Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Ajax with PHP: From Novice to Professional
Beginning Ajax with PHP: From Novice to Professional

Ajax breathes new life into web applications by transparently communicating and manipulating data in conjunction with a server-based technology. Of all the server-based technologies capable of working in conjunction with Ajax, perhaps none are more suitable than PHP, the world's most popular scripting language.

Beginning Ajax with...

The Physics of Information Technology
The Physics of Information Technology
"...throughout the text, Gershenfeld retains much of the conversational tone and spontaneity of a lecture. At its best, this makes for enjoyable reading, with interesting tidbits and asides that enliven the discussions....Gershenfeld's book will be valuable for physical scientists looking for an enjoyable introduction to the information...
Conceptual Spaces: The Geometry of Thought
Conceptual Spaces: The Geometry of Thought
"This is a fearless book that casts a wide net around key issues in cognitive science. It offers the kind of coherent, unified view that the field badly needs." - Steven Sloman, Associate Professor, Cognitive and Linguistic Sciences, Brown University"

Within cognitive science, two approaches currently dominate
...
Preimplantation Genetic Diagnosis
Preimplantation Genetic Diagnosis

Preimplantation genetic diagnosis (PGD) is a key technique in modern reproductive medicine. Originally developed to help couples who were at risk of transmitting single-gene genetic abnormalities to their children, the development of the FISH technique broadened chromosome analysis to include detection of more complex inherited abnormalities....

Stem Cell Transplantation for Hemotologic Malignancies (Contemporary Hematology)
Stem Cell Transplantation for Hemotologic Malignancies (Contemporary Hematology)

A comprehensive survey of the current state-of-the-art in hematopoietic stem cell transplantation for malignant disease. The authors focus on the indications and results of transplantation for acute leukemia, chronic myelogenous leukemia, lymphoma, multiple myeloma, and breast cancer. Special attention is given to transplant-related...

Instant R Starter
Instant R Starter

Jump into the R programming language and go beyond "Hello World!"

Overview

  • Learn something new in an Instant! A short, fast, focused guide delivering immediate results.
  • Basic concepts of the R language
  • Discover tips and tricks for working with...
Fuzzy Surfaces in GIS and Geographical Analysis: Theory, Analytical Methods, Algorithms and Applications
Fuzzy Surfaces in GIS and Geographical Analysis: Theory, Analytical Methods, Algorithms and Applications

Surfaces are a central to geographical analysis. Their generation and manipulation are a key component of geographical information systems (GISs). However, geographical surface data is often not precise. When surfaces are used to model geographical entities, the data inherently contains uncertainty in terms of both position and attribute....

Micro-Nanorobotic Manipulation Systems and Their Applications
Micro-Nanorobotic Manipulation Systems and Their Applications

Micro/Nano Robotics and Automation technologies have rapidly grown associated with the growth of Micro and Nanotechnologies. This book presents a summary of fundamentals in micro-nano scale engineering and the current state of the art of these technologies.

“Micro-Nanorobotic Manipulation Systems and their Applications”...

Pancreatitis and Its Complications (Clinical Gastroenterology)
Pancreatitis and Its Complications (Clinical Gastroenterology)

Diseases of the pancreas have been extremely difficult to study. Until relatively recently, the pancreas was viewed by surgeons as an organ to be avoided, given its deep retroperitoneal location and the sometimes severe consequences of manipulation. Similar difficulties have plagued careful study of the pancreas. In humans, only inf- quently...

Network Attacks and Exploitation: A Framework
Network Attacks and Exploitation: A Framework

Incorporate offense and defense for a more effective network security strategy

Network Attacks and Exploitation provides a clear, comprehensive roadmap for developing a complete offensive and defensive strategy to engage in or thwart hacking and computer espionage. Written by an expert in both government and corporate...

Learning XML, Second Edition
Learning XML, Second Edition
In this new edition of the best selling title, the author explains the important and relevant XML technologies and their capabilities clearly and succinctly with plenty of real-life projects and useful examples. He outlines the elements of markup--demystifying concepts such as attributes, entities, and namespaces--and provides enough depth and...
XSLT Cookbook
XSLT Cookbook
The XSLT Cookbook is a collection of hundreds of solutions to problems that Extensible Stylesheet Language Transformations (XSLT) developers regularly face. The recipes range from simple string-manipulation and mathematical processing to more complex topics like extending XSLT, testing and debugging XSLT...
unlimited object storage image
Result Page: 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy