Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ajax Hacks : Tips & Tools for Creating Responsive Web Sites

Buy

Ajax, the popular term for Asynchronous JavaScript and XML, is one of the most important combinations of technologies for web developers to know these days. With its rich grouping of technologies, Ajax developers can create interactive web applications with XML-based web services, using JavaScript in the browser to process the web server response.

Taking complete advantage of Ajax, however, requires something more than your typical "how-to" book. What it calls for is Ajax Hacks from O'Reilly. This valuable guide provides direct, hands-on solutions that take the mystery out of Ajax's many capabilities. Each hack represents a clever way to accomplish a specific task, saving you countless hours of searching for the right answer.

A smart collection of 100 insider tips and tricks, Ajax Hacks covers all of the technology's finer points. Want to build next-generation web applications today? This book can show you how. Among the multitude of topics addressed, it shows you techniques for:

  • Using Ajax with Google Maps and Yahoo Maps

  • Displaying Weather.com data

  • Scraping stock quotes

  • Fetching postal codes

  • Building web forms with auto-complete functionality

Ajax Hacks also features a number of advanced hacks for accelerated web developers. Discover how to create huge, maintainable bookmarklets, how to use client-side storage for Ajax applications, and how to call a built-in Java object from JavaScript using Ajax. The book even addresses best practices for testing Ajax applications and improving maintenance, performance, and reliability for JavaScript code.

The latest in O"Reilly's celebrated Hacks series, Ajax Hacks smartly complements other O'Reilly titles such as Head Rush Ajax and JavaScript: The Definitive Guide.

(HTML tags aren't allowed.)

Kinematic Self-Replicating Machines
Kinematic Self-Replicating Machines
The principal goal of molecular nanotechnology (MNT) is to develop a manufacturing technology able to inexpensively manufacture most arrangements of atoms that are consistent with physical law. In terms of its precision, flexibility, and low cost, this will be the ultimate manufacturing technology in human history. Two central mechanisms have been...
Assembly language programming for the Atari computers (A Byte book)
Assembly language programming for the Atari computers (A Byte book)
Since you've picked this book up and started browsing through it, you probably own or have access to an ATARI computer and are interested in progressing beyond BASIC. As you already know, the ATARI computers are among the most impressive of all home computers, but many of their special features are not available from...
Analytical Techniques in Materials Conservation
Analytical Techniques in Materials Conservation

This book will introduce the reader to the wide variety of analytical techniques that are employed by those working on the conservation of materials. An introduction to each technique is provided with explanations of how data may be obtained and interpreted. Examples and case studies will be included to illustrate how each technique is used...


Computer Simulation of Shaped Charge Problems
Computer Simulation of Shaped Charge Problems
Devoted to the subject of shape charge design using numerical methods, this book offers the defense and commercial industries unique material not contained in any other single volume. The coverage of the Lagrangian and Eulerian methods as well as the equation of state provides first hand help to engineers working on shape charge problems. The book...
Ruling the Root: Internet Governance and the Taming of Cyberspace
Ruling the Root: Internet Governance and the Taming of Cyberspace

In Ruling the Root, Milton Mueller uses the theoretical framework of institutional economics to analyze the global policy and governance problems created by the assignment of Internet domain names and addresses. “The root” is the top of the domain name hierarchy and the Internet address space. It is the only point of...

Coding Freedom: The Ethics and Aesthetics of Hacking
Coding Freedom: The Ethics and Aesthetics of Hacking

Who are computer hackers? What is free software? And what does the emergence of a community dedicated to the production of free and open source software--and to hacking as a technical, aesthetic, and moral project--reveal about the values of contemporary liberalism? Exploring the rise and political significance of the free and open source...

©2021 LearnIT (support@pdfchm.net) - Privacy Policy