Home | Amazing | Today | Tags | Publishers | Years | Search 
Comet and Reverse Ajax: The Next-Generation Ajax 2.0 (Firstpress)
Comet and Reverse Ajax: The Next-Generation Ajax 2.0 (Firstpress)
One of the most basic laws of a web application is that the client, not the server, must initiate any communication between the two. There are a number of common–use cases where, ideally, the server would like to talk to the client—dashboards and monitoring apps, chat rooms and other collaborations, and progress reports on...
LinkedIn For Dummies (Computer/Tech)
LinkedIn For Dummies (Computer/Tech)
Once you're LinkedIn, you're part of the largest online network of professionals in the world! When you know how to make the most of your profile, manage your contacts, and handle invitations effectively, you'll go far. This book is packed with advice that will help you market yourself and find a job, an employee, an investor, or more business for...
Stripes: ...and Java web development is fun again (Pragmatic Programmers)
Stripes: ...and Java web development is fun again (Pragmatic Programmers)
As a Java developer, you want to leverage your knowledge and the wealth of Java libraries and tools. But when it comes to web development, many frameworks seem over-engineered and too complex. They have a steep learning curve, and it's just too difficult to get them to do exactly what you need because of their "closed-box" design.
...
Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)
Computer and Information Security Handbook (The Morgan Kaufmann Series in Computer Security)

This book presents information on how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to physical and network threats. It also imparts the skills and knowledge needed to identify and counter some fundamental security risks and requirements, inlcuding Internet...

Javafx in Action
Javafx in Action
I suppose for many it was just another unremarkable mid-May Wednesday; certainly I don’t recall the weather making any effort to surprise. What might have made the day slightly memorable for some, perhaps, was that Manchester United was playing Chelsea in the final of the ultra-prestigious soccer European Champions League. A couple of days...
RESTful Java Web Services
RESTful Java Web Services
If you are already familiar with REST theory but are new to RESTful Java web services, and want to use the Java technology stack together with Java RESTful frameworks to create robust web services, this is the book for you.

This book is a guide to developing RESTful web services using Java and the most popular RESTful frameworks
...
ICEfaces 1.8: Next Generation Enterprise Web Development
ICEfaces 1.8: Next Generation Enterprise Web Development
ICEfaces is an Enterprise AJAX framework which allows you to develop modern Web 2.0 applications, using AJAX to implement desktop-like behavior. The integration and handling of such frameworks is a challenge, but ICEfaces is the first enterprise AJAX framework that places the integration aspect at the center of its design. All this is based on a...
Data Dissemination in Wireless Computing Environments (Advances in Database Systems)
Data Dissemination in Wireless Computing Environments (Advances in Database Systems)
In our increasingly mobile world the ability to access information on demand at any time and place can satisfy people's information needs as well as confer on them a competitive advantage. The emergence of battery-operated, low-cost and portable computers such as palmtops and PDAs, coupled with the availability and exploitation of wireless...
The Data Access Handbook: Achieving Optimal Database Application Performance and Scalability
The Data Access Handbook: Achieving Optimal Database Application Performance and Scalability
Performance and scalability are more critical than ever in today’s enterprise database applications, and traditional database tuning isn’t nearly enough to solve the performance problems you are likely to see in those applications. Nowadays, 75-95% of the time it takes to process a data request is typically spent in the database...
ITIL V3 Release, Control and Validation (RCV) Full Certification Online Learning and Study Book Course
ITIL V3 Release, Control and Validation (RCV) Full Certification Online Learning and Study Book Course

Who Knew ITIL Certification E-Learning This Quick and Easy Could Make You Look This Good.

'The Art of Service has dramatically changed the way we deliver employee training. We can now deliver more training at less cost to a wider audience in a shorter period of time.'

On-demand eLearning: Don't pay over $ 3,000.00 for a 5 day...

Modelling Diesel Combustion (Mechanical Engineering Series)
Modelling Diesel Combustion (Mechanical Engineering Series)

This book is a detailed discussion of the Diesel Combustion phenomena like ignition delay, fuel air mixing, rate of heat release, and emissions of smoke, particulate and nitric oxide. The book enables quantitative evaluation of these important phenomena and parameters. Most importantly, it attempts to model them with constants that are...

Seven Deadliest Web Application Attacks (Syngrass Seven Deadlest Attacks)
Seven Deadliest Web Application Attacks (Syngrass Seven Deadlest Attacks)

Do you need to keep up with the latest hacks, attacks, and exploits effecting web applications? Then you need Seven Deadliest Web Application Attacks. This book pinpoints the most dangerous hacks and exploits specific to web applications, laying out the anatomy of these attacks including how to make your system more secure. You will discover...

Result Page: 17 16 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy