Home | Amazing | Today | Tags | Publishers | Years | Search 
Go: Building Web Applications
Go: Building Web Applications

Build real-world, production-ready solutions by harnessing the powerful features of Go

About This Book

  • An easy-to-follow guide that provides everything a developer needs to know to build end-to-end web applications in Go
  • Write interesting and clever, but simple code, and learn skills and...
Boost.Asio C++ Network Programming Cookbook
Boost.Asio C++ Network Programming Cookbook

Key Features

  • Build highly efficient distributed applications with ease
  • Enhance your cross-platform network programming skills with one of the most reputable C++ libraries
  • Find solutions to real-world problems related to network programming with ready-to-use recipes using this...
Network Programming with Rust: Build fast and resilient network servers and clients by leveraging Rust's memory-safety and concurrency features
Network Programming with Rust: Build fast and resilient network servers and clients by leveraging Rust's memory-safety and concurrency features
Learn to write servers and network clients using Rust
Key Features
  • Build a solid foundation in Rust while also mastering important network programming details
  • Leverage the power of a number of available libraries to perform network operations in Rust
  • Develop a fully...
Practical Internet Server Configuration: Learn to Build a Fully Functional and Well-Secured Enterprise Class Internet Server
Practical Internet Server Configuration: Learn to Build a Fully Functional and Well-Secured Enterprise Class Internet Server
Learn the skills to complete the full installation, configuration, and maintenance of an enterprise class internet server, no matter what Unix-like operating system you prefer. This book will rapidly guide you towards real system administration, with clear explanations along the way.

After a chapter explaining the most...

Distributed Services with Go: Your Guide to Reliable, Scalable, and Maintainable Systems
Distributed Services with Go: Your Guide to Reliable, Scalable, and Maintainable Systems

This is the book for Gophers who want to learn how to build distributed systems. You know the basics of Go and are eager to put your knowledge to work. Build distributed services that are highly available, resilient, and scalable. This book is just what you need to apply Go to real-world situations. Level up your...

Implementing SSL / TLS Using Cryptography and PKI
Implementing SSL / TLS Using Cryptography and PKI

Hands-on, practical guide to implementing SSL and TLS protocols for Internet security

If you are a network professional who knows C programming, this practical book is for you.  Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or...

SIP: Understanding the Session Initiation Protocol, Second Edition
SIP: Understanding the Session Initiation Protocol, Second Edition
The Session Initiation Protocol (SIP) is a new signaling, presence and instant
messaging protocol developed to set up, modify, and tear down multimedia sessions,
request and deliver presence and instant messages over the Internet [1].
This chapter covers some background for the understanding of the protocol. SIP
was developed by
...
Bulletproof Wireless Security: GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering)
Bulletproof Wireless Security: GSM, UMTS, 802.11, and Ad Hoc Security (Communications Engineering)

Finally--a single volume guide to really effective security for both voice and data wireless networks!

More and more data and voice communications are going via wireless at some point between the sender and intended recipient. As a result, truly "bulletproof" wireless security is now more than a desirable
...

Internet Security: Cryptographic Principles, Algorithms and Protocols
Internet Security: Cryptographic Principles, Algorithms and Protocols
Cryptography is the key to securing the Internet

If every communication network were to use a secure system based on encryption, then viruses, worms and hackers would have a very hard time. Unfortunately, this scenario does not reflect the reality of the Internet world today. However, with security issues becoming more and more important...

Web Security & Commerce (O'Reilly Nutshell)
Web Security & Commerce (O'Reilly Nutshell)
Attacks on government Web sites, break-ins at Internet service providers, electronic credit card fraud, invasion of
personal privacy by merchants as well as hackers - is this what the World Wide Web is really all about?

Web Security & Commerce cuts through the hype and the front page stories. It tells you what the real risks
...
Network Security with OpenSSL
Network Security with OpenSSL
OpenSSL is a popular and effective open source version of SSL/TLS, the most widely used protocol for secure network communications. The only guide available on the subject, Network Security with OpenSSLdetails the challenges in securing network communications, and shows you how to use OpenSSL tools to best meet those challenges. Focused on the...
Modern Cryptography: Theory and Practice
Modern Cryptography: Theory and Practice
Leading HP security expert Wenbo Mao explains why "textbook" crypto schemes, protocols, and systems are profoundly vulnerable by revealing real-world-scenario attacks. Next, he shows how to realize cryptographic systems and protocols that are truly "fit for application"--and formally demonstrates their fitness. Mao presents...
Result Page: 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy