|
|
Material Design Implementation with AngularJS: UI Component Framework
Build high-quality web and mobile user interfaces (UI) that are interactive, fluid, and provide a consistent experience across devices from desktops to tablets to smartphones.
Use a Material Design approach to position elements and create animations along with principles of the sophisticated AngularJS JavaScript framework. Take... | | Code Generation with Roslyn
Learn how Roslyn's new code generation capability will let you write software that is more concise, runs faster, and is easier to maintain. You will learn from real-world business applications to create better software by letting the computer write its own code based on your business logic already defined in lookup tables.... | | MVVM in Delphi: Architecting and Building Model View ViewModel Applications
Dive into the world of MVVM, learn how to build modern Windows applications, and prepare for cross-platform development. This book introduces you to the right mindset and demonstrates suitable methodologies that allow for quick understanding of the MVVM paradigm. MVVM in Delphi shows you how to use a quick and efficient MVVM ... |
|
|
Translating Statistics to Make Decisions: A Guide for the Non-Statistician
Examine and solve the common misconceptions and fallacies that non-statisticians bring to their interpretation of statistical results. Explore the many pitfalls that non-statisticiansâand also statisticians who present statistical reports to non-statisticiansâmust avoid if statistical results are to be correctly used for... | | Android Recipes: A Problem-Solution Approach
Discover more than 100 down-to-earth code recipes, covering a wide range of useful topics using complete and real-world working code examples. This book is updated to include the Android N SDK (7.0), as well as earlier releases.
Crammed with insightful instruction and helpful examples, this fifth edition of Android Recipes... | | Securing SQL Server: DBAs Defending the Database
Protect your data from attack by using SQL Server technologies to implement a defense-in-depth strategy, performing threat analysis, and encrypting sensitive data as a last line of defense against compromise. The multi-layered approach in this book helps ensure that a single breach doesn't lead to loss or compromise of your data ... |
|
|
Result Page: Previous 2169 2170 2171 2172 2173 2174 2175 2176 2177 2178 2179 2180 2181 2182 2183 2184 2185 2186 2187 2188 2189 Next |