Implementing NetScaler VPX : leverage the features of NetScaler VPX to optimize and deploy responsive web services and applications on multiple virtualization platforms /
Na minha lista:
Autor principal: | Sandbu, Marius (Author) |
---|---|
Outros Autores: | Dhali, Maruf Ahmed (Cover designer) |
Formato: | Recurso Electrónico livro electrónico |
Idioma: | inglês |
Publicado em: |
Birmingham, England :
Packt Publishing,
2014.
|
Colecção: | Professional Expertise Distilled
|
Assuntos: | |
Acesso em linha: | An electronic book accessible through the World Wide Web; click to view |
Tags: |
Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
|
Registos relacionados
Citrix Access Gateway VPX 5.04 essentials a practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPX /
Por: Mallett, Andrew
Publicado em: (2013)
Por: Mallett, Andrew
Publicado em: (2013)
Hacking the code ASP. NET web application security /
Por: Burnett, Mark (Mark M.)
Publicado em: (2004)
Por: Burnett, Mark (Mark M.)
Publicado em: (2004)
Implementing SSH strategies for optimizing the Secure Shell /
Por: Dwivedi, Himanshu
Publicado em: (2004)
Por: Dwivedi, Himanshu
Publicado em: (2004)
Implementing PKI Services on z/OS
Publicado em: (2004)
Publicado em: (2004)
Developing .NET web services with XML
Por: Jorgensen, David
Publicado em: (2002)
Por: Jorgensen, David
Publicado em: (2002)
Implementing database security and auditing
Por: Ben-Natan, Ron
Publicado em: (2005)
Por: Ben-Natan, Ron
Publicado em: (2005)
Configuring NetScreen Firewalls
Por: Cameron, Rob
Publicado em: (2005)
Por: Cameron, Rob
Publicado em: (2005)
Ext.NET web application development a guide to building rich internet applications with Ext.NET using ASP.NET web forms and ASP.NET MVC /
Por: Shah, Anup, 1949-
Publicado em: (2012)
Por: Shah, Anup, 1949-
Publicado em: (2012)
Implementing email security and tokens current standards, tools, and practices /
Por: Turner, Sean
Publicado em: (2008)
Por: Turner, Sean
Publicado em: (2008)
Professional ASP.NET 3.5 security, membership, and role management with C# and VB
Por: Haidar, Bilal
Publicado em: (2008)
Por: Haidar, Bilal
Publicado em: (2008)
The book of VB. NET .NET insight for VB developers /
Por: MacDonald, Matthew
Publicado em: (2002)
Por: MacDonald, Matthew
Publicado em: (2002)
Petri nets fundamental models, verification and applications /
Publicado em: (2009)
Publicado em: (2009)
ASP.NET web developer's guide
Por: ?Ahamada, Mesab?aha
Publicado em: (2002)
Por: ?Ahamada, Mesab?aha
Publicado em: (2002)
C# .NET web developer's guide
Publicado em: (2002)
Publicado em: (2002)
Intrusion prevention and active response deploying network and host IPS /
Por: Rash, Michael
Publicado em: (2005)
Por: Rash, Michael
Publicado em: (2005)
Professional Enterprise .NET
Por: Arking, Jon, 1973-
Publicado em: (2009)
Por: Arking, Jon, 1973-
Publicado em: (2009)
Resource optimization and security for cloud services /
Por: Xiong, Kaiqi
Publicado em: (2014)
Por: Xiong, Kaiqi
Publicado em: (2014)
Trapped in the net the unanticipated consequences of computerization /
Por: Rochlin, Gene I.
Publicado em: (1997)
Por: Rochlin, Gene I.
