|
|
|
|
The Web Application Hacker's Handbook: Finding and Exploiting Security Flaws
This book is a practical guide to discovering and exploiting security flaws in web applications. By “web applications” we mean those that are accessed using a web browser to communicate with a web server. We examine a wide variety of different technologies, such as databases, file systems, and web services, but only in the context... | | Mule in Action
Summary
Mule in Action, Second Edition is a totally-revised guide covering Mule 3 fundamentals and best practices. It starts with a quick ESB overview and then dives into rich examples covering core concepts like sending, receiving, routing, and transforming data.
About the... | | COBOL Programmers Swing with Java"This book will get maximum leverage out of any reader's COBOL background. I would recommend it as a starting point for a COBOL programmer who is planning to learn Java." Computing Reviews
Featuring the development of graphical user interfaces (GUI's) using the latest in Java swing components, this new edition of... |
|
|
|
|
|
Result Page: 42 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 |