Home | Amazing | Today | Tags | Publishers | Years | Search 
JavaScript Bible
JavaScript Bible

The bestselling JavaScript reference, now updated to reflect changes in technology and best practices

As the most comprehensive book on the market, the JavaScript Bible is a classic bestseller that keeps you up to date on the latest changes in JavaScript, the leading technology for incorporating interactivity into Web...

Beginning iPhone 4 Development: Exploring the iOS SDK
Beginning iPhone 4 Development: Exploring the iOS SDK

The authors of the bestselling Beginning iPhone 3 Development are back, with the same excellent material completely updated for iOS 4 and written from the ground up using the latest version of Apple's Xcode 3. All source code has been updated to use the latest Xcode templates and current APIs, and all-new screenshots show Xcode 3 in...

HTML5 for Web Designers
HTML5 for Web Designers

When Mandy Brown, Jason Santa Maria and I formed A Book Apart, one topic burned uppermost in our minds, and there was only one author for the job.

Nothing else, not even "real fonts" or CSS3, has stirred the standards-based design community like the imminent arrival of HTML5. Born out of dissatisfaction with the pacing...

Add Interactivity to Your Site: The Mini Missing Manual
Add Interactivity to Your Site: The Mini Missing Manual

The days of Web pages that have nothing more than text and a picture or two are long gone. To be competitive in today’s Internet landscape, you need pages that pop. This Mini Missing Manual shows you how to add interactive elements to your pages: menus that expand when a visitor clicks on them, images that change with a mouse roll, and...

ModSecurity Handbook
ModSecurity Handbook

ModSecurity Handbook is the definitive guide to ModSecurity, a popular open source web application firewall. Written by Ivan Ristic, who designed and wrote much of ModSecurity, this book will teach you everything you need to know to monitor the activity on your web sites and protect them from attack. Situated between your web sites and the...

WSH and ADSI Administrative Scripting
WSH and ADSI Administrative Scripting

This book is intended to help you, the network administrator, make your job somewhat easier by teaching you to script and automate many of your administrative tasks. As you are well aware, mundane chores such as adding user, group, and computer accounts take more time than they should. The tasks of mapping network shares and creating login...

Z-80 Microprocessor: Architecture, Interfacing, Programming and Design
Z-80 Microprocessor: Architecture, Interfacing, Programming and Design

This text is intended for microprocessor courses at the undergraduate level in technology and engineering. ll is a comprehensive treatment of the microprocessor. covering both hardware and software based on the Z80 microprocessor family. The text assumes a course in digital logic as a prerequisite; however, it does not assume a background in...

Business, Economics, and Finance with Matlab, GIS, and Simulation Models
Business, Economics, and Finance with Matlab, GIS, and Simulation Models

Although there are hundreds of books about MATLAB, there are no books that fully explore its value in the field of business economics. Few books describe how geographic information can be explicitly incorporated in business decisions, or explain how sophisticated MATLAB applications can be provided to users via the Internet using a...

News 2.0 Can journalism survive the Internet?
News 2.0 Can journalism survive the Internet?

The bulk of this book was written over a period of two years between the middle of 2008 and April 2010. In that time the world’s media systems were caught up in a massive vortex of uncertainty and change. News 2.0 captures the flavour of that period and sets it against an historical background. In short: Where did the news media’s...

Identity Management: Concepts, Technologies, and Systems
Identity Management: Concepts, Technologies, and Systems

Digital identity can be defined as the digital representation of the information known about a specific individual or organization. Digital identity management technology is an essential function in customizing and enhancing the network user experience, protecting privacy, underpinning accountability in transactions and interactions, and...

Grails in Action
Grails in Action
Grails in Action is a book for practitioners from practitioners. Glen’s “20-hour challenge,” in which he implemented the www.groovyblogs.org service in Grails, has become legendary. That site is still my one-and-only resource for staying up to date with Groovy and Grails. Not only has he been one of the frontrunners of Grails, he...
Ableton Live 8 Power!: The Comprehensive Guide
Ableton Live 8 Power!: The Comprehensive Guide

Ableton Live 8 Power! is the all-inclusive guide to making music with Ableton's revolutionary live performance and studio software, Live 8. Written for all Live users, from digital audio beginners to seasoned pros, this book explores each fundamental feature in Live. The book provides power-user tips and insider tricks for integrating...

Result Page: 402 401 400 399 398 397 396 395 394 393 392 391 390 389 388 387 386 385 384 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy