Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Modern API Design with ASP.NET Core 2: Building Cross-Platform Back-End Systems
Modern API Design with ASP.NET Core 2: Building Cross-Platform Back-End Systems
Use ASP.NET Core 2 to create durable and cross-platform web APIs through a series of applied, practical scenarios. Examples in this book help you build APIs that are fast and scalable. You’ll progress from the basics of the framework through to solving the complex problems encountered in implementing secure RESTful services....
Tomcat 6 Developer's Guide
Tomcat 6 Developer's Guide
While Tomcat is one of the most popular servlet containers, its inner workings still remain a mystery to many developers. If you only have a superficial familiarity of how this container actually functions, much of its power remains untapped and underutilized. This book will provide you with all that you need to undertand how to effectively use...
Managing and Implementing Microsoft SharePoint 2010 Projects
Managing and Implementing Microsoft SharePoint 2010 Projects

Delve into the capabilities of SharePoint® 2010 -- and determine the best way to put this technology to work for your organization. With this practical guide, you'll gain project management practices for implementing SharePoint, and learn how to customize the system to match the unique collaboration and data-sharing needs of...

Advanced Programming in the UNIX® Environment: Second Edition
Advanced Programming in the UNIX® Environment: Second Edition
"Stephen Rago's update is a long overdue benefit to the community of professionals using the versatile family of UNIX and UNIX-like operating environments. It removes obsolescence and includes newer developments. It also thoroughly updates the context of all topics, examples, and applications to recent releases of popular implementations...
Pro PHP Security
Pro PHP Security

The Internet is a dangerous place for applications. In fact, it is reasonable to say that you
couldn’t create a less secure system if you tried. It is anonymous, uncontrolled, always on,
and instantly accessible from anywhere. This is a world where every bad actor, cracker, script
kiddie, and scam artist is your
...

Color Appearance Models (The Wiley-IS &T Series in Imaging Science and Technology)
Color Appearance Models (The Wiley-IS &T Series in Imaging Science and Technology)
The law of proportion according to which the several colors are formed, even if a man knew he would be foolish in telling, for he could not give any necessary reason, nor indeed any tolerable or probable explanation of them.
Plato

Despite Plato’s warning, this book is about one of the major unresolved issues in the field of
...
Scripting in Java: Integrating with Groovy and JavaScript
Scripting in Java: Integrating with Groovy and JavaScript

When I wrote the three volumes of Harnessing Java 7 in 2012, I did not include a chapter on the Java Scripting API because of the limited space that I had for each volume. Note the phrase “Java Scripting,” which uses two separate words: “Java” and “Scripting.” “JavaScript” is the name of a...

Alfresco 3 Web Services
Alfresco 3 Web Services

Alfresco 3 is the leading open source enterprise content management system that offers powerful features for interacting with the content in its repository from outside the system. These include the support for the Content Management Interoperability Services (CMIS) implementation, reusable web scripts, and a Web Services API.

This...

Temporal Logic for Real-Time Systems (Advanced Software Development Series)
Temporal Logic for Real-Time Systems (Advanced Software Development Series)

This monograph presents a framework for modelling, specifying and verifying systems composed of real-time discrete event processes. A discrete event system consists of the plant (the object to be controlled) and a controller. For example, the plant might consist of machines, robots and conveyors on the factory floor. The objective of...

HTML5 Advertising
HTML5 Advertising

Web advertising is changing. What was once a predominantly Flash-based medium is making the switch to HTML5, with the benefit of a plug-in free environment giving a larger audience for ads, and better integration with the page they are featured on. We live in a time where marketers, designers, and developers are confused as to what they can...

The Unknown Component Problem: Theory and Applications
The Unknown Component Problem: Theory and Applications

The Problem of the Unknown Component: Theory and Applications addresses the issue of designing a component that, combined with a known part of a system, conforms to an overall specification. The authors tackle this problem by solving abstract equations over a language. The most general solutions are studied when both synchronous and...

A Practical Guide to Trusted Computing
A Practical Guide to Trusted Computing
Use Trusted Computing to Make PCs Safer, More Secure, and More Reliable

 

Every year, computer security threats become more severe. Software alone can no longer adequately defend against them: what’s needed is secure hardware. The Trusted Platform Module (TPM) makes...

unlimited object storage image
Result Page: 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 22 21 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy