 |
|
|
|
|
 ActionScript Developer's Guide to PureMVC
Too often in the development of a large application, the developer must stop and think about where to find some class he needs, where some new class should go, and how to wire them up in such a way that gets data from wherever it lives to a display so the user can interact with it or vice-versa.
|  |  Novel Therapeutic Targets for Antiarrhythmic Drugs
Profiles potential treatment approaches for cardiac arrhythmias
Cardiac arrhythmias of ventricular origin are responsible for the deaths of nearly half a million Americans each year while atrial fibrillation accounts for about 2.3 million cases per year, a rate that is projected to increase 2.5 fold over the next half... |  |  Advanced Java® EE Development with WildFly®
Your one-stop guide to developing Java® EE applications with the Eclipse IDE, Maven, and WildFly® 8.1
About This Book
-
Develop Java EE 7 applications using the WildFly platform
-
Discover how to use EJB 3.x, JSF 2.x, Ajax, JAX-RS, JAX-WS, and Spring with WildFly 8.1
-
A...
|
|
|
 The Web Programmer's Desk ReferenceOne of the challenges of web programming is remembering what you can do with what, and what works with everything else. Sure, you can create a button, but can you change its color and font to match the style of your site? And are you sure it will look the same on all browsers? With The Web Programmer's Desk Reference, you can find... |  |  Linux All-in-One Desk Reference For Dummies (Computer/Tech)8 books in 1— your key to success with Linux!
Your one-stop guide to working with various Linux distributions
Linux is hot! It's cost-effective, secure, and comes in a lot of varieties. And with this book to walk you through it, choosing and using a Linux distribution is... |  |  Extreme Exploits: Advanced Defenses Against Hardcore HacksProtect your network and web sites from malicious attacks with help from this cutting-edge guide. Extreme Exploits is packed with never-before-published advanced security techniques and concise instructions that explain how to defend against devastating vulnerabilities in software and network infrastructure. This book gives you detailed analyses... |
|
|
Result Page: 68 67 66 65 64 63 62 61 60 59 |