jQuery is een JavaScript-framework voor het programmeren van dynamische en interactieve websites. Dit boek legt precies uit hoe jQuery werkt, welke code u moet kennen en wat u met jQuery kunt bereiken..
Blijf bij in een wereld vol digitale innovatie met boeken over software, hardware, data en meer. Of je nu programmeert, onderzoekt of gewoon nieuwsgierig bent – hier ontdek je de kracht van technologie.
Zoek verder in Computer en informatica
Bekijk resultaten in...
Alle productenManagementboekenSeminars + TrainingenOnline magazineSale
This book constitutes the refereed proceedings of the 4th International Conference on Algorithmic Aspects in Information and Management, AAIM 2008, held in Shanghai, China, in June 2008. Meer
This volume presents the set of papers accompanying the lectures of the eighth International School on Formal Methods for the Design of Computer, Com- nication, and Software Systems (SFM). Meer
Motivation for This Book The OPC Foundation provides specifications for data exchange in industrial au- mation. There is a long history of COM/DCOM-based specifications, most pro- nent OPC Data Access (DA), OPC Alarms and Events (A&E), and OPC Historical Data Access (HDA), which are widely accepted in the industry and implemented by almost every system targeting industrial automation. Meer
This book constitutes the refereed proceedings of the 6th International Conference on Applied Cryptography and Network Security, ACNS 2008, held in New York, NY, USA, in June 2008. Meer
This book constitutes the thoroughly refereed post-proceedings of the 4th International Workshop on Declarative Agent Languages and Technologies, DALT 2006, held in Japan in May 2006. Meer
This book constitutes the refereed proceedings of the Second International Conference on Information Systems Security, ICISS 2006, held in Kolkata, India in December 2006. Meer
This book constitutes the thoroughly refereed post-proceedings of the First VLDB 2006 International Workshop on Data Mining and Bioinformatics, VDMB 2006, held in Seoul, Korea in September 2006 in conjunction with VLDB 2006. Meer
The ultimate goal of program verification is not the theory behind the tools or the tools themselves, but the application of the theory and tools in the software engineering process. Meer
This volume contains papers presented at TRUST 2008, the ?rst international conference on Trusted Computing and Trust in Information Technologies, held in March 2008 in Villach, Austria. Meer
Itisourgreatpleasuretopresenttheproceedingsofthe15thInternationalConf- ence on Analytical and Stochastic Modelling Techniques and Applications (ASMTA2008)thattookplaceonthebeautifulislandofCyprusforthe? Meer
Design is eminent throughout different disciplines of science, engineering, humanities, and art. However, within these disciplines, the way in which the term design is understood and applied differs significantly. Meer
Das Buch behandelt praxisbezogene Methoden zur Analyse und Steuerung operationaler IT-Risiken entsprechend der Anforderungen im Gesetz zur Kontrolle und Transparenz im Unternehmensbereich (KonTraG). Meer
This book constitutes the refereed proceedings of the 15th International Symposium on Static Analysis, SAS 2008, held in Valencia, Spain in July 2008 - co-located with LOPSTR 2008, the International Symposium on Logic-based Program Synthesis and Transformation, PPDP 2008, the International ACM SIGPLAN Symposium on Principles and Practice of Declarative Programming, and PLID 2008, the International Workshop on Programming Language Interference and Dependence. Meer
The book constitutes the refereed proceedings of the 4th International Conference on Distributed Computing in Sensor Systems, DCOSS 2008, held on Santorini Island, Greece, in June 2008. Meer
This book constitutes the thoroughly refereed post-proceedings of the Third European Workshop on Security and Privacy in Ad hoc and Sensor Networks, ESAS 2006, held in Hamburg, Germany in September 2006 in conjunction with the 11th European Symposium on Research in Computer Security (ESORICS 2006). Meer
Evolutionary algorithms are successful biologically inspired meta-heuristics. Their success depends on adequate parameter settings. The question arises: how can evolutionary algorithms learn parameters automatically during the optimization? Meer
Mechatronic design processes have become shorter and more parallelized, induced by growing time-to-market pressure. Methods that enable quantitative analysis in early design stages are required, should dependability analyses aim to influence the design. Meer
This volume contains the proceedings of UIC 2008, the 5th International C- ference on Ubiquitous Intelligence and Computing: Building Smart Worlds in Real and Cyber Spaces. Meer
The Annual International Frontiers in Algorithmics Workshop is a focused - rum on current trends in research on algorithms, discrete structures, and their applications. Meer
Reservation procedures constitute the core of many popular data transmission protocols. They consist of two steps: A request phase in which a station reserves the communication channel and a transmission phase in which the actual data transmission takes place. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books