|
|
|
|
|
CherryPy Essentials: Rapid Python Web Application DevelopmentThis book covers the CherryPy library for Python web development from its history and installation through its main features and core concepts to its integration with Python and other products to construct, test, and deploy a sample photoblog application. The author Sylvain Hellegouarch is dedicated to the development of free software projects and... | | Oracle8i Internal Services for Waits, Latches, Locks, and MemoryThis concise book contains detailed information about Oracle internals -- information that's not readily available to Oracle customers. It lays a foundation for advanced performance tuning of the Oracle database. Based on Oracle8i release 8.1, the book describes many of the secrets of Oracle's internal services: data structures, algorithms, and... | | Magento 1.3: PHP Developer's GuideDesign, develop, and deploy feature-rich Magento online stores with PHP coding
- Extend and customize the Magento e-commerce system using PHP code
- Set up your own data profile to import or export data in Magento
- Build applications that interface with the customer, product, and order data using...
|
|
|
Windows Server 2012 Unified Remote Access Planning and Deployment
DirectAccess, introduced in Windows Server 2008 R2, has been a ground breaking VPN-like connectivity solution, adopted by thousands of organizations worldwide. Allowing organizations to deploy without manually configuring every client and providing always-on connectivity has made this technology world-famous. Now, with Windows Server 2012,... | | Learning PrimeFaces Extensions Development
PrimeFaces is a lightweight open source component suite for Java Server Faces (JSF), a Java-based web application framework. Java developers use PrimeFaces for front end UI development, and it can also be applied to both mobile and web applications. It allows users to customize, create, and further develop application features.
... | | CEH Certified Ethical Hacker All-in-One Exam Guide
Get complete coverage of all the objectives included on the EC-Council's Certified Ethical Hacker exam inside this comprehensive resource. Written by an IT security expert, this authoritative guide covers the vendor-neutral CEH exam in full detail. You'll find learning objectives at the beginning of each chapter, exam tips, practice... |
|
|
Result Page: 340 339 338 337 336 335 334 333 332 331 330 329 328 327 326 325 324 323 322 |