Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building an e-Commerce Application with MEAN
Building an e-Commerce Application with MEAN

Develop an end-to-end, real-time e-commerce application using the MEAN stack

About This Book

  • Build all the main components of an e-commerce website and extend its high-quality features as per your needs
  • Get to grips with the full-stack JavaScript to build attractive e-commerce sites and...
Secure Your Node.js Web Application: Keep Attackers Out and Users Happy
Secure Your Node.js Web Application: Keep Attackers Out and Users Happy

Cyber-criminals have your web applications in their crosshairs. They search for and exploit common security mistakes in your web application to steal user data. Learn how you can secure your Node.js applications, database and web server to avoid these security holes. Discover the primary attack vectors against web applications, and implement...

SSH, the Secure Shell: The Definitive Guide
SSH, the Secure Shell: The Definitive Guide
Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every...
CompTIA Security+ All-in-One Exam Guide, Second Edition
CompTIA Security+ All-in-One Exam Guide, Second Edition

A CompTIA Security+ Exam Guide and An On-the-Job Reference--All-in-One

Get complete coverage of all the material included on the CompTIA Security+ exam inside this fully up-to-date, comprehensive resource. Written by network security experts, this authoritative exam guide features learning objectives at the beginning of...

JUNOS OS For Dummies (Computer/Tech)
JUNOS OS For Dummies (Computer/Tech)

Welcome to Junos OS For Dummies. This book provides you with a handy reference for configuring and running Junos software on Juniper Networks products. (We won’t bore you with how Junos got here, but you can discover more about Juniper Networks and the evolution of Junos software at www.juniper.net/company.)

...

MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network: Study Guide and DVD Training System (Exam 70-214)
MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network: Study Guide and DVD Training System (Exam 70-214)

The MCSE/MCSA Implementing and Administering Security in a Windows 2000 Network Study Guide (Exam 70-214) is a one-of-a-kind integration text and Web-based exam simulation and remediation. This system gives you 100% coverage of the official Microsoft Exam 70-214 objectives.

  • Completely Guaranteed Coverage of All...
Inside Microsoft  Windows  SharePoint  Services 3.0 (Pro Developer)
Inside Microsoft Windows SharePoint Services 3.0 (Pro Developer)

Get in-depth architectural insights for building enterprise solutions-straight from the experts.

Focus is on the internals of the Windows SharePoint Services 3.0 platform with this in-depth, straightforward reference. You get expert insights, task-oriented guidance, and extensive code samples to help you master the intricacies of...

Real 802.11 Security: Wi-Fi Protected Access and 802.11i
Real 802.11 Security: Wi-Fi Protected Access and 802.11i

"Real 802.11 Security provides clear descriptions of current and emerging security techniques. The authors handle complex topics nicely, and offer significant clarification of IEEE draft standards."
-Russ Housley, IETF Security Area Director and founder of Vigil Security, LLC

"This...

DB2 UDB V8.1 Certification Exam 700 Study Guide
DB2 UDB V8.1 Certification Exam 700 Study Guide
IBM DB2 Universal Database Certification gives you a powerfuladvantage in the marketplace for expertise on the world’s #1enterprise database platform. Passing IBM DB2 UDB V8.1 FamilyFundamentals Exam 700 earns you the IBM Certified Database Associatecertification and is the prerequisite for all intermediate and...
Getting Started with FortiGate
Getting Started with FortiGate

This book will take you from complete novice to expert user in simple, progressive steps. It covers all the concepts you need to administer a FortiGate unit with lots of examples and clear explanations.

Overview

  • Learn about FortiGate and FortiOS 5 starting from the ground up, with no previous knowledge of...
Hacking the Code: ASP.NET Web Application Security
Hacking the Code: ASP.NET Web Application Security

This unique book walks you through the many threats to your web application code, from managing and authorizing users and encrypting private data to filtering user input and securing XML. For every defined threat, it provides a menu of solutions and coding considerations. And, it offers coding examples and a set of security policies for each of...

Professional Plone Development
Professional Plone Development
This book teaches Plone development best practices, focusing on Plone 3.0. It covers setting up a development environment, customizing Plone's look and feel, creating new content types and forms, connecting to external databases, managing users and groups intelligently, configuring a production-ready server, LDAP authentication, and caching. Aimed...
unlimited object storage image
Result Page: 46 45 44 43 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy