Home | Amazing | Today | Tags | Publishers | Years | Search 
Pro ASP.NET Web API Security: Securing ASP.NET Web API
Pro ASP.NET Web API Security: Securing ASP.NET Web API

ASP.NET Web API is a key part of ASP.NET MVC 4 and the platform of choice for building RESTful services that can be accessed by a wide range of devices. Everything from JavaScript libraries to RIA plugins, RFID readers to smart phones can consume your services using platform-agnostic HTTP.

With such wide accessibility,
...

Algorithms Sequential & Parallel: A Unified Approach
Algorithms Sequential & Parallel: A Unified Approach
Effective computing requires the design, analysis, implementation, and evaluation of algorithms to solve problems of interest. Computational problems come from a wide variety of areas including science, engineering, business, athletics, architecture, medicine, management, economics, psychology, anthropology, and entertainment, to...
VMware vSphere Design
VMware vSphere Design

Achieve the performance, scalability, and ROI your business needs

What can you do at the start of a virtualization deployment to make things run more smoothly? If you plan, deploy, maintain, and optimize vSphere solutions in your company, this unique book provides keen insight and solutions. From hardware selection, network...

Smashing Android UI (Smashing Magazine Book Series)
Smashing Android UI (Smashing Magazine Book Series)

Designers and developers, create smashing apps for Android devices

If you're developing applications for Android smartphones and tablets, you know it isn't enough just to create the app. The application has to be intuitive, well laid out, and easy to use. Smashing Android UI shows you just how to do that....

Group Policy: Fundamentals, Security, and the Managed Desktop
Group Policy: Fundamentals, Security, and the Managed Desktop

The Ultimate Book on Group Policy

Freshly updated to include Windows 7, Windows 8 and Windows Server 2012, Group Policy: Fundamentals, Security, and the Managed Desktop, Second Edition is the book for learning everything you need to know about Group Policy, no matter which version of Windows you use. Microsoft...

Fit to Bust: How Great Companies Fail
Fit to Bust: How Great Companies Fail
Warren Buffet remarked that it takes 20 years to build a reputation and five minutes to ruin it. "If you think about that, you'll do things differently." Journalist Tim Phillips turns his eye toward the most avoidable business disasters of recent history. In each case, the story begins at the point where a disastrous...
Adobe Photoshop Elements 14 Classroom in a Book
Adobe Photoshop Elements 14 Classroom in a Book

Adobe Photoshop Elements 14 Classroom in a Book is the most thorough and comprehensive way for you to master all the new features in Adobe's top-rated consumer-targeted photo-editing software. Each chapter in this step-by-step, project-based guide contains a project that builds on your growing knowledge of the...

Architecting the Industrial Internet: The architect's guide to designing Industrial Internet solutions
Architecting the Industrial Internet: The architect's guide to designing Industrial Internet solutions

Learn the ins and outs of the Industrial Internet of Things through subjects ranging from its history and evolution, right up to what the future holds.

About This Book

  • Define solutions that can connect existing systems and newer cloud-based solutions to thousands of thousands of edge devices and...
Analytics: The Agile Way (Wiley and SAS Business Series)
Analytics: The Agile Way (Wiley and SAS Business Series)
For decades now, companies big and small have embraced Agile software development methods. The rationale here is straightforward:
  • Why take one or two years to fully deploy a system, app, or website when so many things can and do go wrong?
  • Why try to cook one big batch and boil the ocean?
  • ...
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Develop, validate, and deploy powerful decentralized applications using blockchain 


Get the most out of cutting-edge blockchain technology using the hands-on information contained in this comprehensive resource. Written by a team of technology and legal experts, Blockchain:...
CoreOS in Action: Running Applications on Container Linux
CoreOS in Action: Running Applications on Container Linux

Summary

CoreOS in Action is a clear tutorial for deploying container-based systems on CoreOS Container Linux.

Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.

About the Technology

Traditional Linux...

Information Security Management Handbook, Volume 7
Information Security Management Handbook, Volume 7

Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding...

Result Page: 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy