Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Autonomics Development: A Domain-Specific Aspect Language Approach (Autonomic Systems)
Autonomics Development: A Domain-Specific Aspect Language Approach (Autonomic Systems)

Distributed applications are difficult to write as programmers need to adhere to specific distributed systems programming conventions and frameworks, which makes distributed systems development complex and error prone and ties the resultant application to the distributed system because the application's code is tangled with the...

Practical Linux Infrastructure
Practical Linux Infrastructure

Practical Linux Infrastructure teaches you how to use the best open source tools to build a new Linux infrastructure, or alter an existing infrastructure, to ensure it stands up to enterprise-level needs. Each chapter covers a key area of implementation, with clear examples and step-by-step instructions.

...
Lotus Notes and Domino 6 Programming Bible
Lotus Notes and Domino 6 Programming Bible
"This unmatched book is a must-have reference for Notes and Domino developers."
– John Hawkins, Editorial Director,
Lotus Advisor Magazine & Conference

If Lotus Notes and Domino 6 can do it, you can do it too...

Whether you’re an architect, developer, or administrator, this guidebook...

XML Web Services in the Organization
XML Web Services in the Organization

Discover how you can use XML-based Web services to dramatically improve the data sharing and communication capabilities in your organization. This pragmatic guide teaches you how to exploit the interoperability features of the Microsoft .NET Framework to build highly available, platform-independent Web services. Easy-to-follow sample...

Cyberthreats: The Emerging Fault Lines of the Nation State
Cyberthreats: The Emerging Fault Lines of the Nation State

As new technologies develop, terrorist groups are developing new methods of attack by using the Internet, and by using cyberspace as a battlefield, it has become increasingly difficult to discover the identity of attackers and bring them to justice. The seemingly limitless boundaries of cyberspace has allowed virtually anyone to launch an...

Citrix® XenApp® 6.5 Expert Cookbook
Citrix® XenApp® 6.5 Expert Cookbook

Over 125 recipes that enable you to configure, administer, and troubleshoot the XenApp infrastructure for effective application virtualization

About This Book

  • Create installation scripts for Citrix XenApp, License Servers, Web Interface, and StoreFront
  • Use PowerShell scripts to configure...
Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts
Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts
This book is a marvellous thing: an important intervention in the policy debate about information security and a practical text for people trying to improve the situation.

A future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers...

Microsoft Windows Server 2003 Deployment Kit: A Microsoft Resource Kit
Microsoft Windows Server 2003 Deployment Kit: A Microsoft Resource Kit

This volume delivers in-depth deployment planning information for automated installations, multilingual deployments, and compatibility testing along with design information for unattended installations, image-based installations, and (RIS) installations.

Plan, design, and implement automated and customized...

Big Data Glossary
Big Data Glossary

To help you navigate the large number of new data tools available, this guide describes 60 of the most recent innovations, from NoSQL databases and MapReduce approaches to machine learning and visualization tools. Descriptions are based on first-hand experience with these tools in a production environment.

This handy...

Kali Linux Network Scanning Cookbook - Second Edition
Kali Linux Network Scanning Cookbook - Second Edition

Over 100 practical recipes that leverage custom scripts and integrated tools in Kali Linux to help you effectively master network scanning

About This Book

  • Learn the fundamentals behind commonly used scanning techniques
  • Deploy powerful scanning tools that are integrated...
XML and PHP
XML and PHP
XML and PHP is a clear, concise guide to the synergies between XML and PHP, many of which are not immediately visible to intermediate developers. XML and PHP demonstrates how PHP and XML can be combined to build cutting-edge Web applications. It includes detailed explanations of...
Improving Web Application Security: Threats and Countermeasures
Improving Web Application Security: Threats and Countermeasures

This guide helps you to design, build, and configure hack-resilient Web applications. These are applications that reduce the likelihood of successful attacks and mitigate the extent of damage should an attack occur. This guide uses a three-layered approach: securing the network, securing the host, and securing the application. This guide...

unlimited object storage image
Result Page: 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy