Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Developing Java Web Services: Architecting and Developing Secure Web Services Using Java
Developing Java Web Services: Architecting and Developing Secure Web Services Using Java
"I commend this book to you as your springboard to the future of how to make the Net work."
-from the Foreword by Simon Phipps, Chief Technology Evangelist, Sun Microsystems, Inc.

This hands-on developer's guide to Web services prepares you for the next level of distributed computing. The authors clearly show
...
The All-New Switch Book: The Complete Guide to LAN Switching Technology
The All-New Switch Book: The Complete Guide to LAN Switching Technology
The much-anticipated update to the bestselling book on LAN switching

Since the publication of the first edition of The Switch Book seven years ago, LAN switching has witnessed significant changes, particularly in the areas of network layers, Ethernet, fast Ethernet, segmenting LANs, layer 3 switching, layer 4 switching, and multi-layer...

Get Ready for OpenID
Get Ready for OpenID
This is the first book written on the OpenID system and it provides comprehensive information to beginners and mid level programmers of OpenID. The book includes topics like: o Introduction to identity management o Creating OpenID identities o Using OpenID to login to web sites o Understanding the OpenID protocol o Structure of OpenID messages o...
Maritime Security: International Law and Policy Perspectives from Australia and New Zealand
Maritime Security: International Law and Policy Perspectives from Australia and New Zealand

Maritime security is of vital importance to Australia and New Zealand as both countries depend on maritime transport for their economic survival. Since the events of September 11th 2001, significant questions have been raised as to whether Australia and New Zealand are adequately prepared for the consequences of a major disruption to...

Jenkins: The Definitive Guide
Jenkins: The Definitive Guide

This book is aimed at relatively technical readers, though no prior experience with Continuous Integration is assumed. You may be new to Continuous Integration, and would like to learn about the benefits it can bring to your development team. Or, you might be using Jenkins or Hudson already, and want to discover how you can...

Hands-On Oracle Application Express Security: Building Secure Apex Applications
Hands-On Oracle Application Express Security: Building Secure Apex Applications
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were involved in some of the fi rst penetration tests performed in the UK, where large organizations and government departments allowed ethical hackers into their networks to determine the risk they faced from what are now known as cyber attacks....
Data-Driven Security: Analysis, Visualization and Dashboards
Data-Driven Security: Analysis, Visualization and Dashboards

Uncover hidden patterns of data and respond with countermeasures

Security professionals need all the tools at their disposal to increase their visibility in order to prevent security breaches and attacks. This careful guide explores two of the most powerful ? data analysis and visualization. You'll soon understand how to...

Exploring SE for Android
Exploring SE for Android

Discover Security Enhancements (SE) for Android to build your own protected Android-based systems

About This Book

  • Learn the fundamental security models and motivations behind Linux, SELinux, and SE for Android.
  • Build and enable current security enhancements from the SE for Android project...
International News Coverage and the Korean Conflict: The Challenges of Reporting Practices
International News Coverage and the Korean Conflict: The Challenges of Reporting Practices

This book explores journalism practices and the dynamics of international news media in Korea, and examines the ways in which Korean journalists and foreign correspondents cover news stories about the Korean conflict. It notably explores news gathering practices concerning the Korean conflict, and investigates factors that influence...

Inside JavaScript
Inside JavaScript

The only comprehensive book available that covers the latest technology, such as Internet Explorer 6 and JavaScript 1.5, and JScript 5.6. Packed full of hands-on examples, this book integrates JavaScript with .NET, XML, XSLT, Java, CSS, HTML, Cookies, Security, and much more. Written for beginning to intermediate readers...

Linux All-in-One Desk Reference For Dummies (Computer/Tech)
Linux All-in-One Desk Reference For Dummies (Computer/Tech)
8 books in 1— your key to success with Linux!

Your one-stop guide to working with various Linux distributions

Linux is hot! It's cost-effective, secure, and comes in a lot of varieties. And with this book to walk you through it, choosing and using a Linux distribution is...

Extreme Exploits: Advanced Defenses Against Hardcore Hacks
Extreme Exploits: Advanced Defenses Against Hardcore Hacks

Protect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses...

unlimited object storage image
Result Page: 388 387 386 385 384 383 382 381 380 379 378 377 376 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy