Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Serverless Single Page Apps: Fast, Scalable, and Available
Serverless Single Page Apps: Fast, Scalable, and Available

Don't waste your time building an application server. See how to build low-cost, low-maintenance, highly available, serverless single page web applications that scale into the millions of users at the click of a button. Quickly build reliable, well-tested single page apps that stay up and running 24/7 using Amazon Web Services. Avoid...

Learning AWS
Learning AWS

Design, build, and deploy responsive applications using AWS cloud components

About This Book

  • Build scalable and highly available real-time applications
  • Make cost-effective architectural decisions by implementing your product's functional and non-functional requirements
  • ...
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Syngress Force 2006 Emerging Threat Analysis: From Mischief to Malicious
Over the last seven years, Internet Security Systems' (ISS) elite X-Force has discovered more high-risk vulnerabilities than all other research groups and vendors combined, including the vulnerability that led to the recent, widespread Zotob worm. For the first time ever, follow the X-Force team as they analyze potential vulnerabilities and...
Multi-Tier Application Programming with PHP: Practical Guide for Architects and Programmers (The Practical Guides)
Multi-Tier Application Programming with PHP: Practical Guide for Architects and Programmers (The Practical Guides)
A fresh look at PHP as it applies to multi-tier application design, giving developers an alternative to more expensive and less manageable solutions.

Some of the benefits of using PHP is that it is easier to learn and cheaper than using Java J2EE Enterprise or .NET platforms. In concert with a database server and a
...
Cyber Terrorism: Political And Economic Implications
Cyber Terrorism: Political And Economic Implications
Cyber Terrorism: Political and Economic Implications is a cyber terrorism brief that outlines many of the recent terrorist activities, political objectives, and their use of cyberspace. Much of this book is dedicated to illustrating the use of the global information infrastructure by terrorists for the communication and coordination of distributed...
Microsoft Dynamics NAV Administration
Microsoft Dynamics NAV Administration

This book is a tutorial guide that illustrates the steps needed to install, configure, deploy, and administer Dynamics NAV. It shows you how to get started with Dynamics NAV and then gradually explains other admin tasks such as backing up and performance tuning, using practical examples. If you want to get started in administering Dynamics...

Java 2 Enterprise Edition 1.4 (J2EE 1.4) Bible
Java 2 Enterprise Edition 1.4 (J2EE 1.4) Bible
"One stop shopping for J2EE."
– Scott Ambler, Senior Consultant, Ronin International, Inc. and Author of Agile Modeling

If Java 2 Enterprise Edition 1.4 can do it, you can do it too...

You already know that Java 2 Enterprise Edition 1.4 makes your enterprise services more cost-effective, more adaptable,...

Europe in Crisis: Bolt from the Blue?
Europe in Crisis: Bolt from the Blue?

This book analyzes the European Great Recession of 2008-12, its economic and social causes, its historical roots, and the policies adopted by the European Union to find a way out of it. It contains explicit debates with several economists and analysts on some of the most controversial questions about the causes of the crisis and the policies...

Java(TM) EE 5 Tutorial, The (3rd Edition) (The Java Series)
Java(TM) EE 5 Tutorial, The (3rd Edition) (The Java Series)

The Java™ EE 5 Tutorial, Third Edition, is the definitive, task-oriented, example-driven guide to programming server-side applications with Sun Microsystems' new Java(TM) EE 5 platform. Written by members of Sun's Java EE 5 platform team, this book enables new and intermediate Java programmers to build...

Wireless Security
Wireless Security
Get full details on major mobile/wireless clients and operating systems-including Windows CE, Palm OS, UNIX, and Windows. You'll learn how to design and implement a solid security system to protect your wireless network and keep hackers out. Endorsed by RSA Security - the most trusted name in e-security - this is your one-stop guide to wireless...
NetBeans  Ruby and Rails IDE with JRuby (FirstPress)
NetBeans Ruby and Rails IDE with JRuby (FirstPress)

As Ruby and Rails continues to grow, and more and more jobs are coming online that require you to effectively develop Ruby and Rails in the web tier. Beyond the Rails framework, there are still very few proven tools and IDEs to get the job done, at least until now. The NetBeans Ruby and Rails IDE, according to some, is by far the best and...

Database Programming with JDBC and Java
Database Programming with JDBC and Java

Java and databases make a powerful combination. Getting the two sides to work together, however, takes some effort--largely because Java deals in objects while most databases do not.

This book describes the standard Java interfaces that make portable object-oriented access to relational databases possible and offers a robust
...

Result Page: 15 14 13 12 11 10 9 8 7 6 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy