Computers & Technology
epub |eng | 2009-02-08 | Author:Jang, Michael [Michael Jang]
Using Knoppix The Knoppix CD (http://www.knoppix.org) is gaining popularity as the universal rescue disk. It boots a complete Linux system from the CD with an array of excellent tools that ...
( Category:
Servers
March 31,2014 )
epub |eng | 2000-01-02 | Author:Clinton Wong [Wong, Clinton]
* * * The Pragma header specifies directives for proxy and gateway systems. Since many proxy systems may exist between a client and server, Pragma headers must pass through each ...
( Category:
Web Design
March 31,2014 )
epub |eng | 2011-06-29 | Author:Collingbourne, Huw [Huw Collingbourne]
Note In Ruby 1.9, the instance_variables method returns an array of symbols. In Ruby 1.8, it returns an array of strings. Name Conflicts Module methods (those methods specifically preceded by ...
( Category:
Ruby Programming
March 31,2014 )
epub |eng | 2012-04-29 | Author:Kong, Joseph [Joseph Kong]
Before I describe the functions defined in Example 10-1, note that the constant LED_IO_ADDR is defined as 0x404c and that the constant LED_NUM is defined as 2. The following sections ...
( Category:
Device Drivers
March 31,2014 )
epub |eng | 2010-11-01 | Author:Barski, Conrad [Conrad Barski M.D.]
Note Using with-output-to-string runs counter to the tenets of functional programming (discussed in Chapter 14). Some Lispers consider this function (and similar functions that intercept input or output intended for ...
( Category:
Game Programming
March 31,2014 )
epub |eng | 2010-07-07 | Author:Lucas, Michael W. [Michael W. Lucas]
The xheader option tells flow-report to provide extra header information. Not all report types have extra header information. In some reports, the extra header information is identical to the regular ...
( Category:
Network Security
March 31,2014 )
epub, mobi |eng | | Author:Hyde, Randall [Randall Hyde]
Example 5-20. Main program that references external objects program main; #include( "stdlib.hhf" ); begin main; mov( 2, Var2 ); mov( 3, Var1 ); Add1and2(); stdout.put( "Var1=", Var1, nl ); end ...
( Category:
Assembly Language Programming
March 31,2014 )
epub, mobi |eng | 2014-03-30 | Author:Tiffany B. Brown, Kerry Butters, Sandeep Panda [Brown, Tiffany B.]
Canvas uses a two-dimensional coordinates grid. The top-left of the canvas has a coordinate of (0,0). The bottom-right will have a positive x and y coordinate according to the size ...
( Category:
Programming
March 31,2014 )
epub |eng | 2011-07-11 | Author:Smart, John Ferguson
Chapter 8. Notification Introduction While it is important to get your build server building your software, it is even more important to get your build server to let people know ...
( Category:
Software Development
March 31,2014 )
epub, mobi |eng | 2011-02-10 | Author:Kerrisk, Michael [Michael Kerrisk]
Creating Capabilities-Only Environments In the preceding pages, we have described various ways in which a process with the user ID 0 (root) is treated specially with respect to capabilities: When ...
( Category:
Software Development
March 31,2014 )
epub |eng | | Author:Ross, John [John Ross]
Performing a Site Survey Understanding general networking principles is fine, but you're installing a wireless network in a real location with real walls and real furniture (and most likely, real ...
( Category:
LAN
March 31,2014 )
epub, mobi |eng | 2011-05-16 | Author:Pfister, Cuno [Cuno Pfister]
Chapter 11. Handling Sensor Requests Chapter 10 is an example of an HTTP server, but it doesn’t use any sensors or actuators. In this chapter, I’ll show how you can ...
( Category:
Single Board Computers
March 31,2014 )
epub |eng | 2011-09-15 | Author:Craig, Terence, Ludloff, Mary E. [Terence Craig and Mary E. Ludloff]
The Consumer Financial Protection Bureau, “Know Before You Owe” The Library of Congress, “Wall Street Reform and Consumer Protection Act of 2009” U.S. Department of the Treasury, “Bureau of Consumer ...
( Category:
Electronic Data Interchange (EDI)
March 31,2014 )
epub |eng | 2014-02-23 | Author:Alcorn, Wade, Frichot, Christian, Orru, Michele & Christian Frichot & Michele Orru
Using BeEF with Metasploit Integrating BeEF and Metasploit allows you to control a browser, fingerprint it, and get as much information as you can before you try to exploit it. ...
( Category:
Hacking
March 30,2014 )
epub, mobi |eng | 2010-03-29 | Author:David Kirkpatrick
10 Privacy “You have one identity.” How much of ourselves should we show the world? It’s an important question Facebook forces us to confront. Do I want you to know ...
( Category:
Company Profiles
March 30,2014 )
Categories
Popular ebooks
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16904)Deep Learning with Python by François Chollet(14616)
The Mikado Method by Ola Ellnestam Daniel Brolund(11877)
Hello! Python by Anthony Briggs(11791)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(11240)
Dependency Injection in .NET by Mark Seemann(11001)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10518)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(9832)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(9420)
Grails in Action by Glen Smith Peter Ledbrook(9165)
Hit Refresh by Satya Nadella(9038)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(8808)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(8594)
The Kubernetes Operator Framework Book by Michael Dame(8470)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8309)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8290)
Robo-Advisor with Python by Aki Ranin(8243)
Practical Computer Architecture with Python and ARM by Alan Clements(8217)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8187)
Building Low Latency Applications with C++ by Sourav Ghosh(8091)