• Web Development with Node and Express: Leveraging the JavaScript Stack

    Learn how to build dynamic web applications with Express, a key component of the Node/JavaScript development stack. In this hands-on guide, author Ethan Brown teaches you the fundamentals through the development of a fictional application that exposes a public website and a RESTful API. You’ll also learn web architecture best practices to help you build single-page, multi-page, and hybrid web apps with Express.Express strikes a balance between a robust framework and no framework at all, allowing you a free hand in your architecture choices. With this book, frontend and backend engineers fami... [Read More]

    • ASIN: 1491949309
    • ASIN: 1491949309
    • ISBN: 1491949309
    • Brand: O Reilly Media
    • Manufacturer: O'Reilly Media

  • WordPress for Beginners 2019: A Visual Step-by-Step Guide to Mastering WordPress (Webmaster Series Book 2)

    Master WordPress using our step-by-step visual approach (over 330 screenshots). This book is a major new release for 2019, covering the latest version of WordPress.Building a beautiful, professional looking WordPress website (or a blog), is no longer the domain of computer geeks. WordPress makes it possible for anyone to create and run a website that looks great on any device - PC, Mac, tablet and phone. Whether you want to build a business site, an affiliate site, a hobby site or a blog, WordPress is a great choice.The primary goal of this book is to take anyone, even an absolute beginner,... [Read More]

    • ASIN: B07JH4BH7K
    • ASIN: B07JH4BH7K

  • Identity and Data Security for Web Development : Best Practices

    Developers, designers, engineers, and creators can no longer afford to pass responsibility for identity and data security onto others. Web developers who don't understand how to obscure data in transmission, for instance, can open security

    • UPC: 50552552

  • Unifi Controller Security Best Practices

    Accenture: Securing AWS Accounts According to CIS (Center for Internet Security) Best Practices

    Best Practices for Security at Scale