Networking & Cloud Computing
epub, mobi, pdf |eng | 2016-12-01 | Author:Jean-Philippe Aumasson

How SipHash Works SipHash uses a trick that makes it more secure than basic sponge functions: instead of XORing message blocks only once before the permutation, SipHash XORs them before ...
( Category: Security & Encryption December 1,2017 )
epub |eng | 2015-09-29 | Author:Minichino, Joe & Howse, Joseph

The most important parameter here is the third one, which defines the aperture of the Sobel operator. The Sobel operator performs the change detection in the rows and columns of ...
( Category: Networking & Cloud Computing November 30,2017 )
azw3 |eng | 2015-09-29 | Author:Minichino, Joe & Howse, Joseph [Minichino, Joe]

The most important parameter here is the third one, which defines the aperture of the Sobel operator. The Sobel operator performs the change detection in the rows and columns of ...
( Category: Networking & Cloud Computing November 30,2017 )
azw3 |eng | 2016-09-27 | Author:Vaduva, Alexandru & Gonzalez, Alex & Simmonds, Chris [Vaduva, Alexandru]

Then we need to explicitly accept the Oracle Java license by adding the following to our conf/local.conf file: LICENSE_FLAGS_WHITELIST += "oracle_java" We want to build the newest update available, so ...
( Category: Operating Systems November 30,2017 )
azw3 |eng | 2017-07-13 | Author:Stoneman, Elton [Stoneman, Elton]

Managing application images Docker Compose can manage Docker images as well as containers. In the Compose file, you can include attributes that tell Docker Compose how to build your images. ...
( Category: Operating Systems November 30,2017 )
epub, mobi |eng | 2016-02-28 | Author:Rafal Kuc & Marek Rogozinski [Kuc, Rafal]

Field value factor function The field_value_factor function allows us to influence the score of the document by using a value of the field in that document. For example, to multiply ...
( Category: Programming November 29,2017 )
epub |eng | 2015-05-30 | Author:Martin Wood [Wood, Martin]

Tip In this chapter, we focus on how the data is retrieved. Chapter 7, Securing Applications and Data, looks at authentication in more detail. The structure of the data in ...
( Category: Software November 29,2017 )
epub |eng | 2012-06-05 | Author:Joe Waters [Waters, Joe]

Figure 5-3: This QR Code shows and tells. Think about placement. Large QR Codes on billboards get people thinking, “Where will it take me if I scan it?” But if ...
( Category: Networking & Cloud Computing November 29,2017 )
azw3 |eng | 2013-08-01 | Author:Nate Anderson

The anonymity. Unlike early spammers, the Mega-D owner covered his tracks better, at least in public. He sent messages composed by others, which pointed to websites that were managed by ...
( Category: Security & Encryption November 29,2017 )
epub |eng | 2013-03-05 | Author:Evgeny Morozov [Morozov, Evgeny]

Against Technological Defeatism Viewed in the abstract, it may seem that the tides of digital preemption, situational crime prevention, and reputation-based controls are unstoppable and irreversible. Information is everywhere, and ...
( Category: Politics & Government November 29,2017 )
epub |eng | 2015-03-13 | Author:Brandon Atkinson [Atkinson, Brandon]

Click Add to place the web part on the page. The web part will display search results immediately. The default search for the Content Search Web Part is called Recently ...
( Category: Software November 29,2017 )
epub |eng | 2015-05-29 | Author:Colin Holgate & Joel Gerdeen [Holgate, Colin & Gerdeen, Joel]

Lastly, if all of these checks fail, we will return an empty string, so that this strange structured link URL doesn't go on to confuse us later: return "" end ...
( Category: Programming November 29,2017 )
epub |eng | 2011-10-15 | Author:Evgeny Morozov [Morozov, Evgeny]

No Such Thing as Virtual Politics The danger that “slacktivism” poses in the context of authoritarian states is that it may give young people living there the wrong impression that ...
( Category: Politics & Government November 29,2017 )
epub, pdf |eng | 2010-12-06 | Author:Dustyn Roberts [Roberts, Dustyn]

4. Connect pin 1 to ground. 5. Connect pin 2 and pin 6 of the 555 timer with a short jumper. 6. Also connect pin 2 to one of the ...
( Category: Crafts & Hobbies November 29,2017 )
mobi |eng | 2015-06-02 | Author:Jamie Bartlett

* * * fn1 This ad hoc dealing continues today, often on forums related to prescription drugs. fn2 Charges that Ulbricht, at the time of writing, denies. fn3 In 2014 ...
( Category: Internet & Social Media November 29,2017 )