Computers & Technology
epub |eng | 2009-03-16 | Author:Hewitt, Eben [Eben Hewitt]
Note There is a bit of a gray area with respect to proper header usage. Many public services, such as some posted by the United States Post Office, use what ...
( Category:
Client-Server Systems
April 5,2014 )
epub |eng | | Author:Testa, Louis [Louis Testa]
Follow these general principles for running an effective meeting: Designate a moderator to run the meeting. Designate someone to capture information and keep minutes as needed. Stick to the agenda. ...
( Category:
Software Development
April 5,2014 )
epub |eng | 2011-10-24 | Author:White, John Myles, Conway, Drew [Drew Conway and John Myles White]
* * * [6] The same person who invented the word “bit”. [7] When you’re interested, we’d recommend reading Judea Pearl’s Causality Pea05. Chapter 3. Classification: Spam Filtering This or ...
( Category:
Computer Science
April 5,2014 )
epub |eng | 2011-11-22 | Author:Klein, Tobias [Tobias Klein]
Step 5: Find the User-Controlled Input Values After I generated the list of all the supported IOCTLs, I tried to locate the buffer containing the user-supplied IOCTL input data. All ...
( Category:
Computers & Technology
April 5,2014 )
epub |eng | 2010-02-21 | Author:Allamaraju, Subbu [Subbu Allamaraju]
Tip Since a cache can be both an HTTP client and a server, in caching-related discussions, the term origin server is used to differentiate between caching servers and the servers ...
( Category:
Client-Server Systems
April 5,2014 )
epub, mobi |eng | 2011-02-10 | Author:Haverbeke, Marijn [Marijn Haverbeke]
Animating Life We will need bind (or method) when implementing the step method of a terrarium. This method has to go over all the bugs on the grid, ask them ...
( Category:
JavaScript
April 5,2014 )
epub, pdf |eng | 2012-02-26 | Author:Michael Sikorski & Andrew Honig [Michael Sikorski]
Using Hashed Exported Names The algorithm just discussed has a weakness: It performs a strcmp against each export name until it finds the correct one. This requires that the full ...
( Category:
Hacking
April 5,2014 )
epub |eng | 2011-07-05 | Author:McCullough, Matthew, Berglund, Tim [Tim Berglund and Matthew McCullough]
The power of Groovy’s operators can also be leveraged inside AntBuilder calls, such as using the regular expression matcher inside an evaluation of all System properties in Example 3-19. The ...
( Category:
Object-Oriented Design
April 5,2014 )
epub |eng | 2009-06-29 | Author:Stubblebine, Tony [Tony Stubblebine]
\Uhhhhhhhh Character specified by an eight-digit hexadecimal code. Table 1-28. Python character classes and class-like constructs Class Meaning [...] Any character listed, or contained within a listed range. [^...] Any ...
( Category:
Software Development
April 5,2014 )
epub |eng | 2009-06-29 | Author:DuBois, Paul [Paul DuBois]
Sometimes people omit UNSIGNED so that they can create rows that contain negative numbers in the sequence column. (Using –1 to signify “has no ID” is an instance of this.) ...
( Category:
Data Warehousing
April 5,2014 )
epub |eng | 2011-03-02 | Author:Teetor, Paul [Paul Teetor]
9.12. Forming a Confidence Interval for a Proportion Problem You have a sample of values from a population consisting of successes and failures. Based on the sample data, you want ...
( Category:
Software Development
April 5,2014 )
epub, mobi |eng | 2011-11-28 | Author:Zalewski, Michal [Michal Zalewski]
Non-Fully Qualified Hostnames Many users browse the Web with their DNS resolvers configured to append local suffixes to all found hostnames, often without knowing. Such settings are usually sanctioned by ...
( Category:
Internet & Social Media
April 5,2014 )
epub |eng | 2009-06-29 | Author:Robbins, Arnold, Hannah, Elbert, Lamb, Linda & Elbert Hannah & Linda Lamb [Arnold Robbins]
Note These keywords are case-sensitive. In checking for them, Vim even ignores the setting of the ignorecase option. If you need variations for different cases of keywords, you must specify ...
( Category:
User Experience & Usability
April 5,2014 )
epub |eng | 2010-08-24 | Author:Dwivedi, Himanshu [Himanshu Dwivedi]
User supplies the challenge, which in this case is 214484840. User supplies the MD5 hash that was sniffed over the network. From Figure 5-5 we see that the hash is ...
( Category:
Hacking
April 5,2014 )
mobi |eng | 2013-09-12 | Author:Hallberg, Bruce [Hallberg, Bruce]
Acquiring Backup Media and Technologies Once you have some idea of your backup needs, you can then proceed to acquire the necessary hardware and software to create and manage your ...
( Category:
LAN
April 3,2014 )
Categories
Popular ebooks
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16904)Deep Learning with Python by François Chollet(14616)
The Mikado Method by Ola Ellnestam Daniel Brolund(11877)
Hello! Python by Anthony Briggs(11791)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(11240)
Dependency Injection in .NET by Mark Seemann(11001)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10517)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(9832)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(9420)
Grails in Action by Glen Smith Peter Ledbrook(9163)
Hit Refresh by Satya Nadella(9038)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(8808)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(8594)
The Kubernetes Operator Framework Book by Michael Dame(8470)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8309)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8288)
Robo-Advisor with Python by Aki Ranin(8242)
Practical Computer Architecture with Python and ARM by Alan Clements(8217)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8187)
Building Low Latency Applications with C++ by Sourav Ghosh(8091)