|
|
|
|
CSS, DHTML, and Ajax, Fourth Edition (Visual QuickStart Guide)The Web doesn't stand still, and neither does this guide: Completely updated to cover the new browsers, standards, and CSS, DHTML, and Ajax features that define the Web today, the one thing that hasn't changed in this edition is its task-based visual approach to the topic. In these pages, readers will find friendly, step-by-step instructions for... | | JavaScript Application CookbookSeasoned Java coders will find the JavaScript Application Cookbook compiled just for them. Written in the same vein as the old-style programmer "toolbox" titles, this book sheds the usual tutorial presentation and simply introduces a series of JavaScript applications you can use on your own sites.
The cookbook begins with... | | Fast Track Visual Basic .NETAimed at the Visual Basic 6 programmer turning to .NET for the first time, Fast Track Visual Basic .NET provides a worthy, fast-paced introduction to the features and APIs working developers need to get started with VB .NET. The salient feature of this book is its compact size and fast-moving yet approachable tutorial to the new version... |
|
Categories for Software EngineeringThis book provides a gentle, software engineering oriented introduction to category theory. Assuming only a minimum of mathematical preparation, this book explores the use of categorical constructions from the point of view of the methods and techniques that have been proposed for the engineering of complex software systems: object-oriented... | | eDirectory Field GuideeDirectory Field Guide is a handy reference for configuring, troubleshooting, and optimizing Novells eDirectory on NetWare, Linux, Unix, and Windows. Along with Sun ONE Directory Server and Microsoft Active Directory, Novells eDirectory is a leader in directory server software, the specialized database that enterprises employ to store... | | Zen and the Art of Information SecurityWhile security is generally perceived to be a complicated and expensive process, Zen and the Art of Information Security makes security understandable to the average person in a completely non-technical, concise, and entertaining format. Through the use of analogies and just plain common sense, readers see through the hype and become comfortable... |
|
MySpace Unraveled: What it is and how to use it safelyDo you know what your children are up to on MySpace? MySpace Unraveled: What it is and how to use it safely discusses the booming MySpace social-networking phenomenon and shows you exactly what you need know about MySpace and how to create a safe online experience for your kids. Written by Larry Magid and Anne Collier of Family Tech... | | Combating Piracy: Intellectual Property Theft and FraudManifestations of fraud in the early twenty-first century are showing signs of innovations and adaptation in response to shifting opportunities. This book reports on new analyses of intellectual property theft as its most recent expression. Fraud and piracy of products and ideas have become common as the opportunities to commit them expand, and... | | Enterprise AJAX: Strategies for Building High Performance Web ApplicationsIf you are like many of the talented developers we meet, you’re interested in AJAX and how you can use it to improve your web applications. You may have even done some preliminary research online, checked out Ajaxian.com, or read a beginner’s book to AJAX development. If not, then you’re like an even larger group of talented... |
|
| | Enabling Technologies for Mobile Services: The MobiLife BookThis book’s emphasis is on describing a complete architectural framework, which combines theory and practice in a way that gives a realistic view of the opportunities and challenges in the applications and services area, including results from both extensive user evaluations and technical evaluations. It will cover topics in the B3G area that... | | Introduction to Artificial Neural SystemsThe recent resurgence of interest in neural networks has its roots in the recognition that the brain performs computations in a different manner than do conventional digital computers. Computers are extremely fast and precise at executing sequences of instructions that have been formulated for them. A human information processing system is composed... |
|
|
Result Page: 2367 2366 2365 2364 2363 2362 2361 2360 2359 2358 2357 2356 2355 2354 2353 2352 2351 2350 2349 |