Computer Science
epub, pdf |eng | 2012-08-27 | Author:Mike Shema

Protecting Information Compromising the information in a database is not the only goal of an attacker, but it surely exists as a major one. Many methods are available to protect ...
( Category: Hacking March 26,2014 )
epub, pdf |eng | 2012-11-22 | Author:Derrick Rountree

3.2.1. Using OpenID The OpenID process starts with user registration. The user must choose an OpenID provider with whom to register. There are several OpenID providers available including Facebook, Google, ...
( Category: Network Security March 26,2014 )
epub, mobi, pdf |eng | 2012-11-19 | Author:Matthew Metheny

Table 6.5 Key Process Activities—Step 3 Table 6.6 Key Process Activities—Step 4 Both NIST and the ISO/IEC processes address the ongoing communications and sharing of risk-related information with decision makers ...
( Category: Cloud Computing March 26,2014 )
epub |eng | 2013-03-26 | Author:Fortnow, Lance [Fortnow, Lance]

The Gödel Letter In 1956 Kurt Gödel wrote a letter to John von Neumann, one of the pioneers of computer science and many other fields. In this letter (written in ...
( Category: Linear Programming March 26,2014 )
epub |eng | 2012-11-08 | Author:Steve Winterfeld

Physical Warfare Cyber warfare can have great impact on the way physical war is waged. Given that even strictly physical warfare, in the sense of boots on the ground, depends ...
( Category: Network Security March 26,2014 )
epub, mobi |eng | 2012-11-19 | Author:Stephen D. Gantz & Daniel R. Philpott

Relevant Source Material Several NIST Special Publications and Federal Information Processing Standards provide guidance, recommendations, and instructions relevant to the development of system security plans and their use in support ...
( Category: Network Security March 26,2014 )
epub |eng | 2012-12-09 | Author:Brett Shavers

Figure 1.8 Spreadsheet timeline example with USB device data. Because a spreadsheet timeline can contain millions of rows of data, analysts may simply underutilize this method of analysis fearing being ...
( Category: Computer Science March 26,2014 )
epub |eng | 2012-06-11 | Author:Wallace Wang [Wallace Wang]

To jump to a particular chapter, you'll need to view the table of contents and then tap the chapter you want to read. (These steps work a little differently when ...
( Category: Computer Science March 26,2014 )
epub, pdf |eng | 2012-12-17 | Author:Jayant Varma [Varma, Jayant]

The Internet Browser In the earlier days, when the only way to make apps for iOS was using Objective-C, many people tried to place apps in HTML wrappers (UIWebView). They ...
( Category: Computer Science March 26,2014 )
epub, pdf |eng | | Author:Lucas Jordan

Adding Particle Systems to Your Game Particle systems in games are collections of many, usually small, images drawn together to create an overall affect. Particle systems are used in many ...
( Category: Computer Science March 26,2014 )
epub |eng | 2012-12-25 | Author:David Mark & James Bucanek

Configuring the PATH Variable The final command is a bit tricky. You need to reconfigure the shell so it also looks in your new, private, ~/bin folder in addition to ...
( Category: Computer Science March 26,2014 )
epub |eng | | Author:Hans-Eric Grönlund & Colin Francis & Shawn Grimes

#import <UIKit/UIKit.h> NSString * const TweetCellId = @"TweetCell"; @interface TweetCell : UITableViewCell @property (strong, nonatomic)NSDictionary *tweetData; @end This cell type uses the standard look with a subtitle and a disclosure ...
( Category: Computer Science March 26,2014 )
epub |eng | 2012-02-24 | Author:Shawn Grimes & Colin Francis [Grimes, Shawn & Francis, Colin]

CFRelease(dictionary); CFRelease(cityKey); CFRelease(stateKey); } else { self.cityLabel.text = @"..."; self.stateLabel.text = @"..."; } Finally, you can dismiss your modal view controller, as well as add your return value for this ...
( Category: Computer Science March 26,2014 )
epub |eng | 2011-12-08 | Author:Dave Mark, Jack Nutting, Jeff LaMarche

Figure 11–3. The default Master-Detail Application template in landscape mode. Note the similarity between this figure and Figure 11–1. Figure 11–4. The default Master-Detail Application template in portrait mode with ...
( Category: Computer Science March 26,2014 )
epub, pdf |eng | 2013-06-24 | Author:Adam Dawes [Dawes, Adam]

There is another mode that can be set for the depth buffer: read-only mode. In this mode, MonoGame will observe the values in the depth buffer when rendering objects and ...
( Category: Computer Science March 26,2014 )