|
|
|
|
|
Mac OS X Advanced Development Techniques Mac OS X Advanced Development Techniques introduces intermediate to advanced developers to a wide range of topics they will not find so extensively detailed anywhere else.
The book concentrates on teaching Cocoa development first, and then takes that knowledge and... | | Adobe Flex 2: Training from the SourcePart of the Adobe Training from the Source series, the official curriculum from Adobe, developed by experienced trainers. Using project-based tutorials, this book/CD volume is designed to teach the techniques needed to create sophisticated, professional-level projects. Each book includes a CD that contains all the files used in the lessons, plus... | | Perfect Passwords: Selection, Protection, AuthenticationUser passwords are the keys to the network kingdom, yet most users choose overly simplistic passwords (like password) that anyone could guess, while system administrators demand impossible to remember passwords littered with obscure characters and random numerals.
Every computer user must face the problems of password security. According... |
|
|
Tapestry 5: Building Web ApplicationsThis book is a practical step-by-step tutorial for those who want to build contemporary, real-life web applications with Tapestry 5, the Apache open-source framework for creating dynamic, robust, highly scalable web applications in Java. It shows the path of least resistance, so that the reader can learn all the essential skills quickly and easily.... | | Accelerated GWT: Building Enterprise Google Web Toolkit ApplicationsAjax is a web development technique that takes advantage of JavaScript to display and interact dynamically with information embedded into a web page. Its emergence has made it possible to create web applications that closely resemble their desktop–based brethren. With this exciting new ability came several challenges; not only did developers... | | Relational Databases and Knowledge BasesA database management system (DBMS), or simply database system, is characterized by the data model it suports . The first DBMSs, designed in the 1960s, were based on hierarchical or network models and have been viewed as extensions of file systems in which interfile links are provided through pointers . The data manipulation languages of these... |
|
|
Result Page: 425 424 423 422 421 420 419 418 417 416 415 414 413 412 411 410 409 408 407 |