From hacks to customize the user environment to networking, securing the system, and optimization, BSD Hacks takes a creative approach to saving time and accomplishing more with fewer resources.
Securing Ajax Applications succinctly explains that the same back-and-forth communications that make Ajax so responsive also gives invaders new opportunities to gather data, make creative new requests of your server, and interfere with the communica
Part I Introduction Chapter 1 Understanding message-oriented middleware and JMS Chapter 2 Introduction to Apache ActiveMQ Part II Configuring ActiveMQ Chapter 3 Understanding connectors Chapter 4 Persisting messages Chapter 5 Securing ActiveMQ Part
In this chapter we introduce the administrative consoles and command line administration. We cover the following topics: - “Introducing the WebSphere administrative consoles” - “Securing the console” - “Job manager console” - “Using command line too
Looking for a unique set of practical tips, tricks, and tools for administrators and power users of BSD systems? From hacks to customize the user environment to networking, securing the system, and optimization, BSD Hacks takes a creative approach t
The .NET Developer's Guide to Windows Security is required reading for .NET programmers who want to develop secure Windows applications. Readers gain a deep understanding of Windows security and the know-how to program secure systems that run on Win
Microsoft? SQL Server? 2008 Integration Services unleashed SAMS 文字版 Contents at a Glance Foreword . . . . . . . . . . . . . . . . . . . . . . . . . xx Part I Getting Started 1 What Is Integration Services and Why Do I Need It?................3 2 Set
Catalyst 3560 Switch Getting Started Guide 1 About this Guide, page 2 2 Taking Out What You Need, page 2 3 Running Express Setup, page 6 4 Managing the Switch, page 8 5 Installing the Switch, page 9 6 Securing the AC Power Cord (Catalyst 3560 8- and
Table of Contents Preface Chapter 1: Anatomy of an Unsafe Application Chapter 2: Getting Started with Spring Security Chapter 3: Enhancing the User Experience Chapter 4: Securing Credential Storage Chapter 5: Fine-Grained Access Control Chapter 6: A
作者:Lynn.Beighley 目录: Intro xxvii 1 It’s Alive: Add Life to Your Static Pages 1 2 How It Fits Together: Connecting to MySQL 59 3 Creating Your Own Data: Create and Populate a Database 103 4 Your Application on the Web: Realistic and Practical Applica
作者: Jeff.Siarto 目录: Intro xix 1 Getting started: WordPress from scratch 1 2 Changing your blog’s look and feel: A question of style 43 3 Content management with WordPress: Beyond the blog 89 4 Users, categories, and tags: Keeping things organized 13