Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
XML Web Services in the Organization
XML Web Services in the Organization

Discover how you can use XML-based Web services to dramatically improve the data sharing and communication capabilities in your organization. This pragmatic guide teaches you how to exploit the interoperability features of the Microsoft .NET Framework to build highly available, platform-independent Web services. Easy-to-follow sample...

Protecting Games: A Security Handbook for Game Developers and Publishers
Protecting Games: A Security Handbook for Game Developers and Publishers

This book is intended to infect its readers with an interest and concern for game protection. My goal is not to preach to the ”security converted,” but to convince game designers, developers, programmers, managers, marketeers, and artists that they should care about the security of their games and give them confidence that there are...

Microsoft Word 2010 Inside Out
Microsoft Word 2010 Inside Out

You're beyond the basics with Word, so dive right in and really put your documents to work! This supremely organized reference packs hundreds of timesaving solutions, troubleshooting tips, and workarounds. It's all muscle and no fluff. Discover how the experts tackle Word 2010 -- and challenge yourself to new levels of...

Citrix® XenApp® 6.5 Expert Cookbook
Citrix® XenApp® 6.5 Expert Cookbook

Over 125 recipes that enable you to configure, administer, and troubleshoot the XenApp infrastructure for effective application virtualization

About This Book

  • Create installation scripts for Citrix XenApp, License Servers, Web Interface, and StoreFront
  • Use PowerShell scripts to configure...
Practical Embedded Security: Building Secure Resource-Constrained Systems (Embedded Technology)
Practical Embedded Security: Building Secure Resource-Constrained Systems (Embedded Technology)
The great strides made over the last decade in the complexity and network functionality of embedded systems have significantly enhanced their attractiveness for use in critical applications such as medical devices and military communications. However, this expansion into critical areas has presented embedded engineers with a serious new problem:...
Digital Convergence - Libraries of the Future
Digital Convergence - Libraries of the Future
Clay tablets have been used to keep records from the earliest times. However, they were used for archives rather than libraries and consisted mainly of administrative records.Private and personal libraries containing books first appeared in Greece in the 5th century BC.The Royal Library of Alexandria was founded in the 3rd century BC and was...
The Official Damn Small Linux(R) Book: The Tiny Adaptable Linux(R) That Runs on Anything (Negus Live Linux Series)
The Official Damn Small Linux(R) Book: The Tiny Adaptable Linux(R) That Runs on Anything (Negus Live Linux Series)
Damn Small Linux (DSL) started as an exercise by John Andrews to fit an entire desktop computer system into a compressed 50MB image. Within a few years, DSL grew to one of the most popular Linux systems in the world (in the Top Ten, by some accounts) without growing beyond that 50MB target.

In a world where desktop systems are...

Wireless Home Networking Simplified
Wireless Home Networking Simplified

Using today’s wireless networks, you can save money, become more productive, and even have more fun! Now, there’s an easy, fully illustrated step-by-step guide to wireless networking for your home: Wireless Home Networking Simplified.

 

...

Improving Web Application Security: Threats and Countermeasures
Improving Web Application Security: Threats and Countermeasures

This guide helps you to design, build, and configure hack-resilient Web applications. These are applications that reduce the likelihood of successful attacks and mitigate the extent of damage should an attack occur. This guide uses a three-layered approach: securing the network, securing the host, and securing the application. This guide...

AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
AAA and Network Security for Mobile Access: Radius, Diameter, EAP, PKI and IP Mobility
AAA (Authentication, Authorization, Accounting) describes a framework for intelligently controlling access to network resources, enforcing policies, and providing the information necessary to bill for services. 

AAA and Network Security for Mobile Access is an invaluable guide to the AAA concepts and framework, including its...

Pro OpenSSH
Pro OpenSSH

SSH, or Secure Shell, is the de facto standard among users and administrators who wish to establish secure communication between disparate networks. This book is authored by a Fortune 100 system administrator, who will provide you with a highly practical reference for configuring and deploying OpenSSH in your own environment.

Some of the...

Mining eBay Web Services: Building Applications with the eBay API
Mining eBay Web Services: Building Applications with the eBay API
Improved Speed, Accuracy, and Convenience—Yours for the Taking

eBay is continuously improving the features it offers buyers and sellers. Now, the biggest improvements are ones you can build for yourself.

Mining eBay Web Services teaches you to create custom
...
unlimited object storage image
Result Page: 115 114 113 112 111 110 109 108 107 106 105 104 103 102 101 100 99 98 97 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy