|
|
|
|
|
Blazor Revealed: Building Web Applications in .NET
Build web applications in Microsoft .NET that run in any modern browser, helping you to transfer your .NET experience and skills to a new environment and build browser-based applications using a robust and type-safe language and runtime. Developing a web site with rich client-side behavior means most developers need to learn a ... | | Handbook of Global Logistics: Transportation in International Supply Chains
Global logistics entails tradeoffs in facility location, distribution networks, the routing and scheduling of deliveries by different modes of travel (e.g., air, water, truck, rail), procurement, and the overall management of international supply chains. In an increasingly global economy, then, logistics has become a very important matter in... | | |
|
Instant Ember.js Application Development How-to
Ember.js is a frontend web development framework that organizes your JavaScript into clean, reusable code. With its powerful tools and concepts at your disposal you can create large scale web applications that rival native applications.
No matter how big your application gets, Ember.js makes your code manageable.
... | | | | CCIE Routing and Switching Practice LabsSix comprehensive CCIE routing and switching labs to hone configuration and troubleshooting skills
Prepare for the CCIE lab exams and hone your configuration and troubleshooting skills with six complete practice scenarios that cover:
|
|
Cisco ASA, PIX, and FWSM Firewall Handbook (2nd Edition) (Networking Technology: Security)David Hucaby, CCIE® No. 4594, is a lead network engineer for the University of Kentucky, where he works with health-care networks based on the Cisco Catalyst, ASA, FWSM, and VPN product lines. He was one of the beta reviewers of the ASA 8.0 operating system software.
- Learn about the various firewall models, user interfaces,
... | | Network Infrastructure SecurityResearch on Internet security over the past few decades has focused mainly on information assurance, issues of data confidentiality and integrity as explored through cryptograph algorithms, digital signature, authentication code, etc. Unlike other books on network information security, Network Infrastructure... | | |
|
|
Result Page: 46 45 44 43 42 41 40 39 38 37 36 35 34 |