Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Serverless Web Applications with React and Firebase: Develop real-time applications for web and mobile platforms
Serverless Web Applications with React and Firebase: Develop real-time applications for web and mobile platforms

Build rich and collaborative applications using client-side code with React, Redux, and Firebase

Key Features

  • A practical guide covering the full stack for web development with React 16 and Firebase
  • Leverage the power of Firebase Cloud Storage, messaging, functions, OAuth,...
Expert Web Services Security in the .NET Platform
Expert Web Services Security in the .NET Platform

Any company using .NET will eventually (if it hasn't already) expose part of its functionality as a .NET Web service, and securing these features will become job number one. Completely up to date for the latest version of Visual Studio .NET, Expert Web Services Security in the .NET Platform is a comprehensive treatment on how to...

Cisco LAN Switching Configuration Handbook (2nd Edition)
Cisco LAN Switching Configuration Handbook (2nd Edition)

Cisco LAN Switching Configuration Handbook, Second Edition, is a quick and portable reference guide to the most commonly used features that can be configured on Cisco® Catalyst® switches. Written to be used across all Catalyst IOS platforms, the book covers general use of Cisco IOS®, followed by a series...

Federated Identity Primer
Federated Identity Primer
The conceptoffederatedidentityisnothingnew.Infact,ithasbeen around alongtime.Itjustneverreallycaughton,partiallybecauseits usage scenarioswerelimited.But,thathaschanged.Nowwiththe increased usageofcloudandInternet-basedapplications,federated identity hasstartedtogainalotoftraction.Instancesoffederated identity...
Hacking Exposed Wireless
Hacking Exposed Wireless

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute...

Ubuntu Certified Professional Study Guide (Exam LPI 199) (Book & CD Rom)
Ubuntu Certified Professional Study Guide (Exam LPI 199) (Book & CD Rom)
The Best Fully Integrated Study System Available for Exam LPI 199

With hundreds of practice questions and hands-on exercises, Ubuntu Certified Professional Study Guide covers what you need to know--and shows you how to prepare--for this challenging exam.

  • 100% complete coverage of all official...
JUNOS For Dummies (Computer/Tech)
JUNOS For Dummies (Computer/Tech)
If you’re in charge of a network, you’re probably aware that the only time anyone notices the network is when it goes down. With JUNOS software and JUNOS For Dummies, a friendly book to help you set it up and manage the software, you might be able to start convincing your clients to believe in magic. Here’s the help you...
Optical and Digital Techniques for Information Security (Advanced Sciences and Technologies for Security Applications)
Optical and Digital Techniques for Information Security (Advanced Sciences and Technologies for Security Applications)
This book comprehensively surveys the results of research investigation and technologies used to secure, verify, recognize, track, and authenticate objects and information from theft, counterfeiting, and manipulation by unauthorized persons and agencies. This book will draw on the diverse expertise in optical sciences and engineering, digital...
Apple Training Series: Mac OS X Server Essentials v10.6: A Guide to Using and Supporting Mac OS X Server v10.6
Apple Training Series: Mac OS X Server Essentials v10.6: A Guide to Using and Supporting Mac OS X Server v10.6
This book is based on the same criteria used for Apple’s official training course, Mac OS X Server Essentials 10.6, an in-depth exploration of Mac OS X Server v10.6. This book serves as a self-paced tour of the breadth of functionality of Mac OS X Server and the best methods for effectively supporting users of Mac OS X Server systems....
Elements of Computer Security (Undergraduate Topics in Computer Science)
Elements of Computer Security (Undergraduate Topics in Computer Science)

As our society grows ever more reliant on computers, so it also becomes more vulnerable to computer crime. Cyber attacks have been plaguing computer users since the 1980s, and computer security experts are predicting that smart telephones and other mobile devices will also become the targets of cyber security threats in the future.

...

Microsoft  Windows  Communication Foundation Step by Step
Microsoft Windows Communication Foundation Step by Step

Your hands-on, step-by-step guide to building next-generation connected applications.

Teach yourself the essentials of Windows Communication Foundation-one step at a time. With this practical tutorial, you get hands-on guidance for creating the Web services you need to implement robust business applications for Windows.

Discover...

Essential Check Point FireWall-1 NG: An Installation, Configuration, and Troubleshooting Guide
Essential Check Point FireWall-1 NG: An Installation, Configuration, and Troubleshooting Guide
Now there's a definitive insider's guide to planning, installing, configuring, and maintaining the newest version of the world's #1 firewall: Check Point™ FireWall-1® Next Generation™. Leading Check Point support authority Dameon Welch-Abernathy (a.k.a. PhoneBoy) offers exclusive hands-on tips, techniques, checklists, and...
unlimited object storage image
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy