Pragmatic Ajax


Book Description

Provides information on using Ajax in building Web applications.




Microsoft Ajax Library Essentials


Book Description

A practical tutorial to enhancing the user experience of your ASP.NET web applications with the final release of the Microsoft AJAX Library.




Web Development with JavaScript and Ajax Illuminated


Book Description

&Quot;Web Development with JavaScript and Ajax Illuminated provides readers with the cutting-edge techniques needed for web development in Web 2.0. It is ideal for the undergraduate student delving into the world of web development or novice web developers looking to further their understanding of JavaScript and Ajax. This text illustrates how to create dynamic, interactive web applications with ease, and interesting real-world case studies throughout the text offer students a glimpse of actual web development scenarios."--BOOK JACKET.




Pragmatic Approaches to Drama


Book Description

This volume collects papers on pragmatic perspectives on ancient theatre. Scholars working on literature, linguistics, theatre will find interesting insights on verbal and non-verbal uses of language in ancient Greek and Roman Drama. Comedies and tragedies spanning from the 5th century B.C.E. to the 1st century C.E. are investigated in terms of im/politeness, theory of mind, interpersonal pragmatics, body language, to name some of the approaches which afford new interpretations of difficult textual passages or shed new light into nuances of characterisation, or possibilities of performance. Words, silence, gestures, do things, all the more so in dramatic dialogues on stage.




AJAX and PHP


Book Description

Enhance the user experience of your PHP website using AJAX with this practical tutorial featuring detailed case studies




Mastering Dojo


Book Description

Computing and information technology.




Advances in Computers


Book Description

This is volume 76 of the Advances in Computers. Since 1960, annual volumes are produced containing chapters by some of the leading experts in the field of computers today. For almost 50 years these volumes present ideas and developments that are radically changing our society. One of the most important ideas sweeping though society today is the social networking website. Names like Wikipedia, Flickr, Second Life, Twitter, Facebook, Meetup, MySpace, LinkedIn, among others, are becoming common parlance as the youth, and a growing segment of the adult population, now view such websites as alternatives to the corner convenience store or coffee shop and critically important avenues for social interactions. In this volume we explore this phenomenon to describe the development of some of these ideas as well as developments in web technology that enable this to occur. This volume contains seven chapters divided into two parts. The first three chapters describe the social networking phenomenon and provide insights into the technology and influences on our culture. The last four chapters provide details of the underlying technology that allows the web to expand to include these social networking sites, as well as other new applications for information dissemination, accessing, and sharing.




Tapestry 101


Book Description




Information Retrieval Technology


Book Description

This book constitutes the thoroughly refereed post-conference proceedings of the 4th Asia Information Retrieval Symposium, AIRS 2008, held in Harbin, China, in May 2008. The 39 revised full papers and 43 revised poster papers presented were carefully reviewed and selected from 144 submissions. All current issues in information retrieval are addressed: applications, systems, technologies and theoretical aspects of information retrieval in text, audio, image, video and multi-media data. The papers are organized in topical sections on IR models image retrieval, text classification, chinese language processing, text processing, application of IR, machine learning, taxonomy, IR methods, information extraction, summarization, multimedia, Web IR, and text clustering.




Computer Security Handbook, Set


Book Description

The classic and authoritative reference in the field of computer security, now completely updated and revised With the continued presence of large-scale computers; the proliferation of desktop, laptop, and handheld computers; and the vast international networks that interconnect them, the nature and extent of threats to computer security have grown enormously. Now in its fifth edition, Computer Security Handbook continues to provide authoritative guidance to identify and to eliminate these threats where possible, as well as to lessen any losses attributable to them. With seventy-seven chapters contributed by a panel of renowned industry professionals, the new edition has increased coverage in both breadth and depth of all ten domains of the Common Body of Knowledge defined by the International Information Systems Security Certification Consortium (ISC). Of the seventy-seven chapters in the fifth edition, twenty-five chapters are completely new, including: 1. Hardware Elements of Security 2. Fundamentals of Cryptography and Steganography 3. Mathematical models of information security 4. Insider threats 5. Social engineering and low-tech attacks 6. Spam, phishing, and Trojans: attacks meant to fool 7. Biometric authentication 8. VPNs and secure remote access 9. Securing Peer2Peer, IM, SMS, and collaboration tools 10. U.S. legal and regulatory security issues, such as GLBA and SOX Whether you are in charge of many computers or just one important one, there are immediate steps you can take to safeguard your computer system and its contents. Computer Security Handbook, Fifth Edition equips you to protect the information and networks that are vital to your organization.