|
|
|
|
Theory of Cryptography: 8th Theory of Cryptography Conference, TCC 2011
These are the proceedings of TCC 2011, the 8th Theory of Cryptography Conference, which was held in Brown University, Providence, RI, during March 28–30, 2011. The conference was sponsored by the International Association for Cryptologic Research (IACR). The General Chair was Anna Lysyanskaya.
The Program Committee,... | | Lift Application Development Cookbook
Over 50 practical recipes to build web applications using Lift, the most secure web framework available
Overview
-
Lift made easy with step-by-steps recipes written by a developer for developers
-
Practical examples covering topics from basic to advanced levels
-
Learn to use...
| | Sage Timeslips For Dummies
Let Sage Timeslips For Dummies show you how to turn your time into money
If you run a business that bills for its time, it’s time you looked into Sage Timeslips and all it can do for you. This practical and friendly guide will help you get to know the Timeslips interface, set up templates for your business,... |
|
|
Microsoft Windows Intune 2.0: Quickstart Administration
Microsoft Windows Intune is a cloud service solution that simplifies how small and mid-sized businesses manage and secure PCs using Microsoft cloud services and Windows 7-so your computers and users can operate at peak performance all the time.
This step-by-step guide will show you how to plan, set up and maintain Windows Intune,... | | Web Development with Node and Express: Leveraging the JavaScript Stack
Learn how to build dynamic web applications with Express, a key component of the Node/JavaScript development stack. In this hands-on guide, author Ethan Brown teaches you the fundamentals through the development of a fictional application that exposes a public website and a RESTful API. You’ll also learn web architecture best... | | Neo4j High Performance
Design, build, and administer scalable graph database systems for your applications using Neo4j
About This Book
-
Explore the numerous components that provide abstractions for pretty much any functionality you need from your persistent graphs
-
Familiarize yourself with how to test the...
|
|
| | | | Inside Internet Security: What Hackers Don't Want You To KnowThis book is a practical guide for anyone designing or administering a corporate or e-business network that runs across a number of platforms via the Internet. It will arm systems administrators with a thorough understanding of the problems of network security and their solutions, and thus help realize the tremendous potential of e-business.... |
|
|
Result Page: 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 121 120 119 118 |