Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Software Architect's Handbook: Become a successful software architect by implementing effective architecture concepts
Software Architect's Handbook: Become a successful software architect by implementing effective architecture concepts

A comprehensive guide to exploring software architecture concepts and implementing best practices

Key Features

  • Enhance your skills to grow your career as a software architect
  • Design efficient software architectures using patterns and best practices
  • Learn...
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)
Building the Infrastructure for Cloud Security: A Solutions View (Expert's Voice in Internet Security)

For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the...

Advanced Rails
Advanced Rails
Ready to go to the next level with Rails? From examining the parts of Ruby that make this framework possible to deploying large Rails applications, Advanced Rails offers you an in-depth look at techniques for dealing with databases, security, performance, web services and much more. Chapters in this book help you understand not only the tricks and...
Programming the Semantic Web
Programming the Semantic Web
With this book, the promise of the Semantic Web -- in which machines can find, share, and combine data on the Web -- is not just a technical possibility, but a practical reality. Programming the Semantic Web demonstrates several ways to implement semantic web applications, using existing and emerging standards and technologies. You'll learn how to...
Open Source Fuzzing Tools
Open Source Fuzzing Tools
A "fuzzer" is a program that attempts to discover security vulnerabilities by sending random data to an application. If that application crashes, then it has deffects to correct. Security professionals and web developers can use fuzzing for software testing--checking their own programs for problems--before hackers do it!

Open...

Android Security Cookbook
Android Security Cookbook

Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions

Overview

  • Analyze the security of Android applications and devices, and exploit common vulnerabilities in applications and Android operating systems
  • ...
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
If you think computer security has improved in recent years, The Myths of Security will shake you out of your complacency. Longtime security professional John Viega, formerly Chief Security Architect at McAfee, reports on the sorry state of the industry, and offers concrete suggestions for professionals and individuals confronting the issue. Why is...
Network Security Evaluation: Using the NSA IEM
Network Security Evaluation: Using the NSA IEM
Are you an information security professional looking for a way to conduct network evaluations in a comprehensive and customized manner? Did you know that the National Security Agency has a methodology that they use and recommend? Security Evaluation was written by professionals who not only use this methodology themselves, but who helped develop...
Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters (Expert's Voice in Security)
Intel Trusted Execution Technology for Server Platforms: A Guide to More Secure Datacenters (Expert's Voice in Security)

"This book is a must have resource guide for anyone who wants to ...  implement TXT within their environments.  I wish we had this guide when our engineering teams were implementing TXT on our solution platforms!”  

John McAuley,EMC Corporation

"This book details innovative technology...

AdvancED Flex Application Development: Building Rich Media X
AdvancED Flex Application Development: Building Rich Media X
Many Flex books cover the basics—this book does something different, and goes far further. The authors, leading Flash platform developers at Almer/Blank, working with Adobe User Group communities, are the creators of the Rich Media Exchange (RMX), a social media network for Adobe developers. In covering just how the RMX was built, this book...
Building JavaScript Games: for Phones, Tablets, and Desktop
Building JavaScript Games: for Phones, Tablets, and Desktop

Building JavaScript Games teaches game programming through a series of engaging, arcade-style games that quickly expand your JavaScript and HTML5 skills. JavaScript is in the top ten most-used programming languages world wide, and is the basis for applications that can run in any modern browser, on any device from smart phone to...

Continuous Delivery and DevOps: A Quickstart guide
Continuous Delivery and DevOps: A Quickstart guide

Streamline and optimize your workflow with this fast and engaging guide to continuous delivery and DevOps. Delivering quality software every time will become a way of life.

Overview

  • Real world and realistic examples of how to go about implementing continuous delivery and DevOps
  • Learn...
Result Page: 10 9 8 7 6 5 4 3 2 1 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy