 |
|
 CouchDB and PHP Web Development Beginner’s Guide
PHP and CouchDB Web Development will teach you the fundamentals of combining CouchDB and PHP to create a full application from conception to deployment. This book will direct you in developing a basic social network, while guiding you through some of the common pitfalls that are frequently associated with NoSQL databases.
CouchDB... |  |  Electrical Circuit Theory and Technology, Second Edition: Revised edition
Electrical Circuit Theory and Technology is a fully comprehensive text for courses in electrical and electronic principles, circuit theory and electrical technology. The coverage takes students from the fundamentals of the subject, to the completion of a first year degree level course. Thus, this book is ideal for students studying... |  |  Information Security: Principles and Practice
Now updated—your expert guide to twenty-first century information security
Information security is a rapidly evolving field. As businesses and consumers become increasingly dependent on complex multinational information systems, it is more imperative than ever to protect the confidentiality and integrity of data.... |
|
|
 JavaMail API
Email was the Internet’s first killer app. One of the most frequently asked questions
about Java is how to send email from a Java applet or application. While it’s certainly
possible to write a Java program that uses sockets to communicate with mail servers,
this requires detailed knowledge of some fairly ... |  |  Active Directory Cookbook
Take the guesswork out of deploying, administering, and automating Active Directory. With hundreds of proven recipes, the updated edition of this popular cookbook provides quick, step-by-step solutions to common (and not so common) problems you might encounter when working with Microsoft’s network directory service.
... |  |  Pro Spring Security
Security is a key element in the development of any non-trivial application. The Spring Security Framework provides a comprehensive set of functionalities to implement industry-standard authentication and authorization mechanisms for Java applications.
Pro Spring Security will be a reference and advanced tutorial... |
|
 Metasploit Penetration Testing Cookbook, Second Edition
Metasploit software helps security and IT professionals identify security issues, verify vulnerability mitigations, and manage expert-driven security assessments. Capabilities include smart exploitation, password auditing, web application scanning, and social engineering. Teams can collaborate in Metasploit and present their findings in... |  |  Learn Active Directory Management in a Month of Lunches
Summary
Learn Active Directory Management in a Month of Lunches is a practical, hands-on tutorial designed for IT pros new to Active Directory. It skips the theory and concentrates on the day-to-day administration tasks you need to know to keep your network running smoothly. Just set aside an hour a day for... |  |  Teach Yourself VISUALLY Windows 8.1
A practical guide for visual learners eager to get started with Windows 8.1
If you learn more quickly when you can see how things are done, this Visual guide is the easiest way to get up and running on Windows 8.1. It covers more than 150 essential Windows tasks, using full-color screen shots and step-by-step instructions to... |
|
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |