Computers & Technology
epub |eng | 2013-12-04 | Author:W. Richard Stevens & Stephen A. Rago

( Category: Computers & Technology December 5,2014 )
mobi |eng | 2014-06-17 | Author:Don R. Crawley

Choose Device configuration by pressing the Enter key (remember that you’re still operating in a command-line interface, so you mouse will have no effect). Figure 73: Choosing the device to ...
( Category: Servers December 4,2014 )
azw3 |eng | 2011-12-15 | Author:Vivek Ramachandran

In the next exercise, we will look at how to crack a WPA PSK wireless network. The exact same steps will be involved in cracking a WPA2-PSK network using CCMP(AES) ...
( Category: Linux & UNIX Administration December 4,2014 )
azw3, mobi |eng | 2011-07-28 | Author:Matt Kloskowski

STEP 16: Press O to get the Dodge tool. Up in the Options Bar, set the Range to Midtones and the Exposure to 20%, and use a small brush to ...
( Category: Graphics & Design December 3,2014 )
epub |eng | 2014-09-30 | Author:Tom Doctoroff

Innovative Products A meticulously defined brand idea also inspires new product extensions, because it provides a focus for innovation. Consumers require much less of a hard sell because new products ...
( Category: Multilevel December 2,2014 )
azw3 |eng | 2012-11-15 | Author:Paulino Calderon Pale

test { id="3.1", desc="Skip symbolic links", sql="SHOW variables WHERE Variable_name = 'log_error' AND Value IS NOT NULL", check=function(rowstab) return { status = not(isEmpty(rowstab[1])) } end } MySQL servers may run ...
( Category: Databases & Big Data November 30,2014 )
mobi |eng | 2014-02-15 | Author:Julitta Korol

In the Visual Basic Editor window, activate the Project Explorer window and double-click the ThisWorkbook object in the Microsoft Excel Objects folder under VBAProject (Practice_WorkbookEvents2.xlsm). In the ThisWorkbook Code window, ...
( Category: VBA November 28,2014 )
epub |eng | 2005-03-01 | Author:Ken Bluttman & Bluttman Ken [Bluttman, Ken & Ken, Bluttman]

Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]
( Category: Hacking November 28,2014 )
epub |eng | 2014-03-16 | Author:Triumph Books

This hole of Water looks unassuming, but it’s actually an elevator that goes all the way to the Bedrock. Some Crafters have experimented with different shapes and styles to create ...
( Category: Minecraft November 28,2014 )
mobi, epub, azw3, pdf |eng | 2013-09-03 | Author:Holiday, Ryan [Holiday, Ryan]

Let’s Get Technical The movie marketing paradigm says throw an expensive premiere and hope that translates into ticket sales come opening weekend. A growth hacker says it’s 2013 and we ...
( Category: Web Marketing November 27,2014 )
epub, mobi, azw3 |eng | 2014-11-18 | Author:Brian Krebs [Krebs, Brian]

Severa Cosma ran his stock spam business in tandem with that of another cybercrook, a hacker who uses the nickname “Severa.” This spammer was named as a defendant in an ...
( Category: Hacking November 26,2014 )
epub, mobi |eng | 2006-03-01 | Author:Lloyd, Seth [Lloyd, Seth]

Entanglement Another difference between the classical and quantum versions of the controlled-NOT is that in the quantum case, information is created, apparently from nothing. Recall the analogous classical process: the ...
( Category: Quantum Theory November 26,2014 )
epub, pdf |eng | 1998-05-29 | Author:Donald E. Knuth [Knuth, Donald E.]

was found by the number field sieve, after four months of computation that occupied otherwise idle time on about 700 workstations [Lenstra, Lenstra, Manasse, and Pollard, Math. Comp. 61 (1993), ...
( Category: Computers & Technology November 26,2014 )
epub, pdf |eng | 1998-11-05 | Author:Donald E. Knuth [Knuth, Donald E.]

Fig. 5. A comparison tree that corresponds to binary search when N = 16. When N is 16, the first comparison made by the algorithm is K : K8; this ...
( Category: Computers & Technology November 26,2014 )
epub |eng | 1998-06-11 | Author:Donald E. Knuth [Knuth, Donald E.]

( Category: Computers & Technology November 26,2014 )