Computers & Technology
mobi, epub, azw3, pdf |eng | 2016-03-14 | Author:James Smith
TOR CHAT By now you should know that any type of messaging system is likely compromised or storing your data for an unknown period of time, and if you ever ...
( Category:
Computers & Technology
April 20,2016 )
epub |eng | 2014-07-26 | Author:Matthew Capala [Capala, Matthew]
( Category:
Business & Money
April 19,2016 )
epub |eng | | Author:Ted Dunning
Figure 4-9. Once the model was shown to work with appropriately synthesized fake data, the analysis was conducted on real data inside the security perimeter. The results for this real-world ...
( Category:
Data Processing
April 19,2016 )
epub, pdf |eng | 2014-02-19 | Author:Majed Marji
Figure 6-10. The main script of the Tutor sprite After asking the user to enter a choice, the Tutor sprite waits for the user’s input and uses three if/else blocks ...
( Category:
Curriculum & Lesson Plans
April 18,2016 )
epub, mobi |eng | 2014-04-14 | Author:Herbert Schildt [Schildt, Herbert]
Reading and Writing Binary Data So far, we have just been reading and writing bytes containing ASCII characters, but it is possible—indeed, common—to read and write other types of data. ...
( Category:
Beginner's Guides
April 18,2016 )
epub, mobi, pdf |eng | 2013-12-01 | Author:Myers, Mark [Myers, Mark]
scripts.js coreJS.js main-code.js main_code.js main.code.js You include a JavaScript file in an HTML file the same way you include an external CSS file—with an opening and closing tag. <script src="whatever.js"></script> ...
( Category:
JavaScript
April 18,2016 )
epub, mobi, pdf |eng | 2013-10-03 | Author:Gookin, Dan [Gookin, Dan]
strlen() Returns the length of a string, not counting the \0 or NULL character at the end of the string. More string functions are available than are shown in Table ...
( Category:
Tutorials
April 18,2016 )
epub |eng | 2016-02-22 | Author:Adam Kucharski [Kucharski, Adam]
WHEN THE US CONGRESS put forward a bill in 1969 suggesting that cigarette advertisements be banned from television, people expected American tobacco companies to be furious. After all, this was ...
( Category:
Intelligence & Semantics
April 16,2016 )
epub |eng | 2016-03-31 | Author:Roger F. Silva [F. Silva, Roger]
Select range A6:M7 and go to the “Home Tab”, “Font group”, click on “Border” and select “All borders”. Your range will now have black default borders. Now select range A9:M16 ...
( Category:
Business & Money
April 16,2016 )
epub |eng | 2013-09-19 | Author:Kellmereit, Daniel & Obodovski, Daniel [Kellmereit, Daniel]
Chapter 5 USE CASES The use cases capture the goals of the system. To understand a use case, we tell stories. ~ Ivar Jacobson In his book The Innovator’s Dilemma,25 ...
( Category:
Venture Capital
April 15,2016 )
epub |eng | 2008-12-16 | Author:Toby Segaran [Toby Segaran]
Figure 7-7. Decision tree model of hotness The central node at the top that divides the dataset the best is gender. The remainder of the tree is actually quite complicated ...
( Category:
Intelligence & Semantics
April 15,2016 )
epub |eng | 2013-11-11 | Author:Dongarra, Jack, Hwang, Kai, Fox, Geoffrey C. & Geoffrey C. Fox & Jack J. Dongarra
Acknowledgements This chapter was coauthored by Geoffrey Fox of Indiana University and Albert Zomaya of Sydney University, jointly. Their work was assisted by Ali Javadzadeh Boloori and Chen Wang of ...
( Category:
Computers & Technology
April 15,2016 )
epub |eng | 2015-12-17 | Author:Fodor’s Travel
( Category:
Computers & Technology
April 15,2016 )
azw3 |eng | 2016-04-03 | Author:Sinard, Nicholas [Sinard, Nicholas]
3. Download Games Many users play games on their RPi, despite the graphics limitations on the computer. You can download emulators, but you can also download games without emulators. Downloading ...
( Category:
Computers & Technology
April 14,2016 )
mobi |eng | 2016-03-31 | Author:Antun Peicevic
Modules are enabled using the a2enmod command. The enabled modules are listed in the /etc/apache2/mods-enabled directory as links to the corresponding modules in the /etc/apache2/mods-available directory. To disable a module, ...
( Category:
Computers & Technology
April 14,2016 )
Categories
Popular ebooks
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16906)Deep Learning with Python by François Chollet(15099)
The Mikado Method by Ola Ellnestam Daniel Brolund(12365)
Hello! Python by Anthony Briggs(12248)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(11602)
Dependency Injection in .NET by Mark Seemann(11391)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10530)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(10204)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(9873)
Grails in Action by Glen Smith Peter Ledbrook(9539)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(9121)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(9066)
Hit Refresh by Satya Nadella(9040)
The Kubernetes Operator Framework Book by Michael Dame(8474)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8453)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8299)
Robo-Advisor with Python by Aki Ranin(8253)
Practical Computer Architecture with Python and ARM by Alan Clements(8226)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8195)
Building Low Latency Applications with C++ by Sourav Ghosh(8101)