Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
ReactJS by Example- Building Modern Web Applications with React
ReactJS by Example- Building Modern Web Applications with React

Key Features

  • Create pragmatic real-world applications while learning React and its modern developer tools
  • Build sustainable user interfaces by transforming data into components of UI
  • Learn how to generate reusable ReactJS components effectively

Book Description

...

Discrete, Continuous, and Hybrid Petri Nets
Discrete, Continuous, and Hybrid Petri Nets

Petri Nets were introduced and still successfully used to analyze and model discrete event systems especially in engineering and computer sciences such as in automatic control.

Recently this discrete Petri Nets formalism was successfully extended to continuous and hybrid systems. This monograph presents a well written and clearly...

JavaScript Step by Step
JavaScript Step by Step

Much has changed since the first edition of JavaScript Step by Step was written in 2007. The underlying JavaScript specification received a major update; Microsoft released Windows Internet Explorer 8—and now 9 (which is about to be released as I write this); JavaScript development frameworks have matured and are now ubiquitous; and...

Learning Perl/Tk: Graphical User Interfaces with Perl (O'Reilly Nutshell)
Learning Perl/Tk: Graphical User Interfaces with Perl (O'Reilly Nutshell)
By combining the rough-and-ready Perl language with the graphical user interface (GUI) capabilities of the Tk toolkit, Perl/Tk makes it easy to write event-based GUI applications quickly--once you know what you're doing. Learning Perl/Tk shows you how to build GUIs with everyone's favorite public-domain programming language. This book...
Conceptual Modelling in Information Systems Engineering
Conceptual Modelling in Information Systems Engineering
Conceptual modeling has always been one of the cornerstones for information systems engineering as it describes the general knowledge of the system in the so-called conceptual schema.

Krogstie, Opdahl and Brinkkemper compiled 20 contributions from renowned researchers covering all aspects of conceptual modeling on the occasion of Arne...

Software Process Improvement: 15th European Conference, EuroSPI 2008, Dublin, Ireland, September 3-5, 2008, Proceedings
Software Process Improvement: 15th European Conference, EuroSPI 2008, Dublin, Ireland, September 3-5, 2008, Proceedings
This textbook is intended for use by SPI (Software Process Improvement) managers and researchers, quality managers, and experienced project and research managers. The papers constitute the research proceedings of the 15th EuroSPI (European Software Process Improvement, www.eurospi.net) conference in Dublin, Ireland, 3–5 September 2008....
Java: The Complete Reference, Ninth Edition
Java: The Complete Reference, Ninth Edition

Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

The Definitive Java Programming Guide

Fully updated for Java SE 8, Java: The Complete Reference, Ninth Edition...

Fatal Exit: The Automotive Black Box Debate
Fatal Exit: The Automotive Black Box Debate
A compelling argument for automotive technologies that speak for the victim, tell the truth, and could save millions of lives

Fatal Exit: The Automotive Black Box Debate cuts through thirty years of political wrangling and institutional biases to provide an argument for the Motor Vehicle Event Data Recorder (MVEDR). This automotive equivalent...

Kinect for Windows SDK Programming Guide
Kinect for Windows SDK Programming Guide

Build motion-sensing applications with Microsoft's Kinect for Windows SDK quickly and easily

  • Building application using Kinect for Windows SDK.
  • Covers the Kinect for Windows SDK v1.6.
  • A practical step-by-step tutorial to make learning easy for a beginner.
  • A detailed...
Java Message Service
Java Message Service
The Java Message Service (JMS) provides a way for the components of a distributed application to talk asynchronously, or for welding together legacy enterprise systems. Think of it as application-to-application e-mail. Unlike COM, JMS uses one or more JMS servers to handle the messages on a store-and-forward basis, so that the loss of one or more...
Cisco Security Professional's Guide to Secure Intrusion Detection Systems
Cisco Security Professional's Guide to Secure Intrusion Detection Systems

This book presents a combination of intrusion detection systems (IDS) and security theory, Cisco security models, and detailed information regarding specific Cisco-based IDS solutions. Cisco Security Professional’s Guide to Secure Intrusion Detection Systems also serves as a guide for security administrators studying for the Cisco...

Introduction to Discrete Event Systems
Introduction to Discrete Event Systems
As its title suggests, this book is about a special class of systems which in recent decades have become an integral part of our world. Before getting into the details of this particular class of systems, it is reasonable to start out by simply describing what we mean by a “system”, and by presenting the fundamental concepts associated...
Result Page: 74 73 72 71 70 69 68 67 66 65 64 63 62 61 60 59 58 57 56 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy