Home | Amazing | Today | Tags | Publishers | Years | Search 
Sams Teach Yourself ASP.NET Ajax in 24 Hours
Sams Teach Yourself ASP.NET Ajax in 24 Hours
In just 24 sessions of one hour or less, you’ll learn how to build advanced web sites and applications with ASP.NET Ajax--and upgrade existing pages to deliver more power and business value. Using a straightforward, step-by-step approach, each lesson equips you with sufficient information and guides you to mastery of Ajax in real-world...
Sams Teach Yourself Ajax, JavaScript, and PHP All in One
Sams Teach Yourself Ajax, JavaScript, and PHP All in One
In just a short time, you can learn how to use Ajax, JavaScript, and PHP to create interactive interfaces to your web applications by combining these powerful technologies.

 

No previous Ajax programming experience is required. Using a straightforward, step-by-step approach, each lesson in...

Scheduling in Distributed Computing Systems: Analysis, Design and Models
Scheduling in Distributed Computing Systems: Analysis, Design and Models
Scheduling in Distributed Computing Systems: Analysis, Design and Models intends to inculcate the innovative ideas for the scheduling aspect. Although the models in this book are designed for distributed systems, the same information is applicable for any type of system (i.e., where distributed processing is required).

Scheduling in...

Practical Internet Security
Practical Internet Security
As organizations today are linking their systems across enterprise-wide networks and VPNs as well as increasing their exposure to customers, competitors, browsers and hackers on the Internet, it becomes increasingly imperative for Web professionals to be trained in techniques for effectively protecting their sites from internal and external...
Introduction to Precise Numerical Methods, Second Edition
Introduction to Precise Numerical Methods, Second Edition
Now that powerful PCs and Macs are everywhere available, when solving a numerical problem, we should no longer be content with an indefinite answer, that is, an answer where the error bound is either unknown or a vague guess. This book’s software allows you to obtain your numerical answers to a prescribed number of correct decimal places. For...
Essential COM (DevelopMentor Series)
Essential COM (DevelopMentor Series)
The Component Object Model (COM) is deep and extremely difficult, making it impossible to grasp the ideas behind this specification quickly or easily. Don Box, the author of Essential COM concedes that it took him six months of reading documentation, writing programs, and experiencing general puzzlement before he had his personal COM...
Itanium Architecture for Software Developers
Itanium Architecture for Software Developers
"Reading the Itanium Architecture for Software Developers book saved us days, maybe weeks on project development." -- Dong Wei, System Architect for Servers, Hewlett-Packard

Product Description
This unique description of the Intel® Itanium™ application architecture helps
...
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition
Cyber Forensics: A Field Manual for Collecting, Examining, and Preserving Evidence of Computer Crimes, Second Edition
Updating and expanding information on concealment techniques, new technologies, hardware, software, and relevant new legislation, this second edition details scope of cyber forensics to reveal and track legal and illegal activity. Designed as an introduction and overview to the field, the authors guide you step-by-step through the basics of...
Upgrading & Fixing Laptops For Dummies (Computer/Tech)
Upgrading & Fixing Laptops For Dummies (Computer/Tech)
Keep your laptop on top of its game!

Find out how to care for your laptop, what can go wrong, and what you can fix

A laptop is much more than a PC that shrank. It has unique needs, and this book shows you how to meet them. You'll discover how to diagnose and fix common problems, replace parts, add external upgrades, and develop...

Robot Modeling and Control
Robot Modeling and Control
Robotics is a relatively young field of modern technology that crosses traditional engineering boundaries. Understanding the complexity of robots and their applications requires knowledge of electrical engineering, mechanical engineering, systems and industrial engineering, computer science, economics, and mathematics. New disciplines of...
Cisco Secure Firewall Services Module (FWSM)
Cisco Secure Firewall Services Module (FWSM)

By definition, a firewall is a single device used to enforce security policies within a network or between networks by controlling traffic flows.

The Firewall Services Module (FWSM) is a very capable device that can be used to enforce those security policies. The FWSM was developed as a module or blade that resides in either
...

C: An advanced introduction (Principles of computer science series)
C: An advanced introduction (Principles of computer science series)
The C programming language was designed and implemented by Dennis Ritchie in 1972 at AT&T Bell Laboratories. Despite a late start, the popularity of C has been increasing rapidly. C compilers are now available for many machines and the list of available C compilers is growing fast [Halfant 1983, Kern 1983, Phraner 1983]. Two important reasons...
Result Page: 158 157 156 155 154 153 152 151 150 149 148 147 146 145 144 143 142 141 140 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy