Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Programming Web Services with Perl
Programming Web Services with Perl
Programming Web Services with Perl is written for Perl programmers who have no prior knowledge of web services. No understanding of XML-RPC or SOAP is necessary to be able to apply these technologies easily, through the use of publicly available Perl modules detailed in the book. If you're interested in applying...
Open Source Development with CVS
Open Source Development with CVS
The need for a modern source-code management strategy in the distributed open-source community is paramount. The benevolent dictatorship model of open-source maintainers is only quasi-stable, but it is far better than the other extreme: the chaos of democratic code development.

The best available compromise is the concurrent versioning system...

Creating and Consuming Web Services in Visual Basic
Creating and Consuming Web Services in Visual Basic
One of the more confusing items about Web Services regards defining exactly what and
why they are. Let's begin with why they exist.

Web Services exist to make it easier to integrate applications. Existing technologies include
Java RMI, CORBA, and DCOM. All of these technologies work over networked
environments and allow
...
RFID Handbook: Applications, Technology, Security, and Privacy
RFID Handbook: Applications, Technology, Security, and Privacy
Radio Frequency Identification (RFID) tagging is now used by the department of defense and many of the worlds largest retailers including Wal-Mart. As RFID continues to infiltrate industries worldwide, organizations must harness a clear understanding of this technology in order to maximize its potential and protect against the potential risks it...
Mouse Models of Innate Immunity: Methods and Protocols (Methods in Molecular Biology)
Mouse Models of Innate Immunity: Methods and Protocols (Methods in Molecular Biology)

The innate immune system represents a critical arm of the immune response by providing immediate and robust host defense; however, human studies of its function are often limited by ethical, logistical, and technical obstacles. In Mouse Models of Innate Immunity: Methods and Protocols, experts in the field explore the design and...

Software Development From A to Z: A Deep Dive into all the Roles Involved in the Creation of Software
Software Development From A to Z: A Deep Dive into all the Roles Involved in the Creation of Software

Understand the big picture of the software development process. We use software every day – operating systems, applications, document editing programs, home banking – but have you ever wondered who creates software and how it’s created? This book guides you through the entire process, from conception to the finished...

Designing a Wireless Network
Designing a Wireless Network
Wireless network design presents the IT professional with unique obstacles. Your network requires the seamless and secure distribution of information, in spite of competing communication protocols, incompatible hardware platforms, and narrow bandwidths. This book is an introduction to developing efficient means of wireless transport in order to...
Hacking Exposed Cisco Networks
Hacking Exposed Cisco Networks

Implement bulletproof Cisco security the battle-tested Hacking Exposed way

Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised...

Cryptology Unlocked
Cryptology Unlocked
Cryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security.

This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic...

Analysis and Synthesis of Logics: How to Cut and Paste Reasoning Systems (Applied Logic Series)
Analysis and Synthesis of Logics: How to Cut and Paste Reasoning Systems (Applied Logic Series)
Starting with simple examples showing the relevance of cutting and pasting logics, the monograph develops a mathematical theory of combining and decomposing logics, ranging from propositional and first-order based logics to higher-order based logics as well as to non-truth functional logics. The theory covers mechanisms for combining semantic...
Mastering Modern Web Penetration Testing
Mastering Modern Web Penetration Testing

Key Features

  • This book covers the latest technologies such as Advance XSS, XSRF, SQL Injection, Web API testing, XML attack vectors, OAuth 2.0 Security, and more involved in today's web applications
  • Penetrate and secure your web application using various techniques
  • Get this comprehensive...
CRISPR Guide RNA Design: Methods and Protocols (Methods in Molecular Biology, 2162)
CRISPR Guide RNA Design: Methods and Protocols (Methods in Molecular Biology, 2162)
This detailed volume focuses on the CRISPR-associated guide RNA and how it can be designed, modified, and validated for a broad repertoire of purposes. Beginning with a section on computational design of target-specific guide RNAs, the book continues by covering chemical modifications to alter guide RNA stability, specificity, and...
unlimited object storage image
Result Page: 99 98 97 96 95 94 93 92 91 90 89 88 87 86 85 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy