Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Flash Video for Professionals: Expert Techniques for Integrating Video on the Web
Flash Video for Professionals: Expert Techniques for Integrating Video on the Web
If your site needs video, you need this book

Now there's a single definitive source for everything Flash developers need to know to integrate cutting-edge video into a website—seamlessly. Whether your Flash skills focus on design or programming, this guide helps you with every phase from writing the project proposal to...

Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition
Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition

Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security

Key Features

  • Familiarize yourself with the most common web vulnerabilities
  • Conduct a preliminary assessment of attack surfaces and run exploits in your lab
  • ...
Building Applications with Microsoft® Outlook® Version 2002
Building Applications with Microsoft® Outlook® Version 2002

This book is designed primarily for Microsoft Outlook application developers using Microsoft Exchange Server. Many of the examples assume that you’ll be deploying workgroup applications in an Exchange Server environment using both public and private folders. It’s also assumed that you’ll be using Outlook 2002 to run the...

24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them
24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them

"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with...

Creating Database Web Applications with PHP and ASP (Internet Series)
Creating Database Web Applications with PHP and ASP (Internet Series)

Creating Database Web Applications with PHP and ASP teaches beginning and intermediate designers the fundamentals of creating complex Web applications. By covering both open source (PHP/MySQL) and proprietary tools (Microsoft ASP and Access), readers gain insight to the strengths and weaknesses of each. In addition, they learn how...

JFC Unleashed
JFC Unleashed
This programmer's tutorial helps the reader understand how to build client & server applications utilizing all the features of the new Java Foundation Classes - Extensive use of code samples demonstrate how to put each feature to use - Spe -Control the look & feel of Java applications using Suns Java Foundation Classes, the new standard...
Programming Firefox: Building Rich Internet Applications with XUL
Programming Firefox: Building Rich Internet Applications with XUL
This is your guide to building Internet applications and user interfaces with the Mozilla component framework, which is best known for the Firefox web browser and Thunderbird email client. Programming Firefox demonstrates how to use the XML User Interface Language (XUL) with open source tools in the framework's Cross-Platform Component...
JavaScript: The Definitive Guide: Activate Your Web Pages (Definitive Guides)
JavaScript: The Definitive Guide: Activate Your Web Pages (Definitive Guides)

Tills book covers the JavaScript language and the JavaScript APIs implemented by web browsers. I wrote it for readers with at least some prior programming experience who want to learn JavaScript and also for programmers who already use JavaScript but want to take their understanding to a new level and really master the language and the...

The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws

This book is a practical guide to discovering and exploiting security flaws in web applications. By “web applications” we mean those that are accessed using a web browser to communicate with a web server. We examine a wide variety of different technologies, such as databases, file systems, and web services, but only in the context...

Testable JavaScript
Testable JavaScript
You have to test your code, so why not make the process as easy and painless as possible? Client-side JavaScript is especially difficult to test properly, as we have very little control over the environment within which our code runs. Multiple operating systems, multiple versions of operating systems, multiple...
Getting Started with HTML5 WebSocket Programming
Getting Started with HTML5 WebSocket Programming

Develop and deploy your first secure and scalable real-time web application

Overview

  • Start real-time communication in your web applications
  • Create a feature-rich WebSocket chat application
  • Learn the step-by-step configuration of the server and clients
  • ...
LDAP Directories Explained: An Introduction and Analysis
LDAP Directories Explained: An Introduction and Analysis

Directory technology promises to solve the problem of decentralized information that has arisen with the explosion of distributed computing. Lightweight Directory Access Protocol (LDAP) is a set of protocols that has become the Internet standard for accessing information directories. Until now, however, those curious about...

unlimited object storage image
Result Page: 108 107 106 105 104 103 102 101 100 99 98 97 96 95 94 93 92 91 90 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy