Computer Science
mobi | | | Author:Christopher Hadnagy

( Category: Hacking January 6,2015 )
mobi |eng | 2011-07-01 | Author:Kevin Mitnick

I did a directory listing to find out what files were on the computer, looking for the LocK-11 program and associated files and stumbled on something I found shocking: a ...
( Category: Human-Computer Interaction January 6,2015 )
mobi | | | Author:Nitesh Dhanjani

( Category: Software Development January 6,2015 )
azw3, epub, pdf |eng | 2014-09-26 | Author:Kirk, Matthew [Kirk, Matthew]

quick 1 brown 2 fox 3 Now that we know what indices are attached to which words, we can take our string “the fox” and make a new row vector, ...
( Category: Machine Theory January 5,2015 )
mobi, pdf |eng | 2004-12-15 | Author:Paul Graham

where w is the token whose probability we're calculating, good and bad are the hash tables I created in the first step, and G and B are the number of ...
( Category: Hacking December 31,2014 )
mobi, epub |eng | 2014-09-29 | Author:Carr, Nicholas [Carr, Nicholas]

ARCHITECTS HAVE always thought of themselves as artists, and before the coming of CAD the wellspring of their art was the drawing. A freehand sketch is similar to a computer ...
( Category: Robotics & Automation November 23,2014 )
epub |eng | 2010-10-18 | Author:Smiley, Jane [Smiley, Jane]

Chapter Eight By the time Atanasoff was home from Bikini Atoll and finished with his aborted computer project for the navy, John Mauchly and Pres Eckert were deep into their ...
( Category: Scientists November 20,2014 )
epub |eng | 2001-12-19 | Author:Carter, Nick [Carter, Nick]

Solution The pipeline latency of this processor is five cycles. Assuming that the LD issues on cycle n, the ADD cannot issue until cycle n + 2 because it is ...
( Category: Design & Architecture November 12,2014 )
mobi |eng | 2008-02-11 | Author:Anderson, Julie & Franceschi, Herve J. [Anderson, Julie]

EXAMPLE 9.5 Processing a Column in a Two-Dimensional Array At line 17, we declare and initialize a single-dimensional String array named familyMembers to make our prompt more user-friendly. At lines ...
( Category: Object-Oriented Design November 11,2014 )
epub |deu | 2012-02-13 | Author:Baluja, Shumeet [Baluja, Shumeet]

Schritt 3: Die Leute finden, die auf Liste 1 und Liste 2 auftauchen, und die Listen zusammenfügen. Das sind die Leute, die etwas über die Bücher geschrieben UND mindestens zwei ...
( Category: Technothrillers November 4,2014 )
epub |deu | 0101-01-01 | Author:Gibson, William [Gibson, William]

ZLOOLDP JLEVRQ 1HZ 5RVH +RWHO Sieben Nächte in einem gemieteten Sarg, Sandii. New Rose Hotel. Wie ich dich jetzt will! Manchmal peil ich dich an. Spiel's wieder ab - so ...
( Category: Arts & Literature November 3,2014 )
epub, mobi |eng | 2012-04-10 | Author:Robert Bloch [Robert Bloch]

Daybroke UP IN THE sky the warheads whirled, and the thunder of their passing shook the mountain. Deep in his vaulted sanctuary he sat, godlike and inscrutable, marking neither the ...
( Category: Short Stories October 31,2014 )
epub |eng | 2013-09-10 | Author:Derrick Rountree & Ileana Castrillo

Attaching an EBS Volume Since the HTML pages to be served from the Web portal need to be persistent, it is required to create an EBS volume for holding the ...
( Category: Network Security October 27,2014 )
epub |eng | | Author:Rami Rosen

LINUX_MIB_XFRMFWDHDRERROR XfrmFwdHdrError __xfrm_route_forward() LINUX_MIB_XFRMOUTSTATEINVALID XfrmOutStateInvalid xfrm_output_one() Note The IPsec git tree: git://git.kernel.org/pub/scm/linux/kernel/git/klassert/ipsec.git. The ipsec git tree is for fixes for the IPsec networking subsystem; the development in this tree is ...
( Category: Computer Science October 27,2014 )
epub, mobi |eng | 2014-10-26 | Author:Cameron Banga & Josh Weinhold

Although it’s important to be clear and concise when describing what you want, leaving nothing up to programmer interpretation is important as well. Being as detailed as possible removes the ...
( Category: User Experience & Usability October 27,2014 )