Firewall Policies and VPN Configurations Deploying a network security policy is a significant and serious undertaking. Making good decisions in this matter will save a great deal of money and prevent many future security issues on your network, while making incorrect or hasty decisions will lay the foundation for an insecure network infrastructure. Creating a network security policy will... Building an e-Commerce Application with MEAN
Develop an end-to-end, real-time e-commerce application using the MEAN stack
About This Book
Build all the main components of an e-commerce website and extend its high-quality features as per your needs
Beginning Office 365 Collaboration Apps: Working in the Microsoft Cloud
Start making the most of the latest collaboration tools in Office 365?including SharePoint, OneDrive, Office 365 Groups, Office, Teams, Yammer, Planner, Stream, Forms, and Flow?and integrate them into your team’s projects to boost productivity, engagement, innovation, and enjoyment at work. This book walks you through the...
Data Access Patterns: Database Interactions in Object-Oriented Applications
Efficient, high-quality data access code is crucial to the performance and usability of virtually any enterprise application-and there's no better way to improve an existing system than to optimize its data access code. Regardless of database engine, platform, language, or application, developers repeatedly encounter the same...
|Result Page: 31 30 29 28 27 26 25 24 23 22 |