|
|
|
|
|
| | | | Beginning Apache Struts: From Novice to ProfessionalThis book describes a web application framework called Apache Struts, with which you can easily build robust, maintainable web applications. Now, the three italicized adjectives aren’t just hype:
• Simplicity: Struts is relatively easy to pick up and use effectively. You get a lot out of Struts for the effort... |
|
Peer-to-Peer : Harnessing the Power of Disruptive Technologies
The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and... | | Hacking Firefox: More Than 150 Hacks, Mods, and CustomizationsThey dreamed of a better browser . . . and before you could say "explore no more," Firefox was born. But already you want more. Tighter security, greater functionality. A custom installation for Linux. Maybe even that unique extension you've always dreamed of creating. Well, if you want to tweak the Fox, here are over 400 pages of ways... | | Moodle E-learning Course DevelopmentA complete guide to successful learning using Moodle - Straight-forward coverage of installing and using the Moodle system - Working with Moodle features in all learning environments - A unique course-based approach focuses your attention on designing well structured, interactive, and successful courses
... |
|
Linux HPC Cluster InstallationFew people who use computers have not heard of Linux®. Linux is at the heart of a revolution that is fundamentally changing many aspects of how software is written and delivered. It remains to be seen where this revolution will ultimately lead. Far less nebulous is the Linux penetration into the scientific calculation arena, or more... | | Real World Linux Security (2nd Edition)
Stop today's most vicious Internet attackers—right in their tracks!
Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or... | | Hunting Security BugsYour essential reference to software security testing—from the experts.
Learn how to think like an attacker—and identify potential security issues in your software. In this essential guide, security testing experts offer practical, hands-on guidance and code samples to help you find, classify, and assess security bugs before... |
|
|
Result Page: 846 845 844 843 842 841 840 839 838 837 836 835 834 833 832 831 830 829 828 |