TOP IMDB | Language and Computers | download musik danterbaru
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
OAuth 2.0 Identity and Access Management Patterns
OAuth 2.0 Identity and Access Management Patterns

Want to learn the world’s most widely used authorization framework? This tutorial will have you implementing secure Oauth 2.0 grant flows without delay. Written for practical application and clear instruction, it’s the complete guide.

Overview

  • Build web, client-side, desktop, and server-side...
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques
Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques

Ever thought of using the time-tested tactics and techniques of the ancient ninja to understand the mind of today's ninja, the hacker? As a penetration tester or security consultant you no doubt perform tests both externally and internally for your clients that include both physical and technical tests. Throw traditional pen...

Pro SQL Server 2012 Practices
Pro SQL Server 2012 Practices

Pro SQL Server 2012 Practices is an anthology of high-end wisdom from a group of accomplished database administrators who are quietly but relentlessly pushing the performance and feature envelope of Microsoft SQL Server 2012. With an emphasis upon performance—but also branching into release...

Java Security (2nd Edition)
Java Security (2nd Edition)
One of Java's most striking claims is that it provides a secure programming environment. Yet despite endless discussion, few people understand precisely what Java's claims mean and how it backs up those claims. If you're a developer, network administrator or anyone else who must understand or work with Java's security mechanisms, Java Security is...
Game Theory: A Critical Introduction
Game Theory: A Critical Introduction
As ever there are people and cats to thank. There is also on this occasion electronic mail. The first draft of this book took shape in various cafeterias in Florence during YV’s visit to Europe in 1992 and matured on beaches and in restaurants during SHH’s visit to Sydney in 1993. Since then the mail wires between Sydney and Norwich, or...
Grouping Multidimensional Data: Recent Advances in Clustering
Grouping Multidimensional Data: Recent Advances in Clustering
Clustering is a fundamental problem that has numerous applications in many disciplines. Clustering techniques are used to discover natural groups in datasets and to identify abstract structures that might reside there, without having any background knowledge of the characteristics of the data. They have been used in various areas including...
Preventing Good People From Doing Bad Things: Implementing Least Privilege
Preventing Good People From Doing Bad Things: Implementing Least Privilege

In today’s turbulent technological environment, it’s becoming increasingly crucial for companies to know about the principle of least privilege. These organizations often have the best security software money can buy, with equally developed policies with which to execute them, but they fail to take into...

Beginning DB2: From Novice to Professional (Expert's Voice)
Beginning DB2: From Novice to Professional (Expert's Voice)
IBM’s DB2 Express Edition is one of the most capable of the free database platforms available in today’s marketplace. In Beginning DB2, author Grant Allen gets you started using DB2 Express Edition for web sites, desktop applications, and more. The author covers the basics of DB2 for developers and database...
ERP and Data Warehousing in Organizations: Issues and Challenges
ERP and Data Warehousing in Organizations: Issues and Challenges
Offering ERP deployment strategies for information as diverse as patient records, police and community relations, and geospatial services, this text addresses the complex issues that IT and communication technologies pose for organizations of all sizes.

The successful implementation and deployment of enterprise resource planning depends...

A Modern Introduction to Differential Equations
A Modern Introduction to Differential Equations
An accessible introductory differential equations textbook for the one-semester course.

Designed for a one-semester course, A Modern Introduction to Differential Equations presents a solid and highly accessible introduction to differential equations, developing the concepts from a dynamic systems perspective...

Squid Proxy Server 3.1: Beginner's Guide
Squid Proxy Server 3.1: Beginner's Guide

Squid proxy server enables you to cache your web content and return it quickly on subsequent requests. System administrators often struggle with delays and too much bandwidth being used, but Squid solves these problems by handling requests locally. By deploying Squid in accelerator mode, requests are handled faster than on normal web servers,...

Sacred Wells: A Study in the History, Meaning, and Mythology of Holy Wells & Waters
Sacred Wells: A Study in the History, Meaning, and Mythology of Holy Wells & Waters
Sacred wells are recognized around the world, in nearly every culture and in every age. Long associated with feminine, divine power they are also seen as places of healing, magick,1 wisdom and sources to the Other World. Some believe that these wells were originally created to bring the moon and its powers to the earth, at least in its reflection....
Result Page: 9 8 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy