Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ajax Security
Ajax Security
The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities

 

More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly moving to the Web via Ajax. But, all too often, this...

ECOOP 2004 - Object-Oriented Programming: 18th European Conference, Oslo, Norway, June 14-18, 2004, Proceedings
ECOOP 2004 - Object-Oriented Programming: 18th European Conference, Oslo, Norway, June 14-18, 2004, Proceedings
ECOOP is the premier forum in Europe for bringing together practitioners, researchers, and students to share their ideas and experiences in a broad range of disciplines woven with the common thread of object technology. It is a collage of events, including outstanding invited speakers, carefully refereed technical papers, practitioner reports...
Hello, Android: Introducing Google's Mobile Development Platform
Hello, Android: Introducing Google's Mobile Development Platform
Android is a new software toolkit for mobile phones, created by Google and the Open Handset Alliance. In a few years, it's expected to be found inside millions of cell phones and other mobile devices, making Android a major platform for application developers. That could be your own program running on all those devices.

Getting started...

SQL The Complete Reference, 3rd Edition
SQL The Complete Reference, 3rd Edition

Get comprehensive coverage of every aspect of SQL from three leading industry experts. Revised with coverage of the latest RDBMS software versions, this one-stop guide explains how to build, populate, and administer high-performance databases and develop robust SQL-based applications. 

SQL: The Complete Reference, Third...

Next Generation Information Technologies and Systems: 7th International Conference, NGITS 2009 Haifa, Israel, June 16-18, 2009 Revised Selected Papers
Next Generation Information Technologies and Systems: 7th International Conference, NGITS 2009 Haifa, Israel, June 16-18, 2009 Revised Selected Papers

This book constitutes the refereed post-conference proceedings of the 7th International Conference on Next Generation Information Technologies and Systems, NGITS 2009, held in Haifa, Israel, in June 2009.

The 14 revised full papers presented together with two keynote lectures and one invited paper were carefully reviewed and selected...

Everything You Know about CSS Is Wrong!
Everything You Know about CSS Is Wrong!

Get ready to experience an eye-opening expos on CSS as you know it today. You'll discover a fresh approach to coding Cascading Style Sheets, making old hacks and workarounds a distant memory.

In this book, you'll learn how to start taking full advantage of Internet Explorer 8 using the very latest CSS techniques...

Java The Complete Reference, Seventh Edition (Osborne Complete Reference Series)
Java The Complete Reference, Seventh Edition (Osborne Complete Reference Series)

As I write this, Java is just beginning its second decade. Unlike many other computer languages whose influence begins to wane over the years, Java’s has grown stronger with the passage of time. Java leapt to the forefront of Internet programming with its first release. Each subsequent version has solidified that position. Today,...

Developing Microsoft SharePoint Applications Using Windows Azure
Developing Microsoft SharePoint Applications Using Windows Azure

Microsoft SharePoint and Windows Azure are two sizeable platforms unto themselves. SharePoint is one of Microsoft’s leading server productivity platforms—a collaborative platform for the enterprise and the web. Windows Azure is Microsoft’s operating system in the cloud. Separately, they have their own strengths, market...

Engineering Secure Software and Systems: Third International Symposium
Engineering Secure Software and Systems: Third International Symposium

It is our pleasure to welcome you to the third edition of the International Symposium on Engineering Secure Software and Systems.

This unique event aims at bringing together researchers from software engineering and security engineering, which might help to unite and further develop the two communities in this and future...

Starting Out with C++: From Control Structures through Objects (7th Edition)
Starting Out with C++: From Control Structures through Objects (7th Edition)
Welcome to Starting Out with C++: From Control Structures through Objects, 7th edition. This book is intended for use in a two-semester C++ programming sequence, or an accelerated one-semester course. Students new to programming, as well as those with prior course work in other languages, will nd this text bene cial. The...
Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)
Cybercrime: Criminal Threats from Cyberspace (Crime, Media, and Popular Culture)

This book is an outstanding contribution to the interdisciplinary series on Crime, Media, and Popular Culture from Praeger Publishers. Because of the pervasiveness of media in our lives and the salience of crime and criminal justice issues, we feel it is especially important to provide a home for scholars who are engaged in innovative and...

Geometric Algorithms and Combinatorial Optimization (Algorithms and Combinatorics 2)
Geometric Algorithms and Combinatorial Optimization (Algorithms and Combinatorics 2)

This book develops geometric techniques for proving the polynomial time solvability of problems in convexity theory, geometry, and - in particular - combinatorial optimization. It offers a unifying approach based on two fundamental geometric algorithms: - the ellipsoid method for finding a point in a convex set and - the basis reduction...

unlimited object storage image
Result Page: 454 453 452 451 450 449 448 447 446 445 444 443 442 441 440 439 438 437 436 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy