Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Modern API Design with ASP.NET Core 2: Building Cross-Platform Back-End Systems
Modern API Design with ASP.NET Core 2: Building Cross-Platform Back-End Systems
Use ASP.NET Core 2 to create durable and cross-platform web APIs through a series of applied, practical scenarios. Examples in this book help you build APIs that are fast and scalable. You’ll progress from the basics of the framework through to solving the complex problems encountered in implementing secure RESTful services....
Design and Analysis of Vaccine Studies (Statistics for Biology and Health)
Design and Analysis of Vaccine Studies (Statistics for Biology and Health)

Widespread immunization has many different kinds of effects in individuals and populations, including in the unvaccinated individuals. The challenge is in understanding and estimating all of these effects. This book presents a unified conceptual framework of the different effects of vaccination at the individual and at the population level....

Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Biometric Image Discrimination Technologies (Computational Intelligence and Its Applications Series)
Personal identification and verification both play a critical role in our society.
Today, more and more business activities and work practices are computerized. Ecommerce
applications, such as e-banking, or security applications, such as building
access, demand fast, real-time and accurate personal identification. Traditional
...
Stopping Spyware
Stopping Spyware
Stop spyware in its tracks! Spyware infects the vast majority of home computers today. After it's on your machine, it can be used to access your social security number, track every website you visit, and take control of your computer away from you. If you work for a large company, odds are your company has purchased anti-spyware protection for...
PHP for Absolute Beginners
PHP for Absolute Beginners

PHP is a server-side scripting language that enables you to develop dynamic sites that engage users in ways that are simply not possible using only HTML and CSS. PHP for Absolute Beginners takes a practical approach to teaching you how to build dynamic content for your website using PHP. You’ll quickly get started with...

Digital Identity
Digital Identity

The rise of network-based, automated services in the past decade has definitely changed the way businesses operate, but not always for the better. Offering services, conducting transactions and moving data on the Web opens new opportunities, but many CTOs and CIOs are more concerned with the risks. Like the rulers of medieval...

CWAP - Certified Wireless Analysis Professional Official Study Guide (Exam PW0-205)
CWAP - Certified Wireless Analysis Professional Official Study Guide (Exam PW0-205)

The only official study guide from the creators of the CWAP exam

  • 100% Complete Coverage – All official test objectives for exam PWO-205 are covered in detail
  • Detailed Frame Analysis – Frame format and frame exchange process diagrams and explanations offer a one-of-a-kind learning experience focused on...
Windows Server 2003 Security Infrastructures : Core Security Features (HP Technologies)
Windows Server 2003 Security Infrastructures : Core Security Features (HP Technologies)

Windows Server 2003 Security Infrastructures is a must for anyone that wants to know the nuts and bolts of Windows Server 2003 security and wants to leverage the operating system’s security infrastructure. The primary goal of this book is to provide insights into the security features and technologies of the Windows Server 2003...

CD Cracking Uncovered: Protection Against Unsanctioned CD Copying
CD Cracking Uncovered: Protection Against Unsanctioned CD Copying

A manual on protecting CDs against illegal copying, this book shows how crackers copy CDs using various access methods. The methods covered include the CDFS driver, cooked mode, SPTI, ASPI, the SCSI port, and the MSCDEX driver. Explained is how to prevent cracker break-ins using protections based on nonstandard CD formats such as the CD driver...

Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China: The New Global Hub of IT (Information Technology) Outsourcing
Source Code China

The New Global Hub of IT Outsourcing

Welcome to the new technology outsourcing services industry reality: China!

The factors that point to a country's potential and success as an outsourcing destination inevitably lead to the one country that is rapidly becoming the new hub for IT...

Mastering Sublime Text
Mastering Sublime Text

When it comes to cross-platform text and source code editing, Sublime Text has few rivals. This book will teach you all its great features and help you develop and publish plugins. A brilliantly inclusive guide.

Overview

  • Discover efficient, keyboard-driven text editing
  • Recognize the latest...
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations
Asset Attack Vectors: Building Effective Vulnerability Management Strategies to Protect Organizations

Build an effective vulnerability management strategy to protect your organization’s assets, applications, and data.

Today’s network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a
...
unlimited object storage image
Result Page: 48 47 46 45 44 43 42 41 40 39 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy