Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Learning Ext JS 4
Learning Ext JS 4

For those with a little JavaScript experience, this book is a great way to learn Ext JS and start building interactive web applications using Ajax, DHTML, Dom, and the like. Ideal for beginners.

  • Learn the basics and create your first classes
  • Handle data and understand the way it works, create powerful...
Developmental Hematopoiesis: Methods and Protocols (Methods in Molecular Medicine)
Developmental Hematopoiesis: Methods and Protocols (Methods in Molecular Medicine)

During the past few decades, technical and conceptual breakthroughs have led to a virtual revolution in developmental biology. In part through cross-species compa- sons and multidisciplinary approaches (combining, for example, classical embry- ogy, genetics, molecular biology, and systems biology), major questions have often been redefined...

Clojure High Performance Programming - Second Edition
Clojure High Performance Programming - Second Edition

Become an expert at writing fast and high performant code in Clojure 1.7.0

About This Book

  • Enhance code performance by using appropriate Clojure features
  • Improve the efficiency of applications and plan their deployment
  • A hands-on guide to designing Clojure programs to get...
Mathematica by Example
Mathematica by Example
Mathematica bv Example is intended to bridge the gap which has existed between the very elementary handbooks available on Mathematica and those reference books written for the more advanced Mathematica users. This book is an extension of a manuscript which was developed to quickly introduce enough Mathematica commands to a group of...
Professional Scala: Combine object-oriented and functional programming to build high-performance applications
Professional Scala: Combine object-oriented and functional programming to build high-performance applications

If your application source code is overly verbose, it can be a nightmare to maintain. Write concise and expressive, type-safe code in an environment that lets you build for the JVM, browser, and more.

Key Features

  • Expert guidance that shows you to efficiently use both object-oriented and...
Data Mining Tools for Malware Detection
Data Mining Tools for Malware Detection

Although the use of data mining for security and malware detection is quickly on the rise, most books on the subject provide high-level theoretical discussions to the near exclusion of the practical aspects. Breaking the mold, Data Mining Tools for Malware Detection provides a step-by-step breakdown of how to develop...

Solar Energy: Systems, Challenges, and Opportunities (Energy, Environment, and Sustainability)
Solar Energy: Systems, Challenges, and Opportunities (Energy, Environment, and Sustainability)
This book covers challenges and opportunities related to solar-energy based systems. It covers a wide variety of topics related to solar energy, including  applications-based systems such as solar thermal systems that are focused on drying, desalination, space cooling, refrigeration, and processing; recent advances in solar cells (DSSC) and...
Mac OS X 10.4 Tiger : Visual QuickStart Guide
Mac OS X 10.4 Tiger : Visual QuickStart Guide
So you're finally ready to find out what all the fuss is about. Whether you're switching from Windows or upgrading from an older Mac OS, this task-based guide represents the surest way to go from 0 to 60 in no time flat with Apple's much anticipated Mac OS X Tiger--more mature, powerfully enhanced, and with more than 200 new features that will...
Buffer Overflow Attacks
Buffer Overflow Attacks
Buffer overflows. In most information technology circles these days, the term buffer overflows has become synonymous with vulnerabilities or in some cases, exploits. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly, and have...
CISSP(r): Certified Information Systems Security Professional Study Guide, 2nd Edition
CISSP(r): Certified Information Systems Security Professional Study Guide, 2nd Edition
Here's the book you need to prepare for the challenging CISSP exam from (ISC)2. This revised edition was developed to meet the exacting requirements of today's security certification candidates. In addition to the consistent and accessible instructional approach that earned...
Resource Management in Wireless Networking
Resource Management in Wireless Networking

This is the first book that provides readers with a deep technical overview of recent advances in resource management for wireless networks at different layers of the protocol stack. The subject is explored in various wireless networks, such as ad hoc wireless networks, 3G/4G cellular, IEEE 802.11, and Bluetooth personal area networks.

...
Beginning Cryptography with Java
Beginning Cryptography with Java
Beginning Cryptography with Java

While cryptography can still be a controversial topic in the programming community, Java has weathered that storm and provides a rich set of APIs that allow you, the developer, to effectively include cryptography in applications—if you know how.

This book teaches you how. Chapters one through...

unlimited object storage image
Result Page: 1047 1046 1045 1044 1043 1042 1041 1040 1039 1038 1037 1036 1035 1034 1033 1032 1031 1030 1029 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy