 |
|
 Fundamentals of Computer Security
This reference work looks at modern concepts of computer security. It introduces the basic mathematical background necessary to follow computer security concepts before moving on to modern developments in cryptography. The concepts are presented clearly and illustrated by numerous examples. Subjects covered include: private-key and public-key... |  |  Securing PHP Apps
Secure your PHP-based web applications with this compact handbook. You'll get clear, practical and actionable details on how to secure various parts of your PHP web application. You'll also find scenarios to handle and improve existing legacy issues.
Is your PHP app truly secure? Let's make sure you get home... |  |  Nginx: From Beginner to Pro
Teaches you to start up Nginx and quickly take your expertise to a level where you can comfortably work with various aspects of the web server and make informed design decisions for your web farm. Nginx powers more than 40% of the top 1000 websites and is among the handful of web servers that can handle more than 10K simultaneous connections.... |
|
 Securing Hadoop
Implement robust end-to-end security for your Hadoop ecosystem
Overview
-
Master the key concepts behind Hadoop security as well as how to secure a Hadoop-based Big Data ecosystem
-
Understand and deploy authentication, authorization, and data encryption in a Hadoop-based Big Data platform
... |  |  Identity and Data Security for Web Development: Best Practices
Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how... |  |  Administrating Solr
Master the use of Drupal and associated scripts to administrate, monitor, and optimize Solr
Overview
-
Learn how to work with monitoring tools like OpsView, New Relic, and SPM
-
Utilize Solr scripts and Collection Distribution scripts to manage Solr
-
Employ search features like...
|
|
 IBM Worklight Mobile Application Development Essentials
Your move onto mobile devices is simplified when you use IBM Worklight and this user-friendly tutorial. After a guided tour through the components you'll learn how to utilize them to optimize your mobile applications.
About This Book
-
Develop Mobile Apps that can be deployed on multiple mobile...
|  |  Node Cookbook Second Edition
Over 50 recipes to master the art of asynchronous serverside JavaScript using Node.js, with coverage of Express 4 and Socket.IO frameworks and the new Streams API
About This Book
-
Work with JSON, XML, web sockets to make the most of asynchronous programming
-
Extensive code samples covering...
|  |  Hyper-V Replica Essentials
For Windows Server administrators, Hyper-V Replica is the free disaster recovery tool that can transform system availability. This book is the ultimate guide, taking a totally practical, empirical approach to teaching best practices.
Overview
-
A practical step-by-step guide that goes beyond theory and...
|
|
|
Result Page: 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 |