iant
Membru nou
Inregistrat: acum 15 ani
Postari: 24
|
|
Of course, all that power just begs to be abused. Power corrupts, as they say, and hackers are nothing but a corrupt bunch: Almost as soon as Gmail was launched, hackers were looking at ways to use those capabilities for other purposes. They investigated the incredibly rich interface, and saw how much of the processing is done on the user?s own machine; they burrowed into the communication between the browser and the server; and they developed a series of interfaces for scripting languages to allow you to control Gmail from your own programs. This book shows what they did, how to do it yourself, and what to do after you?ve mastered the techniques. Meanwhile, you?ll also learn all about Ajax, the terribly fashionable JavaScript technique that Gmail brought into the mainstream.Two topics for the price of one!
Code:
|
|