Computers & Technology
epub |eng | 2009-06-17 | Author:Conway, Damian [Damian Conway]
Backtracking Prevent useless backtracking. In the final example of the previous guideline: qr{ with \s+ (?: each \s+ (?:$EXPR | $VAR \s* in \s* [(] $LIST [)] ) | [(] ...
( Category:
Software Development
February 28,2020 )
epub |eng | | Author:Wolff, David
Where the one-dimensional Gaussian function is given by the following equation: So if Cij is the color of the pixel at pixel location (i,j), the sum that we need to ...
( Category:
Digital Editing
February 28,2020 )
epub |eng | | Author:Sweeney, Patrick J.
Choosing a Hand-held, Mobile, or Fixed-location Reader You can choose from three types of readers for your RFID network: hand-held, mobile, or fixed-location. Many criteria enter into this decision, including ...
( Category:
Manufacturing
February 28,2020 )
epub |eng | 2009-07-06 | Author:John Gray [Gray, John]
17 What globalization is not Capitalism, while economically stable, and even gaining in stability, creates, by rationalizing the human mind, a mentality and a style of life incompatible with its ...
( Category:
Anatomy
February 28,2020 )
epub |eng | | Author:Rob Isenberg
Again, you will have to chown the files (see File Ownership and Permissions): $ sudo chown <your_user>:<your_group> -R . Before we run this test, let’s switch to using the ...
( Category:
Cloud Computing
February 28,2020 )
epub |eng | | Author:Arbuckle, Daniel [Daniel Arbuckle]
Time for action – creating a module fixture We'll build a test module with a module-level fixture. In the fixture, we'll replace the datetime.date.today function, which normally returns an object ...
( Category:
Programming
February 28,2020 )
epub |eng | | Author:McDonald, Alistair [Alistair McDonald]
RBLs A number of RBLs are enabled with the default configuration of SpamAssassin. These are defined in /usr/share/spamassassin/20_dnsbl_tests.cf. An example definition is shown here: header RCVD_IN_NJABL eval:check_rbl('njabl', 'dnsbl.njabl.org.') describe RCVD_IN_NJABL ...
( Category:
Networking & Cloud Computing
February 28,2020 )
epub |eng | | Author:Seth James Nielson & Christopher K. Monson
Listing 5-5Sign Unencrypted Data There’s probably a bit more in Listing 5-5 than expected, particularly in the padding configuration. Let’s walk through it all. First, we generate a key pair. ...
( Category:
Python Programming
February 28,2020 )
epub |eng | 2012-12-05 | Author:Kirk, David B., Hwu, Wen-mei W. & Wen-mei W. Hwu
Figure 10.14 A sequential loop that implements SpMV/COO. The loop is extremely simple. It iterates through all the data elements and performs the multiply and accumulate operations on the appropriate ...
( Category:
Microprocessor Design
February 28,2020 )
epub |eng | | Author:Hans Riesel
( Category:
Counting & Numeration
February 28,2020 )
epub |eng | 2019-07-12 | Author:Shalabh Aggarwal
<a href="{{ url_for('auth.google_login', next=url_for('auth.home')) }}">Login via Google</a> How it works... The Google login works in a manner similar to the Facebook login from the previous recipe. Using Twitter for authentication ...
( Category:
Web Services
February 28,2020 )
epub |eng | | Author:Arundel, John
We've passed in an array of strings to the dotfile parameter of our ssh_user definition. Here's where that gets expanded into resource declarations: if $dotfile { $filepath = regsubst($dotfile,'^(.*)$',"/home/${name}/.\\0", 'G') ...
( Category:
Linux & UNIX Administration
February 28,2020 )
epub, pdf |eng | | Author:Byrne, Bill
8 HORROR EFFECTS This is the first of the chapters that will relate directly to a genre. Horror as a whole has always relied on low budgets and various effects. ...
( Category:
Other Media
February 28,2020 )
epub |eng | 2010-11-09 | Author:Gennick, Jonathan [Jonathan Gennick]
match_parameter A set of options, in the form of a character string, that changes the default manner in which regular-expression pattern matching is performed. You may specify any, all, or ...
( Category:
SQL
February 28,2020 )
epub |eng | | Author:Marie Drennan,Yuri Baranovsky,Vlad Baranovsky & Yuri Baranovsky & Vlad Baranovsky
Mirror In many sitcoms and dramas that you’ve seen, there are characters who were clearly designed as opposites of the main character. It’s the classic “odd couple” dynamic: two people ...
( Category:
Intelligence & Semantics
February 28,2020 )
Categories
Popular ebooks
Deep Learning with Python by François Chollet(27998)The Mikado Method by Ola Ellnestam Daniel Brolund(25281)
Hello! Python by Anthony Briggs(24333)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(23419)
Kotlin in Action by Dmitry Jemerov(22503)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(21956)
Dependency Injection in .NET by Mark Seemann(21837)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(20704)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(19517)
Grails in Action by Glen Smith Peter Ledbrook(18594)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17028)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(15836)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(13683)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11850)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11151)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10621)
Hit Refresh by Satya Nadella(9185)
The Kubernetes Operator Framework Book by Michael Dame(8560)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8400)
Robo-Advisor with Python by Aki Ranin(8357)