Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Ajax Security
Ajax Security
The Hands-On, Practical Guide to Preventing Ajax-Related Security Vulnerabilities

 

More and more Web sites are being rewritten as Ajax applications; even traditional desktop software is rapidly moving to the Web via Ajax. But, all too often, this...

The Principles of Successful Freelancing
The Principles of Successful Freelancing

Thinking about becoming your own boss and embarking on the wonderful and rewarding journey of freelancing? The Principles of Successful Freelancing is for you. In this easy-to follow guide you'll learn what's important in transforming your skills into a booming freelance business.

This book leads you
...

HTML & XHTML : The Definitive Guide
HTML & XHTML : The Definitive Guide

HTML is changing so fast it's almost impossible to keep up with developments. XHTML is HTML 4.0 rewritten in XML; it provides the precision of XML while retaining the flexibility of HTML. HTML & XHTML: The Definitive Guide, 4th Edition, brings it all together. It's the most comprehensive book available on HTML and XHTML...

Digital Literacy: Tools and Methodologies for Information Society
Digital Literacy: Tools and Methodologies for Information Society
Currently in a state of cultural transition, global society is moving from a literary society to digital one, adopting widespread use of advanced technologies such as the Internet and mobile devices. Digital media has an extraordinary impact on society s formative processes, forcing a pragmatic shift in their management and organization....
Advanced Error Control Techniques for Data Storage Systems
Advanced Error Control Techniques for Data Storage Systems
With the massive amount of data produced and stored each year, reliable storage and retrieval of information is more crucial than ever. Robust coding and decoding techniques are critical for correcting errors and maintaining data integrity. Comprising chapters thoughtfully selected from the highly popular Coding and Signal Processing for Magnetic...
Public Libraries in the Smart City
Public Libraries in the Smart City
Far from heralding their demise, digital technologies have lead to a dramatic transformation of the public library. Around the world, libraries have reinvented themselves as networked hubs, community centres, innovation labs, and makerspaces. Coupling striking architectural design with attention to ambience and comfort, libraries have...
Data Modeling Fundamentals: A Practical Guide for IT Professionals
Data Modeling Fundamentals: A Practical Guide for IT Professionals
The purpose of this book is to provide a practical approach for IT professionals to acquire the necessary knowledge and expertise in data modeling to function effectively. It begins with an overview of basic data modeling concepts, introduces the methods and techniques, provides a comprehensive case study to present the details of the data model...
A FAREWELL TO ENTROPY: Statistical Thermodynamics Based on Information
A FAREWELL TO ENTROPY: Statistical Thermodynamics Based on Information
The principal message of this book is that thermodynamics and statistical mechanics will benefit from replacing the unfortunate, misleading and mysterious term entropy with a more familiar, meaningful and appropriate term such as information, missing information or uncertainty. This replacement would facilitate the interpretation of the driving...
From Writing to Computers
From Writing to Computers
... the broad and clear analysis of writing and language, and of automata theory, formal logic, and computability theory he uses to reach [his conclusion] is well worth reading.
–H. D. Warner, Western New England College

From Writing to Computers takes as its central theme the issue of a
...
Modelling Computing Systems: Mathematics for Computer Science (Undergraduate Topics in Computer Science)
Modelling Computing Systems: Mathematics for Computer Science (Undergraduate Topics in Computer Science)

This engaging text presents the fundamental mathematics and modelling techniques for computing systems in a novel and light-hearted way, which can be easily followed by students at the very beginning of their university education. Key concepts are taught through a large collection of challenging yet fun mathematical games and logical puzzles...

Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures
Securing VoIP Networks: Threats, Vulnerabilities, and Countermeasures

Communication between people has changed with the invention of the telephone. The ability to communicate across continents in real-time has also helped our society in several dimensions including entertainment, trade, finance, and defense. But this new capability did not come without an investment. Building an international telephony...

The Essential Handbook of Ground-Water Sampling
The Essential Handbook of Ground-Water Sampling
Tremendous improvements in ground-water sampling methodologies and analytical technologies have made it possible to collect and analyze truly representative samples to detect increasingly lower levels of contaminants—now in the sub-parts-per-billion range. Though these new methods produce more accurate and precise data and are less expensive,...
unlimited object storage image
Result Page: 48 47 46 45 44 43 42 41 40 39 38 37 36 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy