Service oriented architecture /
Learning XML /
XML Basics.
Access 2021 / Microsoft 365 programming by example : with VBA, XML, and ASP
Corporate portals /
CREACIÓN DE PÁGINAS WEB : HTML 5 /
Metadata in the digital library : building an integrated strategy with XML /
Learn Three.js : programming 3D animations and visualizations for the web with HTML5 and WebGL /
Getting started with Web components : build modular and reusable components using HTML, CSS and JavaScript /
Responsive web design by example beginner's guide : build powerful and engaging responsive websites with ease /
JQuery hotshot : ten practical projects that exercise your skill, build your confidence, and help you master JQuery /
From A to [A] : keywords of markup /
HTML5 for Flash Developers.
Hack proofing your Web applications : the only way to stop a hacker is to think like one.
WebGL Beginner's Guide.
Learning jQuery.
MooTools 1.2 beginner's guide : learn how to create dynamic, interative, and responsive cross-browser web applications using one of the most popular JavaScript frameworks /
JQuery 1.4 animation techniques beginner's guide : quickly master all of jquery's animation methods and build a toolkit of ready-to-use animations using jQuery 1.4 /
PHP 7 : real world application development : use new features of PHP 7 to solve practical, real-world problems faced by PHP developers like yourself every day : a course in three modules.
WHAT ON EARTH IS AN SAP IDOC?
Hack proofing XML /
Cybersecurity governance in Latin America states, threats, and alliances /
Internet privacy rights : rights to protect autonomy /
Terrorist use of cyberspace and cyber terrorism : new challenges and reponses /
Logics and languages for reliability and security /
Formal logical methods for system security and correctness /
Practical Linux security cookbook : secure your Linux machines and keep them secured with the help of exciting recipes /
Health Informatics : building a healthcare future through trusted information ; selected papers from the 20th Australian National Health Informatics Conference (HIC 2012) /
Securing the cloud : cloud computer security techniques and tactics /
Mastering Linux security and hardening : secure your Linux server and protect it from intruders, malware attacks, and other external threats /
The disaster recovery handbook : a step-by-step plan to ensure business continuity and protect vital operations, facilities, and assets /
Techniques and applications of digital watermarking and content protection /
Infosec strategies and best practices : gain proficiency in information security using expert-level strategies and best practices /
Nokia network security : solutions handbook /
Cyber crime, security and digital intelligence /
Technology and privacy : the new landscape /
Who goes there? : authentication through the lens of privacy /
CCNA Cyber Ops SECOPS certification guide 210-255 : learn the skills to pass the 210-255 certification exam and become a competent SECOPS associate /
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016 : cyber-security by design /