Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
ASP.NET jQuery Cookbook

Buy
ASP.NET jQuery Cookbook, 9781849690461 (1849690464), Packt Publishing, 2011

The jQuery library has become increasingly popular with web application developers because of its simplicity and ease of use. The library is supported by an active community of developers and has grown significantly over the years after its inception in 2006 by John Resig. Using this library eases complicated tasks and adds to the interactive experience of the end user. Its extensible plugin architecture enables developers to build additional functionalities on top of the core library.

With Microsoft's contribution of Templates, DataLink, and Globalization plugins to the jQuery library and the distribution of jQuery with Visual Studio 2010 onwards, the library has gained popularity with ASP.NET developers. jQuery can be very easily interfaced with ASP.NET controls as well as custom user controls. It can be used to validate controls using client side scripts, thus giving us an alternative for server side Validation Controls. It can be used to incorporate cool animation effects as well as to create graphic-rich pages. It can be used to post AJAX requests to web services, page methods, and HTTP handlers. The possibilities with jQuery
are endless.

This cookbook aims to cover some of the day-to-day tasks faced by ASP.NET developers and how jQuery can be applied to work out the same. We will be focusing on interfacing jQuery with ASP.NET applications and some of the amazing tasks that can be accomplished using this powerful library. The recipes described in this book give fast and easy solutions to some of the common encountered problems in web applications.

(HTML tags aren't allowed.)

Secure and Trust Computing, Data Management, and Applications: 8th FIRA International Conference
Secure and Trust Computing, Data Management, and Applications: 8th FIRA International Conference

On behalf of the Organizing Committees, it is our pleasure towelcome you to the proceedings of the 8th FTRA International Conference on Secure and Trust Computing, Data Management, and Application (STA 2011),which was held in Loutraki, Greece, June 28–30, 2011.

STA 2011 was the first conference after the merger of the...

Practical Genetic Algorithms
Practical Genetic Algorithms

"The first introductory-level book to emphasize practical applications through the use of example problems."
–– International Journal of General Systems, Vol. 31, No. 1, 2002, on the first edition

The use of genetic algorithms (GAs) to solve large and often complex computational problems has given rise...

The Secrets of College Success (Professors' Guide)
The Secrets of College Success (Professors' Guide)

If you’re currently a college student, or plan on being one, you need to check out this book. Written by award-winning professors Lynn Jacobs and Jeremy Hyman, it’s loaded with insider information that only professors know--but few are willing to reveal. The over 600 tips in this book will show you:

  • How to pick...

New Theories of Everything
New Theories of Everything
"A fascinating journey."--Kirkus Reviews
"He acknowledges the limitations of seeking a formula to describe the emotional aspects of experience and the necessity of incorporating these variables into the long-sought-after theory of everything."--Science News
"Recommended for general readers; lower-division
...
SharePoint Server 2010 Administration 24 Hour Trainer (Wrox Programmer to Programmer)
SharePoint Server 2010 Administration 24 Hour Trainer (Wrox Programmer to Programmer)
SHAREPOINT IS ONE THE MOST SUCCESSFUL products in Microsoft’s history. It can be found in small businesses, universities, and Fortune 500 companies. SharePoint 2010, the latest release, contains many new areas for existing and new SharePoint server administrators and site administrators. This book will help you meet the new...
Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures
Enemy at the Water Cooler: Real-Life Stories of Insider Threats and Enterprise Security Management Countermeasures
Today's headlines are littered with news of identity thieves, organized cyber criminals, corporate espionage, nation-state threats and even terrorists. They represent the next wave of security threats but still possess nowhere near the devastating potential of the most insidious threat: the insider. This is not the bored 16 year-old hacker. We are...
©2019 LearnIT (support@pdfchm.net) - Privacy Policy