Publicado em: (1997)
The net effect romanticism, capitalism, and the internet /
Por: Streeter, Thomas
Publicado em: (2010)
Por: Streeter, Thomas
Publicado em: (2010)
Beginning asp.net web pages with webmatrix
Por: Brind, Mike
Publicado em: (2011)
Por: Brind, Mike
Publicado em: (2011)
Designing Visual Basic.NET applications
Por: Vitter, David
Publicado em: (2001)
Por: Vitter, David
Publicado em: (2001)
Kali Linux CTF Blueprints : build, test, and customize your own Capture the Flag challenges across multiple platforms designed to be attacked with Kali Linux /
Por: Buchanan, Cameron
Publicado em: (2014)
Por: Buchanan, Cameron
Publicado em: (2014)
Beginning ASP.NET security
Por: Dorrans, Barry
Publicado em: (2010)
Por: Dorrans, Barry
Publicado em: (2010)
Neural nets and chaotic carriers
Por: Whittle, Peter, 1927-
Publicado em: (2010)
Por: Whittle, Peter, 1927-
Publicado em: (2010)
VB.NET developer's guide
Por: Wakefield, Cameron
Publicado em: (2001)
Por: Wakefield, Cameron
Publicado em: (2001)
Mastering Visual C# .NET
Por: Price, Jason
Publicado em: (2002)
Por: Price, Jason
Publicado em: (2002)
Visual Basic .NET programming
Por: Davis, Harold, 1953-
Publicado em: (2002)
Por: Davis, Harold, 1953-
Publicado em: (2002)
.NET Framework professional projects
Por: Chakraborti, Angshuman
Publicado em: (2002)
Por: Chakraborti, Angshuman
Publicado em: (2002)
Learn ASP.NET MVC /
Por: Weil, Arnaud
Publicado em: (2016)
Por: Weil, Arnaud
Publicado em: (2016)
Web commerce security design and development /
Por: Nahari, Hadi
Publicado em: (2011)
Por: Nahari, Hadi
Publicado em: (2011)
Spring Security 3 secure your web applications against malicious intruders with this easy to follow practical guide /
Por: Mularien, Peter
Publicado em: (2010)
Por: Mularien, Peter
Publicado em: (2010)
Neural nets WIRN10 proceedings of the 20th Italian Workshop on Neural Nets /
Publicado em: (2011)
Publicado em: (2011)
Neural nets WIRN11 proceedings of the 21st Italian Workshop on Neural Nets /
Publicado em: (2011)
Publicado em: (2011)
IBM eserver zSeries 990 (z990) cryptography implementation
Publicado em: (2004)
Publicado em: (2004)
Security technologies for the World Wide Web
Por: Oppliger, Rolf
Publicado em: (2003)
Por: Oppliger, Rolf
Publicado em: (2003)
Web application defender's cookbook battling hackers and protecting users /
Por: Barnett, Ryan C.
Publicado em: (2013)
Por: Barnett, Ryan C.
Publicado em: (2013)
Safeguarding critical e-documents implementing a program for securing confidential information assets /
Por: Smallwood, Robert F., 1959-
Publicado em: (2012)
Por: Smallwood, Robert F., 1959-
Publicado em: (2012)
Federated identity management and web services security with IBM tivoli security solutions
Por: Bücker, Axel
Publicado em: (2005)
Por: Bücker, Axel
Publicado em: (2005)
Innocent code a security wake-up call for Web programmers /
Por: Huseby, Sverre H.
Publicado em: (2004)
Por: Huseby, Sverre H.
Publicado em: (2004)
Visual Basic.NET black book
Por: Holzner, Steven
Publicado em: (2002)
Por: Holzner, Steven
Publicado em: (2002)
Registos relacionados
-
Citrix Access Gateway VPX 5.04 essentials a practical step-by-step guide to provide secure remote access using the Citrix Access Gateway VPX /
Por: Mallett, Andrew
Publicado em: (2013) -
Hacking the code ASP. NET web application security /
Por: Burnett, Mark (Mark M.)
Publicado em: (2004) -
Implementing SSH strategies for optimizing the Secure Shell /
Por: Dwivedi, Himanshu
Publicado em: (2004) -
Implementing PKI Services on z/OS
Publicado em: (2004) -
Developing .NET web services with XML
Por: Jorgensen, David
Publicado em: (2002)