Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Almost every contemporary corporation and organization has acquired and deployed security solutions or mechanisms to keep its networks and data secure. Hardware and software tools such as firewalls, network-based intrusion prevention systems, antivirus and antispam packages, host-based intrusion prevention solutions, and...
SAS 9.1.3 Intelligence Platform: Web Application Administration Guide, Third Edition
SAS 9.1.3 Intelligence Platform: Web Application Administration Guide, Third Edition
Explains how to administer the SAS Web applications that run in the middle tier of the SAS Intelligence Platform. The Web applications include the SAS Information Delivery Portal, SAS Web Report Studio, and SAS Web OLAP Viewer for Java.This guide describes the middle-tier environment, provides sample deployment scenarios, and explains how to...
Biometric Technologies and Verification Systems
Biometric Technologies and Verification Systems

Biometric Technologies and Verification Systems is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step...

Developing Windows Store Apps with HTML5 and JavaScript
Developing Windows Store Apps with HTML5 and JavaScript

The Windows store is growing in popularity and with this step-by-step guide it's easy to join the bandwagon using HTML5, CSS3, and JavaScript. From basic development techniques to publishing on the store, it's the complete primer.

Overview

  • Learn about the powerful new features in HTML5 and...
Microsoft® Windows® Registry Guide, Second Edition
Microsoft® Windows® Registry Guide, Second Edition

Understand how the registry works—and customize Windows to run the way you want.

Get the in-depth information you need to modify—and seamlessly manage—the Windows registry. Written for IT professionals and power users, this vital resource reveals little-known registry techniques, tricks, tips, and...

Enterprise Web Services Security (Internet Series)
Enterprise Web Services Security (Internet Series)
Learn to Protect Your Assets and Prevent Attacks!

The use of Web Services for Business-to-Business (B2B) and Business-to-Consumer (B2C) transactions has created risks that expose critical assets to increasingly greater threats. Enterprise Web Services Security provides the information developers, application architects, and security...

Learning Laravel 4 Application Development
Learning Laravel 4 Application Development

Develop real-world web applications in Laravel 4 using its refi ned and expressive syntax

Overview

  • Build real-world web applications using the Laravel 4 framework
  • Learn how to configure, optimize and deploy Laravel 4 applications
  • Packed with illustrations along with lots of...
Programming JavaScript Applications: Robust Web Architecture with Node, HTML5, and Modern JS Libraries
Programming JavaScript Applications: Robust Web Architecture with Node, HTML5, and Modern JS Libraries

Take advantage of JavaScript’s power to build robust web-scale or enterprise applications that are easy to extend and maintain. By applying the design patterns outlined in this practical book, experienced JavaScript developers will learn how to write flexible and resilient code that’s easier—yes, easier—to...

Mastering Flask Web Development: Build enterprise-grade, scalable Python web applications, 2nd Edition
Mastering Flask Web Development: Build enterprise-grade, scalable Python web applications, 2nd Edition

Learn to build modern, secure, highly available web MVC applications and API's using Python`s Flask framework.

Key Features

  • Create production-ready MVC and REST API with the dynamic features of Flask
  • Utilize the various extensions like Flask-JWT and Flask-SQLAlchemy to...
Building the Mobile Internet (Networking Technology)
Building the Mobile Internet (Networking Technology)

The complete guide to technologies and protocols for delivering seamless mobile Internet experiences

 

In Building the MobileInternet, three leading mobility architects and implementers from Cisco present complete foundational knowledge about...

Personal Cybersecurity: How to Avoid and Recover from Cybercrime
Personal Cybersecurity: How to Avoid and Recover from Cybercrime

Discover the most prevalent cyber threats against individual users of all kinds of computing devices. This book teaches you the defensive best practices and state-of-the-art tools available to you to repel each kind of threat.

Personal Cybersecurity addresses the needs of individual users at work and at home. This book...

Professional ASP.NET 2.0 Security, Membership, and Role Management (Wrox Professional Guides)
Professional ASP.NET 2.0 Security, Membership, and Role Management (Wrox Professional Guides)
ASP.Net security covers a broad range of subjects. Concepts such as Web security features, developing in partial trust, forms authentication, and securing configuration - just to name a few p are all integral components to helping developers ensure reliable security. Addressing the ASP.NET security features from the developer's point of view, this...
unlimited object storage image
Result Page: 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy