Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Django: Web Application Development and Deployment with Python
Beginning Django: Web Application Development and Deployment with Python
Discover the Django web application framework and get started building Python-based web applications. This book takes you from the basics of Django all the way through to cutting-edge topics such as creating RESTful applications. Beginning Django also covers ancillary, but essential, development topics, including...
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution
Identity Attack Vectors: Implementing an Effective Identity and Access Management Solution

Discover how poor identity and privilege management can be leveraged to compromise accounts and credentials within an organization. Learn how role-based identity assignments, entitlements, and auditing strategies can be implemented to mitigate the threats leveraging accounts and identities and how to manage compliance for regulatory...

Deploying Qos for Cisco Ip and Next Generation Networks: The Definitive Guide
Deploying Qos for Cisco Ip and Next Generation Networks: The Definitive Guide
"Deploying QoS for IP Next Generation Networks: The Definitive Guide" provides network architects and planners with insight into the various aspects that drive QoS deployment for the various network types. It serves as a single source of reference for businesses that plan to deploy a QoS framework for voice, video, mobility and data...
Embedded and Real Time System Development: A Software Engineering Perspective: Concepts, Methods and Principles (Studies in Computational Intelligence)
Embedded and Real Time System Development: A Software Engineering Perspective: Concepts, Methods and Principles (Studies in Computational Intelligence)

Nowadays embedded and real-time systems contain complex software. The complexity of embedded systems is increasing, and the amount and variety of software in the embedded products are growing. This creates a big challenge for embedded and real-time software development processes and there is a need to develop separate metrics and...

LDAP Programming with Java(TM)
LDAP Programming with Java(TM)
In this book we’ve provided a very large number of examples for every aspect of
programming with Directory SDK for Java, from simple code snippets to more than
two dozen complete components and applications. You may be able to use some of
them as starting points for your own projects.

We do not discuss directory
...
Biometrics for Network Security
Biometrics for Network Security

The complete guide to implementing biometric security solutions for your network

Network security has become the latter-day equivalent of oxymoronic terms like "jumbo shrimp" and "exact estimate." Newspaper headlines are routinely peppered with incidents of hackers thwarting the security put forth by...

Security Monitoring
Security Monitoring
How well does your enterprise stand up against today's sophisticated security threats? In this book, security experts from Cisco Systems demonstrate how to detect damaging security incidents on your global network--first by teaching you which assets you need to monitor closely, and then by helping you develop targeted strategies and pragmatic...
Architecture of Network Systems (The Morgan Kaufmann Series in Computer Architecture and Design)
Architecture of Network Systems (The Morgan Kaufmann Series in Computer Architecture and Design)

Data communication networks are widely used today and are an integral part of our daily life. The Internet is a medium for business, personal, and government communication, and it is difficult to envision today’s society without this essential infrastructure. The continued success of the Internet is dependent on our ability to...

Everyday Cryptography: Fundamental Principles and Applications
Everyday Cryptography: Fundamental Principles and Applications

Cryptography is a vital technology that underpins the security of information in computer networks. This book presents a comprehensive introduction to the role that cryptography plays in providing information security for technologies such as the Internet, mobile phones, payment cards, and wireless local area networks. Focusing on the...

OpenStack Trove
OpenStack Trove

OpenStack Trove is your step-by-step guide to set up and run a secure and scalable cloud Database as a Service (DBaaS) solution. The book shows you how to set up and configure the Trove DBaaS framework, use prepackaged or custom database implementations, and provision and operate a variety of databases―including MySQL,...

Microsoft Visual Studio LightSwitch Unleashed
Microsoft Visual Studio LightSwitch Unleashed

Microsoft® Visual Studio® LightSwitch® Unleashed

Alessandro Del Sole

 

Microsoft Visual Studio LightSwitch represents a breakthrough in business application development for Windows clients, the Web, and the cloud....

Demystifying Smart Cities: Practical Perspectives on How Cities Can Leverage the Potential of New Technologies
Demystifying Smart Cities: Practical Perspectives on How Cities Can Leverage the Potential of New Technologies

The concept of Smart Cities is accurately regarded as a potentially transformative power all over the world. Bustling metropolises infused with the right combination of the Internet of Things, artificial intelligence, big data, and blockchain promise to improve both our daily lives and larger structural operations at a city...

unlimited object storage image
Result Page: 102 101 100 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 84 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy