Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
JavaScript Application Cookbook
JavaScript Application Cookbook
Seasoned Java coders will find the JavaScript Application Cookbook compiled just for them. Written in the same vein as the old-style programmer "toolbox" titles, this book sheds the usual tutorial presentation and simply introduces a series of JavaScript applications you can use on your own sites.

The cookbook begins with...

Learning jQuery 1.3
Learning jQuery 1.3
Packed with great examples and clear explanations, this revised and updated version of Learning jQuery teaches you how to use jQuery 1.3. This book is for web designers who want to create interactive elements for their designs, and for developers who want to create the best user interface for their web applications. Basic JavaScript programming...
Spark for Python Developers
Spark for Python Developers

Key Features

  • Set up real-time streaming and batch data intensive infrastructure using Spark and Python
  • Deliver insightful visualizations in a web app using Spark (PySpark)
  • Inject live data using Spark Streaming with real-time events

Book Description

Looking...

Implementing CIFS: The Common Internet File System
Implementing CIFS: The Common Internet File System

"The book that Microsoft should have written, but didn't."
—Jeremy Allison, Samba Team

"Your detailed explanations are clear and backed-up with source code—and the numerous bits of humor make a dry subject very enjoyable to read."
—J.D. Lindemann, network engineer, Adaptec, Inc.

The...

Managing NFS and NIS, 2nd Edition
Managing NFS and NIS, 2nd Edition
A modern computer system that's not part of a network is even more of an anomaly today than it was when we published the first edition of this book in 1991. But however widespread networks have become, managing a network and getting it to perform well can still be a problem.
Managing NFS and NIS, in a new edition based on Solaris 8,
...
Advances in Information Processing and Protection
Advances in Information Processing and Protection
This book contains a selection of the best papers given at the Advanced Computer Systems Conference in October 2006 in Poland. The book is partitioned into four topical areas:

The Artificial Intelligence section includes papers on Humatronics, Fuzzy Logic, Robotics, Cell, Genetic and Probabilistic Algorithms, Incomplete Data and Similarity...

Encyclopedia of Information Communication Technology
Encyclopedia of Information Communication Technology
The Encyclopedia of Information Communication Technology (ICT) is a comprehensive resource describing the influence of information communication technology in scientific knowledge construction and spreading, with emphasis on the roles of product technologies, process technologies, and context technologies.

A reference point for studies...

Bioinformatics with Python Cookbook: Learn how to use modern Python bioinformatics libraries and applications to do cutting-edge research in computational biology, 2nd Edition
Bioinformatics with Python Cookbook: Learn how to use modern Python bioinformatics libraries and applications to do cutting-edge research in computational biology, 2nd Edition

Discover modern, next-generation sequencing libraries from Python ecosystem to analyze large amounts of biological data

Key Features

  • Perform complex bioinformatics analysis using the most important Python libraries and applications
  • Implement next-generation sequencing,...
Git in Practice
Git in Practice

Summary

Git in Practice is a collection of 66 tested techniques that will optimize the way you and your team manage your development projects. The book begins with a brief reminder of the core version control concepts you need when using Git and moves on to the high-value features you may not have explored...

Incident Response: A Strategic Guide to Handling System and Network Security Breaches
Incident Response: A Strategic Guide to Handling System and Network Security Breaches
The increasing complexity and diversity of systems, applications, and networks has made them more difficult to defend. As companies continue to experience losses due to security breaches, security professionals must take a new approach in protecting their assets. By using monitoring and detection measures with prompt intervention, you can...
User's Guide To Cryptography And Standards (Artech House Computer Security)
User's Guide To Cryptography And Standards (Artech House Computer Security)
This book is about standards, cryptography, and standards for cryptography. It has been written in the hope that it will
serve a number of purposes, including the following.

◗ Perhaps most importantly, to provide a general introduction
to standardized cryptography for the user of this technology (i.e., a designer or
...
Integrated Frequency Synthesizers for Wireless Systems
Integrated Frequency Synthesizers for Wireless Systems
The increasingly demanding performance requirements of communications systems, as well as problems posed by the continued scaling of silicon technology, present numerous challenges for the design of frequency synthesizers in modern transceivers. This book contains everything you need to know for the efficient design of frequency synthesizers for...
unlimited object storage image
Result Page: 684 683 682 681 680 679 678 677 676 675 674 673 672 671 670 669 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy