Home | Amazing | Today | Tags | Publishers | Years | Search 
ModSecurity Handbook
ModSecurity Handbook

ModSecurity Handbook is the definitive guide to ModSecurity, a popular open source web application firewall. Written by Ivan Ristic, who designed and wrote much of ModSecurity, this book will teach you everything you need to know to monitor the activity on your web sites and protect them from attack. Situated between your web sites and the...

Add Interactivity to Your Site: The Mini Missing Manual
Add Interactivity to Your Site: The Mini Missing Manual

The days of Web pages that have nothing more than text and a picture or two are long gone. To be competitive in today’s Internet landscape, you need pages that pop. This Mini Missing Manual shows you how to add interactive elements to your pages: menus that expand when a visitor clicks on them, images that change with a mouse roll, and...

Digital Signatures (Advances in Information Security)
Digital Signatures (Advances in Information Security)

As a beginning graduate student, I recall being frustrated by a general lack of accessible sources from which I could learn about (theoretical) cryptography. I remember wondering: why aren’t there more books presenting the basics of cryptography at an introductory level? Jumping ahead almost a decade later, as a faculty member my...

Emerging Technologies of Augmented Reality: Interfaces and Design
Emerging Technologies of Augmented Reality: Interfaces and Design

Although the field of mixed reality has grown significantly over the last decade, there have been few published books about augmented reality, particularly the interface design aspects. Emerging Technologies of Augmented Reality: Interfaces and Design provides a foundation of the main concepts of augmented reality (AR), with a particular...

Programming Python
Programming Python

If you've mastered Python's fundamentals, you're ready to start using it to get real work done. Programming Python will show you how, with in-depth tutorials on the language's primary application domains: system administration, GUIs, and the Web. You'll also explore how Python is used in databases,...

Mining the Social Web: Analyzing Data from Facebook, Twitter, LinkedIn, and Other Social Media Sites
Mining the Social Web: Analyzing Data from Facebook, Twitter, LinkedIn, and Other Social Media Sites

Facebook, Twitter, and LinkedIn generate a tremendous amount of valuable social data, but how can you find out who's making connections with social media, what they’re talking about, or where they’re located? This concise and practical book shows you how to answer these questions and more. You'll learn how to...

Design Methods and Applications for Distributed Embedded Systems
Design Methods and Applications for Distributed Embedded Systems

The ever decreasing price/performance ratio of microcontrollers makes it economically attractive to replace more and more conventional mechanical or electronic control systems within many products by embedded real-time computer systems. An embedded real-time computer system is always part of a well-specified larger system, which we call an...

C# 2010 for Programmers (4th Edition) (Deitel Developer Series)
C# 2010 for Programmers (4th Edition) (Deitel Developer Series)

The professional programmer’s Deitel® guide to C# 2010 and the powerful Microsoft® .NET 4 Framework

Written for programmers with a background in C++, Java or other high-level, object-oriented languages, this book applies the Deitel signature live-code approach to teaching programming and...

Sams Teach Yourself iPad in 10 Minutes (Sams Teach Yourself -- Minutes)
Sams Teach Yourself iPad in 10 Minutes (Sams Teach Yourself -- Minutes)

Sams Teach Yourself iPad™ in 10 Minutes offers straightforward, practical answers when you need fast results. By working through 10-minute lessons, you’ll learn everything you need to use your iPad to get online, get apps, use the Web, manage email, use maps, books, photos, music,...

Easy To Understand Guide Hom Com
Easy To Understand Guide Hom Com

TO MANY PEOPLE, the word "computer" is a kind of future shock - an image of huge, intimidating machines banked in specially climate-controlled rooms, deep in corporate America. The people who use them, we think, are an elite group - far from ordinary people, hunched over their glowing video screens like sorcerers bending over a...

The Practice of Enterprise Modeling: Third IFIP WG 8.1 Working Conference
The Practice of Enterprise Modeling: Third IFIP WG 8.1 Working Conference

These are the proceedings of the Third IFIP WG 8.1 Working Conference on the Practice of Enterprise Modeling, held in Delft (The Netherlands) on November 9 and 10, 2010. It followed the success of PoEM 2008 and 2009 (both held in Stockholm), which each attracted over 50 participants from all over the world, representing both industry and...

Learning Classifier Systems: 11th International Workshop, IWLCS 2008
Learning Classifier Systems: 11th International Workshop, IWLCS 2008

Learning Classifier Systems (LCS) constitute a fascinating concept at the intersection of machine learning and evolutionary computation. LCS’s genetic search, generally in combination with reinforcement learning techniques, can be applied to both temporal and spatial problem-solving and promotes powerful search in a wide variety of...

Result Page: 884 883 882 881 880 879 878 877 876 875 874 873 872 871 870 869 868 867 866 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy