free tracker
Categories Unlimited Books

Spring Security – Third Edition: Secure your web applications, RESTful serv…

Learn how to secure your Java applications from hackers using Spring Security 4.2

About This Book

  • Architect solutions that leverage the full power of Spring Security while remaining loosely coupled.
  • Implement various scenarios such as supporting existing user stores, user sign up, authentication, and supporting AJAX requests,
  • Integrate with popular Microservice and Cloud services such as Zookeeper, Eureka, and Consul, along with advanced techniques, including OAuth, JSON Web Token’s (JWS),…

Decompiling Android

Pub Date : 2012-07-04 | Author : Godfrey Nolan | Publisher : Apress

ISBN 10 : 9781430242482
ISBN 13 : 1430242485

Decompiling Android looks at the the reason why Android apps can be decompiled to recover their source code, what it means to Android developers and how you can protect your code f..

Raspberry Pi Hacks

Pub Date : 2013-12-09 | Author : Ruth Suehle | Publisher : "O'Reilly Media, Inc."

ISBN 10 : 9781449362317
ISBN 13 : 1449362311

With more than 60 practical and creative hacks, this book helps you turn Raspberry Pi into the centerpiece of some cool electronics projects. Want to create a controller for a came..

Javascript Robotics

Pub Date : 2015-04-13 | Author : Backstop Media | Publisher : Maker Media, Inc.

ISBN 10 : 9781457186912
ISBN 13 : 1457186918

JavaScript Robotics is on the rise. Rick Waldron, the lead author of this book and creator of the Johnny-Five platform, is at the forefront of this movement. Johnny-Five is an open..

Decompiling Java

Pub Date : 2004-07-23 | Author : Godfrey Nolan | Publisher : Apress

ISBN 10 : 9781430207399
ISBN 13 : 1430207396

* Includes complete decompiler source * Includes complete obfuscator source * Includes a comprehensive chapter on strategies for protecting your code * Covers the basic theory behi..

Segment Routing

Pub Date : 2017-01-17 | Author : Clarence Filsfils | Publisher :

ISBN 10 : 1542369126
ISBN 13 : 9781542369121

Over the past ten years, operators have heavily invested in network infrastructure because of exploding growth in IP traffic. Moreover, the lack of close interaction between applic..

Leave a Reply

Your email address will not be published. Required fields are marked *