 |
|
 Programming Microsoft ASP.NET MVC (3rd Edition) (Developer Reference)
Develop next-generation web applications with ASP.NET MVC
Go deep into the architecture and features of ASP.NET MVC 5, and learn how to build web applications that work well on both the desktop and mobile devices. Web development expert Dino Esposito takes you through the web framework’s Model-View-Controller (MVC)... |  |  JBoss AS 7 Development
Learn from an expert and master JBoss Application Server through this brilliantly accessible book. It irons out the difficulties and covers creating, debugging, and securing Java EE applications. The only manual you need.
Overview
-
A complete guide for JBoss developers covering everything from basic...
|  |  Learning Image Processing with OpenCV
Exploit the amazing features of OpenCV to create powerful image processing applications through easy-to-follow examples
About This Book
-
Learn how to build full-fledged image processing applications using free tools and libraries
-
Take advantage of cutting-edge image processing...
|
|
 Getting Started with Oracle WebLogic Server 12c: Developer's Guide
If you’ve dipped a toe into Java EE development and would now like to dive right in, this is the book for you. Introduces the key components of WebLogic Server and all that’s great about Java EE 6.
Overview
-
Create a complete Java EE 6 application leveraging WebLogic features like JMS, SOAP and...
|  |  Bazaar Version Control
Primarily written for those who are new to version control systems, this easy-to-follow guide to Bazaar will quickly make you an expert. From basic principles to creating plugins – it’s all here.
Overview
-
Gain an understanding of what version control is, and how you can benefit and effectively...
|  |  Identity and Data Security for Web Development: Best Practices
Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how... |
|
 Microsoft Exchange Server 2013 Inside Out Mailbox and High Availability
With a focus on mailbox and high availability features, this book delivers the ultimate, in-depth reference to IT professionals planning and managing an Exchange Server 2013 deployment. Guided by Tony Redmond, a Microsoft MVP and award-winning author, you will:
-
Understand major changes to Exchange Server architecture
... |  |  Kafka: The Definitive Guide: Real-time data and stream processing at scale
Learn how to take full advantage of Apache Kafka, the distributed, publish-subscribe queue for handling real-time data feeds. With this comprehensive book, you’ll understand how Kafka works and how it’s designed. Authors Neha Narkhede, Gwen Shapira, and Todd Palino show you how to deploy production Kafka clusters; secure,... |  |  Expert Python Programming - Second Edition
Become an ace Python programmer by learning best coding practices and advance-level concepts with Python 3.5
About This Book
-
Based on the latest stable version of Python (version 3.5)
-
Creating well manageable code that will run in various environments with different sets of...
|
|
|
Result Page: 46 45 44 43 42 41 40 39 38 37 36 35 34 33 |