Computers & Technology
epub |eng | 2012-08-27 | Author:Robert J. Bartz
Frames Used for Active Scanning During the active scanning process, two frames are exchanged between the device and the access point. 1. The wireless LAN device sends a broadcast probe ...
( Category:
LAN
March 26,2014 )
epub, mobi, pdf |eng | 2012-11-06 | Author:Michael Raggo & Chet Hosmer
Figure 7.2 Creating “mike.txt” in Notepad We can then of course run a directory listing to see the newly created file in our directory: D:\mike>dir Volume in drive D has ...
( Category:
Operating Systems Theory
March 26,2014 )
epub, mobi, pdf |zho | 2003-08-12 | Author:Simon Singh [Singh, Simon]
5 The Language Barrier While British codebreakers were breaking the German Enigma cipher and altering the course of the war in Europe, American codebreakers were having an equally important influence ...
( Category:
Encryption
March 26,2014 )
epub |eng | 2013-01-06 | Author:Batten, Lynn Margaret
5.3 The Elliptic Curve Factoring Scheme In this section, we describe how elliptic curves can be used to factor numbers suspected of being composite. We saw in Section 2.2 that ...
( Category:
Security & Encryption
March 26,2014 )
epub |eng | 2012-03-25 | Author:Martin, Keith M.
8.1.3 Non-deterministic generators There are two general approaches to generating randomness. First we will look at non-deterministic generation, which relies on unpredictable sources in the physical world. This is a ...
( Category:
Skills
March 26,2014 )
epub |eng | 2000-03-25 | Author:Andrew Hunt & David Thomas
Workflow On many projects, we need to model and analyze the users' workflows as part of requirements analysis. We'd like to find out what can happen at the same time, ...
( Category:
Software Design, Testing & Engineering
March 26,2014 )
epub, mobi, pdf |eng | 2012-07-09 | Author:Michael Fitzgerald [Michael Fitzgerald]
Transforming Plain Text with sed Let’s add some markup to the top of the text in rime.txt. We can do this with the insert command (i\). In the directory where ...
( Category:
Programming
March 26,2014 )
epub |eng | | Author:Copy
A web page or a remote file can be downloaded by using wget, as follows: $ wget URL For example: $ wget http://slynux.org --2010-08-01 07:51:20-- http://slynux.org/ Resolving slynux.org... 174.37.207.60 Connecting ...
( Category:
Computers & Technology
March 26,2014 )
epub, mobi |eng | 2013-04-21 | Author:Michael W. Lucas
MASTER_SITE_GNOME Software from the Gnome project MASTER_SITE_PERL_CPAN The biggest Perl module collection MASTER_SITE_TEX_CTAN Software for TeX typesetting MASTER_SITE_KDE Software related to KDE MASTER_SITE_SAVANNAH Software development hosted by the FSF MASTER_SITE_AFTERSTEP ...
( Category:
Networking & System Administration
March 26,2014 )
epub, pdf |eng | 2009-02-08 | Author:Ed Burnette [Ed Burnette]
Execute (Ctrl+U or Run → Execute) Evaluate the expression but don't show its value. Watch (Run → Watch) Copy an expression into the Expressions view. Its value is recalculated every ...
( Category:
Object-Oriented Design
March 26,2014 )
epub, pdf |eng | 2013-03-25 | Author:Dan Bode & Nan Liu [Bode, Dan and Liu, Nan]
File confinement The confine method can use exists to base confinement on whether a specific file is present on the managed system. The example below demonstrates how a provider managing ...
( Category:
Operating Systems
March 26,2014 )
epub |eng | 0101-01-01 | Author:Idris, Ivan [Idris, Ivan]
Pausing the game: Sometimes we need to pause the execution of a game, as in our case in order to be able to hear a sound. We can do this ...
( Category:
Game Programming
March 26,2014 )
epub |eng | | Author:Neal Stephenson [Stephenson, Neal]
So when I got home I began messing around with Linux, which is one of many, many different concrete implementations of the abstract, Platonic ideal called Unix. I was not ...
( Category:
Technology
March 26,2014 )
epub | | 1999-03-15 | Author:Neal Stephenson [Stephenson, Neal]
The Hole Hawg Of Operating Systems Unix has always lurked provocatively in the background of the operating system wars, like the Russian Army. Most people know it only by reputation, ...
( Category:
Technology
March 26,2014 )
epub, mobi | | 2010-03-07 | Author:Winn Schwartau [Schwartau, Winn]
WE'RE GOING AFTER THEM After who? FREEDOM. NEMO AND SOME PHREAKS PHRIENDS ARE GOING TO FIND OUT WHAT'S GOING ON. What's wrong? DID YOU EVER TALK TO ANYONE AND FEEL ...
( Category:
Literature & Fiction
March 26,2014 )
Categories
Popular ebooks
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16904)Deep Learning with Python by François Chollet(14616)
The Mikado Method by Ola Ellnestam Daniel Brolund(11877)
Hello! Python by Anthony Briggs(11791)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(11240)
Dependency Injection in .NET by Mark Seemann(11001)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10517)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(9832)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(9420)
Grails in Action by Glen Smith Peter Ledbrook(9163)
Hit Refresh by Satya Nadella(9038)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(8808)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(8594)
The Kubernetes Operator Framework Book by Michael Dame(8467)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8309)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8287)
Robo-Advisor with Python by Aki Ranin(8241)
Practical Computer Architecture with Python and ARM by Alan Clements(8217)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8187)
Building Low Latency Applications with C++ by Sourav Ghosh(8089)