 |
|
|
|
 Hacking Exposed Web 2.0: Web 2.0 Security Secrets and Solutions
Lock down next-generation Web services
"This book concisely identifies the types of attacks which are faced daily by Web 2.0 sites, and the authors give solid, practical advice on how to identify and mitigate these threats." --Max Kelly, CISSP, CIPP, CFCE, Senior Director of Security, Facebook
... |  |  Spring Security 3.1
Knowing that experienced hackers are itching to test your skills makes security one of the most difficult and high-pressure concerns of creating an application. The complexity of properly securing an application is compounded when you must also integrate this factor with existing code, new technologies, and other frameworks. Use this book to... |  |  |
|
 Spring Roo in Action
Summary
Spring Roo in Action is a unique book that teaches you how to code Java in Roo, with a particular focus on Spring-based applications. Through hands-on examples, you'll learn how Roo creates well-formed application structures and supports best practices and tools. Plus, you'll get a... |  |  Taming Text: How to Find, Organize, and Manipulate It
Summary
Taming Text, winner of the 2013 Jolt Awards for Productivity, is a hands-on, example-driven guide to working with unstructured text in the context of real-world applications. This book explores how to automatically organize text using approaches such as full-text search, proper name recognition,... |  |  ExtGWT Rich Internet Application Cookbook
80 recipes to build rich Java web apps on the robust GWT platform, with Sencha ExtGWT
-
Take your ExtGWT web development skills to the next level
-
Create stunning UIs with several layouts and templates in a fast and simple manner
-
Enriched with code and screenshots for easy and quick grasp
... |
|
Result Page: 3 2 1 |