Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CherryPy Essentials: Rapid Python Web Application Development
CherryPy Essentials: Rapid Python Web Application Development
This book covers the CherryPy library for Python web development from its history and installation through its main features and core concepts to its integration with Python and other products to construct, test, and deploy a sample photoblog application. The author Sylvain Hellegouarch is dedicated to the development of free software projects and...
Computer Networks (5th Edition)
Computer Networks (5th Edition)

This book is now in its fifth edition. Each edition has corresponded to a different phase in the way computer networks were used. When the first edition appeared in 1980, networks were an academic curiosity. When the second edition appeared in 1988, networks were used by universities and large businesses. When the third edition appeared in...

Windows Server 2012 Unified Remote Access Planning and Deployment
Windows Server 2012 Unified Remote Access Planning and Deployment

DirectAccess, introduced in Windows Server 2008 R2, has been a ground breaking VPN-like connectivity solution, adopted by thousands of organizations worldwide. Allowing organizations to deploy without manually configuring every client and providing always-on connectivity has made this technology world-famous. Now, with Windows Server 2012,...

Pro Angular
Pro Angular

Angular 4.0 updates for this book are now available. Follow the Download source code link for this book on the Apress website.

Get the most from Angular 2, the leading framework for building dynamic JavaScript applications. Best-selling author Adam Freeman begins by describing the MVC...

Flash Hacks : 100 Industrial-Strength Tips & Tools
Flash Hacks : 100 Industrial-Strength Tips & Tools

This collection offers expert Flash tips and tricks for optimization, creating interesting effects, ActionScript programming, sound and video effects, and much more--and you don't need to be an expert to use them (although you'll certainly look like one). Ranging from practical hacks to the fun and quirky, the book covers Flash MX,...

Hacking Exposed: Network Security Secrets & Solutions
Hacking Exposed: Network Security Secrets & Solutions
In today's round-the-clock, hyper-connected, all-digital economy, computer security is everyone's business. Hacking Exposed: Network Security Secrets & Solutions, Second Edition brings even more in-depth insight into how hackers infiltrate e-business, and how they can be stopped. Security insiders Stuart McClure, Joel Scambray, and George Kurtz...
AJAX: Creating Web Pages with Asynchronous JavaScript and XML (Bruce Perens' Open Source Series)
AJAX: Creating Web Pages with Asynchronous JavaScript and XML (Bruce Perens' Open Source Series)

The Easy, Example-Based Guide to Ajax for Every Web Developer

 

Using Ajax, you can build Web applications with the sophistication and usability of traditional desktop

...

Real World Color Management, Second Edition
Real World Color Management, Second Edition
Every graphics professional worth his or her salt knows the importance of color management. No matter how much thought artist and client put into the color scheme for a given project, all of that work is for naught if you can't get your results to match your expectations. Enter Real World Color Management.

In this industrial-strength,...

Java Message Service API Tutorial and Reference: Messaging for the J2EE Platform
Java Message Service API Tutorial and Reference: Messaging for the J2EE Platform
Aimed at the more experienced Java developer who needs to work with enterprise messaging, Java Message Service API Tutorial and Reference delivers starter code and a complete reference to all JMS classes that you will need to know to work effectively with this powerful feature of the J2EE platform.

The no-nonsense, just-the-facts...

VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers
VMware ESX Server in the Enterprise: Planning and Securing Virtualization Servers
VMware ESX Server in the Enterprise is the definitive, real-world guide to planning, deploying, and managing today’s leading virtual infrastructure platform in mission-critical environments.

 

Drawing on his extensive experience consulting on large-scale ESX Server implementations,...

MCTS Self-Paced Training Kit (Exam 70-503): Microsoft® .NET Framework 3.5 Windows® Communication Foundation (PRO-Certification)
MCTS Self-Paced Training Kit (Exam 70-503): Microsoft® .NET Framework 3.5 Windows® Communication Foundation (PRO-Certification)
Your 2-in-1 Self-Paced Training Kit EXAM PREP GUIDE Ace your preparation for the skills measured by MCTS Exam 70-503 and on the job. Work at your own pace through a series of lessons and reviews that fully cover each exam objective. Then, reinforce and apply what you ve learned through real-world case scenarios and practice exercises. This official...
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues
Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux. With the theory out of the way, you’ll...

unlimited object storage image
Result Page: 124 123 122 121 120 119 118 117 116 115 114 113 112 111 110 109 108 107 106 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy