Home | Amazing | Today | Tags | Publishers | Years | Search 
Secure Java: For Web Application Development
Secure Java: For Web Application Development

Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure...

Mastering phpMyAdmin 3.3.x for Effective MySQL Management
Mastering phpMyAdmin 3.3.x for Effective MySQL Management

phpMyAdmin is an open source tool written in PHP. It handles the administration of MySQL over the World Wide Web (WWW). It can perform various tasks, such as creating, modifying, or deleting databases, tables, fields, or rows. It can also execute SQL statements and manage users and their permissions. When it comes to exploiting phpMyAdmin to...

Microsoft SharePoint 2010 Unleashed
Microsoft SharePoint 2010 Unleashed

Using Microsoft SharePoint 2010 technologies, organizations can bring together, utilize, and collaborate with information from virtually any source. Microsoft SharePoint 2010 Unleashed is the most complete, practical resource for all administrators, managers, architects, users, and power users who want to make the...

Microsoft Office Communications Server 2007 R2 Resource Kit
Microsoft Office Communications Server 2007 R2 Resource Kit

In-depth, comprehensive, and fully revised for R2—this RESOURCE KIT delivers the information you need to deploy, manage, and troubleshoot Microsoft Office Communications Server 2007 R2. Get technical insights, scenarios, and best practices from those who know the technology best—the engineers who designed and developed...

Liferay Portal 6 Enterprise Intranets
Liferay Portal 6 Enterprise Intranets

Liferay Portal is the world's leading open-source portal platform built on Java and Web 2.0 technologies. It was designed to not only simplify your work experience but cater to your preferences and needs. With this book in hand, you will be able to solve all your Intranet development-related queries. After all, a solution shouldn't...

PHP 5 Social Networking
PHP 5 Social Networking

Social Networking has quickly become a very popular activity on the Internet, particularly with the emergence of sites like Facebook and MySpace. PHP is a flexible web development language used on a wide variety of sites, including Facebook and Yahoo! But building a social networking site from scratch using PHP involves some complex logic,...

Pro ASP.NET SharePoint 2010 Solutions: Techniques for Building SharePoint Functionality into ASP.NET Applications
Pro ASP.NET SharePoint 2010 Solutions: Techniques for Building SharePoint Functionality into ASP.NET Applications

Code re-use is the Holy Grail of software development. Countless hours of refactoring, countless books, countless software development tools, components, IDEs, and platforms have been dedicated to pursue this elusive quality.

Why is this? As software consumers, we are used to seeing very rapid advancements in technology. Every...

Computational Forensics: 4th International Workshop, IWCF 2010 Tokyo, Japan
Computational Forensics: 4th International Workshop, IWCF 2010 Tokyo, Japan

This Lecture Notes in Computer Science (LNCS) volume contains the papers presented at the International Workshop on Computational Forensics (IWCF 2010), held in Tokyo, Japan during November 11–12, 2010. The workshop took place in conjunction with the 16th Annual Scientific Meeting of the Japanese Association of Forensic Science.

...
Understanding Voice over IP Security (Artech House Telecommunications Library)
Understanding Voice over IP Security (Artech House Telecommunications Library)

VoIP is poised to take over from the century-old public switched telephone network (PSTN). But VoIP telephony does not enjoy the same privacy as the old PSTN. This is because PSTN phone calls were based on establishing a “closed circuit” between the two parties, while VoIP phone calls send packets through the Internet, which...

Cisco LAN Switching Configuration Handbook (2nd Edition)
Cisco LAN Switching Configuration Handbook (2nd Edition)

Cisco LAN Switching Configuration Handbook, Second Edition, is a quick and portable reference guide to the most commonly used features that can be configured on Cisco® Catalyst® switches. Written to be used across all Catalyst IOS platforms, the book covers general use of Cisco IOS®, followed by a series...

Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses
Pro PHP Security: From Application Security Principles to the Implementation of XSS Defenses

PHP security, just like PHP itself, has advanced. Updated for PHP 5.3, the second edition of this authoritative PHP security book covers foundational PHP security topics like SQL injection, XSS, user authentication, and secure PHP development. Chris Snyder and Tom Myer also dive into recent developments like mobile security,...

Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20
Security Protocols: 15th International Workshop, Brno, Czech Republic, April 18-20

Welcome once again to the proceedings of the International Security Protocols Workshop. The 15th workshop in our series took place in Brno, a beautiful city in the southeast of the Czech Republic famous also as setting for a blown espionage operation in “Tinker Tailor Soldier Spy.”

The theme of our deliberations this...

Result Page: 51 50 49 48 47 46 45 44 43 42 41 40 39 38 37 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy