Computer Science
epub |eng | 2010-10-31 | Author:Terry Griffin [Terry Griffin]

( Category: Crafts & Hobbies June 18,2017 )
epub, mobi |eng | 2011-06-17 | Author:Shumeet Baluja

( Category: Thrillers & Suspense June 18,2017 )
epub |eng | 2011-10-23 | Author:Darvish Shadravan & Laura Rogers [Darvish Shadravan]

( Category: Software June 18,2017 )
epub |eng | 2011-09-19 | Author:Richard Banks [Richard Banks]

( Category: Programming June 18,2017 )
epub |eng | | Author:Matt Wynne & Aslak Hellesøy

( Category: Computer Science June 18,2017 )
epub |eng | 2011-06-06 | Author:Abbott Katz

( Category: Programming June 18,2017 )
epub |eng | 2012-09-26 | Author:John Michelsen & Jason English [Michelsen, John & English, Jason]

Best Practice 2: Reduce Your Infrastructure Footprint Solving the problem of available IT infrastructure for software development doesn't seem like the sexiest thing Service Virtualization can do outside its ties ...
( Category: Computer Science June 17,2017 )
epub, pdf |eng | | Author:Sheran Gunasekera

Figure 6-13. Setting up an SSL/TLS Session TLS and SSL use a combination of cryptographic techniques to ensure data transmission is secure. Let’s look at this session setup now. I’m ...
( Category: Programming June 17,2017 )
epub |eng | 2011-10-11 | Author:Scott Meyers & Mike Lee

NOTE: In the past some people would create a Time Machine backup to a different partition on their primary hard drive. Although this wouldn't help if your hard drive had ...
( Category: Software June 17,2017 )
epub |eng | 2009-02-08 | Author:Chris Tyler [Chris Tyler]

How Does It Work? The default macro definitions for the RPM system are merged from several files when either rpm or rpmbuild starts: /usr/lib/rpm/macros Standard definitions distributed with the RPM ...
( Category: Operating Systems June 17,2017 )
epub |eng | 2013-06-03 | Author:Dan C. Marinescu

(6.80) The application can meet its deadline only if , and under this condition this inequality becomes (6.81) If , there is not enough time even for data distribution and ...
( Category: Hardware & DIY June 17,2017 )
epub, mobi, pdf |eng | 2009-02-08 | Author:Aviva Garrett [Aviva Garrett]

policer name Rate-limit traffic on an interface. syslog Keep a record of the packet in a system logfile. As with routing policy, the JUNOS software evaluates a firewall filter term ...
( Category: Operating Systems June 17,2017 )
epub, pdf |eng | 2011-12-11 | Author:Emery Premeaux

//================================================= extern unsigned char second; // 0 extern unsigned char minute; // 1 extern unsigned char hour; // 2 extern unsigned char weekday; // 3 extern unsigned char day; // ...
( Category: Engineering June 17,2017 )
epub |eng | 2011-11-03 | Author:Josh Noble, Robert Piddocke & Dan Bakmand-Mikalski

Maintenance One of the biggest challenges with search keywords is the amount of manual maintenance required. Administrators tend to put a low priority on maintaining a meaningful and useful corpus ...
( Category: Networking & Cloud Computing June 17,2017 )