OAuth 2.0 Identity and Access Management Patterns
Want to learn the world’s most widely used authorization framework? This tutorial will have you implementing secure Oauth 2.0 grant flows without delay. Written for practical application and clear instruction, it’s the complete guide.
Build web, client-side, desktop, and server-side...
Copyright Law in the Digital World: Challenges and Opportunities
This book addresses the key issues, challenges and implications arising out of changes in the copyright law and corresponding judicial responses. Using concrete examples, the book does not assume any prior knowledge of copyright law, but brings together leading intellectual property researchers to consider the significant role of copyright...
Test Driven Development: A Practical Guide Foreword by Ron Jeffries
- The relentlessly practical TDD guide: real problems, real solutions, real code
- Includes a start-to-finish project written in Java and using JUnit
- Introduces TDD frameworks for C++, C#/.NET, Python, VB6, and more
- For every developer and project manager interested
CISA Certified Information Systems Auditor All-in-One Exam Guide
"All-in-One is All You Need."
CISA Certified Information Systems Auditor All in One Exam Guide
Get complete coverage of all the material included on the Certified Information Systems Auditor exam inside this comprehensive resource. Written by an IT security and audit expert, this...
Microsoft Outlook 2010 Inside Out
You're beyond the basics, so dive right in and take control of your schedule and business communications from the inside out! This in-depth reference packs hundreds of timesaving solutions, troubleshooting tips, and workarounds in a supremely organized format. It's all muscle and no fluff. Discover how the experts manage...
Voice and Audio Compression for Wireless Communications "I recommend this book as a useful reference on voice and audio compression for wireless communication." (Computing Reviews, June 10, 2008)
Voice communications remains the most important facet of mobile radio services, which may be delivered over conventional fixed links, the Internet or wireless channels. This...
Techniques and Applications of Digital Watermarking and Content Protection Whether you need to quickly come up to speed on the state of the art in digital watermarking or want to explore the latest research in this area, such as 3-D geometry watermarking, this timely reference gives you the hands-on knowledge you need for your work. This book covers the full range of media -- still images, audio data, video, 3-D geometry...
|Result Page: 45 44 43 42 41 40 39 38 37 36 |