MySQL and JSON: A Practical Programming Guide
Applied Network Security
Master the art of detecting and averting advanced network security attacks and techniques
About This Book
Deep dive into the advanced network security attacks and techniques by leveraging tools such as Kali Linux 2, MetaSploit, Nmap, and Wireshark
Become an expert in cracking WiFi...
Instant Node.js Starter
Program your scalable network applications and web services with Node.js with this book and ebook
Learn something new in an Instant! A short, fast, focused guide delivering immediate results
Learn how to use module patterns and Node Packet Manager (NPM) in your applications...
RESTful .NET: Build and Consume RESTful Web Services with .NET 3.5
I’ve been working with the Web throughout my entire software engineering career. I started out writing ASP pages and COM components. I then moved into the world of .NET with ASP.NET and ASMX web services.
In 2004, I got involved with BizTalk Server, which pushed me even more into the world of services and XML. I worked with...
Cloud Standards: Agreements That Hold Together Clouds
Cloud computing is often described as providing computing resources the way electric utilities provide energy. In theory, anyone with an adequate connection to the Internet should be able to tap into a cloud provider and get exactly the computing resources they want when they want it, just like plugging into the electricity grid and...
|Result Page: 143 142 141 140 139 138 137 136 135 134 |