|
|
|
|
|
Learning Ext JS 4
For those with a little JavaScript experience, this book is a great way to learn Ext JS and start building interactive web applications using Ajax, DHTML, Dom, and the like. Ideal for beginners.
-
Learn the basics and create your first classes
-
Handle data and understand the way it works, create powerful...
| | AWS Certified Advanced Networking Official Study Guide: Specialty Exam
The official study guide for the AWS certification specialty exam
The AWS Certified Advanced Networking Official Study Guide – Specialty Exam helps to ensure your preparation for the AWS Certified Advanced Networking – Specialty Exam. Expert review of AWS fundamentals align with the exam objectives,... | | A Practical Guide to Fedora and Red Hat Enterprise Linux (6th Edition)
“I have found this book to be a very useful classroom text, as well as a great Linux resource. It teaches Linux using a ground-up approach that gives students the chance to progress with their skills and grow into the Linux world. I have often pointed to this book when asked to recommend a solid ... |
|
|
Buffer Overflow AttacksBuffer overflows. In most information technology circles these days, the term buffer overflows has become synonymous with vulnerabilities or in some cases, exploits. It is not only a scary word that can keep you up at night wondering if you purchased the best firewalls, configured your new host-based intrusion prevention system correctly, and have... | | Data Compression: The Complete ReferenceGiambattista della Porta, a Renaissance scientist, was the author in 1558 of Magia Naturalis (Natural Magic), a book in which he discusses many subjects, including demonology, magnetism, and the camera obscura. The book mentions an imaginary device that has since become known as the “sympathetic telegraph.” This device was to have... | | Resource Management in Wireless NetworkingThis is the first book that provides readers with a deep technical overview of recent advances in resource management for wireless networks at different layers of the protocol stack. The subject is explored in various wireless networks, such as ad hoc wireless networks, 3G/4G cellular, IEEE 802.11, and Bluetooth personal area networks. ... |
|
|
Result Page: 872 871 870 869 868 867 866 865 864 863 862 861 860 859 858 857 856 855 854 |