Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Murach's Java Servlets and JSP, 2nd Edition
Murach's Java Servlets and JSP, 2nd Edition

Ever since the late 1990s when Java servlets and JavaServer Pages (JSPs) came into widespread use, web site developers have been switching from CGI scripting languages to servlets and JSPs. As a result, there has been tremendous growth in the use of servlets and JSPs. Today, there's little doubt that scrvlet and JSP technology is here to...

Developing  a hapi Edge: A rich Node.js framework for apps and services
Developing a hapi Edge: A rich Node.js framework for apps and services

“Developing a hapi Edge” shows you how to build enterprise-quality web applications using the hapi service and application framework. By walking through the creation of a real web application, hapi-plugins.com, you will learn how to configure and start hapi, build out APIs, perform authentication, validation, caching, and so much...

.NET Framework Security
.NET Framework Security
Welcome! The book you hold in your hands is a comprehensive guide and roadmap to the security infrastructure of the Microsoft .NET Framework. The .NET Framework is Microsoft's new cross-language development environment for building rich client applications and XML Web Services. One of the key features of the .NET Framework is a robust security...
Java Security (2nd Edition)
Java Security (2nd Edition)
One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is...
Spring Security 3.1
Spring Security 3.1

Knowing that experienced hackers are itching to test your skills makes security one of the most difficult and high-pressure concerns of creating an application. The complexity of properly securing an application is compounded when you must also integrate this factor with existing code, new technologies, and other frameworks. Use this book to...

Getting Started with Containerization: Reduce the operational burden on your system by automating and managing your containers
Getting Started with Containerization: Reduce the operational burden on your system by automating and managing your containers

Choose the smarter way to learn about containerizing your applications and running them in production.

Key Features

  • Deploy and manage highly scalable, containerized applications with Kubernetes
  • Build high-availability Kubernetes clusters
  • Secure your...
MCSA/MCSE 70-299 Exam Cram 2 : Implementing and Administering Security in a Windows 2003 Network
MCSA/MCSE 70-299 Exam Cram 2 : Implementing and Administering Security in a Windows 2003 Network
The 70-299 exam measures your ability to implement, manage, maintain, and troubleshoot security in a Windows Server 2003 network infrastructure and also plan and configure a Windows Server 2003 PKI. The MCSE 70-299 Exam Cram 2 gives you the essential information you need to know to learn how to implement, manage,...
Documentum Content Management Foundations: EMC Proven Professional Certification Exam E20-120 Study Guide
Documentum Content Management Foundations: EMC Proven Professional Certification Exam E20-120 Study Guide

This is a complete study guide including study material and practice questions to prepare for the EMC Proven Professional certification Exam E20-120. It can also serve Documentum beginners and practitioners as a handy guide and quick reference to the technical fundamentals that is fully up to date for Documentum 5.3. Beginners are introduced to...

Algorithms and Protocols for Wireless Sensor Networks (Wiley Series on Parallel and Distributed Computing)
Algorithms and Protocols for Wireless Sensor Networks (Wiley Series on Parallel and Distributed Computing)
Boukerche is well-known and established international researcher in the field of wireless mobile networks and distributed systems. This is one of the first publications to focus on wireless ad hoc and sensor networks with a concentration on algorithms and protocols providing you with a comprehensive resource to learn about the continuous advances...
Building Telephony Systems with OpenSIPS 1.6
Building Telephony Systems with OpenSIPS 1.6

SIP is the most important VoIP protocol and OpenSIPS is clearly the open source leader in VoIP platforms based on pure SIP. The whole telecommunication industry is changing to an IP environment, and telephony in the way we know today will disappear in less than ten years. SIP is the protocol leading this disruptive revolution and it is one of...

Serverless Applications with Node.js: Using AWS Lambda and Claudia.js
Serverless Applications with Node.js: Using AWS Lambda and Claudia.js
Summary

Serverless Applications with Node.js walks you through building serverless apps on AWS using JavaScript. Inside, you'll discover what Claudia.js brings to the table as you build and deploy a scalable event-based serverless application, based around a pizzeria that's fully integrated with AWS
...
Java 9 Dependency Injection: Write loosely coupled code with Spring 5 and Guice
Java 9 Dependency Injection: Write loosely coupled code with Spring 5 and Guice

Create clean code with Dependency Injection principles

Key Features

  • Use DI to make your code loosely coupled to manage and test your applications easily on Spring 5 and Google Guice
  • Learn the best practices and methodologies to implement DI
  • Write more...
unlimited object storage image
Result Page: 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 36 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy