Ajax Security The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities
More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly moving to the Web via Ajax. But, all too often, this...
Intel Xeon Phi Coprocessor High Performance Programming
Authors Jim Jeffers and James Reinders spent two years helping educate customers about the prototype and pre-production hardware before Intel introduced the first Intel Xeon Phi coprocessor. They have distilled their own experiences coupled with insights from many expert customers, Intel Field Engineers, Application Engineers and Technical...
jQuery in Action
The Testability of Distributed Real-Time Systems The Testability of Distributed Real-Time Systems starts by collecting and analyzing all principal problems, as well as their interrelations that one has to keep in mind wh4en testing a distributed real-time system. The book discusses them in some detail from the viewpoints of software engineering, distributed systems principles, and real-time... Advances in Grid and Pervasive Computing: 6th International Conference
the emerging areas of grid computing, cloud computing, and pervasive computing.
The 6th International Conference on Grid and Pervasive Computing, GPC
2011, was held in Oulu, Finland, during May 11-13, 2011. This volume contains
the full papers that were presented at the conference. This program was
preceded by one day of workshops, a...
Mastering Linux Shell Scripting
Identify the high level steps such as verifying user input, using command lines and conditional statements in creating and executing simple shell scripts
Create and edit dynamic shell scripts to manage complex and repetitive tasks
Learn about scripting in Perl and programming in
|Result Page: 19 18 17 16 15 14 13 12 11 10 9 8 |