intTypePromotion=1
zunia.vn Tuyển sinh 2024 dành cho Gen-Z zunia.vn zunia.vn
ADSENSE

Building secure apis

Xem 1-8 trên 8 kết quả Building secure apis
  • Ebook A developer’s guide to Amazon SimpleDB: Part 1 includes contents: Chapter 6 working beyond the boundaries, chapter 7 planning for the application lifecycle, chapter 8 security in SimpleDB-based applications, chapter 9 increasing performance, chapter 10 writing a SimpleDB Client: a language-independent guide, chapter 11 improving the simpledb client, chapter 12 building a web-Based task list.

    pdf150p haojiubujain08 01-11-2023 5 1   Download

  • Ebook "Learning node.js for mobile application development" includes content: Setting up your workspace, configuring persistence with mongoDB, creating an API, securing your backend, real time data and websockets, introducing ionic, building user interfaces, making our app interactive, accessing native phone features, working with apis,... and other contents.

    pdf248p haojiubujain07 20-09-2023 5 2   Download

  • Ebook Security engineering: A guide to building dependable distributed systems (Second Edition) – Part 2 presents the following content: Chapter 14 security printing and seals; chapter 15 biometrics; chapter 16 physical tamper resistance; chapter 17 emission security; chapter 18 API attacks; chapter 19 electronic and information warfare; chapter 20 telecom system security; chapter 21 network attack and defense; chapter 22 copyright and DRM; chapter 23 the bleeding edge; chapter 24 terror, justice and freedom; chapter 25 managing the development of secure systems; chapter 26 system evaluatio...

    pdf609p haojiubujain03 24-07-2023 5 4   Download

  • Ebook Security engineering: A guide to building dependable distributed systems (Second Edition) – Part 2 presents the following content: Chapter 14 security printing and seals; chapter 15 biometrics; chapter 16 physical tamper resistance; chapter 17 emission security; chapter 18 API attacks; chapter 19 electronic and information warfare; chapter 20 telecom system security; chapter 21 network attack and defense; chapter 22 copyright and DRM; chapter 23 the bleeding edge; chapter 24 terror, justice and freedom; chapter 25 managing the development of secure systems; chapter 26 system evaluatio...

    pdf311p haojiubujain03 24-07-2023 2 2   Download

  • Starting with expert guidance on web tier technologies, including JavaServer Faces and Facelets, this book also covers building web services using JAX-WS and JAX-RS, developing business logic with Enterprise JavaBeans components, accessing databases using the Java Persistence API, securing web and enterprise applications, and using Contexts and Dependency Injection for the Java EE platform.

    pdf588p phungnguyet_123 20-02-2013 85 13   Download

  • eginning ios apps with fac and twitter apis shows you how to add the power of social networking to your mobile apps on iphone, ipad, and ipod touch. with this book as your guide, you can write apps that connect to fac and twitter quickly, securely, and discreetly. instead of starting from scratch, you will build on the vast resources, data storage capacity, and familiar features of these platforms which have become part of everyday life for hundreds of millions of users worldwide.

    pdf315p hoa_can 29-01-2013 67 15   Download

  • Deciding to add security to a web application is like deciding whether to wear clothes in the morning. Both decisions provide comfort and protection throughout the day, and in both cases the decisions are better made beforehand rather than later. Just look around and ask yourself, “How open do I really want to be with my neighbors?” Or, “How open do I really want them to be with me?”

    pdf250p tailieuvip13 25-07-2012 57 3   Download

  • Before looking at the steps necessary to build the preceding application, I should cover what the term .NET means and what it offers to a software developer. .NET is an infrastructure that provides two major benefits: productivity and security. Using .NET, a developer can write code for many modern problem domains faster, and during coding, the developer faces fewer pitfalls that could end up in security vulnerabilities. Furthermore, .NET code can be implemented so that it can be executed with restricted access to APIs.

    pdf303p tailieuvip13 24-07-2012 108 22   Download

CHỦ ĐỀ BẠN MUỐN TÌM

ADSENSE

nocache searchPhinxDoc

 

Đồng bộ tài khoản
2=>2