Computers & Technology
epub, pdf |eng | 2012-12-06 | Author:Mike Wilson [Mike Wilson]
Node.js The Express methods have expanded slightly during this chapter, supporting the new data that is sent to and from the account model. Because all of the display and processing ...
( Category:
JavaScript
June 12,2015 )
epub |eng | 2015-06-02 | Author:Onstott, Scott
Select the pattern called ANSI31 in the Pattern panel if it is not already selected. Select index color Red in the Color drop-down in the Properties panel. Select color 99, ...
( Category:
CAD
June 12,2015 )
epub |eng | 2014-07-10 | Author:Helmke, Matthew & Joseph, Elizabeth K. & Rey, Jos Antonio & Ballew, Philip & Hill, Benjamin Mako
Figure 5-15 Compiz Config Settings Manager warning Figure 5-16 Compiz Config Settings Manager main view When you open Compiz Config Settings Manager, you’ll notice that some of the categories have ...
( Category:
Linux
June 12,2015 )
epub |eng | 2015-06-01 | Author:Dwight, Rebecca & Stevens, Clara
Chapter One: What Is Udemy? In this chapter, you will learn: What Udemy is How Udemy can benefit you What is Udemy? Udemy (short for the Academy of You) is ...
( Category:
Hacking
June 12,2015 )
epub, pdf |eng | 2012-12-19 | Author:Ryan Carter [Ryan Carter]
Summary At first glance, the task of implementing OAuth can appear daunting, and OAuth’s token exchange system can be confusing if you’re unfamiliar with it. Fortunately, Cloud Connectors have done ...
( Category:
Internet & Social Media
June 12,2015 )
epub, pdf |eng | 2012-12-20 | Author:C.J. Date [C.J. Date]
Symmetry I believe symmetry is a good design principle in general. To quote Polya: “If a problem is symmetric in some ways we may derive some profit from noticing its ...
( Category:
Computers & Technology
June 12,2015 )
mobi, epub |eng | 2006-11-16 | Author:David Leavitt
The Enigma Machine, employed by the Germans to encrypt classified and sensitive messages during World War II. (HultonArchive/Getty Images) Inside each rotor a mass of wires connected the contact points ...
( Category:
LGBT
June 12,2015 )
epub |eng | 2015-06-10 | Author:David Park
16 Every hour brought new arrivals to Bakalla. Whatever was happening between the rival clans had scared people enough to make them abandon their homes and seek a safer place. ...
( Category:
Business & Money
June 11,2015 )
epub |eng | 2015-06-03 | Author:Rivenburgh, Kris
See the screenshot We've got quite the site abrewin' here. The End We're now in the home stretch of designing an amazing Thesis site. Let's continue on from our last ...
( Category:
Computers & Technology
June 11,2015 )
mobi |eng | 2015-06-03 | Author:Rivenburgh, Kris [Rivenburgh, Kris]
See the screenshot We've got quite the site abrewin' here. The End We're now in the home stretch of designing an amazing Thesis site. Let's continue on from our last ...
( Category:
Computers & Technology
June 11,2015 )
mobi |eng | 2009-02-08 | Author:Matthias Kalle Dalheimer; Matt Welsh
PAP and CHAP Some ISPs may require you to use a special authentication protocol, such as PAP (Password Authentication Protocol) or CHAP (Challenge Handshake Authentication Protocol) . These protocols rely ...
( Category:
Design & Architecture
June 11,2015 )
mobi |eng | 2007-01-15 | Author:Michael Schrenk
Use an email-enabled webbot to interface incompatible systems. For example, you could upload a small file to an FTP sever from a BlackBerry if the file (the contents of the ...
( Category:
Web Browsers
June 11,2015 )
mobi, epub |eng | 2009-12-27 | Author:Patrick Finney
28 appeasers had been flawed and that their designs had not turned out as they anticipated: appeasement, which was intended to conciliate, failed to pacify. Rearmament, which was meant to ...
( Category:
Computers & Technology
June 11,2015 )
mobi, epub, pdf |eng | 1990-12-15 | Author:Alvin Toffler
( Category:
Customs & Traditions
June 11,2015 )
mobi |eng | 2010-07-16 | Author:Charles Bell; Mats Kindahl; Lars Thalmann
The replace operation is not allowed. Indexes are less efficient than for a single table. The Merge storage engine is best suited for very large database (VLDB) applications, like data ...
( Category:
MySQL
June 11,2015 )
Categories
Popular ebooks
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16906)Deep Learning with Python by François Chollet(14873)
The Mikado Method by Ola Ellnestam Daniel Brolund(12130)
Hello! Python by Anthony Briggs(12036)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(11427)
Dependency Injection in .NET by Mark Seemann(11212)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10528)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(10032)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(9663)
Grails in Action by Glen Smith Peter Ledbrook(9355)
Hit Refresh by Satya Nadella(9039)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(8947)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(8862)
The Kubernetes Operator Framework Book by Michael Dame(8473)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8387)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8297)
Robo-Advisor with Python by Aki Ranin(8248)
Practical Computer Architecture with Python and ARM by Alan Clements(8223)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8193)
Building Low Latency Applications with C++ by Sourav Ghosh(8097)