Computers & Technology
mobi |eng | 2011-03-17 | Author:Haralambos Marmanis;Dmitry Babenko
Email classification is interesting in many respects. One peculiarity is there’s “someone out there” trying to beat your classifier. In fact, the spammers may use the same techniques that we ...
( Category:
Programming
June 15,2017 )
epub |eng | 2004-03-17 | Author:Paul Wolfe & Charlie Scott & Mike Erwin [Wolfe, Paul & Scott, Charlie & Erwin, Mike]
Figure 10-21: Enable scanning to add functionality to Outlook Express. Approved and Blocked Senders SpamCatcher’s final configuration options consist of standard whitelists and blacklists of e-mail addresses. In each tab, ...
( Category:
Business & Money
June 15,2017 )
epub, pdf |eng | 2011-07-04 | Author:Sascha Steinhoff [Sascha Steinhoff]
Perform the scan. Basic RAW workflow IV - From RAW file to TIFF/JPEG This workflow is the same as for the flatbed scanner. Variation C - Scanning Kodachrome slides (K14) ...
( Category:
Photography & Video
June 15,2017 )
epub |eng | 2011-10-18 | Author:David Pogue [David Pogue]
Then build a list of email and chat addresses, corresponding to the people you feel comfortable letting your kid exchange emails and chats with. Click the button below the list, ...
( Category:
Operating Systems
June 15,2017 )
epub |eng | 2011-09-28 | Author:Jamie Munro [Jamie Munro]
The Edit function is updated to first call the DeleteFile function, then call the UploadFile function. The DeleteConfirmed function is updated to call the DeleteFile function before deleting the book ...
( Category:
Computers & Technology
June 15,2017 )
epub |eng | 2012-06-14 | Author:Khara Plicanic
Make Friends with Manual Mode • Pros: Full control to get the shot the way you want it. • Cons: Not every camera offers manual mode. As mentioned in Chapter ...
( Category:
Photography & Video
June 15,2017 )
mobi, epub, azw3 |eng | 2010-10-13 | Author:Koster, Raph [Koster, Raph]
Some of the activities on the first chart aren’t what you would normally term “fun,” even though they are almost all activities in which you learn patterns. We can sit ...
( Category:
Programming
June 15,2017 )
mobi, epub, pdf |eng | 2011-07-14 | Author:Bob DuCharme
} * * * Tip Like the triple patterns in a WHERE graph pattern and in Turtle data, the triples in a CONSTRUCT graph pattern can use semicolons and commas ...
( Category:
Databases & Big Data
June 15,2017 )
epub, pdf |eng | 2011-11-28 | Author:Anghel Leonard [Leonard, Anghel]
Figure 7-3 Java buffer representation (c) Next, suppose that we read 2 bytes of data into our buffer. The 2 bytes of data go into the buffer starting at position ...
( Category:
Computers & Technology
June 15,2017 )
epub, pdf |eng | 2011-11-27 | Author:Kochan, Stephen G. [Kochan, Stephen G.]
return 2.0 * 3.141592654; * r; after the preprocessor had made its substitution, which would result in a syntax error. Remember not to put a semicolon at the end of ...
( Category:
Programming
June 15,2017 )
epub, pdf |eng | | Author:Noel Rappin
context "with an admin user" do setup do login_as_admin end teardown do logout end test "admin features" # something administrative end end context "with a regular user" do setup do ...
( Category:
Programming
June 15,2017 )
epub |eng | 2011-06-14 | Author:Steven Mann & Chuck Rivel & Ray Barley & Jim Pletscher & Aneel Ismaily
The ETLLoadID, LoadDate, and UpdateDate columns are fields that don’t provide analytic value. Clear the check box in front of these fields so that they aren’t imported. Click OK to ...
( Category:
Software
June 15,2017 )
epub |eng | 2004-01-02 | Author:Mitch Tulloch [Tulloch, Mitch]
ServerListenBacklog Sometimes, IIS cracks under the weight of too many client requests, even though it still has lots of memory and CPU cycles to work with. Typically, clients start getting ...
( Category:
Internet & Social Media
June 15,2017 )
mobi |eng | 2011-07-14 | Author:Weintraub, Marty [Weintraub, Marty]
We’ve done extensive testing on the difference between ads that present corporate logos versus ads that feature pictures of various stripes. The fact that logos tend to perform a little ...
( Category:
Processes & Infrastructure
June 15,2017 )
epub |eng | 2013-10-08 | Author:Rachel Schutt & Cathy O’Neil
So given users’ understandable concerns about privacy, students in Rachel’s class brainstormed some potential solutions that Google could implement (or that anyone dealing with user-level data could consider). Possibilities: You ...
( Category:
Computers & Technology
June 15,2017 )
Categories
Popular ebooks
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16906)Deep Learning with Python by François Chollet(16110)
The Mikado Method by Ola Ellnestam Daniel Brolund(13389)
Hello! Python by Anthony Briggs(13193)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(12353)
Dependency Injection in .NET by Mark Seemann(12210)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(10968)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(10816)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10540)
Grails in Action by Glen Smith Peter Ledbrook(10277)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(10214)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(9558)
Hit Refresh by Satya Nadella(9040)
Kotlin in Action by Dmitry Jemerov(8946)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8686)
The Kubernetes Operator Framework Book by Michael Dame(8488)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8308)
Robo-Advisor with Python by Aki Ranin(8261)
Practical Computer Architecture with Python and ARM by Alan Clements(8234)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8203)