2681
by Flanders, Jon
Published 2008
[O'Reilly Media]
... Program READ/WRITE services Host REST services Program REST feeds Program AJAX REST clients Secure REST...

2682 ... schemes provided by .NET Core to make your apps and APIs secure. The book then shows you how the latest...

2683
by De Sanctis, Valerio
Published 2022
Packt Publishing
... the front-end and back-end to build and deploy secure and robust web applications...

2684
by Wallace, Kevin
Published 2016
Pearson IT Certification
... routing, Wide Area Networks (WAN), network services, securing network devices, and network management...

2685
by Mahajan, Gautam
Published 2023
Productivity Press
..., secures long-term customers, and brings distinct meaning to your brand and your stakeholders. Without...

2686
by Johnson, Allan
Published 2017
Cisco Press
... deploy LAN switching, IPv4 and IPv6 routing, WANs, and infrastructure services; and to secure and manage...

2687
by Soni, Rahul
Published 2016
Apress
... and understand the architectural nuances. Then you will learn how to scale out, secure, monitor and troubleshoot...

2688
by Doyle, Jennifer
Published 2005
Cisco Press
..., includes protocol changes and Cisco features that enhance routing integrity, secure routers from attacks...

2689
by Liu, Cricket
Published 2003
O'Reilly
... incremental transfer Secure zone transfers Restrict which queries a server will answer Upgrade to BIND 9 from...

2690
by Kuhl, Joan Snyder
Published 2019
Berrett-Koehler Publishers
... for women seeking to build the confidence and conviction to secure the seat at the table they've earned...

2691
by Eeckhout, Jan
Published 2022
Princeton University Press
...—acquiring rivals, securing huge profits, and creating brutally unequal outcomes for workers. Instead...

2692
by Walther, Stephen, Hoffman, Kevin, Dudek, Nate
Published 2010
Sams
... components and controls, providing effective site navigation, securing sites and applications, and much more...

2693
by Bailey, Matt
Published 2017
Manning Publications
... Docker. Container Linux is a fast, secure base layer for any container-centric distributed application...

2694
Published 2022
Packt Publishing
... hands-on with examples to import data into ADLS and then securely access it and analyze it using Azure...

2695
by Mann, Steve
Published 2013
Sams
... Administer Enterprise Search, InfoPath Form Services, profiles, metadata, and Secure Store Streamline Work...

2696
by Cardona, Rene
Published 2021
Apress
... multiple tenant networks to secure your critical infrastructure. You will: Discover the advantages of a...

2697
by Gourley, David
Published 2002
O'Reilly

2698
by Wallace, Kevin
Published 2016
Pearson IT Certification
... switching, IP routing, Wide Area Networks (WANs), network services, securing network devices, and network...

2700
by Dufrasne, Bertrand, Brunson, Sherri, Butcher, Andrew, Cook, Jeff
Published 2016
IBM, International Technical Support Organization
..., highly secure, and resilient series of disk storage systems. The DS8880 family is the latest and most...