Smashing jQuery (Smashing Magazine Book Series)
jQuery has become a part of my everyday routine in Web design and development, so when
Wiley approached me about writing a book on jQuery, I was thrilled. jQuery has opened up a
world of possibility for Web design. Th rough this book, I hope to show others how using
jQuery can really speed up your development time and allow you to write...
Tcl/Tk 8.5 Programming Cookbook
Created in 1988 by John Ousterhoult, while working at the University of Califormia, Berkeley, Tcl (Tool Command Language) is a scripting language originally designed for embedded system platforms. Since its creation, Tcl has grown far beyond its original design with numerous expansions and additions (such as the graphical Took Kit or Tk) to...
Concise Guide to Computation Theory
What is the theory of computation all about? The theory of computation embodies
the principle by which computers have become the basis of modern digital technology,
which makes a computer perform as desired, and which, consequently, has
led to the prosperity of our advanced information society (just as physical sciences
University Calculus, Early Transcendentals (2nd Edition)
University Calculus, Early Transcendentals, Second Edition helps readers successfully generalize and apply the key ideas of calculus through clear and precise explanations, clean design, thoughtfully chosen examples, and superior exercise sets. This text offers the right mix of basic, conceptual, and challenging...
SharePoint 2010 Development For Dummies
In the last few years SharePoint has taken the world by storm. In fact,
the product is one of the fastest growing products in the history of
Microsoft. Companies of all sizes are rapidly implementing SharePoint and
moving it to the center of their organization. The interesting thing about
SharePoint, however, is that if you ask ten...
Prime Numbers and Computer Methods for Factorization (Modern Birkhäuser Classics)
From the original hard cover edition:In the modern age of almost universal computer usage, practically every individual in a technologically developed society has routine access to the most up-to-date cryptographic technology that exists, the so-called RSA public-key cryptosystem. A major component of this system is the factorization of large...
|Result Page: Previous 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 Next |