|
|
|
|
WildFly: New Features
Get acquainted with the exciting new features that WildFly has to offer with this book and ebook
Overview
-
Learn about the latest WildFly components, including CLI management, classloading, and custom modules
-
Customize your web server and applications by managing logs, virtual hosts, and the...
| | | | Yii Application Development Cookbook - Second Edition
This book is the perfect way to add the capabilities of Yii to your PHP5 development skills. Dealing with practical solutions through real-life recipes and screenshots, it enables you to write applications more efficiently.
Overview
-
Learn how to use Yii even more efficiently
-
Full of...
|
|
Deploying Virtual Private Networks with Microsoft Windows Server 2003Get in-depth technical guidance, Windows-specific best practices, and real-world troubleshooting tactics-direct from the Windows wireless product development team.
This is the essential reference for any IT professional deploying virtual private networks (VPNs) using Windows Server 2003 and Windows XP. The book thoroughly details how... | | Oracle PL/SQL for DBAsPL/SQL, Oracle's powerful procedural language, has been the cornerstone of Oracle application development for nearly 15 years. Although primarily a tool for developers, PL/SQL has also become an essential tool for database administration, as DBAs take increasing responsibility for site performance and as the lines between... | | Wireless Security HandbookThis book was written to give the reader a well-rounded understanding of wireless network security. It looks at wireless from multiple perspectives, ranging from auditor, to security architect, to hacker. This wide scope benefits anyone who has to administer, secure, hack, or participate on a wireless network. Going through this... |
|
|
Professional Web 2.0 Programming (Wrox Professional Guides)Web 2.0 architecture opens up an incredible number of options for flexible web design, creative reuse, and easier updates. Along with covering the key languages and techniques of Web 2.0, this unique book introduces you to all of the technologies that make up Web 2.0 at a professional level. Throughout the chapters, you'll find code for several... | | Syngress Force 2006 Emerging Threat Analysis: From Mischief to MaliciousOver the last seven years, Internet Security Systems' (ISS) elite X-Force has discovered more high-risk vulnerabilities than all other research groups and vendors combined, including the vulnerability that led to the recent, widespread Zotob worm. For the first time ever, follow the X-Force team as they analyze potential vulnerabilities and... | | Oracle Data Warehousing and Business Intelligence SolutionsUp-to-date, comprehensive coverage of the Oracle database and business intelligence tools
Written by a team of Oracle insiders, this authoritative book provides you with the most current coverage of the Oracle data warehousing platform as well as the full suite of business intelligence tools. You'll learn how to... |
|
|
Result Page: 388 387 386 385 384 383 382 381 380 379 378 377 376 375 374 373 372 371 370 |