Computers & Technology
epub, pdf |eng | 1992-03-31 | Author:Neil Postman [Postman, Neil]

7 The Ideology of Machines: Computer Technology That American Technopoly has now embraced the computer in the same hurried and mindless way it embraced medical technology is undeniable, was perhaps ...
( Category: Engineering July 10,2017 )
epub |eng | 2017-02-23 | Author:C. J. Cherryh

8 Cabinet meeting. God. Shawn’s nine advisors, that met with him regularly, and that generally had compatible opinions—but no scarcity of concerns. There had been perhaps a few too many ...
( Category: Computers & Technology July 9,2017 )
epub |eng | 2017-02-27 | Author:Mark O'Connell

Long before the peoples of the Western World turned to the machine, mechanism as an element in social life had come into existence. Before inventors created engines to take the ...
( Category: Internet & Social Media July 9,2017 )
epub, pdf |eng | 2016-03-21 | Author:Andrew K. Dennis [Dennis, Andrew K.]

Following this, we then included the fb.h library, which gives us methods to access the frame buffer. You can read more about the library at https://www.kernel.org/doc/Documentation/fb/framebuffer.txt. After this we then ...
( Category: Computers & Technology July 9,2017 )
epub, azw3, pdf |eng | 2017-06-27 | Author:Evelina B. [B., Evelina]

inset Optional. Changes the shadow from an outer shadow (outset) to an inner shadow initial Sets this property to its default value. Read about initial inherit Inherits this property from ...
( Category: Computers & Technology July 7,2017 )
epub |eng | 2017-06-23 | Author:Andrei Besedin [Besedin, Andrei]

ArrayList represents dynamic Collection. Methods for manipulating elements are: add() – for adding element to ArrayList remove() – for removing elements from ArrayList get() – for getting elements from ArrayList ...
( Category: Programming July 7,2017 )
epub |eng | 2017-06-23 | Author:Miles Price [Price, Miles]

( Category: Security & Encryption July 7,2017 )
azw3, epub, pdf |eng | 2017-06-23 | Author:Miles Price

Physical security is a critical part of cyber security. Hackers will always look for any weakness that they can find, whether online or offline. Chapter 5: Social Engineering Did you ...
( Category: Security & Encryption July 7,2017 )
epub, azw3, pdf |eng | 2017-07-02 | Author:James Wells [Wells, James]

It shows you what was the permanent (built-in in network card) MAC address and its corporation in brackets, and down it shows that there is a new MAC address which ...
( Category: Computers & Technology July 5,2017 )
azw3, epub, pdf |eng | 2017-06-30 | Author:Jeff M

In the example above we clicked on the WirelessKeyView. This tool will scan the wireless network that the computer is currently connected to and display the network name, key type, ...
( Category: Computers & Technology July 4,2017 )
epub, pdf |eng | 2017-06-29 | Author:Serhan Yamacli [Yamacli, Serhan]

String weightStr = weightText.getText().toString(); double weight = Double. parseDouble(heightStr); Code 6.4 We now have weight and height data in double type variables so we can do the BMI calculation using ...
( Category: Computers & Technology July 3,2017 )
epub |eng | | Author:Manohar Swamynathan

# create hihger order polynomial for independent variables order_no = 6 # map the variable 1 & 2 to its higher order polynomial def map_features(variable_1, variable_2, order=order_no): assert order >= ...
( Category: Programming July 3,2017 )
epub |eng | 2014-09-15 | Author:James Robertson

( Category: Performing Arts July 1,2017 )
epub |eng | 2017-03-13 | Author:K.C. Wells [Wells, K.C.]

Chapter Fourteen JAMIE RINSED his mouth under the jet and then regarded himself in the mirror above the sink. What the fuck did I just do? He cupped his hands ...
( Category: LGBT July 1,2017 )
epub, mobi |eng | 2016-02-08 | Author:A M Eydie [Eydie, A M]

The more signatures that are from people you know and trust, the more trust you can have in the keys authenticity This trust stuff is a big deal for software ...
( Category: Internet & Social Media July 1,2017 )