Programming
epub |eng | 1995-03-02 | Author:Erich Gamma & Richard Helm & Ralph Johnson & John Vlissides

Sample Code The following code shows how to implement user interface decorators in C++. We’ll assume there’s a Component class called VisualComponent. We define a subclass of VisualComponent called Decorator, ...
( Category: Software Reuse March 3,2015 )
epub, pdf |eng | 2012-09-25 | Author:Eric Sammer [Eric Sammer]

Example: 0700 See Example 6-5 for a sample hdfs-site.xml file configured for security. Example 6-5. Updating hdfs-site.xml to enable Hadoop security <?xml version="1.0"?> <configuration> <property> <name>dfs.block.access.token.enable</name> <value>true</value> </property> <!-- NameNode ...
( Category: Java March 3,2015 )
epub, pdf |eng | 2013-12-09 | Author:Matt Neuburg

A UISearchDisplayController’s searchContentsController needn’t be a UITableViewController, and the data that the user is searching needn’t be the content of an existing table view. But they frequently are! That’s because ...
( Category: Object-Oriented Design March 3,2015 )
epub | | | Author:Bill Pretty

( Category: Electronics February 15,2015 )
epub |eng | 2011-04-26 | Author:Antony Kennedy, Inayaili de León

Fonts and Units Modern browsers have built-in page zooming, which enlarges the entire page, including fonts, images, layout elements, and so on. But this is not the silver bullet that ...
( Category: CSS February 15,2015 )
epub |eng | | Author:Michael Fogus, Chris Houser

In section 1.5.6, we mentioned quoting and its effects on evaluation, and in this chapter we’ll expand on that theme fully as it relates to Clojure’s macro facility. But the ...
( Category: Software Development February 15,2015 )
epub, pdf |eng | 2011-04-24 | Author:Vandad Nahavandipoor [Vandad Nahavandipoor]

--Game Center Documentation See Also Authenticating the Local Player in Game Center Creating Leaderboards in iTunes Connect Problem You don’t know how to start incorporating leaderboards into your iOS games. ...
( Category: Game Programming February 15,2015 )
epub, pdf |eng | 2011-04-18 | Author:Kristina Chodorow [Kristina Chodorow]

Figure 3-2. A B-tree, possibly for an index on a field with integer values. When your query includes x as part of the criteria, MongoDB will notice that it has ...
( Category: Object-Oriented Design February 15,2015 )
epub |eng | 2011-03-15 | Author:Jan Smith & Roman Joost

Figure 6-36. A blue and white scarf was added to the person in the middle of the picture on the right using the Clone Tool. Cloning an Item in an ...
( Category: Digital Editing February 13,2015 )
azw3 |eng | 2008-12-16 | Author:Bovet, Daniel P. [Bovet, Daniel P.]

SA_ONSTACK Use an alternative stack for the signal handler (see the later section "Catching the Signal“) SA_RESTART Interrupted system calls are automatically restarted (see the later section "Reexecution of System ...
( Category: Kernel & Peripherals February 13,2015 )
azw3, mobi |eng | 2009-02-08 | Author:Corbet, Jonathan & Rubini, Alessandro & Kroah-Hartman, Greg [Corbet, Jonathan]

Hardware Abstractions We complete the discussion of PCI by taking a quick look at how the system handles the plethora of PCI controllers available on the marketplace. This is just ...
( Category: Device Drivers February 13,2015 )
azw3 |eng | 2009-03-01 | Author:Donahoo, Michael J. & Calvert, Kenneth L. [Donahoo, Michael J.]

The method GetNextMsg() reads data from the given stream and places it in the given buffer until it runs out of room or determines that it has received a complete ...
( Category: TCP-IP February 13,2015 )
epub |eng | 2012-04-08 | Author:Burris, Eddie [Burris, Eddie]

Figure 45 Inheritance doesn’t work well when different combinations of features are valid The examples above highlight some of the weaknesses associated with common approaches to extending the behavior of ...
( Category: Software Development February 13,2015 )
azw3 |eng | 2012-05-24 | Author:Josuttis, Nicolai M. [Josuttis, Nicolai M.]

#include "algostuff.hpp" using namespace std; int main() { set<int> coll; INSERT_ELEMENTS(coll,1,9); PRINT_ELEMENTS(coll); // print elements rotated one element to the left set<int>::const_iterator pos = next(coll.cbegin()); rotate_copy(coll.cbegin(), // beginning of source ...
( Category: Object-Oriented Design February 13,2015 )
azw3 |eng | 2013-09-02 | Author:Pahlavan, Kaveh & Krishnamurthy, Prashant [Pahlavan, Kaveh]

Secret-key algorithms such as AES are based on two principles: confusion and diffusion. The former introduces a layer of scrambling that creates confusion as to what exactly might be the ...
( Category: Mobile & Wireless February 13,2015 )