 |
|
|
|
|
 Software & Systems Requirements Engineering: In PracticeProven Software & Systems Requirements Engineering Techniques
"Requirements engineering is a discipline used primarily for large and complex applications. It is more formal than normal methods of gathering requirements, and this formality is needed for many large applications. The authors are experienced... |  |  jQuery and JavaScript Phrasebook (Developer's Library)
Get more done faster with jQuery and JavaScript! Brad Dayley’s jQuery and JavaScript Phrasebook brings together 100+ instantly useful code snippets and idioms for performing a wide spectrum of common web application tasks. This hands-on guide gets straight to the essence of what’s new and important in... |  |  Practical JavaScript, DOM Scripting and Ajax ProjectsPractical JavaScript, DOM, and Ajax Projects is ideal for web developers already experienced in JavaScript who want to take their knowledge to the next level. It presents ten complete example projects for you to learn from and adapt for use in your own work.
The book starts with a quick recap of the fundamentals of modern JavaScript... |
|
 Flex 4 in Action: Revised Edition of Flex 3 in Action
Flex 4 in Action is an easy-to-follow, hands-on Flex 4 tutorial. Revised and updated from the previous edition on Flex 3, this book is chock-full of examples, goes beyond feature coverage, and helps readers put Flex to work in real day-to-day tasks. This book helps Flex developers make their Flex applications stand out from... |  |  New Perspectives on HTML, XHTML, and XML (New Perspectives)
The New Perspectives Series’ critical-thinking, problem-solving approach is the ideal way
to prepare students to transcend point-and-click skills and take advantage of all that the
World Wide Web has to offer.
Our goal in developing the New Perspectives Series was to create books that give students
the software concepts... |  |  Hacking Exposed Cisco NetworksImplement bulletproof Cisco security the battle-tested Hacking Exposed way
Defend against the sneakiest attacks by looking at your Cisco network and devices through the eyes of the intruder. Hacking Exposed Cisco Networks shows you, step-by-step, how hackers target exposed systems, gain access, and pilfer compromised... |
|
|
|
Result Page: 37 36 35 34 33 32 31 30 29 28 27 |