 |
|
|
|
 JavaScript(TM) PhrasebookDevelopers are hungry for a concise, easy-to-use reference that puts essential code "phrases" at their fingertips. JavaScript, and the related AJAX, is hot and there is little to no information on how to use JavaScript to develop AJAX-based applications. While there are many JavaScript books on the market, most of them are dated and few... |  |  EndNote 1 - 2 - 3 Easy!: Reference Management for the ProfessionalReference management is the process of storing, managing, retrieving, and citing references from various sources. Learning effective reference management is critically important for healthcare and biomedical professionals as it is a major component of the process of scientific manuscript writing. Effective reference management is also useful for... |  |  |
|
 Music Composition For DummiesCreative exercises build your composing skills
The fun and easy way to turn the tune in your head into a full-fledged composition!
Wish you could write music? You can! This friendly guide gives you everything you need to start composing, from choosing the right rhythm and tempo to... |  |  Securing Java: Getting Down to Business with Mobile Code, 2nd EditionInformation Security/Java "This book is mandatory reading for every user and developer of Webware." —Peter G. Neumann, Moderator of the Risks Forum, from his review of the first edition Securing Java Java security is more important now than ever before. As Java matures and moves into the enterprise, security takes a more prominent... |  |  Grant Writing For Dummies
Learn to:
-
Navigate federal grant databases and apply online for grants
-
Find the most current public and private sector grant opportunities
-
Create strong statements of need
-
Submit applications that meet funders’ expectations
Your comprehensive... |
|
|
 |  |  Post Quantum CryptographyQuantum computers will break today's most popular public-key cryptographic systems, including RSA, DSA, and ECDSA. This book introduces the reader to the next generation of cryptographic algorithms, the systems that resist quantum-computer attacks: in particular, post-quantum public-key encryption systems and post-quantum public-key signature... |  |  |
|
|
Result Page: 5 4 3 2 1 |