John Cothran | The Vampire Diaries | Venus Theatre Of Tragedy
Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
ASP.NET Web API 2: Building a REST Service from Start to Finish
ASP.NET Web API 2: Building a REST Service from Start to Finish

The ASP.NET MVC Framework has always been a good platform on which to implement REST-based services, but the introduction of the ASP.NET Web API Framework raised the bar to a whole new level.

Now in release version 2.1, the Web API Framework has evolved into a powerful and refreshingly usable platform. This concise book provides...

Csound Power!
Csound Power!

Csound, a free, cross-platform, do-it-yourself software solution for sound synthesis and music production, has been growing in power for more than 25 years. Getting started with this highly sophisticated system can be a bit daunting for new users. But once you've mastered the basic concepts, using Csound is nearly as easy as plugging...

Practical Linux Security Cookbook
Practical Linux Security Cookbook

Key Features

  • This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
  • More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
  • Enhance file system security and local and remote...
Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Cisco NAC Appliance: Enforcing Host Security with Clean Access (Networking Technology: Security)
Almost every contemporary corporation and organization has acquired and deployed security solutions or mechanisms to keep its networks and data secure. Hardware and software tools such as firewalls, network-based intrusion prevention systems, antivirus and antispam packages, host-based intrusion prevention solutions, and...
Solaris Solutions for System Administrators: Time-Saving Tips, Techniques, and Workarounds, Second Edition
Solaris Solutions for System Administrators: Time-Saving Tips, Techniques, and Workarounds, Second Edition
Learn how to work smart and avoid common pitfalls of managing Solaris systems

The Solaris operating system is used by hundreds of thousands of companies worldwide to run everything from Web services to back-end financial systems. The Solaris 9 release improves manageability; however, it also increases the complexity of the operating environment...

Git : Best Practices Guide
Git : Best Practices Guide

Master the best practices of Git with the help of real-time scenarios to maximize team efficiency and workflow

About This Book

  • Work with a versioning tool for continuous integration using Git
  • Learn how to make the best use of Git's features
  • Comprehensible guidelines...
Learning Linux Binary Analysis
Learning Linux Binary Analysis

Key Features

  • Grasp the intricacies of the ELF binary format of UNIX and Linux
  • Design tools for reverse engineering and binary forensic analysis
  • Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes

Book Description

Learning...

Oracle Data Guard 11gR2 Administration Beginner's Guide
Oracle Data Guard 11gR2 Administration Beginner's Guide

If you're an Oracle Database Administrator it's almost essential to know how to protect and preserve your data. This is the perfect primer to Data Guard that covers all the bases with a totally practical, user-friendly approach.

Overview

  • Understand the essentials and components of Oracle Data...
Oracle Fusion Applications Administration Essentials
Oracle Fusion Applications Administration Essentials

Administer, configure, and maintain your Oracle Fusion Applications

Overview

  • Provides clear and concise guidance for administering Oracle Fusion Applications
  • Comprehensively covers all major areas of Oracle Fusion Applications administration
  • Contains meaningful illustrations...
Human Ear Recognition by Computer (Advances in Pattern Recognition)
Human Ear Recognition by Computer (Advances in Pattern Recognition)

Biometrics deals with recognition of individuals based on their physiological or behavioral characteristics. The human ear is a new feature in biometrics that has several merits over the more common face, fingerprint and iris biometrics. Unlike the fingerprint and iris, it can be easily captured from a distance without a fully cooperative...

Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

MCSA/MCSE: Windows Server 2003 Network Security Administration Study Guide (70-299)
MCSA/MCSE: Windows Server 2003 Network Security Administration Study Guide (70-299)
Here's the book you need to prepare for the Implementing and Administering Security in a Microsoft Windows Server 2003 Network exam (70-299). This Study Guide was developed to meet the exacting requirements of today's certification candidates. In addition to the consistent and...
Result Page: 8 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy