Computers & Technology
Advanced Programming in the UNIX® Environment, Third Edition by W. Richard Stevens & Stephen A. Rago
epub |eng | 2013-12-04 | Author:W. Richard Stevens & Stephen A. Rago
( Category:
Computers & Technology
December 5,2014 )
mobi |eng | 2014-06-17 | Author:Don R. Crawley
Choose Device configuration by pressing the Enter key (remember that you’re still operating in a command-line interface, so you mouse will have no effect). Figure 73: Choosing the device to ...
( Category:
Servers
December 4,2014 )
azw3 |eng | 2011-12-15 | Author:Vivek Ramachandran
In the next exercise, we will look at how to crack a WPA PSK wireless network. The exact same steps will be involved in cracking a WPA2-PSK network using CCMP(AES) ...
( Category:
Linux & UNIX Administration
December 4,2014 )
azw3, mobi |eng | 2011-07-28 | Author:Matt Kloskowski
STEP 16: Press O to get the Dodge tool. Up in the Options Bar, set the Range to Midtones and the Exposure to 20%, and use a small brush to ...
( Category:
Graphics & Design
December 3,2014 )
epub |eng | 2014-09-30 | Author:Tom Doctoroff
Innovative Products A meticulously defined brand idea also inspires new product extensions, because it provides a focus for innovation. Consumers require much less of a hard sell because new products ...
( Category:
Multilevel
December 2,2014 )
azw3 |eng | 2012-11-15 | Author:Paulino Calderon Pale
test { id="3.1", desc="Skip symbolic links", sql="SHOW variables WHERE Variable_name = 'log_error' AND Value IS NOT NULL", check=function(rowstab) return { status = not(isEmpty(rowstab[1])) } end } MySQL servers may run ...
( Category:
Databases & Big Data
November 30,2014 )
mobi |eng | 2014-02-15 | Author:Julitta Korol
In the Visual Basic Editor window, activate the Project Explorer window and double-click the ThisWorkbook object in the Microsoft Excel Objects folder under VBAProject (Practice_WorkbookEvents2.xlsm). In the ThisWorkbook Code window, ...
( Category:
VBA
November 28,2014 )
epub |eng | 2005-03-01 | Author:Ken Bluttman & Bluttman Ken [Bluttman, Ken & Ken, Bluttman]
Index [SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Z]
( Category:
Hacking
November 28,2014 )
epub |eng | 2014-03-16 | Author:Triumph Books
This hole of Water looks unassuming, but it’s actually an elevator that goes all the way to the Bedrock. Some Crafters have experimented with different shapes and styles to create ...
( Category:
Minecraft
November 28,2014 )
mobi, epub, azw3, pdf |eng | 2013-09-03 | Author:Holiday, Ryan [Holiday, Ryan]
Let’s Get Technical The movie marketing paradigm says throw an expensive premiere and hope that translates into ticket sales come opening weekend. A growth hacker says it’s 2013 and we ...
( Category:
Web Marketing
November 27,2014 )
epub, mobi, azw3 |eng | 2014-11-18 | Author:Brian Krebs [Krebs, Brian]
Severa Cosma ran his stock spam business in tandem with that of another cybercrook, a hacker who uses the nickname “Severa.” This spammer was named as a defendant in an ...
( Category:
Hacking
November 26,2014 )
epub, mobi |eng | 2006-03-01 | Author:Lloyd, Seth [Lloyd, Seth]
Entanglement Another difference between the classical and quantum versions of the controlled-NOT is that in the quantum case, information is created, apparently from nothing. Recall the analogous classical process: the ...
( Category:
Quantum Theory
November 26,2014 )
epub, pdf |eng | 1998-05-29 | Author:Donald E. Knuth [Knuth, Donald E.]
was found by the number field sieve, after four months of computation that occupied otherwise idle time on about 700 workstations [Lenstra, Lenstra, Manasse, and Pollard, Math. Comp. 61 (1993), ...
( Category:
Computers & Technology
November 26,2014 )
epub, pdf |eng | 1998-11-05 | Author:Donald E. Knuth [Knuth, Donald E.]
Fig. 5. A comparison tree that corresponds to binary search when N = 16. When N is 16, the first comparison made by the algorithm is K : K8; this ...
( Category:
Computers & Technology
November 26,2014 )
The Art of Computer Programming: Volume 1 / Fundamental Algorithms, Third Edition by Donald E. Knuth
epub |eng | 1998-06-11 | Author:Donald E. Knuth [Knuth, Donald E.]
( Category:
Computers & Technology
November 26,2014 )
Categories
Popular ebooks
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16904)Deep Learning with Python by François Chollet(14661)
The Mikado Method by Ola Ellnestam Daniel Brolund(11920)
Hello! Python by Anthony Briggs(11832)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(11272)
Dependency Injection in .NET by Mark Seemann(11033)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10523)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(9867)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(9461)
Grails in Action by Glen Smith Peter Ledbrook(9196)
Hit Refresh by Satya Nadella(9038)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(8833)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(8637)
The Kubernetes Operator Framework Book by Michael Dame(8471)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8320)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8292)
Robo-Advisor with Python by Aki Ranin(8245)
Practical Computer Architecture with Python and ARM by Alan Clements(8218)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8189)
Building Low Latency Applications with C++ by Sourav Ghosh(8094)