Computers & Technology
epub |eng | 2009-02-08 | Author:Jang, Michael [Michael Jang]

Using Knoppix The Knoppix CD (http://www.knoppix.org) is gaining popularity as the universal rescue disk. It boots a complete Linux system from the CD with an array of excellent tools that ...
( Category: Servers March 31,2014 )
epub |eng | 2000-01-02 | Author:Clinton Wong [Wong, Clinton]

* * * The Pragma header specifies directives for proxy and gateway systems. Since many proxy systems may exist between a client and server, Pragma headers must pass through each ...
( Category: Web Design March 31,2014 )
epub |eng | 2011-06-29 | Author:Collingbourne, Huw [Huw Collingbourne]

Note In Ruby 1.9, the instance_variables method returns an array of symbols. In Ruby 1.8, it returns an array of strings. Name Conflicts Module methods (those methods specifically preceded by ...
( Category: Ruby Programming March 31,2014 )
epub |eng | 2012-04-29 | Author:Kong, Joseph [Joseph Kong]

Before I describe the functions defined in Example 10-1, note that the constant LED_IO_ADDR is defined as 0x404c and that the constant LED_NUM is defined as 2. The following sections ...
( Category: Device Drivers March 31,2014 )
epub |eng | 2010-11-01 | Author:Barski, Conrad [Conrad Barski M.D.]

Note Using with-output-to-string runs counter to the tenets of functional programming (discussed in Chapter 14). Some Lispers consider this function (and similar functions that intercept input or output intended for ...
( Category: Game Programming March 31,2014 )
epub |eng | 2010-07-07 | Author:Lucas, Michael W. [Michael W. Lucas]

The xheader option tells flow-report to provide extra header information. Not all report types have extra header information. In some reports, the extra header information is identical to the regular ...
( Category: Network Security March 31,2014 )
epub, mobi |eng | | Author:Hyde, Randall [Randall Hyde]

Example 5-20. Main program that references external objects program main; #include( "stdlib.hhf" ); begin main; mov( 2, Var2 ); mov( 3, Var1 ); Add1and2(); stdout.put( "Var1=", Var1, nl ); end ...
( Category: Assembly Language Programming March 31,2014 )
epub, mobi |eng | 2014-03-30 | Author:Tiffany B. Brown, Kerry Butters, Sandeep Panda [Brown, Tiffany B.]

Canvas uses a two-dimensional coordinates grid. The top-left of the canvas has a coordinate of (0,0). The bottom-right will have a positive x and y coordinate according to the size ...
( Category: Programming March 31,2014 )
epub |eng | 2011-07-11 | Author:Smart, John Ferguson

Chapter 8. Notification Introduction While it is important to get your build server building your software, it is even more important to get your build server to let people know ...
( Category: Software Development March 31,2014 )
epub, mobi |eng | 2011-02-10 | Author:Kerrisk, Michael [Michael Kerrisk]

Creating Capabilities-Only Environments In the preceding pages, we have described various ways in which a process with the user ID 0 (root) is treated specially with respect to capabilities: When ...
( Category: Software Development March 31,2014 )
epub |eng | | Author:Ross, John [John Ross]

Performing a Site Survey Understanding general networking principles is fine, but you're installing a wireless network in a real location with real walls and real furniture (and most likely, real ...
( Category: LAN March 31,2014 )
epub, mobi |eng | 2011-05-16 | Author:Pfister, Cuno [Cuno Pfister]

Chapter 11. Handling Sensor Requests Chapter 10 is an example of an HTTP server, but it doesn’t use any sensors or actuators. In this chapter, I’ll show how you can ...
( Category: Single Board Computers March 31,2014 )
epub |eng | 2011-09-15 | Author:Craig, Terence, Ludloff, Mary E. [Terence Craig and Mary E. Ludloff]

The Consumer Financial Protection Bureau, “Know Before You Owe” The Library of Congress, “Wall Street Reform and Consumer Protection Act of 2009” U.S. Department of the Treasury, “Bureau of Consumer ...
( Category: Electronic Data Interchange (EDI) March 31,2014 )
epub |eng | 2014-02-23 | Author:Alcorn, Wade, Frichot, Christian, Orru, Michele & Christian Frichot & Michele Orru

Using BeEF with Metasploit Integrating BeEF and Metasploit allows you to control a browser, fingerprint it, and get as much information as you can before you try to exploit it. ...
( Category: Hacking March 30,2014 )
epub, mobi |eng | 2010-03-29 | Author:David Kirkpatrick

10 Privacy “You have one identity.” How much of ourselves should we show the world? It’s an important question Facebook forces us to confront. Do I want you to know ...
( Category: Company Profiles March 30,2014 )