 |
|
|
|
 Microsoft SharePoint 2013 Developer Reference
Design and develop great solutions using SharePoint 2013
Develop your business collaboration solutions quickly and effectively with the rich set of tools, classes, libraries, and controls available in Microsoft SharePoint 2013. With this practical reference, enterprise-development expert Paolo Pialorsi shows you... |  |  Twisted Network Programming Essentials
Get started with Twisted, the event-driven networking framework written in Python. With this introductory guide, you’ll learn the key concepts and design patterns to build event-driven client and server applications for many popular networking protocols. You’ll also learn the tools to build new protocols using... |  |  Expert SharePoint 2010 Practices
Expert SharePoint 2010 Practices is a valuable compendium of best practices, tips, and secrets straight from the most knowledgeable SharePoint gurus in the industry.
Learn from the experts as you dive into topics like multitenancy, solution deployment, business intelligence, and administration. Our team of carefully... |
|
 Molecular Pharmacognosy
"Molecular Pharmacognosy” discusses the application of molecular biology in resource science and authentication of traditional Chinese medicine (TCM). This book reviews the latest developments in pharmacognosy, introduces a series of new views and insights, presents the hotspots and focus of the field of study on molecular... |  |  Third-Party JavaScript
Summary
Third-Party JavaScript guides web developers through the complete development of a full-featured third-party JavaScript application. You'll learn dozens of techniques for developing widgets that collect data for analytics, provide helpful overlays and dialogs, or implement features like chat or... |  |  Web Penetration Testing with Kali Linux
A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux
Overview
-
Learn key reconnaissance concepts needed as a penetration tester
-
Attack and exploit key features, authentication, and sessions on web...
|
|
| Result Page: 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 |