 |
|
|
 Ransomware: Defending Against Digital Extortion
The biggest online threat to businesses and consumers today is ransomware, a category of malware that can encrypt your computer files until you pay a ransom to unlock them. With this practical book, you’ll learn how easily ransomware infects your system and what steps you can take to stop the attack before it sets foot in the... |  |  Android Recipes: A Problem-Solution Approach
Discover more than 100 down-to-earth code recipes, covering a wide range of useful topics using complete and real-world working code examples. This book is updated to include the Android N SDK (7.0), as well as earlier releases.
Crammed with insightful instruction and helpful examples, this fifth edition of Android Recipes... |  |  Microservices: Flexible Software Architecture
The Most Complete, Practical, and Actionable Guide to Microservices
Going beyond mere theory and marketing hype, Eberhard Wolff presents all the knowledge you need to capture the full benefits of this emerging paradigm. He illuminates... |
|
 RESTful Java Patterns and Best Practices
Learn best practices to efficiently build scalable, reliable, and maintainable high performance RESTful services
About This Book
-
Learn how to build RESTful services with JAX-RS 2.0
-
Efficiently use the techniques outlined to build reliable and highly available applications based on...
|  |  Node.js the Right Way: Practical, Server-Side JavaScript That Scales
Get to the forefront of server-side JavaScript programming by writing compact, robust, fast, networked Node applications that scale. Ready to take JavaScript beyond the browser, explore dynamic languages features and embrace evented programming? Explore the fun, growing repository of Node modules provided by npm. Work with multiple protocols,... |  |  Defensive Security Handbook: Best Practices for Securing Infrastructure
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook... |
|
|
| Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 |