Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Blockchain for Enterprise: Build scalable blockchain applications with privacy, interoperability, and permissioned features
Blockchain for Enterprise: Build scalable blockchain applications with privacy, interoperability, and permissioned features

Implement blockchain principles in your choice of domain using Ethereum

Key Features

  • Build permissioned enterprise-grade blockchain applications from scratch
  • Implement Blockchain-as-a-Service to enterprises in terms of deployment and security
  • Achieve...
Complexity Economics: Building a New Approach to Ancient Economic History (Palgrave Studies in Ancient Economies)
Complexity Economics: Building a New Approach to Ancient Economic History (Palgrave Studies in Ancient Economies)

Economic archaeology and ancient economic history have boomed the past decades. The former thanks to greatly enhanced techniques to identify, collect, and interpret material remains as proxies for economic interactions and performance; the latter by embracing the frameworks of new institutional economics. Both disciplines, however,...

Paleoclimatology, Third Edition: Reconstructing Climates of the Quaternary
Paleoclimatology, Third Edition: Reconstructing Climates of the Quaternary

Paleoclimatology: Reconstructing Climates of the Quaternary, Third Edition―winner of a 2015 Textbook Excellence Award (Texty) from The Text and Academic Authors Association―provides a thorough overview of the methods of paleoclimatic reconstruction and of the historical changes in climate during the past three million...

Inside Microsoft Exchange Server 2007 Web Services
Inside Microsoft Exchange Server 2007 Web Services
Dive deep into the architecture of Exchange Web Servicesand master the intricacies for accessing data with the new, unifying API. Exchange Web Services offers new functionality, replacing old, disparate APIs. This practical guide introduces developers to Exchange Web Services. It includes comprehensive, in-depth coverage of the architecture and key...
Nginx 1 Web Server Implementation Cookbook
Nginx 1 Web Server Implementation Cookbook

Nginx is an open source high-performance web server, which has gained quite some popularity recently. Due to its modular architecture and small footprint, it has been the default choice for a lot of smaller Web 2.0 companies to be used as a load-balancing proxy server. It supports most of the existing backend web protocols such as FCGI,...

Mastering OpenLDAP: Configuring, Securing and Integrating Directory Services
Mastering OpenLDAP: Configuring, Securing and Integrating Directory Services
This book is the ideal introduction to using OpenLDAP for Application Developers and will also benefit System Administrators running OpenLDAP. It prepares the reader to build a directory using OpenLDAP, and then employ this directory in the context of the network, taking a practical approach that emphasizes how to get things done. On occasion, it...
PostgreSQL Server Programming - Second Edition
PostgreSQL Server Programming - Second Edition

Extend PostgreSQL using PostgreSQL server programming to create, test, debug, and optimize a range of user-defined functions in your favorite programming language

About This Book

  • Acquaint yourself with all the options to extend PostgreSQL using the programming language of your choice such as C++ and...
Firewalls 24seven
Firewalls 24seven
For experienced network administrators. This updated edition of Firewalls 24seven is the book that you and other network administrators have been waiting for. Starting where other books and training courses end and the real world begins, it provides advanced information on today's most effective security technologies and techniques.

Written to...

Penetration Testing with Perl
Penetration Testing with Perl

Harness the power of Perl to perform professional penetration testing

About This Book

  • Write your own custom information security tools using Perl and object-oriented Perl modules
  • Apply powerful Perl Regular Expression syntax to finely tune intelligence gathering techniques
  • ...
Implementing SSH: Strategies for Optimizing the Secure Shell
Implementing SSH: Strategies for Optimizing the Secure Shell
    Secure Shell (SSH) is a utility that can be described in many different ways. It can be described as a protocol, an encryption tool, a client/server application, or a command interface. Along with its various descriptions, SSH provides various functions with a single package. SSH’s diverse set of services and the ability to...
Oracle SOA Suite 11g Developer's Cookbook
Oracle SOA Suite 11g Developer's Cookbook

Over 65 high-level recipes for extending your Oracle SOA applications and enhancing your skills with expert tips and tricks for developers

Overview

  • Extend and enhance the tricks in your Oracle SOA Suite developer arsenal with expert tips and best practices.
  • Get to grips with Java...
Red Hat: The Complete Reference Enterprise Linux & Fedora Edition
Red Hat: The Complete Reference Enterprise Linux & Fedora Edition
Maximize the powerful capabilities of Red Hat Enterprise and Fedora Linux using this
comprehensive and up-to-date reference. You'll get full details on everything from installation and
configuration to system administration and server management of Enterprise Linux-with specifics
on the Linux Kernel 2.6. Thorough security coverage
...
unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy