Software Design, Testing & Engineering
mobi |eng | 2014-03-13 | Author:Peter Kim

privilege::debug sekurlsa::logonPasswords full Figure 66 - Mimikatz Again, it doesn’t matter how long their password is and you don’t have to even worry about the hashes. You can now take ...
( Category: Testing March 3,2015 )
mobi, epub |eng | 2012-12-19 | Author:Jason R. Briggs

We can add another irregular polygon (a shape with uneven angles or sides) using this code: canvas.create_polygon(200, 10, 240, 30, 120, 100, 140, 120, fill="", outline="black") This code begins with ...
( Category: Python March 3,2015 )
epub |eng | | Author:Jeff Langr

​ purchases_.push_back(PurchaseRecord(shareChange, transactionDate)); ​ } One more little expressiveness thing is that the name of our exception type InvalidSellException is not very good. Let’s change it to InsufficientSharesException. c6/14/PortfolioTest.cpp ​ ...
( Category: Testing March 3,2015 )
epub |eng | 2013-10-14 | Author:Nahavandipoor, Vandad [Nahavandipoor, Vandad]

Chapter 12. Audio and Video 12.0. Introduction The AV Foundation (Audio and Video Foundation) framework in the iOS SDK allows developers to play and/or record audio and video with ease. ...
( Category: Software Development March 3,2015 )
mobi |eng | 2008-10-13 | Author:McDowell, Gayle Laakmann [McDowell, Gayle Laakmann]

SOLUTION * * * Observation: Regardless of how we drop Egg1, Egg2 must do a linear search. i.e., if Egg1 breaks between floor 10 and 15, we have to check ...
( Category: Software Development March 3,2015 )
epub, mobi |eng | 2014-10-08 | Author:Thomas, Dave [Thomas, Dave]

Erlang/OTP 17 [erts-6.0] [source] [64-bit] [smp:4:4] [async-threads:10] [hipe] [kernel-poll:false] [dtrace] ==> idna (compile) Compiled src/idna_ucs.erl Compiled src/idna.erl : : Compiled lib/issues/cli.ex Generated issues.app iex(1)> Let’s try it out: iex> Issues.GithubIssues.fetch("elixir-lang", ...
( Category: Software Development March 3,2015 )
epub, pdf |eng | 2011-10-30 | Author:Nick Kuh

birthday = [NSEntityDescription insertNewObjectForEntityForName:@"BRDBirthday" inManagedObjectContext:context]; name = dictionary[@"name"]; pic = dictionary[@"pic"]; birthdate = dictionary[@"birthdate"]; pathForPic = [[NSBundle mainBundle] pathForResource:pic ofType:nil]; imageData = [NSData dataWithContentsOfFile:pathForPic]; birthday.name = name; birthday.imageData = imageData; ...
( Category: Electronics March 3,2015 )
mobi |eng | 2012-03-20 | Author:Whittaker, James A. & Arbon, Jason & Carollo, Jeff [Whittaker, James A.]

There is also a lot of internal recruiting going on. Engineers are encouraged to change projects so there is always movement from team to team. Internal recruiting is focused on ...
( Category: Software Development March 3,2015 )
epub |eng | 1995-03-02 | Author:Erich Gamma & Richard Helm & Ralph Johnson & John Vlissides

Sample Code The following code shows how to implement user interface decorators in C++. We’ll assume there’s a Component class called VisualComponent. We define a subclass of VisualComponent called Decorator, ...
( Category: Software Reuse March 3,2015 )
epub, pdf |eng | 2013-12-09 | Author:Matt Neuburg

A UISearchDisplayController’s searchContentsController needn’t be a UITableViewController, and the data that the user is searching needn’t be the content of an existing table view. But they frequently are! That’s because ...
( Category: Object-Oriented Design March 3,2015 )
epub |eng | | Author:Michael Fogus, Chris Houser

In section 1.5.6, we mentioned quoting and its effects on evaluation, and in this chapter we’ll expand on that theme fully as it relates to Clojure’s macro facility. But the ...
( Category: Software Development February 15,2015 )
epub, pdf |eng | 2011-04-18 | Author:Kristina Chodorow [Kristina Chodorow]

Figure 3-2. A B-tree, possibly for an index on a field with integer values. When your query includes x as part of the criteria, MongoDB will notice that it has ...
( Category: Object-Oriented Design February 15,2015 )
epub |eng | 2012-04-08 | Author:Burris, Eddie [Burris, Eddie]

Figure 45 Inheritance doesn’t work well when different combinations of features are valid The examples above highlight some of the weaknesses associated with common approaches to extending the behavior of ...
( Category: Software Development February 13,2015 )
azw3 |eng | 2012-05-24 | Author:Josuttis, Nicolai M. [Josuttis, Nicolai M.]

#include "algostuff.hpp" using namespace std; int main() { set<int> coll; INSERT_ELEMENTS(coll,1,9); PRINT_ELEMENTS(coll); // print elements rotated one element to the left set<int>::const_iterator pos = next(coll.cbegin()); rotate_copy(coll.cbegin(), // beginning of source ...
( Category: Object-Oriented Design February 13,2015 )
azw3 |eng | 2013-09-02 | Author:Pahlavan, Kaveh & Krishnamurthy, Prashant [Pahlavan, Kaveh]

Secret-key algorithms such as AES are based on two principles: confusion and diffusion. The former introduces a layer of scrambling that creates confusion as to what exactly might be the ...
( Category: Mobile & Wireless February 13,2015 )