 |
|
|
 Hacking Exposed Mobile: Security Secrets & Solutions
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Proven security tactics for today's mobile apps,devices, and networks
"A great overview of the new threats created... |  |  Computer Science Illuminated
Each new print copy includes Navigate 2 Advantage Access that unlocks a comprehensive and interactive eBook, student practice activities and assessments, a full suite of instructor resources, and learning analytics reporting tools.
Fully revised and updated, the Sixth Edition of the best-selling text Computer Science... |  |  Working with NHibernate 3.0
My first experiences programming data-driven computer systems required registering COM
objects with the regsrv32.exe, invoking the Server.CreateObject method to create an
ADODB.Connection and ADODB.Recordset, and then using the MoveFirst(), MoveLast(),
MoveNext(), and MovePrevious() methods that navigate, forward only, through the... |
|
 Rails, Angular, Postgres, and Bootstrap: Powerful, Effective, and Efficient Full-Stack Web Development
As a Rails developer, you care about user experience and performance, but you also want simple and maintainable code. Achieve all that by embracing the full stack of web development, from styling with Bootstrap, building an interactive user interface with AngularJS, to storing data quickly and reliably in PostgreSQL. Take a holistic view of... |  |  Microsoft Azure IAAS Essentials
Design, configure, and build your cloud-based infrastructure using Microsoft Azure
About This Book
-
Deploy both Windows-based and Linux-based virtual machines to Microsoft Azure
-
Utilize SQL Server Azure to build a robust, highly available solution that can be recovered in the event of...
|  |  Making Sense of NoSQL: A guide for managers and the rest of us
Summary
Making Sense of NoSQL clearly and concisely explains the concepts, features, benefits, potential, and limitations of NoSQL technologies. Using examples and use cases, illustrations, and plain, jargon-free writing, this guide shows how you can effectively assemble a NoSQL solution to replace or... |
|
 Python Hacking Essentials
Target Audience
-
This book is not for professional hackers. Instead, this book is made for beginners who have programming experience and are interested in hacking. Here, hacking techniques that can be easily understood have been described. If you only have a home PC, you can test all the examples provided here. I
... |  |  Hacking Exposed 7: Network Security Secrets and Solutions
The latest tactics for thwarting digital attacks
“Our new reality is zero-day, APT, and state-sponsored attacks. Today, more than ever, security professionals need to get into the hacker’s mind, methods, and toolbox to successfully deter such relentless assaults. This edition brings readers abreast with the... |  |  Database Management Systems, 3rd Edition
Database Management Systems provides comprehensive and up-to-date coverage of the fundamentals of database systems. Coherent explanations and practical examples have made this one of the leading texts in the field. The third edition continues in this tradition, enhancing it with more practical material.
The new edition has... |
|
| Result Page: 95 94 93 92 91 90 89 88 87 86 85 84 83 82 81 80 79 78 77 |