Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Sams Teach Yourself Visual Basic .NET Web Programming in 21 Days

Buy
Visual Basic.NET will integrate state of the art programming language features, including inheritance, polymorphism, and garbage collection. The book will explain these key concepts in a simple and practical way.* Web Forms and Web Controls usher in an elegant way to make dynamic web pages. The book will cover these topics with how-to code examples and projects.*

One of the newest developments in Internet programming is the use of XML and the SOAP communication protocol. .NET Web Services harness these two technologies, and will be covered in later sections of the book.

About the Author

Peter Aitken has been writing about computers and programming for more than 10 years, with some 30 books and more than 1.5 million copies in print as well as hundreds of magazine and trade publication articles. His book titles include Sams Teach Yourself Internet Programming With Visual Basic in 21 Days and Sams Teach Yourself C in 21 Days. A regular contributor to Office Pro magazine and the DevX Web site, Peter is the proprietor of PGA Consulting, providing custom application and Internet development to business, academia, and government since 1994. You can reach him at peter@pgacon.com.

Philip Syme has been writing applications with C++ and Visual Basic since the release of Windows 3.1. He has helped create several enterprise scale projects developed for Fortune 500 companies that use Microsoft technologies. Phil has also coauthored articles published in IEEE symposiums. Phil lives in Baltimore, Maryland, and can be reached at psyme@home.com.

(HTML tags aren't allowed.)

Endocrine System (Your Body: How It Works)
Endocrine System (Your Body: How It Works)

As a critical part of human physiology, the endocrine system controls the chemical messengers that help our body function. Learn about how the endocrine system works with this great book.

The human body is an incredibly complex and amazing structure. At best, it is a source of strength, beauty, and wonder. We can compare the...

Microsoft Visual Studio 2008 Unleashed
Microsoft Visual Studio 2008 Unleashed
Microsoft® Visual Studio 2008 Unleashed is an end-to-end, deep dive into the Visual Studio development environment. It’s meant to provide you guidance on how you can squeeze the ultimate productivity out of the many features built into the .NET development tools. Understanding how to use your tools will make you a better...
Intelligent Document Capture with Ephesoft - Second Edition
Intelligent Document Capture with Ephesoft - Second Edition

Automate the processing of scanned and digital documents by improving accuracy using web-based open and modern intelligent document capture software

About This Book

  • Learn how to implement the benefits of intelligent document capture using Ephesoft Enterprise 4
  • Leverage the power of the...

Implementing Domain-Specific Languages with Xtext and Xtend
Implementing Domain-Specific Languages with Xtext and Xtend

If you know Eclipse then learning how to implement a DSL using Xtext is a natural progression. And this guide makes it easy to get started through a step-by-step approach accompanied with simple examples.

Overview

  • Learn to quickly develop a domain-specific language with Xtext
  • Implement any...
Neurosurgery: A Case-Based Approach
Neurosurgery: A Case-Based Approach

This book describes neurosurgical cases following the format of the clinical handover. Each case has a one line summary and differential diagnosis, appropriate interpretation of illustrated radiological studies, further ancillary tests, and management options. When appropriate, scoring/scaling systems and detailed anatomy are...

Conquest in Cyberspace: National Security and Information Warfare
Conquest in Cyberspace: National Security and Information Warfare
With billions of computers in existence, cyberspace, 'the virtual world created when they are connected,' is said to be the new medium of power. Computer hackers operating from anywhere can enter cyberspace and take control of other people's computers, stealing their information, corrupting their workings, and shutting them down. Modern societies...
©2021 LearnIT (support@pdfchm.net) - Privacy Policy