Home | Amazing | Today | Tags | Publishers | Years | Search 
CouchDB and PHP Web Development Beginner’s Guide
CouchDB and PHP Web Development Beginner’s Guide

PHP and CouchDB Web Development will teach you the fundamentals of combining CouchDB and PHP to create a full application from conception to deployment. This book will direct you in developing a basic social network, while guiding you through some of the common pitfalls that are frequently associated with NoSQL databases.

CouchDB...

GlassFish Security
GlassFish Security

Security was, is, and will be one of the most important aspects of Enterprise Applications and one of the most challenging areas for architects, developers, and administrators. It is mandatory for Java EE application developers to secure their enterprise applications using Glassfish security features.

Learn to secure Java EE...

Sams Teach Yourself Microsoft Windows 7 in 10 Minutes
Sams Teach Yourself Microsoft Windows 7 in 10 Minutes

Sams Teach Yourself Microsoft Windows® 7 in 10 Minutes gives you straightforward, practical answers when you need fast results. By working through its 10-minute lessons, you’ll learn how to get more done with Windows 7…get it done quicker with no hassle…and have more fun along the way!

...
Simple and Usable Web, Mobile, and Interaction Design (Voices That Matter)
Simple and Usable Web, Mobile, and Interaction Design (Voices That Matter)

In a complex world, products that are easy to use win favor with consumers. This is the first book on the topic of simplicity aimed specifically at interaction designers. It shows how to drill down and simplify user experiences when designing digital tools and applications. It begins by explaining why simplicity is attractive, explores the...

Active Directory: Designing, Deploying, and Running Active Directory, Fourth Edition
Active Directory: Designing, Deploying, and Running Active Directory, Fourth Edition

Active Directory is a common repository for information about objects that reside on the network, such as users, groups, computers, printers, applications, and files. The default Active Directory schema supports numerous attributes for each object class that can be used to store a variety of information. Access Control Lists (ACLs) are...

Codin' for the Web: A Designer's Guide to Developing Dynamic Web Sites
Codin' for the Web: A Designer's Guide to Developing Dynamic Web Sites

EVEN THE MOST SKILLED WEB DESIGNERS can find the complexities of creating a full-functioned Web site to be a daunting task. Here to help designers create sites that not only work, but work well and are easy to update and maintain is an easy-to-read guide to Web programming basics from best-selling author Charles Wyke-Smith. Just as architects...

Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Computer Forensics: Hard Disk and Operating Systems (Ec-Council Press Series : Computer Forensics)
Hacking and electronic crimes sophistication has grown at an exponential rate in recent years. In fact, recent reports have indicated that cyber crime already surpasses the illegal drug trade! Unethical hackers, better known as black hats, are preying on information systems of government, corporate, public, and private networks and...
CompTIA Security+ SY0-301 Authorized Cert Guide, Deluxe Edition (2nd Edition)
CompTIA Security+ SY0-301 Authorized Cert Guide, Deluxe Edition (2nd Edition)

Learn, prepare, and practice for CompTIA Security+ SY0-301exam success with this CompTIA Authorized Cert Guide, Deluxe Edition from Pearson IT Certification, a leader in IT Certification learning and a CompTIA Authorized Platinum Partner. DVD features three complete practice exams, complete video solutions to the 25...

Computer Security Fundamentals (2nd Edition)
Computer Security Fundamentals (2nd Edition)

It has been more than 6 years since the publication of the original edition of this book. A great deal has happened in the world of computer security since that time. This edition is updated to include newer information, updated issues, and revised content.

The real question is who is this book for. This book is...

Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Pro Spring Security
Pro Spring Security

Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications.

Pro Spring Security will be a reference and advanced tutorial
...

JavaMail API
JavaMail API
Email was the Internet’s first killer app. One of the most frequently asked questions about Java is how to send email from a Java applet or application. While it’s certainly possible to write a Java program that uses sockets to communicate with mail servers, this requires detailed knowledge of some fairly...
Result Page: 14 13 12 11 10 9 8 7 6 5 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy