Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
JavaScript Application Cookbook
JavaScript Application Cookbook
Seasoned Java coders will find the JavaScript Application Cookbook compiled just for them. Written in the same vein as the old-style programmer "toolbox" titles, this book sheds the usual tutorial presentation and simply introduces a series of JavaScript applications you can use on your own sites.

The cookbook begins with...

Foundations of Python Network Programming
Foundations of Python Network Programming

Foundations of Python Network Programming, Third Edition, covers all of the classic topics found in the second edition of this book, including network protocols, network data and errors, email, server architecture, and HTTP and web applications, plus updates for Python 3.

Some of the new topics in this edition...

Programming Python
Programming Python

As Python's creator. I'd like to say a few words about its origins, adding a bit of personal philosophy.

Over six years ago. in December 1989; I was looking for a "hobby" programming project that would keep me occupied during the week around Christmas. My office (a government-run research lab in Amsterdam)
...

Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails
Phishing Dark Waters: The Offensive and Defensive Sides of Malicious Emails

An essential anti-phishing desk reference for anyone with an email address

Phishing Dark Waters addresses the growing and continuing scourge of phishing emails, and provides actionable defensive techniques and tools to help you steer clear of malicious emails. Phishing is analyzed from the viewpoint of human...

Simple Steps to Data Encryption: A Practical Guide to Secure Computing
Simple Steps to Data Encryption: A Practical Guide to Secure Computing

Everyone wants privacy and security online, something that most computer users have more or less given up on as far as their personal data is concerned. There is no shortage of good encryption software, and no shortage of books, articles and essays that purport to be about how to use it. Yet there is precious little for ordinary users who...

sendmail Performance Tuning
sendmail Performance Tuning

"This book is great. Nick covers a wide range of materials--everything from how to architect the mail system and what disks to buy to how to configure your router. This book should be a basic reference for anyone who needs to get down into the guts of a sendmail-based system and make it shine."-Eric Allman, the...

How to Cheat at Securing Your Network (How to Cheat)
How to Cheat at Securing Your Network (How to Cheat)

Most Systems Administrators are not security specialists. Keeping the network secure is one of many responsibilities, and it is usually not a priority until disaster strikes. How to Cheat at Securing Your Network is the perfect book for this audience. The book takes the huge amount of information available on network security and...

TCP/IP Network Administration (3rd Edition; O'Reilly Networking)
TCP/IP Network Administration (3rd Edition; O'Reilly Networking)

The first edition of TCP/IP Network Administration was written in 1992. In the decade since, many things have changed, yet some things remain the same. TCP/IP is still the preeminent communications protocol for linking together diverse computer systems. It remains the basis of interoperable...

Practical Zendesk Administration
Practical Zendesk Administration
"Reading these chapters is like reading the advanced manual we never wrote when we designed the product. Stafford and Anton's ability to enlighten readers on how to use the product better and the reasons for the design decisions in Zendesk never ceases to impress us."
-Mikkel Svane, Founder and CEO at
...
Peer-to-Peer : Harnessing the Power of Disruptive Technologies
Peer-to-Peer : Harnessing the Power of Disruptive Technologies

The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and...

802.11n: A Survival Guide
802.11n: A Survival Guide
Communications is changing our life in many ways. Our society is increasingly dependent on wireless communications technologies and the applications they support. In the same way that we can’t understand how the folks who lived in 1800 managed without anesthesia, television, … (insert favorite must-have...
PHP Solutions: Dynamic Web Design Made Easy
PHP Solutions: Dynamic Web Design Made Easy
In this book you'll learn how to:
  • Create dynamic websites with design and usability in mind, as well as functionality
  • Understand how PHP scripts work, giving you confidence to adapt them to your own needs
  • Bring online forms to life, check required fields, and ensure user input is safe to process
  • ...
unlimited object storage image
Result Page: 53 52 51 50 49 48 47 46 45 44 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy