jQuery is een JavaScript-framework voor het programmeren van dynamische en interactieve websites. Dit boek legt precies uit hoe jQuery werkt, welke code u moet kennen en wat u met jQuery kunt bereiken..
Blijf bij in een wereld vol digitale innovatie met boeken over software, hardware, data en meer. Of je nu programmeert, onderzoekt of gewoon nieuwsgierig bent – hier ontdek je de kracht van technologie.
Zoek verder in Computer en informatica
Bekijk resultaten in...
Alle productenManagementboekenSeminars + TrainingenOnline magazineSale
In the setting of multiparty computation, sets of two or more parties with p- vate inputs wish to jointly compute some (predetermined) function of their inputs. Meer
On behalf of the NDT 2010 conference, the Program Committee and Charles University in Prague, Czech Republic, we welcome you to the proceedings of the Second International Conference on ‘Networked Digital Technologies’ (NDT 2010). Meer
This book celebratesthe 25th anniversaryof GULP—the Italian Associationfor LogicProgramming.Authored by Italian researchersat the leading edge of their ? Meer
Steganography is the art and science of hiding information in inconspicuous cover data so that even the existence of a secret message is kept confidential, and steganalysis is the task of detecting secret messages in covers. Meer
Computer science departments at universities in the U.S.A.
are world renowned. This handy reference guide gives
detailed profiles of 40 of the best known among them. Meer
L systems are language-theoretic models for developmental
biology. They wereintroduced in 1968 by Aristid Lindenmayer
(1925-1989) and have proved to be among the most beautiful
examples of interdisciplinary science, where work in one
area induces fruitful ideas and results in other areas. Meer
This book contains papers presented at a workshop on the use
of parallel techniques in symbolic and algebraic computation
held at Cornell University in May 1990. Meer
ICISC 2009, the 12th International Conference on Information Security and Cryptology, was held in Seoul, Korea, during December 2–4, 2009. It was - ganized by the Korea Institute of Information Security and Cryptology (KIISC) and the Ministry of Public Administration and Security (MOPAS). Meer
The Second International Conference on Networks and Communications (NeCoM 2010), the Second International Conference on Wireless and Mobile Networks (WiMoN 2010), and the Second International Conference on Web and Semantic Technology (WeST 2010) were held in Chennai, India, during July 23–25, 2010. Meer
ICITS2009washeldattheShizuokaConventionandArtsCenter“GRANSHIP” in Japan during December 3–6,2009.This was the 4th International Conference on Information Theoretic Security. Meer
Die vorliegende Arbeit entstand im Rahmen des PROMETHEUS-Teilprogramms PRO ART! am Fraunhofer-Institut fiir Informations-und Datenverarbeitung (IITB) in Karls ruhe und ist eine iiberarbeitete Fassung meiner der Fakultat fiir Informatik der Universitat Karlsruhe (TH) im Januar 1991 vorgelegten Dissertation mit dem Titel: Begriffsgraphen zur Situationsmodellierung in der Bildfolgenauswertung. Meer
Die simulationsgestützte Optimierung von Produktportfolios und Produktionsketten birgt großes Potenzial – Berichte über Kopplungen von Simulation und Optimierung sind aber rar. Meer
Many novel application scenarios and architectures in business process management or service composition are characterized by a distribution of activities and resources, and by complex interaction and coordination dynamics. Meer
Arti?cial immune systems (AIS) is a diverse and maturing area of research that bridges the disciplines of immunology and computation. The original research impetus in AIS had a clear focus on applying immunological principles to c- putationalproblemsinpracticaldomainssuchascomputersecurity,datamining and optimization. Meer
Welcome to the proceedings of the 8th Workshop of the Initiative for the Eva- ation of XML Retrieval (INEX)! Now in its eighth year, INEX is an established evaluation forum for XML information retrieval (IR), with over 100 organi- tions worldwide registered and over 50 groups participating actively in at least one of the tracks. Meer
In today’s competitive and highly dynamic environment, organizations need new so- tions to enable them to solve modern business problems and to make decisions using integrated, trustworthy, and up-to-date data. Meer
Model-Driven Development (MDD) has become an important paradigm in software development. It uses models as primary artifacts in the development process. Meer
Knowledge transfer between universities, business and the community is a topical subject of increasing importance. The first International Conference on 'Innovation through Knowledge Transfer: Research with Impact', InnovationKT'09, held in Kingston, London, UK, provided a rare and welcome opportunity to share some of the successes of knowledge transfer. Meer
This volume contains the 16 papers presented at the INTRUST 2009 conf- ence, held in Beijing, China in December 2009. INTRUST 2009 was the ?rst international conference on the theory, technologies and applications of trusted systems. Meer
Als je jouw studieboeken gekocht hebt bij hanzestudybook.nl, kun je geselecteerde titels moeiteloos terugverkopen aan Noordhoff.
Geen vragen, geen gedoe en lekker duurzaam.
Een AI-book is niet een boek dat geschreven is door AI maar een boek dat verrijkt is met AI. Het maakt de inhoud van een boek interactief via WhatsApp, zodat je ermee kunt chatten. Zie het als een razend slimme assistent die het boek perfect begrijpt en er alles uit onthouden heeft. Jij kunt deze assistent alles vragen. Vraag bijvoorbeeld hoe je iets kunt toepassen op jouw persoonlijke situatie, om een korte samenvatting, of wat de belangrijkste inzichten zijn. AI-books zijn alleen te gebruiken via WhatsApp, je hoeft er geen aparte app voor te installeren.
Meer informatie over AI-books