Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ubiquitous Computing
Ubiquitous Computing

Near Field Communication (NFC) technology has become increasingly important for ubiquitous computing. Florian Resatsch investigates the optimal strategies for developing and evaluating ubiquitous computing applications based on NFC. He draws on a variety of current theories on ubiquitous computing, human-computer interaction, and technology...

Pro jQuery in Oracle Application Express
Pro jQuery in Oracle Application Express

Building on your existing SQL skills, this book teaches you how to apply useful jQuery techniques to applications developed using the Oracle Application Express (APEX) development tool.

Pro jQuery in Oracle Application Express covers the fundamentals you need to start enhancing your applications, with some practical...

Rich Internet Applications with Adobe Flex & Java (Secrets of the Masters)
Rich Internet Applications with Adobe Flex & Java (Secrets of the Masters)
At the beginning of the decade Macromedia coined the term rich Internet application (RIA) to describe the future of applications. An RIA is a Web experience that’s engaging, interactive, lightweight, and flexible. RIAs offer the flexibility and ease of use of an intelligent desktop application and add the broad reach of traditional Web...
Core Servlets and JavaServer Pages, Vol. 1: Core Technologies, Second Edition
Core Servlets and JavaServer Pages, Vol. 1: Core Technologies, Second Edition

The J2EE(TM) Platform has become the technology of choice for developing professional e-commerce applications, interactive Web sites, and Web-enabled applications and services. Servlet and JSP(TM) technology is the foundation of this platform: it provides the link between Web clients and server-side applications. In this 2nd...

Building Tag Clouds in Perl and PHP
Building Tag Clouds in Perl and PHP

Tag clouds are everywhere on the web these days. First popularized by the web sites Flickr, Technorati, and del.icio.us, these amorphous clumps of words now appear on a slew of web sites as visual evidence of their membership in the elite corps of "Web 2.0." This PDF analyzes what is and isn't a tag cloud, offers design...

Practical Google Analytics and Google Tag Manager for Developers
Practical Google Analytics and Google Tag Manager for Developers

Whether you’re a marketer with development skills or a full-on web developer/analyst, Practical Google Analytics and Google Tag Manager for Developers shows you how to implement Google Analytics using Google Tag Manager to jumpstart your web analytics measurement.

There’s a reason that so many...

Hardware Hacking Projects for Geeks
Hardware Hacking Projects for Geeks

Put a hacker in a room with a Furby for a weekend and you'll hear a conversation that's fairly one-sided in its originality. Toss in an 802.11b network card, a soldering iron, wire cutters, a logic probe, and a few other carefully selected tools and materials and you'll have potential. Add a copy of Hardware Hacking Projects for...

RFID Security
RFID Security

RFID (Radio Frequency Identification) is a method of remotely storing and receiving data using devices called RFID tags. RFID tags can be small adhesive stickers containing antennas that allow them to receive and respond to transmissions from RFID transmitters. RFID tags are used to identify and track everything from Exxon EZ passes to dogs to...

Core JSTL: Mastering the JSP™ Standard Tag Library
Core JSTL: Mastering the JSP™ Standard Tag Library

Using JSTL, software developers and Web page authors can create robust, flexible Web applications more quickly and easily than ever before. Now, best-selling author and JSTL expert David Geary presents the definitive guide to JSTL: its built-in tags, powerful expression language, and extensibility. Through practical examples...

Python Text Processing with NLTK 2.0 Cookbook
Python Text Processing with NLTK 2.0 Cookbook

Natural Language Processing is used everywhere - in search engines, spell checkers, mobile phones, computer games - even your washing machine. Python's Natural Language Toolkit (NTLK) suite of libraries has rapidly emerged as one of the most efficient tools for Natural Language Processing. You want to employ nothing less than the best...

Hacking the Xbox: An Introduction to Reverse Engineering
Hacking the Xbox: An Introduction to Reverse Engineering
This--this being the attitude encapsulated in Andrew "bunnie" Huang's Hacking the Xbox--is why a lot of people got into the computer industry in the first place. These people liked taking things apart and figuring out how they worked, then making them serve purposes they weren't originally designed for and sharing the new discoveries with...
Mastering Jakarta Struts
Mastering Jakarta Struts
A code-intensive guide to using the Jakarta Struts Framework to build Java Web applications

Developing Web applications with Java became considerably easier with the advent of JavaServer Pages (JSP) and servlets. Unfortunately, when used for large-scale applications, JSPs have been less successful–– they can become bloated with...

unlimited object storage image
Result Page: 14 13 12 11 10 9 8 7 6 5 4 3 2 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy