Computers & Technology
epub |eng | 2014-04-15 | Author:Glenn Block, Pablo Cibraro, Pedro Felix, Howard Dierking, and Darrel Miller

( Category: Computer Programming April 5,2021 )
epub |eng | 2013-09-12 | Author:Leonard Richardson, Mike Amundsen, and Sam Ruby

Versoning isn’t special API versioning gets a lot of attention because the problem is a lot worse for an API that ignores the hypermedia constraint. But it’s just one example ...
( Category: Web Development & Design Programming April 5,2021 )
epub, pdf |eng | 2013-09-09 | Author:Paul Bakker and Bert Ertman

org.example.sessions - sessions.api - sessions.rest - sessions.mongo org.example.sessions.test org.example.registration - registration.api - registration.rest - registration.mongo - registration.email org.example.registration.test org.example.feedback - feedback.api - feedback.rest - feedback.stats - feedback.mongo org.example.feedback.test You can ...
( Category: Networking & Cloud Computing April 5,2021 )
mobi |eng | 2009-02-08 | Author:Kerry J. Cox & Christopher Gerg [Cox, Kerry J.]

Wherever you decide to put it, just make sure that you set the RULE_PATH variable in the snort.conf file to point to the directory containing the *.rules files. Below is ...
( Category: Computer Cryptography April 5,2021 )
epub, mobi, azw3 |eng | 2020-11-01 | Author:Jones, Chris [Jones, Chris]

Fungibility and Monero If you read any literature about Monero you’ll likely encounter the topic of fungibility quite a lot. Why does it matter so much to Monero and cryptocurrencies ...
( Category: Computer History & Culture April 5,2021 )
epub, pdf |eng | 2014-04-15 | Author:Micha Gorelick and Ian Ozsvald

( Category: Computer Science April 4,2021 )
mobi, epub |eng | | Author:AI Publishing

Let us create a new dataframe myframe2 that is the same as myframe except for an extra entry [‘red’,’pencil’,0.8] at index 5. 1. myframe2 = myframe 2. myframe2.loc[5]=[‘red’,’pencil’,0.8] 3. myframe2 ...
( Category: Computer Science April 4,2021 )
azw3, epub, pdf |eng | 2021-03-27 | Author:Swizec Teller [Teller, Swizec]

deleteItem() The deleteItem() mutation is simple. GraphQL and the database do the work for us. // src/mutations.ts export const deleteItem = async (_: any, args: { id: string }) => ...
( Category: Networking & Cloud Computing April 3,2021 )
epub |eng | 2021-03-30 | Author:Dr DisRespect

* * * So yeah, I went with the guy. Twenty hours later, I was in the Brotherhood’s AH-64 Apache attack chopper, staring out the window at the Hong Kong ...
( Category: Memoirs April 2,2021 )
epub |eng | 2018-05-16 | Author:chris Marquardt

Figure 4-44: Taxi, New York City. The bright color and the proximity of the taxi in the foreground make it a doubly important feature. For this shot, I used a ...
( Category: Photography & Video April 2,2021 )
epub |eng | 2021-03-30 | Author:Tarik Makota, Brian Maguire, Danny Gagne, Rajeev Chakrabarti

Create an IAM policy and IAM role in Account B that provides permissions to read the S3 objects, and grant access to Account C to assume the role. This role ...
( Category: Databases & Big Data April 1,2021 )
azw3, pdf |eng | 2021-01-13 | Author:POUL KLAUSEN [KLAUSEN , POUL]

The goal is to end the session so that the object loginBean (and, if any, other session objects) no longer lives. Then there is edit.jsp, in the event of a ...
( Category: Networking & Cloud Computing March 30,2021 )
epub |eng | | Author:Butcher, Paul

​ send(:cache, {:get, self(), ref, url}) ​ ​receive​ ​do​ ​ {:ok, ^ref, page} -> page ​ ​end​ ​ ​end​ ​ ​def​ size ​do​ ​ ref = make_ref() ​ send(:cache, {:size, ...
( Category: Databases & Big Data March 29,2021 )
epub, mobi |eng | 2021-03-31 | Author:Jean-Georges Valle [Jean-Georges Valle]

Other Wi-Fi attacks Some other attacks exists, but they usually target the Wi-Fi infrastructure, not the device. An excellent introduction book is Vivek Ramachandran's Wireless Penetration Testing Beginner's Guide. Networking ...
( Category: Networking & Cloud Computing March 29,2021 )