 |
|
 Learning Java Through Applications: A Graphical Approach (Programming Series)Learning Java Through Applications emphasizes Java’s graphical capabilities and the ability to create graphical user interfaces. The book uses 15 complete Java programs in order of increasing complexity, including geometric patterns, games, puzzles, number theory problems, and cryptography, to teach students the Java programming language and... |  |  Innovative Cryptography (Programming Series)Innovative Cryptography, Second Edition provides a cutting-edge evaluation and review of current findings in the area of cryptography and explores how to implement these new techniques efficiently. It covers current cryptographic problems and suggests practical solutions. The book also discusses the role of symmetric ciphers and symmetric block... |  |  Web 2.0 Security - Defending AJAX, RIA, AND SOAService-Oriented Architecure (SOA), Rich Internet Applications (RIA), and Asynchronous Java and eXtended Markup Language (Ajax) comprise the backbone behind now-widespread Web 2.0 applications, such as MySpace, Google Maps, Flickr, and Live.com. Although these robust tools make next-generation Web applications possible, they also add new security... |
|
|
|
 |  |  TCP/IP Primer PlusThere's no shortage of books about the protocols that enable the Internet to work, and TCP/IP Primer Plus faces a tall order as it attempts to distinguish itself from its competitors. It succeeds in doing so thanks to the degree of detail with which it treats the TCP/IP standards. Every last bit--that's bit as in binary... |  |  |
|
Result Page: 185 184 183 182 181 180 179 178 177 176 175 174 173 172 171 170 169 168 167 |