 |
|
|
|
 The Web Programmer's Desk ReferenceOne of the challenges of web programming is remembering what you can do with what, and what works with everything else. Sure, you can create a button, but can you change its color and font to match the style of your site? And are you sure it will look the same on all browsers? With The Web Programmer's Desk Reference, you can find... |  |  Java, Java, Java, Object-Oriented Problem Solving (3rd Edition) This second edition of Java, Java, Java offers a robust, accessible, and flexible problem-solving perspective. The use of Unified Modeling Language (UML) diagrams throughout the text, strongly emphasizes object-oriented design. This book assists students and professionals with their most challenging problem as beginning programmers:... |  |  Jess in Action: Java Rule-Based SystemsA practical handbook for anyone interested in programming rule-based systems and written by the creator of the popular Java rule engine, Jess, this book is structured around a series of large, fully developed practical examples of rule-based programming in Java. After the topic of rule-based systems is introduced, software developers and ... |
|
|
|
 |  |  Metasploit Penetration Testing Cookbook
Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes... |  |  Using MIS (4th Edition)
An engaging introduction to how people use IS to solve business problems.
Using MIS explains why MIS is the most important course in the business school by showing readers how businesses use information systems and technology to accomplish their... |
|
|
Result Page: 349 348 347 346 345 344 343 342 341 340 339 338 337 336 335 |