Programming
epub |eng | 2012-07-12 | Author:Daniel Vaughan
( Category:
Mobile Phones, Tablets & E-Readers
July 13,2018 )
epub, mobi |eng | 2016-07-11 | Author:Jeremy Kubica
“We started off searching for an island with coffee. I was still green in those days and hadn’t heard of iterative deepening, so I boldly suggested a depth-first search. The ...
( Category:
Programming
July 12,2018 )
epub, mobi |eng | 2018-05-14 | Author:Alan D. Moore
Styling our form labels The first thing we can tackle with our knowledge of styling is our form widgets. Our colorization of the form is rather ugly and incomplete due ...
( Category:
Networking & Cloud Computing
July 11,2018 )
epub |eng | 2018-03-22 | Author:Simon Harrer & Jörg Lenhard & Linus Dietz [Harrer, Simon]
Avoid Breaking the Cause Chain class TransmissionParser { static Transmission parse(String rawMessage) { if (rawMessage != null && rawMessage.length() != Transmission.MESSAGE_LENGTH) { throw new IllegalArgumentException( String.format("Expected %d, but got %d ...
( Category:
Programming Languages
July 11,2018 )
epub |eng | 2018-06-03 | Author:Haishi Bai & Dan Stolts & Santiago Fernandez Munoz [Bai, Haishi]
IP Addresses You’ve learned how to perform basic virtual network management tasks, so let’s dig deeper into how the Azure Virtual Network works, beginning with IP addresses. You can assign ...
( Category:
Programming
July 11,2018 )
Microsoft Azure Security Center (IT Best Practices - Microsoft Press) by Yuri Diogenes & Tom Shinder
epub |eng | 2018-06-03 | Author:Yuri Diogenes & Tom Shinder [Diogenes, Yuri]
FIGURE 5-5 Details of a security alert. Security incidents Some attacks may happen in a completely isolated way. Others will be coordinated—that is, part of the same attack campaign. Security ...
( Category:
Networking & Cloud Computing
July 11,2018 )
epub |eng | 2018-05-31 | Author:Jennifer Robbins
Figure 14-9. Border styles applied to individual sides of an element. Border Width (Thickness) Use one of the border-width properties to specify the thickness of the border. Once again, you ...
( Category:
Web Development & Design
July 10,2018 )
mobi, epub |eng | 2014-06-24 | Author:Rick Viscomi, Andy Davies, and Marcel Duran
Figure 7-3. Under the Advanced Settings section, the Auth tab can be used to input a username and password. This data will be sent to the test page in the ...
( Category:
Web Development & Design
July 9,2018 )
epub |eng | 2017-12-04 | Author:Joseph D'Antoni & Scott Klein [D'Antoni, Joseph]
Managing TDE using T-SQL Transparent Data Encryption can be managed with T-SQL at the database level through a small handful of T-SQL statements and DMVs (dynamic management views). TDE can ...
( Category:
Certification
July 9,2018 )
epub, azw3, pdf |eng | 2015-10-19 | Author:Patrick Felicia [Felicia, Patrick]
Figure 3-34: Searching in the hierarchy (cubes) In a similar way, if we type the word green for example, it will list all the objects which names include the word ...
( Category:
Programming
July 8,2018 )
epub, pdf |eng | | Author:Joachim Haagen Skeie
I’ve mentioned that Ember Data employs a lazy loading structure for your data. For the Montric application, the data for a chart won’t be loaded before the application requests access ...
( Category:
Programming Languages
July 8,2018 )
epub |eng | | Author:Lance Halvorsen
Naming GenServer Processes This whole chapter we’ve been starting new GenServer processes and binding their PIDs to variables. Whenever we’ve needed to call a public function on a process, we’ve ...
( Category:
Programming
July 8,2018 )
mobi, epub, pdf |eng | 2015-08-16 | Author:Emma Jane Hogbin Westby
The Project Throughout this chapter, you will see reference made to “The Project.” I use this shorthand to refer to the canonical, or official, repository for a software project. This ...
( Category:
Programming
July 5,2018 )
mobi |eng | 2010-10-04 | Author:
( Category:
Bibles
July 3,2018 )
epub |eng | | Author:Dennis Matotek, James Turnbull & Peter Lieverdink
( Category:
Programming
July 2,2018 )
Categories
Popular ebooks
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16762)Deep Learning with Python by François Chollet(12571)
Hello! Python by Anthony Briggs(9916)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9796)
The Mikado Method by Ola Ellnestam Daniel Brolund(9779)
Dependency Injection in .NET by Mark Seemann(9340)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8298)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7763)
Grails in Action by Glen Smith Peter Ledbrook(7696)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(7557)
Becoming a Dynamics 365 Finance and Supply Chain Solution Architect by Brent Dawson(7078)
Microservices with Go by Alexander Shuiskov(6846)
Practical Design Patterns for Java Developers by Miroslav Wengner(6767)
Test Automation Engineering Handbook by Manikandan Sambamurthy(6705)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6414)
Angular Projects - Third Edition by Aristeidis Bampakos(6110)
The Art of Crafting User Stories by The Art of Crafting User Stories(5641)
NetSuite for Consultants - Second Edition by Peter Ries(5573)
Demystifying Cryptography with OpenSSL 3.0 by Alexei Khlebnikov(5378)
Kotlin in Action by Dmitry Jemerov(5064)
