The recipes in this book are easy to understand and follow as the author discusses real-world scenarios. The range of topics covered in this book will bring out the forward-thinking WCF developer in you. It is not a comprehensive reference to the whole of WCF, but a practical guide that boosts proficiency when working with the various...
Expert Guide to Deploying, Using, and Managing DataPower SOA Appliances
IBM® WebSphere® DataPower® appliances can simplify SOA deployment, strengthen SOA security, enhance SOA performance, and dramatically improve SOA return on...
Although the basic purposes of finance, and the nature of the core instruments used in
attaining them, are relatively constant, recent years have seen an explosion in complexity of
both products and techniques.
A number of forces are driving this explosion. The first is internationalization encompassing
a dramatic growth in...
This training kit is designed for server and domain administrators who have two to three
years of experience managing Windows servers and infrastructure in an environment
that typically supports 250 to 5,000 (or even more) users in three or more physical locations
and has three or more domain controllers. You will likely be responsible...
CCNP Security FIREWALL 642-617 Official Cert Guide is a best of breed Cisco exam study guide that focuses specifically on the objectives for the CCNP Security FIREWALL exam. Senior security consultants and instructors David Hucaby, Dave Garneau, and Anthony Sequeira share preparation hints and test-taking tips,...
Since its initial launch, Sencha Touch has quickly become the gold standard for
developing rich mobile web applications with HTML5. Sencha Touch is the first
HTML5 mobile JavaScript framework that allows you to develop mobile web
applications that look and feel like native applications on both iPhone and Android
touchscreen...
When I had a chance to use the Mosaic web browser way back in 1994, I fell in love
with the web at first sight and became interested in HTML and the way the W3C was
driving the growth of the web along with the IETF. A year later, I discovered Java by
reading Sun’s white paper and was convinced that it would...
Security is one of the fastest moving segments within the realm of technology. Whereas
most technology is created to offer new services or products, security is created to prevent
the abuse of these new products and or services. In today’s world, where we are
always connected in ways that have never been...
This book is intended to provide students and professionals with a solid foundation in the
fundamentals of advanced network security. The previous edition of this book placed significant
emphasis on intrusion detection, but this edition aims to provide a more balanced approach to
the topic of network defense and countermeasures. As...
Learn the basics of ethical hacking and gain insights into the logic, algorithms, and syntax of Python. This book will set you up with a foundation that will help you understand the advanced concepts of hacking in the future. Learn Ethical Hacking with Python 3 touches the core issues of cyber security: in the modern world...
The Basics of Web Hacking introduces you to a tool-driven process to identify the most widespread vulnerabilities in Web applications. No prior experience is needed. Web apps are a "path of least resistance" that can be exploited to cause the most damage to a system, with the lowest hurdles to overcome. This is a perfect...
This book is designed as a server reference for Fedora Linux with systemd. This second edition covers Fedora Linux 23. Administration tools are covered as well as the underlying configuration files and system implementations. The emphasis is on what administrators will need to know to perform key networking and server tasks. Topics covered...