 |
|
 The JavaScript Anthology: 101 Essential Tips, Tricks & HacksUsing a cookbook approach, The JavaScript Anthology will show you how to apply JavaScript to solve over 101 common Web Development challenges. You'll discover how-to:
Optimize your code so that it runs faster
Create Ajax applications with the XmlHttpRequest object
Validate web forms to improve usability... |  |  Practical Ruby for System Administration (Expert's Voice in Open Source)Ruby has set the world on fire, proving itself a serious challenger to Perl and Python in all spheres. In particular, more and more people are discovering that Ruby's flexibility, superb feature set, and gentle learning curve make it a natural choice for system administration tasks, from the humblest server to the largest enterprise deployment.... |  |  Asterisk: The Future of Telephony
This bestselling book is now the standard guide to building phone systems with Asterisk, the open source IP PBX that has traditional telephony providers running scared! Revised for the 1.4 release of the software, the new edition of Asterisk: The Future of Telephony reveals how you can save money on equipment and support, and finally... |
|
 Practical Hacking Techniques and CountermeasuresExamining computer security from the hacker's perspective, Practical Hacking Techniques and Countermeasures employs virtual computers to illustrate how an attack is executed, including the script, compilation, and results.
It provides detailed screen shots in each lab for the reader to follow along in a step-by-step process in order to... |  |  AdvancED DOM Scripting: Dynamic Web Design TechniquesDocument Object Model (DOM) scripting is often misrepresented as any sort of scripting on the Web, but pure DOM scripting includes only those features and methods incorporated into a W3C DOM specification—that means no proprietary browser features. In a perfect world, we could follow the standards, ignore proprietary features, and finish with... |  |  Cryptology UnlockedCryptology includes data encryption (cryptography), cryptographic protocols and code breaking to provide the fundamentals of data security.
This new book introduces cryptography in a unique and non-mathematical style. Cryptology Unlocked explains encryption, crypto analysis (classic and modern algorithms), cryptographic... |
|
 Ruby Series Rails Plugins: Extending Rails Beyond the CoreOne of the most powerful aspects of the Rails framework is the ability to extend and override it within your own applications. This is achieved through the Rails plugin mechanism, which provides an avenue for Rails developers to add powerful new features to their applications and share this functionality with the worldwide... |  |  jQuery Reference GuideThis detailed reference guide to jQuery, an open-source JavaScript library that shields web developers from browser inconsistencies, simplifies adding dynamic, interactive elements, and reduces development time, covers the syntax of every jQuery method, function, and selector with detailed discussions to help readers get the most from jQuery. After... |  |  Beginning ASP.NET 3.5 in C# 2008: From Novice to Professional, Second EditionASP.NET is Microsoft’s platform for developing web applications. Using ASP.NET, you can create e-commerce shops, data-driven portal sites, and just about anything else you can find on the Internet. Best of all, you don’t need to paste together a jumble of HTML and script code in order to program the Web. Instead, you can create... |
|
|
Result Page: 32 31 30 29 28 27 26 25 24 23 22 21 20 19 18 |