Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Hacking the Code: ASP.NET Web Application Security
Hacking the Code: ASP.NET Web Application Security

This unique book walks you through the many threats to your web application code, from managing and authorizing users and encrypting private data to filtering user input and securing XML. For every defined threat, it provides a menu of solutions and coding considerations. And, it offers coding examples and a set of security policies for each of...

Implementation and Application of Automata: 15th International Conference, CIAA 2010
Implementation and Application of Automata: 15th International Conference, CIAA 2010

This volume of Lecture Notes in Computer Science contains revised versions of papers presented at the 15th International Conference on Implementation and Application of Automata, CIAA 2010. The conference was held at the University of Manitoba in Winnipeg, Canada, on August 12–15, 2010. The previous CIAA conferences were held in London,...

Learning Perl, Fourth Edition
Learning Perl, Fourth Edition

Learning Perl, better known as "the Llama book", starts the programmer on the way to mastery. Written by three prominent members of the Perl community who each have several years of experience teaching Perl around the world, this latest edition has been updated to account for all the...

Adobe Illustrator CS6 on Demand (2nd Edition)
Adobe Illustrator CS6 on Demand (2nd Edition)
Welcome to Adobe Illustrator CS6 on Demand, a visual quick reference book that shows you how to work efficiently with Illustrator. This book provides complete coverage of basic to advanced Illustrator skills.

Need answers quickly? Adobe Illustrator CS6 on Demand provides those answers in a visual step-by-step format....

The Linux Command Line: A Complete Introduction
The Linux Command Line: A Complete Introduction

You've experienced the shiny, point-and-click surface of your Linux computer—now dive below and explore its depths with the power of the command line.

The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell. Along the way...

Learning Cypher
Learning Cypher

Write powerful and efficient queries for Neo4j with Cypher, its official query language

About This Book

  • Improve performance and robustness when you create, query, and maintain your graph database
  • Save time by writing powerful queries using pattern matching
  • Step-by-step...
Professional Augmented Reality Browsers for Smartphones: Programming for junaio, Layar and Wikitude (Wrox Programmer to Programmer)
Professional Augmented Reality Browsers for Smartphones: Programming for junaio, Layar and Wikitude (Wrox Programmer to Programmer)
AT AUGMENTEDPLANET.COM, I have been blogging about the rise in popularity of augmented reality (AR) since April 2009. When I started Augmented Planet, the only augmented reality applications available were either high-budget demos put together by creative agencies to wow their clients or obscure demos created by developers...
Java 11 and 12 – New Features: Learn about Project Amber and the latest developments in the Java language and platform
Java 11 and 12 – New Features: Learn about Project Amber and the latest developments in the Java language and platform

Enhance your development skills with Java's state-of-the-art features and projects to make your applications leaner and faster

Key Features

  • Overcome the challenges involved in migrating to new versions of Java
  • Discover how Oracle has bridged the gap between Java and...
Getting Started with Oracle Event Processing 11g
Getting Started with Oracle Event Processing 11g

Create and develop real-world scenario Oracle CEP applications

Overview

  • A unique insight and fascinating event driven journey that breathes life into Oracle Event Processing.
  • Explore the evolution and major capabilities of this innovative Oracle product in a step by step, building block...
Operations, Logistics and Supply Chain Management (Lecture Notes in Logistics)
Operations, Logistics and Supply Chain Management (Lecture Notes in Logistics)
This book provides an overview of important trends and developments in logistics and supply chain research, making them available to practitioners, while also serving as a point of reference for academicians. Operations and logistics are cornerstones of modern supply chains that in turn are essential for global business and...
WAN Survival Guide: Strategies for VPNs and Multiservice Networks
WAN Survival Guide: Strategies for VPNs and Multiservice Networks
Ensure that your WAN can handle the latest technologies with this must-have strategy guide

If a Wide Area Network (WAN) isn't set up properly, it won't be able to meet the needs of the applications being used in the Local Area Network (LAN). And with the emergence of new technologies such as VPNs, multi-service networks, and
...
SAS 9.1.3 Language Reference: Dictionary, 3-Volume Set
SAS 9.1.3 Language Reference: Dictionary, 3-Volume Set
New and enhanced features in Base SAS save you time, effort, and system resources by providing faster processing and easier data access and management, more robust analysis, and improved data presentation.
  •  By using new SAS system options that enable threading and the use of multiple CPUs, the following SAS procedures take...
unlimited object storage image
Result Page: 23 22 21 20 19 18 17 16 15 14 13 12 11 10 9 8 7 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy