Home | Amazing | Today | Tags | Publishers | Years | Search 
Advanced Ajax: Architecture and Best Practices
Advanced Ajax: Architecture and Best Practices
“I very much enjoyed how this book covers the full Ajax application lifecycle and not only coding techniques. Anyone who is looking to become a professional front-end developer will appreciate the architectural insight and best practices delivered by this book.”  — Andi Gutmans, Co-Founder & Co-Chief...
Drug Safety Evaluation
Drug Safety Evaluation
A comprehensive safety guide to all aspects of the drug development process

Drug Safety Evaluation presents an all-inclusive, practical guide for those who are responsible for ensuring the safety of drugs and biologics for patients, for health care providers, for those involved in the manufacture of medicinal products, and for all those who...

Professional Joomla! (Programmer to Programmer)
Professional Joomla! (Programmer to Programmer)
As a major force in the world of affordable, advanced web site deployment, Joomla! has become the most important noncommercial Content Management System (CMS) in the world. The number of Joomla! downloads and add-ons continues to grow at lightning pace, spurring the need for a resource that explores the diverse needs of professional Joomla!...
Understanding MySQL Internals
Understanding MySQL Internals
Although MySQL's source code is open in the sense of being publicly available, it's essentially closed to you if you don't understand it. In this book, Sasha Pachev -- a former member of the MySQL Development Team -- provides a comprehensive tour of MySQL 5 that shows you how to figure out the inner workings of this powerful database. You'll go...
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws

Hack the planet

Web applications are everywhere, and they're insecure. Banks, retailers, and others have deployed millions of applications that are full of holes, allowing attackers to steal personal data, carry out fraud, and compromise other systems. This innovative book shows you how they do it.

...

Eye Movements: A Window on Mind and Brain
Eye Movements: A Window on Mind and Brain
Eye-movement recording has become the method of choice in a wide variety of disciplines investigating how the mind and brain work. This volume brings together recent, high-quality eye-movement research from many different disciplines and, in doing so, presents a comprehensive overview of the state-of-the-art in eye-movement research.
...
The United States and Western Europe since 1945: From "Empire" by Invitation to Transatlantic Drift
The United States and Western Europe since 1945: From "Empire" by Invitation to Transatlantic Drift
`Offers a powerful argument, presents a sophisticated narrative, and is a magisterial, and, indeed, the best synthesis available of transatlantic relations since 1945 - a massive achievement.' Andreas W. Daum, Political Science Quarterly

Based on new and existing research by a world-class scholar, this is the first book in 20
...
London and Paris as International Financial Centres in the Twentieth Century
London and Paris as International Financial Centres in the Twentieth Century
`This book has a truly exciting set of fifteen chapters... This is a well-integrated volume that should be in the library of every economic historian who deals with international banking and finance in the late nineteenth and twentieth century. I read it with great absorption and delight.' Mira Wilkins, EH.NET

London and
...
Prototype and script.aculo.us: You Never Knew JavaScript Could Do This!
Prototype and script.aculo.us: You Never Knew JavaScript Could Do This!
Tired of getting swamped in the nitty-gritty of cross-browser, Web 2.0-grade JavaScript? Get back in the game with Prototype and script.aculo.us, two extremely popular JavaScript libraries, that make it a walk in the park. Be it AJAX, drag and drop, auto-completion, advanced visual effects, or many other great features, all you need is write one or...
Design Accessible Web Sites: 36 Keys to Creating Content for All Audiences and Platforms
Design Accessible Web Sites: 36 Keys to Creating Content for All Audiences and Platforms
It was a dark and stormy night...

Actually, It was a late summer afternoon a little over ten years ago when I first began to get accessibility. Back then, I was working as a student web developer and sysadmin and we needed a system for a blind user to work on a paper. Simple enough—we had some new systems. Just grab one, install
...
The Greek Wars: The Failure of Persia
The Greek Wars: The Failure of Persia
THE viewpoint of this book is no longer novel, and the concerns of scholars are different from what they were over four decades ago when I began to lecture on Xenophon and on the Persian Wars. One must salute above all Pierre Briant, but also Amelie Kuhrt and the late Heleen Sancisi-Weerdenburg, to whom all students are much beholden not only for...
How to Cheat at Securing Linux
How to Cheat at Securing Linux
Linux servers now account for 33% of all networks servers running worldwide (Source: IDC). The top 3 market share holders in the network server space (IBM, Hewlett-Packard, and Dell) all use Linux as their standard operating system for the majority of their servers designed for medium to large size businesses. As with any technologies, increased...
Result Page: 785 784 783 782 781 780 779 778 777 776 775 774 773 772 771 770 769 768 767 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy