|
|
|
|
Spring in Practice: Covers Spring 3
Summary
Spring in Practice shows you how to tackle the challenges you face when you build Spring-based applications. The book empowers software developers to solve concrete business problems by mapping application-level issues to Spring-centric solutions. It diverges from other cookbooks because it presents... | | HackNotes(tm) Web Security Pocket ReferenceHackNotes Web Security Portable Reference describes the hacks and vulnerabilities threatening today's Web applications, then provides the defenses necessary to counteract and destroy threats of all manner. Determine whether a vulnerability exists, then attack and overcome application weaknesses through a series of tested and trusted... | | Enterprise JavaBeans 3.1
Learn how to code, package, deploy, and test functional Enterprise JavaBeans with the latest edition of this bestselling guide. Written by the developers of JBoss EJB 3.1, this book not only brings you up to speed on each component type and container service in this implementation, it also provides a workbook with several hands-on... |
|
Hacking Exposed Web Applications, 2nd Ed.Implement bulletproof e-business security the proven Hacking Exposed way
Defend against the latest Web-based attacks by looking at your Web applications through the eyes of a malicious intruder. Fully revised and updated to cover the latest Web exploitation techniques, Hacking Exposed Web Applications, Second Edition shows you,... | | Minimally Invasive Spine Surgery: A Surgical Manual
Don’t miss it! The second, completely revised and expanded edition of the successful surgical manual on minimally invasive spine surgery includes 51 chapters (including more than 20 new chapters) covering all current minimally invasive techniques in spine surgery. A complete survey of all microsurgical and endoscopic techniques with a... | | Web Applications (Hacking Exposed)"This book goes a long way in making the Web a safer place to do business." -- Mark Curphey, Chair of the Open Web Application Security Project
Unleash the hackers' arsenal to secure your Web applications
In today's world of pervasive Internet connectivity and rapidly evolving Web technology, online security is as... |
|
Applying Domain-Driven Design and Patterns: With Examples in C# and .NET“[This] is a book about design in the .NET world, driven in an agile manner and infused with the products of the enterprise patterns community. [It] shows you how to begin applying such things as TDD, object relational mapping, and DDD to .NET projects...techniques that many developers think are the key to future... | | Professional Rootkits (Programmer to Programmer)Whether you want to learn how to develop a robust, full-featured rootkit or you're looking for effective ways to prevent one from being installed on your network, this hands-on resource provides you with the tools you'll need. Expert developer Ric Vieler walks you through all of the capabilities of rootkits, the technology they use, steps for... | | Scala for Machine Learning
Leverage Scala and Machine Learning to construct and study systems that can learn from data
About This Book
-
Explore a broad variety of data processing, machine learning, and genetic algorithms through diagrams, mathematical formulation, and source code
-
Leverage your expertise in Scala...
|
|
|
|
Result Page: 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |