Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CORS in Action: Creating and consuming cross-origin APIs
CORS in Action: Creating and consuming cross-origin APIs

Summary

CORS in Action introduces Cross-Origin Resource Sharing (CORS) from both the server and the client perspective. It starts with the basics: how to make CORS requests and how to implement CORS on the server. It then explores key details such as performance, debugging, and security. API authors will...

Swift High Performance
Swift High Performance

Leverage Swift and enhance your code to take your applications to the next level

About This Book

  • Build solid, high performance applications in Swift
  • Increase your efficiency by getting to grips with concurrency and parallel programming
  • Use Swift to design...
PHP Objects, Patterns and Practice, Third Edition
PHP Objects, Patterns and Practice, Third Edition

This book takes you beyond the PHP basics to the enterprise development practices used by professional programmers. Updated for PHP 5.3 with new sections on closures, namespaces, and continuous integration, this edition will teach you about object features such as abstract classes, reflection, interfaces, and error handling. You’ll also...

Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Hacking: THE BLUEPRINT A Beginners Guide To Ethical Computer Hacking (CyberPunk Blueprint Series)
Ever wonder how easy it is to hack into someone’s bank account info while surfing the net at your local Starbucks? Learning how to hack is one of the best preventative measures you can take when protecting yourself from other hackers. Hacking is often misunderstood and that is for good reason. Many people use hacking as...
Diagnosing Your Health Symptoms For Dummies®
Diagnosing Your Health Symptoms For Dummies®

Everybody develops new health problems sometimes. Often, these problems are familiar and not especially worrying. When you wake up with a slightly sore throat or get a mild headache after a long, busy day, for example, the chances are that you’ve already had this kind of thing before and you know instinctively what to do about it. You...

SELinux System Administration
SELinux System Administration

NSA Security-Enhanced Linux (SELinux) is a set of patches and added utilities to the Linux kernel to incorporate a strong, flexible, mandatory access control architecture into the major subsystems of the kernel. With its fine-grained yet flexible approach, it is no wonder Linux distributions are firing up SELinux as a default security...

Probabilistic Databases (Synthesis Lectures on Data Management)
Probabilistic Databases (Synthesis Lectures on Data Management)
Probabilistic databases are databases where the value of some attributes or the presence of some records are uncertain and known only with some probability. Applications in many areas such as information extraction, RFID and scientific data management, data cleaning, data integration, and financial risk assessment produce large volumes of...
Video Systems in an IT Environment, Second Edition: The Basics of Professional Networked Media and File-based Workflows
Video Systems in an IT Environment, Second Edition: The Basics of Professional Networked Media and File-based Workflows
Astute sailors know the optimal time to catch the tidal fl ood toward the harbor. If it is missed, a ship may be caught in a storm or stranded at sea. An able captain and crew never pass up favorable currents. Today there is a different tidal fl ood that many captains of ship are seeking to ride to safe harbor. What is it? It is the tidal swell of...
Basic Environmental Engineering: (as Per the New Syllabus of R.T.U. and Other Universities)
Basic Environmental Engineering: (as Per the New Syllabus of R.T.U. and Other Universities)

Environmental engineering is one of the most popular, complex and fast growing disciplines in engineering. The scope of environment includes issues from public health, aesthetics, and impact of all development activities, pollution control legislation, standards, regulations, guidelines and their enforcement. Traditionally the application of...

Nonviral Vectors for Gene Therapy, Part 2, Volume 54, Second Edition (Advances in Genetics)
Nonviral Vectors for Gene Therapy, Part 2, Volume 54, Second Edition (Advances in Genetics)
Since the pioneering discovery by Felgner et al. (1987) that cationic lipid can efficiently transfect cells, there was a surge of research activity in this area. The field received another boost when Nabel et al. (1993) successfully completed a small phase I clinical trial in gene therapy of melanoma using cationic liposome as a...
Red Hat Linux Fedora 3 Unleashed
Red Hat Linux Fedora 3 Unleashed
Keeping with the tradition of offering the best and most comprehensive coverage of Red Hat Linux on the market, Red Hat Fedora 3 Unleashed includes new and additional materials based on the latest release of Red Hat's Fedora Core Linux distribution. Incorporating an advanced approach, the information presented aims...
Real Estate Investing For Canadians For Dummies
Real Estate Investing For Canadians For Dummies

The past decade has seen many real estate investors taken on a wild ride. The first decade of the 21st century began with real estate being seen as a safe haven for investors, and the boom that followed made real estate the sure-fire key to wealth. The subprime mortgage crisis in the United States and drop in real estate values around the...

unlimited object storage image
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 17 16 15 14 
©2020 LearnIT (support@pdfchm.net) - Privacy Policy