Home | Amazing | Today | Tags | Publishers | Years | Search 
Java Security Solutions
Java Security Solutions
Your complete guide to the what, why, where, and how of Java Security

In this unique guide, two Java security experts show you how to take full advantage of Java security technologies–cryptography, algorithms, and architecture. They explain today’s Java security tools, concepts, protocols, and specifications, including ECC, RSA,...

Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they...
Core JavaServer(TM) Faces, Second Edition (2nd Edition) (Core Series)
Core JavaServer(TM) Faces, Second Edition (2nd Edition) (Core Series)
JavaServer Faces (JSF) is quickly emerging as the leading solution for rapid user interface development in Java-based server-side applications. Now, Core JavaServer Faces—the #1 guide to JSF—has been thoroughly updated in this second edition, covering the latest feature enhancements, the...
Upgrading and Repairing PCs (14th Edition)
Upgrading and Repairing PCs (14th Edition)
This is the newest comprehensive update to the world's #1 guide to PC repair and maintenance. Worldrenowned PC hardware expert Scott Mueller has thoroughly updated his legendary Upgrading and Repairing PCs to reflect today's latest PC technologies, and added a new DVD with more than two hours of digital video demonstrating PC maintenance and...
Web Archiving
Web Archiving
The public information available on the Web today is larger than information distributed on any other media. The raw nature of Web content, the unpredictable remote changes that can affect it, the wide variety of formats concerned, and the growth in data-driven websites make the preservation of this material a challenging task, requiring specific...
Microsoft  Exchange Server 2007 Administrator's Pocket Consultant (Pro Administrator's)
Microsoft Exchange Server 2007 Administrator's Pocket Consultant (Pro Administrator's)
Here's the practical, pocket-sized reference for IT professionals who administer and support Microsoft Exchange Server 2007. This unique guide provides essential details for using this next-generation messaging and collaboration platform to deliver better performance, interoperability, and end-user experience. Written by an award-winning...
2007 Microsoft  Office System Inside Out
2007 Microsoft Office System Inside Out
Learn everything you need to know for working with the 2007 Microsoft Office system--from the inside out! This book packs hundreds of time-saving solutions, troubleshooting tips, and workarounds for using the 2007 release of Microsoft Office--all in concise, fast-answer format. Whether you are upgrading from Office 97 or Office 2003, you'll be...
Human Interaction with Machines: Proceedings of the 6th International Workshop
Human Interaction with Machines: Proceedings of the 6th International Workshop
The International Workshop on “Human Interaction with Machines” is the sixth in a successful series of workshops that were established by Shanghai Jiao Tong University and Technische Universität Berlin. The goal of those workshops is to bring together researchers from both universities in order to present research results to an...
Designing Forms for Microsoft Office InfoPath and Forms Services 2007 (Microsoft .NET Development Series)
Designing Forms for Microsoft Office InfoPath and Forms Services 2007 (Microsoft .NET Development Series)
"Microsoft Office InfoPath represents a revolutionary leap in XML technologies and a new paradigm for gathering business-critical information. I am delighted that Scott Roberts and Hagen Green, two distinguished members of the InfoPath product team, decided to share their experience in this book."

--From the Foreword by Jean...

Microsoft  Office Outlook  2007 Step by Step
Microsoft Office Outlook 2007 Step by Step
The smart way to learn Microsoft Office Outlook 2007--one step at a time! Work at your own pace through the easy numbered steps, practice files on CD, helpful hints, and troubleshooting tips to master the fundamentals of working with the latest version of Office Outlook, including how to navigate the new user interface. You will learn the...
From P2P to Web Services and Grids: Peers in a Client/Server World
From P2P to Web Services and Grids: Peers in a Client/Server World

"From P2P to Web Services and Grids" provides a comprehensive overview of emerging distributed-systems technologies. It covers peer-to-peer (P2P) systems, which have revolutionized the way we think about distributed computing and the internet, alternative solutions, most notably web services and Grid computing, but...

Embedded Java Security: Security for Mobile Devices
Embedded Java Security: Security for Mobile Devices
This book is a comprehensive presentation of embedded Java security (namely, J2ME CLDC/MIDP), in the sense that the security model of embedded Java is thoroughly explained, then a detailed analysis of this model is undertaken. It is compared with the security model of Java Standard Edition in order to view the impact of limited resources (typically...
Result Page: 309 308 307 306 305 304 303 302 301 300 299 298 297 296 295 294 293 292 291 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy