 |
|
 Just Spring Data Access: Covers JDBC, Hibernate, JPA and JDO
JDBC has simplified database access in Java applications, but a few nagging wrinkles remain—namely, persisting Java objects to relational databases. With this book, you’ll learn how the Spring Framework makes that job incredibly easy with dependency injection, template classes, and object-relational-mapping (ORM). ... |  |  Excel VBA 24-Hour Trainer
Increase your productivity and save time and effort with Excel VBA
This unique book-and-DVD package prepares you to get more out of Excel by using Visual Basic for Applications (VBA) to automate your routine or labor-intensive Excel tasks. Microsoft Excel MVP and author Tom Urtis walks through a series of lessons while the... |  |  Understanding Network Hacks: Attack and Defense with Python
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore... |
|
 Rails, Angular, Postgres, and Bootstrap: Powerful, Effective, and Efficient Full-Stack Web Development
As a Rails developer, you care about user experience and performance, but you also want simple and maintainable code. Achieve all that by embracing the full stack of web development, from styling with Bootstrap, building an interactive user interface with AngularJS, to storing data quickly and reliably in PostgreSQL. Take a holistic view of... |  |  Making Sense of NoSQL: A guide for managers and the rest of us
Summary
Making Sense of NoSQL clearly and concisely explains the concepts, features, benefits, potential, and limitations of NoSQL technologies. Using examples and use cases, illustrations, and plain, jargon-free writing, this guide shows how you can effectively assemble a NoSQL solution to replace or... |  |  Python Hacking Essentials
Target Audience
-
This book is not for professional hackers. Instead, this book is made for beginners who have programming experience and are interested in hacking. Here, hacking techniques that can be easily understood have been described. If you only have a home PC, you can test all the examples provided here. I
... |
|
 Computer Science Illuminated
Each new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.
Fully revised and updated, the Sixth Edition of the best-selling text Computer Science... |  |  Hacking Exposed 7: Network Security Secrets and Solutions
The latest tactics for thwarting digital attacks
“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the... |  |  Teach Yourself Database Programming With Visual Basic 5 in 21 Days
Welcome to Teach Yourself Database Programming with Visual Basic 5 in 21 Days, Second
Edition. You cover a lot of ground in the next 21 lessons-from developing fully functional
input screens with fewer than 10 lines of Visual Basic code and writing Visual Basic code
libraries, to handling complex user security and auditing in... |
|
|
| Result Page: 320 319 318 317 316 315 314 313 312 311 310 309 308 307 306 305 304 303 302 |