 |
|
 |  |  Getting Started with OAuth 2.0
I’ve been working with web-based APIs since 1999, building SOAP-based web services for internal IT applications and helping thousands of developers using Google’s RESTbased APIs for Google Calendar, Picasa Web Albums, YouTube, and more. Each of these APIs has required authorization from users to act on their behalf. Developers ... |  |  Combinatorial Image Analysis: 14th International Workshop, IWCIA 2011
This volume includes the articles presented at the 14th International Workshop
on Combinatorial Image Analysis, IWCIA 2011, held in Madrid, Spain, May
23–25, 2011. The 13 previous meetings were held in Paris (France) 1991, Ube
(Japan) 1992, Washington D.C. (USA) 1994, Lyon (France) 1995, Hiroshima
(Japan) 1997, Madras... |
|
 Network Defense: Perimeter Defense Mechanisms
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent
reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers better known
as black hats are preying on information systems of government, corporate, public, and private networks and
are... |  |  SQL and Relational Theory: How to Write Accurate SQL Code
This edition differs from its predecessor in a number of ways. The overall objective remains the same, of course—
using SQL relationally is still the emphasis—but the text has been revised throughout to reflect, among other things,
experience gained from teaching live seminars based on the first edition.
One... |  |  Drupal 7 Theming Cookbook
Themes are among the most powerful and flexible features available when it comes to the
presentation of a website. The greatest strength of Drupal lies in its design, which, when done
correctly, allows developers and designers to customize and micromanage each and every
aspect of the site. Furthermore, the Drupal theming system and its... |
|
|
|
Result Page: 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 |