Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
ActionScript 3.0 Design Patterns: Object Oriented Programming Techniques (Adobe Developer Library)
ActionScript 3.0 Design Patterns: Object Oriented Programming Techniques (Adobe Developer Library)
Now that ActionScript is reengineered from top to bottom as a true object-oriented programming (OOP) language, reusable design patterns are an ideal way to solve common problems in Flash and Flex applications. If you're an experienced Flash or Flex developer ready to tackle sophisticated programming techniques with ActionScript 3.0, this hands-on...
Python: Master the Art of Design Patterns
Python: Master the Art of Design Patterns

About This Book

  • Learn all about abstract design patterns and how to implement them in Python 3
  • Understand the structural, creational, and behavioral Python design patterns
  • Get to know the context and application of design patterns to solve real-world problems in software...
MCSE Training Guide (70-227): Installing, Configuring, and Administering Microsoft Internet Security and Acceleration (ISA) Server 2000
MCSE Training Guide (70-227): Installing, Configuring, and Administering Microsoft Internet Security and Acceleration (ISA) Server 2000

This book is based on the objectives of Microsoft MCSE Exam 70-227, which is already in development at Microsoft as part of the MCSE 2000 curriculum.

It covers all relevant exam material. This will not just prepare individuals to answer questions on an exam, but will help the individual understand the product and learn to work with it....

Effective Oracle Database 10g Security by Design
Effective Oracle Database 10g Security by Design

The database has two important roles: 1. Serve the data—databases are commonly referred to as data servers; 2. Protect the data. Yes that’s right, the database is there to serve and protect. Database security features are vast and complex. While the complexity can afford us many ways to provide a robust...

Steal This File Sharing Book
Steal This File Sharing Book

Steal This File Sharing Book tackles the thorny issue of file sharing, explaining how file sharing networks work and how to use them safely and effectively. There’s a wealth of free material available online—music, movies books, software, video games, even pornography. But do you know where to find that rare song...

Instant Burp Suite Starter
Instant Burp Suite Starter

Get up and running with Burp Suite using this hands-on practical guide

Overview

  • Learn something new in an Instant! A short, fast, focused guide delivering immediate results.
  •  
  • Intercept HTTP/S requests with Burp Proxy.
  • Tamper and analyze responses.
  • ...
Guide to Network Defense and Countermeasures
Guide to Network Defense and Countermeasures
This book is intended to provide students and professionals with a solid foundation in the fundamentals of advanced network security. The previous edition of this book placed significant emphasis on intrusion detection, but this edition aims to provide a more balanced approach to the topic of network defense and countermeasures. As...
MCITP Self-Paced Training Kit (Exam 70-646): Windows Server 2008 Server Administrator
MCITP Self-Paced Training Kit (Exam 70-646): Windows Server 2008 Server Administrator

This training kit is designed for server and domain administrators who have two to three years of experience managing Windows servers and infrastructure in an environment that typically supports 250 to 5,000 (or even more) users in three or more physical locations and has three or more domain controllers. You will likely be responsible...

The Basics of Web Hacking: Tools and Techniques to Attack the Web
The Basics of Web Hacking: Tools and Techniques to Attack the Web

The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect...

Security Technologies for the World Wide Web, Second Edition
Security Technologies for the World Wide Web, Second Edition

This newly revised edition of the Artech House bestseller offers the most up-to-date comprehensive analysis of the current trends in WWW security available, with brand new chapters on authentication and authorization infrastructures, server-side security, and risk management. Practitioners will also find coverage of entirely new topics such as...

Mastering Python Design Patterns: A guide to creating smart, efficient, and reusable software, 2nd Edition
Mastering Python Design Patterns: A guide to creating smart, efficient, and reusable software, 2nd Edition

Exploit various design patterns to master the art of solving problems using Python

Key Features

  • Master the application design using the core design patterns and latest features of Python 3.7
  • Learn tricks to solve common design and architectural challenges
  • ...
Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks
Dr Tom Shinder's ISA Server and Beyond: Real World Security Solutions for Microsoft Enterprise Networks

The terrorist attacks of September 11 signaled the dawn of a new age of warfare: InfoWar. The greatest challenge facing the IT community in the 21st Century is securing networks from malicious attacks. The problem for the Microsoft network administrators and engineers is that securing Microsoft networks is an extremely complex task.
...

unlimited object storage image
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy