|
|
|
|
|
|
|
Managing Information Security
Managing Information Security offers focused coverage of how to protect mission critical systems, how to deploy security management systems, IT security, ID Management, intrusion detection and prevention systems, computer forensics, network forensics, firewalls, penetration testing, vulnerability assessment, and more. It offers in-depth... | | | | Ext JS in Action
It was early 2006, and I was spending many frustrating hours testing and learning
many of the frameworks and libraries on the internet. Seemingly, out of nowhere, I
stumbled upon an extension to YUI or YUI-ext, developed by an unknown at the time,
Jack Slocum.
At last! An Ajax library that was easy to use and well-documented.... |
|
|
Result Page: Previous 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 Next |