Computers & Technology
epub |eng | 2017-12-19 | Author:Danyel Fisher
Scatterplot Figure 5-16. Scatterplot. Two continuous variables. Additional continuous, ordinal, or categorical variables can be added for size, color, and shape. This shows the relation between curb weight and MPG ...
( Category:
Databases & Big Data
January 18,2018 )
epub |eng | 2017-10-24 | Author:Justin Pauley
Path 1: Excel This section covers the Excel implementation, If you’re following Path 2, all the techniques should be implemented in Excel, as shown in this section, and will be ...
( Category:
Software
January 18,2018 )
epub |eng | | Author:R. K. Ghosh
13. The eLinux Community Portal. Android kernel features (2015), http://elinux.org/Android_Kernel_Features. Accessed 28 Dec 2016 14. F. Maker, Y.-H. Chan, A survey on android vs. linux. Technical report, University of California, ...
( Category:
Computers & Technology
January 18,2018 )
epub, pdf |eng | 2018-01-03 | Author:Guy Hart-Davis
The Clearing History Will Remove Related Cookies and Other Website Data dialog opens. Click Clear () and then click the last hour, today, today and yesterday, or all history to ...
( Category:
Hardware & DIY
January 18,2018 )
epub |eng | | Author:Deepak Sarda
>>> get_evens = make_function('even') ③ >>> print get_evens(range(10)) [0, 2, 4, 6, 8] 1.We called make_function with odd as the parity parameter value, and it returns to us a function ...
( Category:
Programming Languages
January 18,2018 )
epub |eng | 2016-11-28 | Author:Ferro, Lauren S. [Ferro, Lauren S.]
This is because we do extract ideas, but there are no components to show the extracted idea. But that's okay, because we're about to learn how to do that in ...
( Category:
Computers & Technology
January 18,2018 )
azw3 |eng | 2017-07-24 | Author:Johansen, Gerard [Johansen, Gerard]
Command-line tools There are several command-line tools that can be utilized during the analysis of network packet captures. During more in-depth or lengthy incident response engagements, analysts may gather several ...
( Category:
Security & Encryption
January 18,2018 )
epub |eng | 2017-07-18 | Author:Jason Andress,Ryan Linn & Ryan Linn [Неизв.]
Control Statements We now have some basics down for dealing with PHP pages. So, let’s work through some conditionals and loops so that we can create more interesting code. We ...
( Category:
Programming
January 18,2018 )
azw3, pdf, epub |eng | 2017-07-24 | Author:Gerard Johansen [Johansen, Gerard]
Command-line tools There are several command-line tools that can be utilized during the analysis of network packet captures. During more in-depth or lengthy incident response engagements, analysts may gather several ...
( Category:
Security & Encryption
January 18,2018 )
azw3 |eng | 2017-10-10 | Author:Selby, Nick & Vescent, Heather [Selby, Nick]
FUN FACT LIVING ON BITCOINS In 2013, reporter Kashmir Hill wondered whether she could live for a week paying for things only in bitcoin. She had trouble finding vendors who ...
( Category:
Computer Science
January 18,2018 )
epub, mobi, azw3 |eng | 2018-01-18 | Author:James Forshaw
Figure 7-5: ECB encryption of a bitmap image Cipher Block Chaining Another common mode of operation is Cipher Block Chaining (CBC), which is more complex than ECB and avoids its ...
( Category:
Internet & Social Media
January 18,2018 )
azw3 |eng | 2016-08-30 | Author:Ràfols, Raimon [Ràfols, Raimon]
( Category:
Computers & Technology
January 17,2018 )
azw3 |eng | 2015-12-18 | Author:Annuzzi, Joseph, Jr. & Lauren Darcey & Shane Conder [Darcey, Lauren]
Table 13.1 Important Alternative Resource Qualifiers Always try to include default resources—that is, those resources saved in directories without any qualifiers. These are the resources that the Android operating system ...
( Category:
Mobile Phones, Tablets & E-Readers
January 17,2018 )
azw3 |eng | 2017-05-10 | Author:Darwin, Ian F. [Darwin, Ian F.]
( Category:
Programming Languages
January 17,2018 )
azw3 |eng | 2017-07-18 | Author:Smyth, Neil [Smyth, Neil]
26.4. Designing the User Interface This example project will use the existing “Hello World” TextView in the activity layout to display the data associated with incoming messages. All that is ...
( Category:
Mobile Phones, Tablets & E-Readers
January 17,2018 )
Categories
Popular ebooks
Deep Learning with Python by François Chollet(28003)The Mikado Method by Ola Ellnestam Daniel Brolund(25294)
Hello! Python by Anthony Briggs(24339)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(23434)
Kotlin in Action by Dmitry Jemerov(22512)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(21976)
Dependency Injection in .NET by Mark Seemann(21849)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(20715)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(19524)
Grails in Action by Glen Smith Peter Ledbrook(18609)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17034)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(15843)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(13697)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11857)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11151)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10627)
Hit Refresh by Satya Nadella(9202)
The Kubernetes Operator Framework Book by Michael Dame(8570)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8415)
Robo-Advisor with Python by Aki Ranin(8361)