Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Building Internet Firewalls (2nd Edition)
Building Internet Firewalls (2nd Edition)
In the vast and varied universe of computer books, only a few stand out as the best in their subject areas. Building Internet Firewalls is one of those. It's deep, yet carefully focused, so that almost anything you might want to know about firewall strategies for protecting networks is here. In addition, there's lots of information on...
Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks: Xss Exploits and Defense
Cross Site Scripting Attacks starts by defining the terms and laying out the ground work. It assumes that the reader is familiar with basic web programming (HTML) and JavaScript. First it discusses the concepts, methodology, and technology that makes XSS a valid concern. It then moves into the various types of XSS attacks, how they...
Professional Website Performance: Optimizing the Front-End and Back-End
Professional Website Performance: Optimizing the Front-End and Back-End

THE PAST DECADE has seen an increased interest in website performance, with businesses of all sizes realizing that even modest changes in page loading times can have a signifi cant effect on their profi ts. The move toward a faster web has been driven largely by Yahoo! and Google, which have both carried out extensive research on the subject...

Node: Up and Running: Scalable Server-Side Code with JavaScript
Node: Up and Running: Scalable Server-Side Code with JavaScript
In 2008 I was searching for a new programming platform for making websites. This was more than wanting a new language; indeed, the details of the language mattered very little to me. Rather, I was concerned about the ability to program advanced push features into the website like I had seen in Gmail—the ability for the server to push...
Mobile Malware Attacks and Defense
Mobile Malware Attacks and Defense
The Only Book for Analyzing and Mitigating Mobile Malicious Code!

Malware has gone mobile, and the security landscape is changing quickly with emerging attacks on cell phones, PDAs, and other mobile devices. This first book on the growing threat covers a wide range of malware targeting operating systems like Symbian and new
...
Business Intelligence and Agile Methodologies for Knowledge-Based Organizations: Cross-Disciplinary Applications
Business Intelligence and Agile Methodologies for Knowledge-Based Organizations: Cross-Disciplinary Applications
Business intelligence is made possible by the existence of Information Technology. Business intelligence aims to support better business decision-making. To use agile methodologies and to develop Information Technology faster and cheaper is to put an icing on the cake. I doubt that Hans Peter Luhn was aware of the consequences of...
Tile-Based Geospatial Information Systems: Principles and Practices
Tile-Based Geospatial Information Systems: Principles and Practices

Tile-based online mapping systems have replaced traditional Web GIS systems, because of their improved speed and usability. The trend towards tile-base systems was started by Internet services companies, such as Google, Yahoo, and Microsoft. They have been followed by the traditional GIS community, government organizations and open source...

Internet and Network Economics: 7th International Workshop, WINE 2011, Singapore, December 11-14, 2011
Internet and Network Economics: 7th International Workshop, WINE 2011, Singapore, December 11-14, 2011

This volume contains the papers presented at WINE 2011: 7th Workshop on Internet and Network Economics held during December 11–14, 2011 in Singapore.

Over the past decade, there has been a growing interaction between researchers in theoretical computer science, networking and security, economics, mathematics, sociology,...

Handbook of Cloud Computing
Handbook of Cloud Computing

Cloud computing has become a significant technology trend. Experts believe cloud computing is currently reshaping information technology and the IT marketplace. The advantages of using cloud computing include cost savings, speed to market, access to greater computing resources, high availability, and scalability.

Handbook of Cloud...

Hadoop in Practice
Hadoop in Practice

Summary

Hadoop in Practice collects 85 Hadoop examples and presents them in a problem/solution format. Each technique addresses a specific task you'll face, like querying big data using Pig or writing a log file loader. You'll explore each problem step by step, learning both how to build and deploy...

Designing from Both Sides of the Screen: How Designers and Engineers Can Collaborate to Build Cooperative Technology
Designing from Both Sides of the Screen: How Designers and Engineers Can Collaborate to Build Cooperative Technology
Designing from Both Sides of the Screen: How Designers and Engineers Can Collaborate to Build Cooperative Technology is a must-have book for anyone developing user interfaces (UI). The authors define a seemingly simple goal, the Cooperative Principle for Technology: "[T]hose who are designing, building, or managing the development of...
Yahoo! Hacks
Yahoo! Hacks

Yahoo! took the world by storm in the 1990s as a one-of-a-kind, searchable list of interesting web sites. But ten years later, it has expanded into a department store overflowing with useful and innovative tools and services-from email, blogging, social networking, and instant messaging, to news, financial markets, shopping,...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy