Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Loading
Pro jQuery

Buy
Pro jQuery, 9781430240952 (1430240954), Apress, 2012

At its heart, jQuery does something that sounds pretty dull: it lets you modify the contents of HTML documents by manipulating the model that the browser creates when it processes the HTML (known as DOM manipulation, as I’ll explain later). If you are reading this, you have probably already done some DOM manipulation, either using another JavaScript library or even using the built-in API that most modern web browsers support, and you have picked up this book because you want to do it in a better way.

jQuery goes beyond better. It makes DOM manipulation a pleasure and, on occasion, an actual joy. There is something so elegant and graceful about the way that jQuery works that transforms a task that can be pure drudgery into something that is simple and easy, and once you start using jQuery, there is no going back. Here are the top reasons that I use jQuery in my projects:

• jQuery is expressive. I can do more work with much less code than when using the browser DOM API.

• jQuery methods apply to multiple elements. The DOM API approach of selectiterate- modify is gone, meaning fewer for loops to iterate through elements and fewer mistakes.

• jQuery deals with implementation differences between browsers. I don’t have to worry about whether IE supports a feature in an odd way, for example; I just tell jQuery what I want, and it works around the implementation differences.

• jQuery is open source. When I don’t understand how something works or I don’t quite get the result I was expecting, I can read through the JavaScript code and, if needed, make changes.

Not everything is perfect, of course, and there are one or two rough edges, which I’ll explain as I get into the details. But even with the occasional flaw, I love working with jQuery, and I hope you will find it equally compelling and enjoyable to use. To me, the genius of jQuery is that it takes something that is a major grind in web development and makes it simple, quicker, and easier. I can’t ask for more than that.

(HTML tags aren't allowed.)

Managing Mobile Services: Technologies and Business Practices
Managing Mobile Services: Technologies and Business Practices
New, attractive services for communications systems are versatile and promise to make the next generation of communications a success. Yet, as the systems grow more complex and diverse, so do the challenges of managing them.

Service management derives from technologies used in fixed telephony systems and has evolved towards...

Applied jQuery: Develop and Design
Applied jQuery: Develop and Design

As Web designers, you are painstakingly compelled to grab Web surfers’ attention as quickly as possible and then keep them on your site to absorb the content. In addition to the product, service, or information that you are providing, the site must be visually attractive and offer stimulating (and valuable) interaction. The...

Going Wi-Fi: A Practical Guide to Planning and Building an 802.11 Network
Going Wi-Fi: A Practical Guide to Planning and Building an 802.11 Network

Make informed decisions about planning and installing 802.11 “Wi-Fi” wireless networks. This book helps you tackle the challenge, whether installing Wi-Fi within an existing corporate network, or setting up a wireless network from scratch in any business or organization. Author Janice Reynolds guides you through everything you need...


Software Requirements, Second Edition
Software Requirements, Second Edition

Without formal, verifiable software requirements—and an effective system for managing them—the programs that developers think they’ve agreed to build often will not be the same products their customers are expecting. In Software Requirements, Second Edition, requirements engineering authority Karl Wiegers amplifies the...

Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition
Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd Edition

There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files. This book is about the latter.

If I take a letter, lock it in a safe, hide the safe somewhere in New York, then tell you to read the...

Natural Computing: 4th International Workshop on Natural Computing
Natural Computing: 4th International Workshop on Natural Computing

The complex behavior of systems in nature is rooted in intricate mechanisms of interaction that often supersede human-made systems in terms of reliability, power efficiency, and computational capacity. Researchers have begun to realize that natural systems are a great source of inspiration for novel algorithms in computation and communication...

©2016 LearnIT (support@pdfchm.net) - Privacy Policy