 |
|
 Pro ASP.NET Web API Security: Securing ASP.NET Web API
ASP.NET Web API is a key part of ASP.NET MVC 4 and the platform of choice for building RESTful services that can be accessed by a wide range of devices. Everything from JavaScript libraries to RIA plugins, RFID readers to smart phones can consume your services using platform-agnostic HTTP.
With such wide accessibility,... |  |  Algorithms Sequential & Parallel: A Unified Approach
Effective computing requires the design, analysis, implementation, and evaluation
of algorithms to solve problems of interest. Computational problems come from
a wide variety of areas including science, engineering, business, athletics, architecture,
medicine, management, economics, psychology, anthropology, and entertainment,
to... |  |  VMware vSphere Design
Achieve the performance, scalability, and ROI your business needs
What can you do at the start of a virtualization deployment to make things run more smoothly? If you plan, deploy, maintain, and optimize vSphere solutions in your company, this unique book provides keen insight and solutions. From hardware selection, network... |
|
 Smashing Android UI (Smashing Magazine Book Series)
Designers and developers, create smashing apps for Android devices
If you're developing applications for Android smartphones and tablets, you know it isn't enough just to create the app. The application has to be intuitive, well laid out, and easy to use. Smashing Android UI shows you just how to do that.... |  |  Group Policy: Fundamentals, Security, and the Managed Desktop
The Ultimate Book on Group Policy
Freshly updated to include Windows 7, Windows 8 and Windows Server 2012, Group Policy: Fundamentals, Security, and the Managed Desktop, Second Edition is the book for learning everything you need to know about Group Policy, no matter which version of Windows you use. Microsoft... |  |  Fit to Bust: How Great Companies Fail
Warren Buffet remarked that it takes 20 years to build a reputation and five minutes to ruin it. "If you think about that, you'll do things differently." Journalist Tim Phillips turns his eye toward the most avoidable business disasters of recent history. In each case, the story begins at the point where a disastrous ... |
|
|
 |  |  CoreOS in Action: Running Applications on Container Linux
Summary
CoreOS in Action is a clear tutorial for deploying container-based systems on CoreOS Container Linux.
Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.
About the Technology
Traditional Linux... |  |  Information Security Management Handbook, Volume 7
Updated annually, the Information Security Management Handbook, Sixth Edition, Volume 7 is the most comprehensive and up-to-date reference available on information security and assurance. Bringing together the knowledge, skills, techniques, and tools required of IT security professionals, it facilitates the up-to-date understanding... |
|
Result Page: 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 55 54 53 |