Computers & Technology
mobi |eng | 2016-03-25 | Author:Gareth Thomas
( Category:
Computers & Technology
April 9,2016 )
mobi |eng | 2016-03-06 | Author:Scott Casterson
27. Using the Chrome App Launcher This feature is auto installed on the Google Chromebit when a user first adds an application to the device. To utilize the Launcher, go ...
( Category:
Computers & Technology
April 9,2016 )
epub, azw3 |eng | 2016-03-31 | Author:Rex Jones [Jones, Rex]
Binding is the connection between a method call and the method definition. Static binding (known as early binding) is when binding occurs at compile time. Therefore binding happens before a ...
( Category:
Computers & Technology
April 9,2016 )
mobi |eng | 2016-02-22 | Author:Galina Mazurenko
Step 3. Reconnoiter her social network, gather data, analyze! In the information age, it is very difficult for a person (even for a scammer) to control their "private space". Anyway, ...
( Category:
Computers & Technology
April 9,2016 )
mobi, azw3, epub |eng | 2016-03-25 | Author:Gareth Thomas
perl \ -ne 'if(/.{29}\d{1,3}\s{2,4}\d{1,3}\s{2,4}\d{1,3}\s{2,4}\d{1,3}/)'\ -e '{push(@l,$_)}' \ -e 'END{print map{$_->[0]}' \ -e ' sort{$a->[1] <=> $b->[1]}' \ -e ' map{[$_,substr($_,34,3)]}@l;}' perlebcdic.pod If you would rather see it in CCSID 1047 ...
( Category:
Computers & Technology
April 9,2016 )
mobi, pdf |eng | 2016-02-29 | Author:Francesco Ursino
When the aim of a campaign is to promote a game, or film about a video game, or even a book focused on this topic, the most important question for ...
( Category:
Business & Money
April 9,2016 )
mobi |eng | 2016-03-13 | Author:Boniface Ndirangu
January 16, 2016 at 4:34 pm Hi Mimi-CU Thanks so much for your nice comments. This is so refreshing t read and now that you are ok with the machine ...
( Category:
Computers & Technology
April 9,2016 )
azw3, epub |eng | 2016-02-17 | Author:Meeuwisse, Raef [Meeuwisse, Raef]
I is for Indicators Of Compromise (IOC) IaaS – acronym meaning infrastructure as a service. This is a form of cloud solution where, in place of owning and running a ...
( Category:
Computers & Technology
April 9,2016 )
epub |eng | 2016-03-10 | Author:Eric Geissinger
I decided to rewrite the site as suggested by my benevolent hacker adviser. So, while still manually processing transactions and responding to a bigger and bigger message load, I began ...
( Category:
E-Commerce
April 9,2016 )
azw3 |eng | 2015-12-10 | Author:Stephens, Ryan & Jones, Arie D. & Plew, Ron [Stephens, Ryan]
Subqueries with the SELECT Statement Subqueries are most frequently used with the SELECT statement; although you can use them within a data manipulation statement as well. The subquery when employed ...
( Category:
SQL
April 9,2016 )
epub |eng | 2016-04-05 | Author:Betsy Beyer, Chris Jones, Jennifer Petoff & Niall Richard Murphy
1 For example, see Doorman, which provides a cooperative distributed client-side throttling system. Chapter 22. Addressing Cascading Failures Written by Mike Ulrich If at first you don’t succeed, back off ...
( Category:
Testing
April 8,2016 )
epub |eng | | Author:Mike O’Leary
Persistence Another important use of malware by attackers is for persistence. Persistence scripts allow an attacker the ability to return to a compromised system without the necessity of exploiting it ...
( Category:
Networks
April 8,2016 )
mobi |eng | | Author:unknow
Example project – Extracting data from e-mail and web forums The Django IRC logs project was pretty simple. It was designed to show you the differences between three solid techniques ...
( Category:
Business & Money
April 8,2016 )
azw3, mobi, epub |eng | 2016-03-28 | Author:Ellcessor, Elizabeth [Ellcessor, Elizabeth]
The Site of Content Analyzing media access from the point of view of content is just one of the five perspectives established in the interrogatory “access kit” featured in the ...
( Category:
Social Sciences
April 8,2016 )
epub |eng | | Author:Simon Sirca & Martin Horvat
7.3 Explicit Methods of the Runge–Kutta Type Methods of the Runge–Kutta (RK) type are the best known representatives of single-step methods. The solution is advanced in a sequence of short ...
( Category:
Quantum Chemistry
April 8,2016 )
Categories
Popular ebooks
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16906)Deep Learning with Python by François Chollet(15178)
The Mikado Method by Ola Ellnestam Daniel Brolund(12444)
Hello! Python by Anthony Briggs(12318)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(11664)
Dependency Injection in .NET by Mark Seemann(11451)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10530)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(10271)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(9942)
Grails in Action by Glen Smith Peter Ledbrook(9605)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(9204)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(9106)
Hit Refresh by Satya Nadella(9040)
The Kubernetes Operator Framework Book by Michael Dame(8476)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8475)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8299)
Robo-Advisor with Python by Aki Ranin(8254)
Practical Computer Architecture with Python and ARM by Alan Clements(8227)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8197)
Building Low Latency Applications with C++ by Sourav Ghosh(8102)