 |
|
|
 Realtime Web Apps: With HTML5 WebSocket, PHP, and jQuery
Realtime Web Apps: With HTML5 WebSocket, PHP, and jQuery is a guide for beginner- to intermediate-level web developers looking to take the next leap forward in website and app development: realtime.
With Realtime Web Apps, you'll be able to quickly get up to speed on what HTML5 WebSocket does, how... |  |  CoffeeScript Application Development
JavaScript is becoming one of the key languages in web development. It is now more important than ever across a growing list of platforms. CoffeeScript puts the fun back into JavaScript programming with elegant syntax and powerful features.
CoffeeScript Application Development will give you an in-depth look at the CoffeeScript... |  |  The MassGeneral Hospital for Children Handbook of Pediatric Global Health
The MassGeneral Hospital for Children Handbook of Pediatric Global Health is a concise resource for the ever-increasing number of health professionals involved in global health, many of whom spend a few weeks to months or even years providing medical care in resource-poor countries. This Handbook provides... |
|
|
 GameMaker: Studio For Dummies (For Dummies (Computer/Tech))
Get gaming faster with the official guide to GameMaker: Studio
GameMaker: Studio allows you to create your own games, even with zero coding experience, and GameMaker: Studio For Dummies is a complete guide to the ins and outs of the program. Create the game you've always wanted to play in record time and at a... |  |  Deterministic and Random Evolution (Mathematics Research Developments)
The first notes for this text were written during the summers of 2008–2010 when I taught
a short course on mathematical modeling at the University of New Mexico. The audience
consisted mostly of undergraduate mathematics students, and an aim of the course was to
interest them in math at the graduate level.
The... |  |  Surveillance and Threat Detection: Prevention versus Mitigation
Surveillance and Threat Detection offers readers a complete understanding of the terrorist/criminal cycle, and how to interrupt that cycle to prevent an attack.
Terrorists and criminals often rely on pre-attack and pre-operational planning and surveillance activities that can last a period of weeks, months, or even years.... |
|
| Result Page: 12 11 10 9 8 7 6 5 4 3 2 1 |