—straight from the Microsoft patterns & practices team. Learn how to choose the most appropriate architecture and the best implementation technologies that the Microsoft application platform offers applications developers. Get critical design...

Beginning iOS Apps with Facebook and Twitter APIs: for iPhone, iPad, and iPod touch
Beginning iOS Apps with Facebook and Twitter APIs: for iPhone, iPad, and iPod touch

Beginning iOS Apps with Facebook and Twitter APIs shows you how to add the power of social networking to your mobile apps on iPhone, iPad, and iPod touch. With this book as your guide, you can write apps that connect to Facebook and Twitter quickly, securely, and discreetly. Instead of starting from scratch, you will build on the...

Learning Rails
Learning Rails
While most books written about Rails cater to programmers looking for information on data structures, "Learning Rails" targets web developers whose programming experience is tied directly to the Web. Rather than begin with the inner layers of a Rails web application--the models and controllers--this unique book approaches...
Digital Watermarking: Principles & Practice (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital Watermarking: Principles & Practice (The Morgan Kaufmann Series in Multimedia Information and Systems)
Digital watermarking is a key ingredient to copyright protection. It provides a solution to illegal copying of digital material and has many other useful applications such as broadcast monitoring and the recording of electronic transactions. Now, for the first time, there is a book that focuses exclusively on this exciting technology. Digital...
Encyclopedia of Cryptography and Security
Encyclopedia of Cryptography and Security

Expanded into two volumes, the Second Edition of Springer’s Encyclopedia of Cryptography and Security brings the latest and most comprehensive coverage of the topic: Definitive information on cryptography and information security from highly regarded researchers Effective tool for professionals in many fields and researchers of all...

Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses
Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses

PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also dive into recent developments like mobile security,...

unlimited object storage image
Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy