Computer Science
epub |eng | | Author:Jonathan Reid & Thomas Valentine
Data Caching As you do more asynchronous programming with XMLHttpRequest, it’s not uncommon to find yourself wanting to cache data locally for speed and efficiency. This is particularly true with ...
( Category:
Computer Science
March 26,2014 )
epub |eng | | Author:Mark C. Chu-Carroll
That’s really the heart of set theory: set membership and the linkage with predicate logic. It’s almost unbelievably simple, which is why it’s considered so darned attractive by mathematicians. It’s ...
( Category:
Computer Science
March 26,2014 )
epub |eng | 2012-05-02 | Author:Herbert Schildt [Schildt, Herbert]
C h a p t e r 1 7 : j a v a . u t i ll P a r t 1 : T h e C o ...
( Category:
Java Programming Reference
March 26,2014 )
epub, pdf |eng | 2011-12-20 | Author:Jeff Scott Brown & Graeme Rocher
You have purchased (${session.user.purchasedSongs?.size() ?: 0}) songs. <br> </div> </div> The last bit of work is modify the main Sitemesh layout to take advantage of the newly created welcomeMessage template, ...
( Category:
Computer Science
March 26,2014 )
epub |eng | 2009-02-08 | Author:Dan Pilone & Neil Pitman [Dan Pilone]
effect Specifies an activity that is executed when a transition happens. This activity can be written using operations, attributes, and links of the owning classifier as well as any parameters ...
( Category:
Object-Oriented Design
March 26,2014 )
epub |eng | 2010-12-06 | Author:Daniel P. Friedman;William E. Byrd;Oleg Kiselyov [Kiselyov, Daniel P. Friedman;William E. Byrd;Oleg]
The First Commandment To transform a function whose value is a Boolean into a function whose value is a goal, replace cond with conde and unnest each question and answer. ...
( Category:
Computer Science
March 26,2014 )
epub |eng | | Author:Brandon McInnis & Ryo Shimizu & Hidekazu Furukawa & Ryohei Fushimi & Ryo Tanaka & Kevin Kratzer
Using Collision Detection for Movement Now the map in our game exists, but we need a way to move our character around in accordance with the data. Maps in enchant.js ...
( Category:
Computer Science
March 26,2014 )
epub, pdf |eng | 2011-05-22 | Author:Dan Clark
Summary In this chapter, you examined the various types of collections exposed by the .NET Framework. You learned how to work with arrays, array lists, queues, stacks, and generic collections. ...
( Category:
Object-Oriented Design
March 26,2014 )
epub |eng | 2012-11-21 | Author:Rex van der Spuy [Spuy, Rex van der]
Clicking on the monsters How does the program know which monster we’re clicking on? The monster object itself has no way of detecting mouse clicks. But HTML tags, like <div> ...
( Category:
Computer Science
March 26,2014 )
epub, pdf |eng | 2009-02-08 | Author:Ed Burnette [Ed Burnette]
Execute (Ctrl+U or Run → Execute) Evaluate the expression but don't show its value. Watch (Run → Watch) Copy an expression into the Expressions view. Its value is recalculated every ...
( Category:
Object-Oriented Design
March 26,2014 )
epub, pdf |eng | 2012-10-31 | Author:Doug Lowe [Lowe, Doug]
Figure 4-5: Configuring a Windows client to obtain its DNS address from DHCP. Chapter 5: Using FTP In This Chapter Figuring out the basics of FTP Setting up an FTP ...
( Category:
Networks
March 26,2014 )
epub |eng | 2012-03-25 | Author:Dinkar Sitaram & Geetha Manjunath
• partition(key2) : Determine a data partition and return the reducer number The partition function is given the key with the number of reducers and returns the index of the ...
( Category:
Cloud Computing
March 26,2014 )
epub |eng | 2012-10-23 | Author:Joe Fichera & Steven Bolt
Snort One suggestion I have is to use another open source tool, Snort. Snort is a network intrusion prevention and detection system (IPS/IDS) that was developed by Sourcefire. Snort[5] can ...
( Category:
Network Security
March 26,2014 )
epub |eng | 2012-11-06 | Author:Matthew Neely & Alex Hamerstone & Chris Sanyk
Case Study: Onsite Profiling Internal penetration test at a large insurance company located in a downtown of a large city. The following story is, well, mostly true. Because we are ...
( Category:
Computer Science
March 26,2014 )
epub, pdf |eng | 2012-03-05 | Author:Theresa Neil [Theresa Neil]
This pattern may also work for screens with one primary and one ancillary call to action, like Bill Minder. But in these circumstances, visually differentiate the primary call to action ...
( Category:
Computer Design
March 26,2014 )
Categories
AI & Machine Learning | Bioinformatics |
Computer Simulation | Cybernetics |
Human-Computer Interaction | Information Theory |
Robotics | Systems Analysis & Design |
Popular ebooks
Deep Learning with Python by François Chollet(12571)Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8300)
Test-Driven Development with Java by Alan Mellor(6721)
Data Augmentation with Python by Duc Haba(6636)
Principles of Data Fabric by Sonia Mezzetta(6387)
Learn Blender Simulations the Right Way by Stephen Pearson(6284)
Microservices with Spring Boot 3 and Spring Cloud by Magnus Larsson(6156)
Hadoop in Practice by Alex Holmes(5958)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(5806)
RPA Solution Architect's Handbook by Sachin Sahgal(5553)
Big Data Analysis with Python by Ivan Marin(5363)
The Infinite Retina by Robert Scoble Irena Cronin(5246)
Life 3.0: Being Human in the Age of Artificial Intelligence by Tegmark Max(5147)
Pretrain Vision and Large Language Models in Python by Emily Webber(4327)
Infrastructure as Code for Beginners by Russ McKendrick(4086)
Functional Programming in JavaScript by Mantyla Dan(4038)
The Age of Surveillance Capitalism by Shoshana Zuboff(3950)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3801)
Embracing Microservices Design by Ovais Mehboob Ahmed Khan Nabil Siddiqui and Timothy Oleson(3606)
Applied Machine Learning for Healthcare and Life Sciences Using AWS by Ujjwal Ratan(3577)
