Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Amazing Java: Learn Java Quickly!
Amazing Java: Learn Java Quickly!


Do you know Java is being used worldwide? These days it is difficult to find a platform not running on Java. Their uses begin from commercial e-commerce website to Android apps, from desktop applications to games, from financial applications to scientific applications, from J2ME applications to open source library
...

Samba-3 by Example: Practical Exercises to Successful Deployment (2nd Edition) (Bruce Perens Open Source)
Samba-3 by Example: Practical Exercises to Successful Deployment (2nd Edition) (Bruce Perens Open Source)

The Practical, Tested, Step-by-Step Samba-3 Guidebook Has Now Been Fully Updated!

The definitive Samba-3 guidebook has been completely updated to reflect the latest Samba releases and migration techniques. This book’s complete configuration files, step-by-step implementation instructions, network diagrams, and...

Citrix Access Suite 4 for Windows Server 2003: The Official Guide, Third Edition
Citrix Access Suite 4 for Windows Server 2003: The Official Guide, Third Edition
Build, secure, scale, and maintain Citrix on Windows

New and existing Citrix engineers will learn to design and deploy an enterprise-level server-based computing (SBC) environment on Windows Server 2003 using Citrix Access Suite 4.0. This official guide explains how to maximize the suite components to enable and...

SQL Server 2008 Transact-SQL Recipes: A Problem-Solution Approach (Recipes: a Problem-Solution Approach)
SQL Server 2008 Transact-SQL Recipes: A Problem-Solution Approach (Recipes: a Problem-Solution Approach)
SQL Server 2008 Transact–SQL Recipes: A Problem–Solution Approach is an example–based guide to the Transact–SQL language that is at the core of SQL Server 2008. Learn to create databases, insert and update data, generate reports, secure your data, and more. Author Joseph Sack takes common...
Perimeter Security
Perimeter Security
Perimeter Security has taken on a new level of importance since 9/11. Whether insuring the safety of government buildings, hospitals, residences, or bio-research labs, the safety of workers and materials can only be ensured by outfitting all points of entry with the appropriate alarm and surveillance equipment. This comprehensive hands-on resource...
CompTIA Network+ N10-005 Authorized Exam Cram (4th Edition)
CompTIA Network+ N10-005 Authorized Exam Cram (4th Edition)

CD Features More Than 200 Practice Questions

 

CompTIA® Network+ N10-005 Authorized Exam Cram, Fourth Edition is the perfect study guide to help you pass CompTIA’s new Network+ N10-005 exam. It provides coverage and practice questions for...

Microsoft SQL Server 2012 Step by Step (Step by Step Developer)
Microsoft SQL Server 2012 Step by Step (Step by Step Developer)

Your hands-on, step-by-step guide to building applications with Microsoft SQL Server 2012

Teach yourself the programming fundamentals of SQL Server 2012—one step at a time. Ideal for beginning SQL Server database administrators and developers, this tutorial provides clear guidance and practical, learn-by-doing...

JIRA 5.2 Essentials
JIRA 5.2 Essentials

Learn how to track bugs and issues, and manage your software development projects with JIRA

Overview

  • Learn how to set up JIRA for software development.
  • Effectively manage and handle software bugs and issues.
  • Includes updated JIRA content as well as coverage of the popular...
Mobile Application Development with SMS and the SIM Toolkit
Mobile Application Development with SMS and the SIM Toolkit
Get mobile messaging going on virtually any platform, in any language

Mobile Application Development Using SMS and the SIM Toolkit is just the guide you’ve been looking for if you’re building applications for GSM or 3G networks, wish you had sample code for reality-based applications, or want to add mobile...

Ajax Security
Ajax Security
The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities

 

More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly moving to the Web via Ajax. But, all too often, this...

Secure Java: For Web Application Development
Secure Java: For Web Application Development

Most security books on Java focus on cryptography and access control, but exclude key aspects such as coding practices, logging, and web application risk assessment. Encapsulating security requirements for web development with the Java programming platform, Secure Java: For Web Application Development covers secure...

Engineering Secure Software and Systems: Third International Symposium
Engineering Secure Software and Systems: Third International Symposium

It is our pleasure to welcome you to the third edition of the International Symposium on Engineering Secure Software and Systems.

This unique event aims at bringing together researchers from software engineering and security engineering, which might help to unite and further develop the two communities in this and future...

unlimited object storage image
Result Page: 140 139 138 137 136 135 134 133 132 131 130 129 128 127 126 125 124 123 122 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy