 |
|
 CCIE Security Exam Certification Guide (CCIE Self-Study)Official self-study test preparation guide for the CCIE Security written exam
Review all CCIE Security written exam topics, including:
- Switching concepts, routing protocols, and WAN protocols, including PPP, ISDN, and Frame Relay
- DNS, TFTP, Secure Shell, Secure Socket Layer Protocol, NTP, and...
|  |  |  |  Foundation Flash Applications for Mobile DevicesIn this book you'll learn:
- The essentials of Flash Lite 1.1 and 2.X
- How to create mobile applications and games
- Best practices for structuring your mobile applications, from starting out to final deployment
- How to integrate graphics, sound, and video
... |
|
 |  |  System-on-a-Chip: Design and TestThis project started as an interim report. The purpose was to communicate to various groups within Advantest about the main issues for system-on-achip (SoC) design and testing and the common industrial practices. Over one years time, a number of people contributed in various capacities to complete this report.
... |  |  Building the Perfect PCThis popular Build-It-Yourself (BIY) PC book covers everything you want to know about building your own system: Planning and picking out the right components, step-by-step instructions for assembling your perfect PC, and an insightful discussion of why you'd want to do it in the first place. Most big brand computers from HP, Dell and others use... |
|
 JSTL: JSP Standard Tag Library Kick StartThe JSP Standard Tag Library is a collection of commonly used functions and tools invaluable to JSP developers to avoid re-creating the same functions on site after site. Sun has indicated that JSP development should be based around using tag libraries going forward, and will relase JSP STL, as their official library. This book starts with an... |  |  Web Client Programming with Perl
If you've ever wanted to learn more about Web protocols so you could build custom client-side tools to automate tasks--or just so you have a better understanding of what's happening behind the scenes--then Web Client Programming with Perl is the book for you. Wong explains HTTP (Hypertext Transfer Protocol) requests and... |  |  Socket.IO Real-time Web Application Development
Build modern real-time web applications powered by Socket.IO
Overview
-
Understand the usage of various socket.io features like rooms, namespaces, and sessions.
-
Secure the socket.io communication.
-
Deploy and scale your socket.io and Node.js applications in production.
... |
|
 Enterprise Java 2 Security: Building Secure and Robust J2EE Applications The purpose of this book is to illustrate the applicability of Java 2 Platform, Enterprise Edition (J2EE), and Java 2 Platform, Standard Edition (J2SE), security technologies in building a secure enterprise infrastructure containing Java-based enterprise applications. With a pragmatic approach, the book explains why Java security... |  |  Patterns in Java, Volume 2Mark Grand's Patterns in Java, Volume 2 offers a grab bag of 50 reusable patterns for Java developers. Together, these patterns can improve your graphical user interface (GUI) design, testing, and the overall robustness of your next Java project.
After a short introduction to patterns and UML (unified modeling language) basics, the... |  |  Web Security & Commerce (O'Reilly Nutshell)Attacks on government Web sites, break-ins at Internet service providers, electronic credit card fraud, invasion of personal privacy by merchants as well as hackers - is this what the World Wide Web is really all about?
Web Security & Commerce cuts through the hype and the front page stories. It tells you what the real risks... |
|
Result Page: 8 7 6 5 4 3 2 1 |