Home | Amazing | Today | Tags | Publishers | Years | Search 
RESTful Java with JAX-RS 2.0
RESTful Java with JAX-RS 2.0

Learn how to design and develop distributed web services in Java, using RESTful architectural principles and the JAX-RS 2.0 specification in Java EE 7. By focusing on implementation rather than theory, this hands-on reference demonstrates how easy it is to get started with services based on the REST architecture.

With...

Selective Sentinel Lymphadenectomy for Human Solid Cancer (Cancer Treatment and Research)
Selective Sentinel Lymphadenectomy for Human Solid Cancer (Cancer Treatment and Research)
Lymph node (LN) status is the most important prognostic indicator for the clinical outcome of patients in human solid cancer. Recent developments in sentinel lymph node (SLN) concept and technology have resulted in the application of this revolutionary approach to determine if cancer has metastasized to the regional nodal basin....
Developing Secure Applications with Visual Basic
Developing Secure Applications with Visual Basic

Using client-proven methods, and over 15 years of programming experience, expert author Davis Chapman empowers developers to create powerful, secure applications. Developing Secure Applications with Visual Basic first provides you with an understanding of encryption, and then guides you through adding security features to your own...

FreeSWITCH 1.6 Cookbook
FreeSWITCH 1.6 Cookbook

Over 45 practical recipes to empower you with the latest FreeSWITCH 1.6 features

About This Book

  • Learn how to create a fast and secure messaging and telephony system with FreeSWITCH
  • Trap all the common functionalities of the telephony platform using popular communication protocols
  • ...
Java in a Nutshell, Fourth Edition
Java in a Nutshell, Fourth Edition

Java just keeps growing, adding features, functionality, complexity, and tempting developers to growl with frustration. The new 1.4 release of Java 2 Standard edition increases the size of the platform by 50%, to 2757 classes in 135 packages. How are you going to figure out what this means for your applications? As always, Java in...

Boost.Asio C++ Network Programming
Boost.Asio C++ Network Programming

Enhance your skills with practical examples for C++ network programming

Overview

  • Augment your C++ network programming using Boost.Asio
  • Discover how Boost.Asio handles synchronous and asynchronous programming models.
  • Practical examples of client/server applications.
  • ...
Social Engineering: The Art of Human Hacking
Social Engineering: The Art of Human Hacking

The first book to reveal and dissect the technical aspect of many social engineering maneuvers

From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the...

Identity and Data Security for Web Development: Best Practices
Identity and Data Security for Web Development: Best Practices

Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don’t understand how to obscure data in transmission, for instance, can open security flaws on a site without realizing it. With this practical guide, you’ll learn how...

Android Security Cookbook
Android Security Cookbook

Practical recipes to delve into Android's security mechanisms by troubleshooting common vulnerabilities in applications and Android OS versions

Overview

  • Analyze the security of Android applications and devices, and exploit common vulnerabilities in applications and Android operating systems
  • ...
Learning Puppet Security
Learning Puppet Security

Secure your IT environments with the powerful security tools of Puppet

About This Book

  • Pass a compliance audit by showing the concrete state of your systems using Puppet
  • Secure your Puppet server to minimize risks associated with misconfigured installations using the gdsoperations/auditd...
Penetration Testing with the Bash shell
Penetration Testing with the Bash shell

Make the most of the Bash shell and Kali Linux's commandlinebased security assessment tools

About This Book

  • Utilize the command line to create, run, and execute tests
  • Learn useful command line based information processing utilities and unlock the problem solving power of a Linux...
Building a SharePoint 2016 Home Lab: A How-To Reference on Simulating a Realistic SharePoint Testing Environment
Building a SharePoint 2016 Home Lab: A How-To Reference on Simulating a Realistic SharePoint Testing Environment
This book is a step-by-step guide to building your own SharePoint farm in a home lab setting. Learn how to build a windows domain and then join servers into the domain in order to create your own testing and learning environment. After you get the domain stood up, where you go from there is up to you.  This book will help you learn how...
Result Page: 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy