Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Beginning Apache Struts: From Novice to Professional
Beginning Apache Struts: From Novice to Professional
This book describes a web application framework called Apache Struts, with which you
can easily build robust, maintainable web applications. Now, the three italicized adjectives
aren’t just hype:

• Simplicity: Struts is relatively easy to pick up and use effectively. You get a lot out of
Struts for the effort
...
Peer-to-Peer : Harnessing the Power of Disruptive Technologies
Peer-to-Peer : Harnessing the Power of Disruptive Technologies

The term "peer-to-peer" has come to be applied to networks that expect end users to contribute their own files, computing time, or other resources to some shared project. Even more interesting than the systems' technical underpinnings are their socially disruptive potential: in various ways they return content, choice, and...

Hacking Firefox: More Than 150 Hacks, Mods, and Customizations
Hacking Firefox: More Than 150 Hacks, Mods, and Customizations
They dreamed of a better browser . . . and before you could say "explore no more," Firefox was born. But already you want more. Tighter security, greater functionality. A custom installation for Linux. Maybe even that unique extension you've always dreamed of creating. Well, if you want to tweak the Fox, here are over 400 pages of ways...
Moodle E-learning Course Development
Moodle E-learning Course Development
A complete guide to successful learning using Moodle
- Straight-forward coverage of installing and using the Moodle system
- Working with Moodle features in all learning environments
- A unique course-based approach focuses your attention on designing well structured, interactive, and successful courses

...
Real World Linux Security (2nd Edition)
Real World Linux Security (2nd Edition)

 

Stop today's most vicious Internet attackers—right in their tracks!

Your Linux system will be attacked: maybe in minutes, certainly in days. Be ready! Real World Linux Security, Second Edition brings together state-of-the-art solutions and exclusive software for safeguarding any Linux-based system or...

Hunting Security Bugs
Hunting Security Bugs

Your essential reference to software security testing—from the experts.

Learn how to think like an attacker—and identify potential security issues in your software. In this essential guide, security testing experts offer practical, hands-on guidance and code samples to help you find, classify, and assess security bugs before...

CSS, DHTML, and Ajax, Fourth Edition (Visual QuickStart Guide)
CSS, DHTML, and Ajax, Fourth Edition (Visual QuickStart Guide)

The Web doesn't stand still, and neither does this guide: Completely updated to cover the new browsers, standards, and CSS, DHTML, and Ajax features that define the Web today, the one thing that hasn't changed in this edition is its task-based visual approach to the topic. In these pages, readers will find friendly, step-by-step instructions for...

JavaScript Application Cookbook
JavaScript Application Cookbook
Seasoned Java coders will find the JavaScript Application Cookbook compiled just for them. Written in the same vein as the old-style programmer "toolbox" titles, this book sheds the usual tutorial presentation and simply introduces a series of JavaScript applications you can use on your own sites.

The cookbook begins with...

Fast Track Visual Basic .NET
Fast Track Visual Basic .NET
Aimed at the Visual Basic 6 programmer turning to .NET for the first time, Fast Track Visual Basic .NET provides a worthy, fast-paced introduction to the features and APIs working developers need to get started with VB .NET. The salient feature of this book is its compact size and fast-moving yet approachable tutorial to the new version...
MySpace Unraveled: What it is and how to use it safely
MySpace Unraveled: What it is and how to use it safely
Do you know what your children are up to on MySpace? MySpace Unraveled: What it is and how to use it safely discusses the booming MySpace social-networking phenomenon and shows you exactly what you need know about MySpace and how to create a safe online experience for your kids. Written by Larry Magid and Anne Collier of Family Tech...
Enterprise AJAX: Strategies for Building High Performance Web Applications
Enterprise AJAX: Strategies for Building High Performance Web Applications
If you are like many of the talented developers we meet, you’re interested in AJAX and how you can use it to improve your web applications. You may have even done some preliminary research online, checked out Ajaxian.com, or read a beginner’s book to AJAX development. If not, then you’re like an even larger group of talented...
AI 2006: Advances in Artificial Intelligence: 19th Australian Joint Conference on Artificial Intelligence, Hobart, Australia
AI 2006: Advances in Artificial Intelligence: 19th Australian Joint Conference on Artificial Intelligence, Hobart, Australia
This book constitutes the refereed proceedings of the 19th Australian Joint Conference on Artificial Intelligence, AI 2006, held in Hobart, Australia in December 2006.

The 89 revised full papers and 70 revised short papers presented together with the extended abstracts of 4 invited speeches were carefully reviewed and selected from 689...

unlimited object storage image
Result Page: 698 697 696 695 694 693 692 691 690 689 688 687 686 685 684 683 682 681 680 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy