Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Pro jQuery

Buy
Pro jQuery, 9781430240952 (1430240954), Apress, 2012

At its heart, jQuery does something that sounds pretty dull: it lets you modify the contents of HTML documents by manipulating the model that the browser creates when it processes the HTML (known as DOM manipulation, as I’ll explain later). If you are reading this, you have probably already done some DOM manipulation, either using another JavaScript library or even using the built-in API that most modern web browsers support, and you have picked up this book because you want to do it in a better way.

jQuery goes beyond better. It makes DOM manipulation a pleasure and, on occasion, an actual joy. There is something so elegant and graceful about the way that jQuery works that transforms a task that can be pure drudgery into something that is simple and easy, and once you start using jQuery, there is no going back. Here are the top reasons that I use jQuery in my projects:

• jQuery is expressive. I can do more work with much less code than when using the browser DOM API.

• jQuery methods apply to multiple elements. The DOM API approach of selectiterate- modify is gone, meaning fewer for loops to iterate through elements and fewer mistakes.

• jQuery deals with implementation differences between browsers. I don’t have to worry about whether IE supports a feature in an odd way, for example; I just tell jQuery what I want, and it works around the implementation differences.

• jQuery is open source. When I don’t understand how something works or I don’t quite get the result I was expecting, I can read through the JavaScript code and, if needed, make changes.

Not everything is perfect, of course, and there are one or two rough edges, which I’ll explain as I get into the details. But even with the occasional flaw, I love working with jQuery, and I hope you will find it equally compelling and enjoyable to use. To me, the genius of jQuery is that it takes something that is a major grind in web development and makes it simple, quicker, and easier. I can’t ask for more than that.

(HTML tags aren't allowed.)

Silverlight 2 Bible
Silverlight 2 Bible

Create Web 2.0 applications from the inside out

Create rich, cross-platform, interactive Web applications with Microsoft's new Silverlight and this essential guide. Designers will discover how to add animation, audio, video, and other high-impact effects. Programmers will cover Visual Studio®, .NET, and other programming tools, and...

The Esoteric Investor: Alternative Investments for Global Macro Investors
The Esoteric Investor: Alternative Investments for Global Macro Investors

Massive demographic, environmental, economic, and regulatory shifts are generating huge new investment opportunities with an exceptionally high probability of success over the coming years and decades. In The Esoteric Investor, a world-class portfolio manager identifies these investments, and shows how your best...

Embedded Systems Dictionary
Embedded Systems Dictionary

This authoritative work defines the meaning and usage of 2,800 of the most-used terms in embedded systems in a way that serves technical and non-technical audiences alike. The primary definition is a concise statement of that term’s meaning tailored to the needs of less technical readers. Engineers, technical writers, and others will find...


Grid Computing (On Demand Series)
Grid Computing (On Demand Series)
IBM Business On Demand Series: Your business blueprint for leveraging the grid computing revolution.

When you turn on the light, the power grid delivers exactly what you need, instantly. What if computers and networks could work that way? Now they can...and that will transform the way you do business. Grid Computing is about the "Business...

Introducing Maya 2011
Introducing Maya 2011

A practical, step-by-step guide to Maya 2011

Four previous editions can’t be wrong: this book is the perfect introduction to 3D and Maya. Learn to build and animate your own digital models and scenes with step-by-step instruction and fun and practical examples, while you draw inspiration from the striking examples...

Black Hat Physical Device Security: Exploiting Hardware and Software
Black Hat Physical Device Security: Exploiting Hardware and Software
Attacking & Defending Physical Devices for Software and Hardware EngineersThe security devices of today are much more complex than those long ago. While some still are just electronic transistors, diodes, capacitors and resistors, many now have software and communication-based features. Easy-to-use and easy-to-deploy,...
©2014 LearnIT (support@pdfchm.net) - Privacy Policy