Navigation bar
  Start Previous page
 55 of 106 
Next page End 50 51 52 53 54 55 56 57 58 59 60  

“ If you have been wanting to learn Java, check out the newly revised fourth
edition of the best-seller Sams Teach Yourself Programming with Java in 24
Hours. This step-by-step tutorial will teach you how to create simple Java
programs and applets. Comprised of 24 one-hour lessons, this new edition focuses
on key programming concepts and essential Java basics, has been improved by
dozens of reader comments, and is reorganized to better cover the latest
developments in Java. The book's coverage of core Java programming topics has
also been expanded. A great starting point for learning Java, this book is also
a great primer to reading sams Teach Yourself Java in 21 Days.
Password: www.AvaxHome.ru
Peter Prinz, Tony Crawford, "C in a Nutshell"
O'Reilly | ISBN 0596006977 | 2005 Year | CHM | 1 Mb | 618 Pages
“ Learning a language--any language--involves a process wherein you learn to
rely less and less on instruction and more increasingly on the aspects of the
language you've mastered. Whether you're learning French, Java, or C, at some
point you'll set aside the tutorial and attempt to converse on your own. It's
not necessary to know every subtle facet of French in order to speak it well,
especially if there's a good dictionary available. Likewise, C programmers don't
need to memorize every detail of C in order to write good programs. What they
need instead is a reliable, comprehensive reference that they can keep nearby. C
in a Nutshell is that reference.
This long-awaited book is a complete reference to the C programming language and
C runtime library. Its purpose is to serve as a convenient, reliable companion
in your day-to-day work as a C programmer. C in a Nutshell covers virtually
everything you need to program in C, describing all the elements of the language
and illustrating their use with numerous examples.
The book is divided into three distinct parts. The first part is a fast-paced
description, reminiscent of the classic Kernighan & Ritchie text on which many C
programmers cut their teeth. It focuses specifically on the C language and
preprocessor directives, including extensions introduced to the ANSI standard in
1999. These topics and others are covered:
Numeric constants
Implicit and explicit type conversions
Expressions and operators
Functions
Fixed-length and variable-length arrays
Pointers
Dynamic memory management
Input and output
The second part of the book is a comprehensive reference to the C runtime
library; it includes an overview of the contents of the standard headers and a
description of each standard library function. Part III provides the necessary
knowledge of the C programmer's basic tools: the compiler, the make utility, and
the debugger. The tools described here are those in the GNU software collection.
C in a Nutshell is the perfect companion to K&R, and destined to be the most
reached-for reference on your desk.
Password: www.AvaxHome.ru
Christopher Steel, Ramesh Nagappan, Ray Lai, "Core Security Patterns: Best
Practices and Strategies for J2EE, Web Services, and Identity Management"
Prentice Hall PTR | ISBN 0131463071 | 2005 Year | CHM | 7,6 Mb | 1088 Pages
“ "Java provides the application developer with essential security mechanisms
and support in avoiding critical security bugs common in other languages. A
language, however, can only go so far. The developer must understand the
security requirements of the application and how to use the features Java
provides in order to meet those requirements. Core Security Patterns addresses
both aspects of security and will be a guide to developers everywhere in
creating more secure applications."
--Whitfield Diffie, inventor of Public-Key Cryptography
"A comprehensive book on Security Patterns, which are critical for secure
programming."
--Li Gong, former Chief Java Security Architect, Sun Microsystems, and coauthor
of Inside Java 2 Platform Security
"As developers of existing applications, or future innovators that will drive
the next generation of highly distributed applications, the patterns and best
practices outlined in this book will be an important asset to your development
efforts."
--Joe Uniejewski, Chief Technology Officer and Senior Vice President, RSA
Security, Inc.
"This book makes an important case for taking a proactive approach to security
rather than relying on the reactive security approach common in the software
industry."
--Judy Lin, Executive Vice President, VeriSign, Inc.
"Core Security Patterns provides a comprehensive patterns-driven approach and
methodology for effectively incorporating security into your applications. I
recommend that every application developer keep a copy of this indispensable
security reference by their side."
--Bill Hamilton, author of ADO.NET Cookbook, ADO.NET in a Nutshell, and NUnit
Pocket Reference
"As a trusted advisor, this book will serve as a Java developer™s security
handbook, providing applied patterns and design strategies for securing Java
applications."
--Shaheen Nasirudheen, CISSP,Senior Technology Officer, JPMorgan Chase
"Like Core J2EE Patterns, this book delivers a proactive and patterns-driven
approach for designing end-to-end security in your applications. Leveraging the
authors™ strong security experience, they created a must-have book for any
designer/developer looking to create secure applications."
--John Crupi, Distinguished Engineer, Sun Microsystems, coauthor of Core J2EE
Patterns
Core Security Patterns is the hands-on practitioner™s guide to building robust
end-to-end security into J2EE™ enterprise applications, Web services, identity
management, service provisioning, and personal identification solutions. Written
by three leading Java security architects, the patterns-driven approach fully
reflects today™s best practices for security in large-scale, industrial-strength
applications.
The authors explain the fundamentals of Java application security from the
ground up, then introduce a powerful, structured security methodology; a vendor-
independent security framework; a detailed assessment checklist; and twenty-
three proven security architectural patterns. They walk through several
realistic scenarios, covering architecture and implementation and presenting
detailed sample code. They demonstrate how to apply cryptographic techniques;
obfuscate code; establish secure communication; secure J2ME™ applications;
authenticate and authorize users; and fortify Web services, enabling single
sign-on, effective identity management, and personal identification using Smart
Cards and Biometrics.
Core Security Patterns covers all of the following, and more:
What works and what doesn™t: J2EE application-security best practices, and
common pitfalls to avoid
Implementing key Java platform security features in real-world applications
Establishing Web Services security using XML Signature, XML Encryption, WS-
Security, XKMS, and WS-I Basic security profile
Designing identity management and service provisioning systems using SAML,
Liberty, XACML, and SPML
Designing secure personal identification solutions using Smart Cards and
Biometrics
Security design methodology, patterns, best practices, reality checks, defensive
strategies, and evaluation checklists
End-to-end security architecture case study: architecting, designing, and
implementing an end-to-end security solution for large-scale applications
Password: www.AvaxHome.ru
Alexander O. Tarakanov, Victor A. Skormin, Svetlana P. Sokolova,
"Immunocomputing: Principles and Applications"
Springer | ISBN 038795533X | 2003 Year | DjVu | 2 Mb | 232 Pages
Text introduces immunocomputing (IC) as a new computing approach that replicates
the principles of information processing by proteins and immune networks. For
experts in computer science, artificial intelligence, and biomolecular
computing. Includes index and references.
Password: www.AvaxHome.ru
Peter Wasserscheid (Editor), Thomas Welton (Editor), "Ionic Liquids in
Synthesis"
Wiley-VCH | ISBN 3527305157 | 2003 Year | PDF | 3,37 Mb | 380 Pages
“ The demand for increasingly clean and efficient chemical syntheses is becoming
more urgent from both an economic and an environmental standpoint. The
development of ionic liquids that are fluid at room temperature is a major
advance in green chemistry. These new green "designer-solvents" are less toxic
Previous page Top Next page