Home | Amazing | Today | Tags | Publishers | Years | Search 
Websphere MQ Security in an Enterprise Environment (IBM Redbooks)
Websphere MQ Security in an Enterprise Environment (IBM Redbooks)

This IBM Redbook considers an enterprise and describes some of the procedures and documentation that need to be developed to secure WebSphere MQ on the z/OS (zSeries), OS/400 (iSeries), IBM AIX (pSeries) and Windows 2000 (xSeries) platforms. This Redbook also documents the before and after configurations needed to take advantage of the recent...

Java in 60 Minutes A Day
Java in 60 Minutes A Day
Get up and running with Java in no time using this innovative virtual classroom approach!

Do you know how to harness the exciting power of object-oriented programming? Focusing on the Java 2 Platform, Standard Edition (J2SE™), this revolutionary book and companion online presentation take you through 19 one-hour lessons that teach you how...

Programmer's Ultimate Security DeskRef
Programmer's Ultimate Security DeskRef
The Programmer's Ultimate Security DeskRef is the only complete desk reference covering multiple languages and their inherent security issues. It will serve as the programming encyclopedia for almost every major language in use. While there are many books starting to address the broad subject of security best practices within the software...
Mastering Kylix 2
Mastering Kylix 2
Kylix is Borland's new tool, based on Delphi, for developing applications that run on the Linux operating system. In this book, best-selling Mastering Delphi author Marco Cantu tackles all aspects of using the tool. Whether you are a Delphi developer who wants to learn Linux development, or you are a Linux developer who wants to learn how to use...
Java in a Nutshell : A Desktop Quick Reference (Java Series) (3rd Edition)
Java in a Nutshell : A Desktop Quick Reference (Java Series) (3rd Edition)
The 3rd edition of the well-known reference, Java in a Nutshell, covers the essential APIs of Java 1.2, including networking, security, input and output, and basic language and utility classes. Due to the size of the Java 1.2 API, graphics and graphical user interface classes are now examined in a volume called Java Foundation Classes...
Hacking Exposed Wireless
Hacking Exposed Wireless

Secure Your Wireless Networks the Hacking Exposed Way

Defend against the latest pervasive and devastating wireless attacks using the tactical security information contained in this comprehensive volume. Hacking Exposed Wireless reveals how hackers zero in on susceptible networks and peripherals, gain access, and execute...

The Linux Programmer's Toolbox (Prentice Hall Open Source Software Development Series)
The Linux Programmer's Toolbox (Prentice Hall Open Source Software Development Series)
Master the Linux Tools That Will Make You a More Productive Programmer

Linux comes with an extraordinary collection of power tools for C and C++ developers. The Linux Programmer's Toolbox helps you leverage all that power and productivity--without mastering endless syntax options, tracking down hard-to-find...

Mastering Perl/Tk
Mastering Perl/Tk
Perl/Tk is the marriage of the Tk graphical toolkit with Perl, the powerful programming language used primarily for system administration, web programming, and database manipulation. With Perl/Tk, you can build Perl programs with an attractive, intuitive GUI interface with all the power of Perl behind it. Mastering Perl/Tk is the...
Teach Yourself Tcp/Ip in 14 Days
Teach Yourself Tcp/Ip in 14 Days
As you might imagine, Teach Yourself TCP/IP in 14 Days provides a rapid introduction to the TCP/IP protocols and to a few commonly used applications that are built on top of them. The discussion is very lucid and emphasizes the fundamental concepts behind a given protocol; it does a good job of not letting the mass of details obscure the...
SAMS Teach Yourself PHP4 in 24 Hours
SAMS Teach Yourself PHP4 in 24 Hours
This is a book about PHP, the open source Web scripting language that has joined Perl, ASP,
and Java on the select list of languages that can be used to create dynamic online
environments. It is also a book about programming. In the space available, it is neither
possible to create a complete guide to programming in PHP nor to cover
...
Special Edition Using Perl 5 for Web Programming
Special Edition Using Perl 5 for Web Programming
Back in 1986, a UNIX programmer by the name of Larry Wall found himself working on a task that involved generating reports from a great many text files, with cross-references. Because he was a UNIX programmer, and because the problem involved manipulating the contents of text files, he started to use awk for the task. But it soon became clear that...
The Tomes of Delphi : Basic 32-Bit
The Tomes of Delphi : Basic 32-Bit
Developer's Guide to Delphi Communications is another addition to the highly successful Delphi series from Wordware. This is the only title on the market that provides a comprehensive overview to the communications capability of Delphi relative to the major communications protocols, such as TCP/IP, MAPI, SMTP, and HTTP.

Reliable
...
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy