Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Troubleshooting Remote Access Networks (CCIE Professional Development)
Troubleshooting Remote Access Networks (CCIE Professional Development)
A guide to understanding the troubleshooting tools, commands, and methodologies that enable reliable performance for remote access services

* Gain a solid grasp of enterprise telecommunications technology fundamentals, including service options and clocking, line coding, and framing in carrier systems
* Understand how network traffic
...

Web Penetration Testing with Kali Linux
Web Penetration Testing with Kali Linux

A practical guide to implementing penetration testing strategies on websites, web applications, and standard web protocols with Kali Linux

Overview

  • Learn key reconnaissance concepts needed as a penetration tester
  • Attack and exploit key features, authentication, and sessions on web...
Beginning API Development with Node.js: Build highly scalable, developer-friendly APIs for the modern web with JavaScript and Node.js
Beginning API Development with Node.js: Build highly scalable, developer-friendly APIs for the modern web with JavaScript and Node.js

Learn everything you need to get up and running with cutting-edge API development using JavaScript and Node.js; ideal for data-intensive real-time applications that run across multiple platforms.

Key Features

  • Build web APIs from start to finish using JavaScript across the development...
Hacking Web Apps: Detecting and Preventing Web Application Security Problems
Hacking Web Apps: Detecting and Preventing Web Application Security Problems

How can an information security professional keep up with all of the hacks, attacks, and exploits on the Web? One way is to read Hacking Web Apps. The content for this book has been selected by author Mike Shema to make sure that we are covering the most vicious attacks out there. Not only does Mike let you in on the anatomy of these...

Mobility Management in Wireless Networks: Data Replication Strategies and Applications (ERCOFTAC S.)
Mobility Management in Wireless Networks: Data Replication Strategies and Applications (ERCOFTAC S.)
In wireless communication systems, the network keeps track of a user’s
location through an up-to-date user profile stored in various databases.
A user profile contains not only a user’s current location information, but
also service information, such as billing and authentication. The coverage
area of an access
...
Writing Apache Modules with Perl and C
Writing Apache Modules with Perl and C
This book was designed for application developers who already have some experience with web programming. We assume that you understand CGI scripting, know how to produce HTML pages dynamically, and can create fill-out forms and process their contents. We also assume that you know the basics of web server administration—if not with the Apache...
Professional ASP.NET 2.0 AJAX (Programmer to Programmer)
Professional ASP.NET 2.0 AJAX (Programmer to Programmer)

Are you ready to build more responsive web applications with richer UI elements? This detailed guide to the Microsoft AJAX Library shows you how to bring together ASP.NET 2.0 with an object-oriented approach to JavaScript development using this new framework from Microsoft. You'll gain an in-depth understanding of the ASP.NET AJAX architecture,...

Expert SharePoint 2010 Practices
Expert SharePoint 2010 Practices

Expert SharePoint 2010 Practices is a valuable compendium of best practices, tips, and secrets straight from the most knowledgeable SharePoint gurus in the industry.

Learn from the experts as you dive into topics like multitenancy, solution deployment, business intelligence, and administration. Our team of carefully
...

Mobile Location Services: The Definitive Guide
Mobile Location Services: The Definitive Guide

Tomorrow's mobile applications must be smarter than ever, accessing and intelligently using a wide range of location data. In Mobile Location Services, leading mobile application consultant Andrew Jagoe presents the first end-to-end solutions guide to building and deploying location-based...

Practical Signcryption (Information Security and Cryptography)
Practical Signcryption (Information Security and Cryptography)

In today’s world, data must be sent around the world cheaply and securely, and that requires origin authentication, integrity protection, and confidentiality – the recipient of a message should be able to ascertain who sent the message, be sure that the message has not been changed en route, and be sure that the data arrives...

Pro Zend Framework Techniques: Build a Full CMS Project
Pro Zend Framework Techniques: Build a Full CMS Project

The Zend Framework is a truly amazing PHP–based web application development framework and platform that is breathing new life into PHP development. One of the most common uses for a framework such as this is to build content driven web sites.

Pro Zend Framework CMS offers

  • A structured guide for...
Computational Forensics: 4th International Workshop, IWCF 2010 Tokyo, Japan
Computational Forensics: 4th International Workshop, IWCF 2010 Tokyo, Japan

This Lecture Notes in Computer Science (LNCS) volume contains the papers presented at the International Workshop on Computational Forensics (IWCF 2010), held in Tokyo, Japan during November 11–12, 2010. The workshop took place in conjunction with the 16th Annual Scientific Meeting of the Japanese Association of Forensic Science.

...
unlimited object storage image
Result Page: 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 35 34 33 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy