Computers & Technology
epub |eng | 2011-03-09 | Author:Marko Gargenta [Marko Gargenta]
Most of the StatusData code is a direct cut-and-paste from DbHelper.java. This is because it now makes sense to make DbHelper an inner class because DbHelper now exists only in ...
( Category:
Electronics
March 26,2014 )
epub, pdf |eng | 2013-03-11 | Author:Karim Yaghmour
root@android:/ # ls /data/system/users/ -l drwx------ system system 2013-01-19 01:03 0 -rw------- system system 155 2012-11-30 20:46 0.xml drwx------ system system 2013-01-19 01:03 10 -rw------- system system 166 2012-12-04 23:38 ...
( Category:
Embedded Systems
March 26,2014 )
epub |eng | 2012-10-31 | Author:Mario Zechner & Robert Green [Zechner, Mario & Green, Robert]
Alpha Blending: I Can See Through You Alpha blending in OpenGL ES is pretty easy to enable. We only need two method calls: gl.glEnable(GL10.GL_BLEND); gl.glBlendFunc(GL10.GL_SRC_ALPHA, GL10.GL_ONE_MINUS_SRC_ALPHA); The first method call ...
( Category:
Object-Oriented Design
March 26,2014 )
epub, pdf |eng | 2011-10-10 | Author:Brian Evans
attachInterrupt() The attachInterrupt() function enables hardware interrupts and links a hardware pin to an ISR to be called when the interrupt is triggered. This function also specifies the type of ...
( Category:
Single Board Computers
March 26,2014 )
epub, pdf |eng | 2012-12-12 | Author:Dave Smith, Jeff Friesen
Photo Overlay We can now add on to the previous example any controls or views that are appropriate to display on top of the camera preview. Let’s modify the preview ...
( Category:
Computer Science
March 26,2014 )
epub, mobi, pdf |eng | | Author:Wallace Jackson
7. Add a black background called background2, using a value of #000000. To add this to the list on the left, click the Add button as if you were going ...
( Category:
Object-Oriented Design
March 26,2014 )
epub, mobi, pdf |eng | 2013-03-25 | Author:Ara Pehlivanian, Don Nguyen [Pehlivanian, Ara]
The for ... in Loop The for ... in loop was covered in the last chapter. To recap, this statement is used to loop through the properties of an object; ...
( Category:
Internet & Social Media
March 26,2014 )
epub, mobi |nor | 2013-03-25 | Author:Christer Fuglesang
11 As they get closer to the Moona-Lisa, Markus’ and Mariana’s dinosaurs get skittish and refuse to go any further. Not even sugar helps. “Strange, we’ll have to walk the ...
( Category:
Computers & Technology
March 26,2014 )
epub |eng | 2013-03-26 | Author:Rafiq Elmansy
Type www.spellcheck.net in your web browser and press . The Spell Check form appears. Type your text, or copy and paste it. Click Spell Check. The Spell Checker window appears ...
( Category:
Storage & Retrieval
March 26,2014 )
epub, mobi |eng | 2012-08-07 | Author:Macleod, Don [Macleod, Don]
If people prefer not to leave the ordinary trails that the rest of us do simply by being a member of society, your hunt may never pan out. Research Tools ...
( Category:
Internet, Groupware, & Telecommunications
March 26,2014 )
epub, pdf |eng | 2013-06-27 | Author:Engebretson, Patrick & David Kennedy [Engebretson, Patrick & Kennedy, David]
JtR: King of the Password Crackers It is hard to imagine discussing a topic like the basics of hacking without discussing passwords and password cracking. No matter what we do ...
( Category:
Computers & Technology
March 26,2014 )
epub |eng | 2013-07-01 | Author:Wilhelm, Thomas [Wilhelm, Thomas]
TCP Scanning Most of the interesting applications from a pentest perspective use TCP to communicate across the networks, including Web servers, file transfer applications, databases, and more. There are a ...
( Category:
Hacking
March 26,2014 )
epub |eng | 2012-03-25 | Author:Jack Wiles & Terry Gudaitis & Jennifer Jabbusch & Russ Rogers & Sean Lowther
• Secured management interfaces for the APs, controllers, chassis hosting controllers • Strict change management policies • Monitoring and auditing configuration changes and alerts on changes • Annual or semi-annual ...
( Category:
Hacking
March 26,2014 )
epub |eng | 2013-03-25 | Author:Henry S. Warren
Thus, (27) always has a solution. If p is not forced to equal W, then from (25) and (28), If p is forced to equal W, then from (25), Because ...
( Category:
Computer Science
March 26,2014 )
epub, pdf |eng | 2013-01-27 | Author:Eric Cole
There is a lot of focus, energy and effort put against incident response today, but what we have found is not everyone is using the same definitions. Therefore in order ...
( Category:
Hacking
March 26,2014 )
Categories
Popular ebooks
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16904)Deep Learning with Python by François Chollet(14616)
The Mikado Method by Ola Ellnestam Daniel Brolund(11877)
Hello! Python by Anthony Briggs(11791)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(11240)
Dependency Injection in .NET by Mark Seemann(11001)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10517)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(9832)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(9420)
Grails in Action by Glen Smith Peter Ledbrook(9163)
Hit Refresh by Satya Nadella(9038)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(8808)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(8594)
The Kubernetes Operator Framework Book by Michael Dame(8468)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8309)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8288)
Robo-Advisor with Python by Aki Ranin(8242)
Practical Computer Architecture with Python and ARM by Alan Clements(8217)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8187)
Building Low Latency Applications with C++ by Sourav Ghosh(8089)