Computer Science
mobi | | | Author:Christopher Hadnagy
( Category:
Hacking
January 6,2015 )
mobi |eng | 2011-07-01 | Author:Kevin Mitnick
I did a directory listing to find out what files were on the computer, looking for the LocK-11 program and associated files and stumbled on something I found shocking: a ...
( Category:
Human-Computer Interaction
January 6,2015 )
mobi | | | Author:Nitesh Dhanjani
( Category:
Software Development
January 6,2015 )
azw3, epub, pdf |eng | 2014-09-26 | Author:Kirk, Matthew [Kirk, Matthew]
quick 1 brown 2 fox 3 Now that we know what indices are attached to which words, we can take our string “the fox” and make a new row vector, ...
( Category:
Machine Theory
January 5,2015 )
mobi, pdf |eng | 2004-12-15 | Author:Paul Graham
where w is the token whose probability we're calculating, good and bad are the hash tables I created in the first step, and G and B are the number of ...
( Category:
Hacking
December 31,2014 )
mobi, epub |eng | 2014-09-29 | Author:Carr, Nicholas [Carr, Nicholas]
ARCHITECTS HAVE always thought of themselves as artists, and before the coming of CAD the wellspring of their art was the drawing. A freehand sketch is similar to a computer ...
( Category:
Robotics & Automation
November 23,2014 )
epub |eng | 2010-10-18 | Author:Smiley, Jane [Smiley, Jane]
Chapter Eight By the time Atanasoff was home from Bikini Atoll and finished with his aborted computer project for the navy, John Mauchly and Pres Eckert were deep into their ...
( Category:
Scientists
November 20,2014 )
epub |eng | 2001-12-19 | Author:Carter, Nick [Carter, Nick]
Solution The pipeline latency of this processor is five cycles. Assuming that the LD issues on cycle n, the ADD cannot issue until cycle n + 2 because it is ...
( Category:
Design & Architecture
November 12,2014 )
mobi |eng | 2008-02-11 | Author:Anderson, Julie & Franceschi, Herve J. [Anderson, Julie]
EXAMPLE 9.5 Processing a Column in a Two-Dimensional Array At line 17, we declare and initialize a single-dimensional String array named familyMembers to make our prompt more user-friendly. At lines ...
( Category:
Object-Oriented Design
November 11,2014 )
epub |deu | 2012-02-13 | Author:Baluja, Shumeet [Baluja, Shumeet]
Schritt 3: Die Leute finden, die auf Liste 1 und Liste 2 auftauchen, und die Listen zusammenfügen. Das sind die Leute, die etwas über die Bücher geschrieben UND mindestens zwei ...
( Category:
Technothrillers
November 4,2014 )
epub |deu | 0101-01-01 | Author:Gibson, William [Gibson, William]
ZLOOLDP JLEVRQ 1HZ 5RVH +RWHO Sieben Nächte in einem gemieteten Sarg, Sandii. New Rose Hotel. Wie ich dich jetzt will! Manchmal peil ich dich an. Spiel's wieder ab - so ...
( Category:
Arts & Literature
November 3,2014 )
epub, mobi |eng | 2012-04-10 | Author:Robert Bloch [Robert Bloch]
Daybroke UP IN THE sky the warheads whirled, and the thunder of their passing shook the mountain. Deep in his vaulted sanctuary he sat, godlike and inscrutable, marking neither the ...
( Category:
Short Stories
October 31,2014 )
epub |eng | 2013-09-10 | Author:Derrick Rountree & Ileana Castrillo
Attaching an EBS Volume Since the HTML pages to be served from the Web portal need to be persistent, it is required to create an EBS volume for holding the ...
( Category:
Network Security
October 27,2014 )
epub |eng | | Author:Rami Rosen
LINUX_MIB_XFRMFWDHDRERROR XfrmFwdHdrError __xfrm_route_forward() LINUX_MIB_XFRMOUTSTATEINVALID XfrmOutStateInvalid xfrm_output_one() Note The IPsec git tree: git://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec.git. The ipsec git tree is for fixes for the IPsec networking subsystem; the development in this tree is ...
( Category:
Computer Science
October 27,2014 )
epub, mobi |eng | 2014-10-26 | Author:Cameron Banga & Josh Weinhold
Although it’s important to be clear and concise when describing what you want, leaving nothing up to programmer interpretation is important as well. Being as detailed as possible removes the ...
( Category:
User Experience & Usability
October 27,2014 )
Categories
AI & Machine Learning | Bioinformatics |
Computer Simulation | Cybernetics |
Human-Computer Interaction | Information Theory |
Robotics | Systems Analysis & Design |
Popular ebooks
Deep Learning with Python by François Chollet(12571)Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8300)
Test-Driven Development with Java by Alan Mellor(6724)
Data Augmentation with Python by Duc Haba(6639)
Principles of Data Fabric by Sonia Mezzetta(6390)
Learn Blender Simulations the Right Way by Stephen Pearson(6290)
Microservices with Spring Boot 3 and Spring Cloud by Magnus Larsson(6161)
Hadoop in Practice by Alex Holmes(5958)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(5807)
RPA Solution Architect's Handbook by Sachin Sahgal(5559)
Big Data Analysis with Python by Ivan Marin(5365)
The Infinite Retina by Robert Scoble Irena Cronin(5249)
Life 3.0: Being Human in the Age of Artificial Intelligence by Tegmark Max(5147)
Pretrain Vision and Large Language Models in Python by Emily Webber(4328)
Infrastructure as Code for Beginners by Russ McKendrick(4089)
Functional Programming in JavaScript by Mantyla Dan(4038)
The Age of Surveillance Capitalism by Shoshana Zuboff(3950)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3804)
Embracing Microservices Design by Ovais Mehboob Ahmed Khan Nabil Siddiqui and Timothy Oleson(3608)
Applied Machine Learning for Healthcare and Life Sciences Using AWS by Ujjwal Ratan(3579)
