Home | Amazing | Today | Tags | Publishers | Years | Search 
Ajax Security
Ajax Security
The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities

 

More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly moving to the Web via Ajax. But, all too often, this...

Practical DWR 2 Projects (Expert's Voice in Java)
Practical DWR 2 Projects (Expert's Voice in Java)

The Ajax craze is sweeping the world, and there is no shortage of libraries from which to choose to make it all easier to develop. One of those libraries has risen near the top in the Java space, and that library is DWR. DWR, or Direct Web Remoting, allows you to treat your Java classes running on the server as if they were local objects running...

Maximum Energy for Life: A 21-Day Strategic Plan to Feel Great, Reverse the Aging Process, and Optimize Your Health
Maximum Energy for Life: A 21-Day Strategic Plan to Feel Great, Reverse the Aging Process, and Optimize Your Health

For more than twenty-five years, Mackie Shilstone has helped the world’s most famous sports figures, elected officials, and businesspeople become more focused, eat healthier, and achieve greater success at what they do best. Now, Shilstone has distilled his performance-enhancing secrets into a book that can help anyone feel younger, live...

Advances in Object-Oriented Data Modeling (Cooperative Information Systems)
Advances in Object-Oriented Data Modeling (Cooperative Information Systems)
This book focuses on recent developments in representational and processing aspects of complex data-intensive applications.

Focuses on recent developments in representational and processing aspects of object-oriented data modeling, covering hot topics such as reverse engineering and work-flow modeling. Each chapter contains a
...
Intellectual Property and Open Source: A Practical Guide to Protecting Code
Intellectual Property and Open Source: A Practical Guide to Protecting Code
"Clear, correct, and deep, this is a welcome addition to discussions of law and computing for anyone -- even lawyers!" -- Lawrence Lessig, Professor of Law at Stanford Law School and founder of the Stanford Center for Internet and Society

If you work in information technology, intellectual property is central to your job -- but...

Hacker Debugging Uncovered (Uncovered series)
Hacker Debugging Uncovered (Uncovered series)

Hacking is a natural need of many sentient beings. They pass along the thorny path of understanding the true essence of surrounding things, bent on destruction. Just look around: Atomic scientists split atoms, analysts split long molecules into lots of smaller ones, and mathematicians actively use decomposition. And not one of...

Language and the Internet
Language and the Internet
According to popular mythology, the Internet will be bad for the future of language--technospeak will rule, standards will be lost, and creativity diminished as globalization imposes sameness. David Crystal, one of the foremost authorities on language, argues the reverse in his new book: that the Internet is enabling a dramatic expansion of the...
The IT / Digital Legal Companion: A Comprehensive Business Guide to Software, IT, Internet, Media and IP Law
The IT / Digital Legal Companion: A Comprehensive Business Guide to Software, IT, Internet, Media and IP Law
The content goes from the basics to advanced topics such as off-shoring, anti-circumvention, open source business models, user-created content, reverse engineering, mobile media distribution, web and game development, mash-ups, web widgets, and massively multiplayer games.

This book is designed to empower you to:

* Understand
...
Malware Forensics: Investigating and Analyzing Malicious Code
Malware Forensics: Investigating and Analyzing Malicious Code

Dissecting the dark side of the Internet -- with its infectious worms, botnets, rootkits, and Trojan horse programs (known as malware)-- this in-depth, how-to guide details the complete process of responding to a malicious code incident, from isolating malware and testing it in a forensic lab environment, to pulling apart suspect code and...

Software Engineering: International Summer Schools, ISSSE 2006-2008, Salerno, Italy, Revised Tutorial Lectures
Software Engineering: International Summer Schools, ISSSE 2006-2008, Salerno, Italy, Revised Tutorial Lectures
Software engineering is widely recognized as one of the most exciting, stimulating, and profitable research areas, with a significant practical impact on the software industry. Thus, training future generations of software engineering researchers and bridging the gap between academia and industry are vital to the field. The International Summer...
Mobile Malware Attacks and Defense
Mobile Malware Attacks and Defense
The Only Book for Analyzing and Mitigating Mobile Malicious Code!

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new
...
Personality Disorders (Diseases and Disorders)
Personality Disorders (Diseases and Disorders)
Charles Best, one of the pioneers in the search for a cure for diabetes, once explained what it is about medical research that intrigued him so. “It’s not just the gratification of knowing one is helping people,” he confided, “although that probably is a more heroic and selfless motivation. Those feelings may enter in, but...
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy