Computer Science
epub, pdf |eng | 2012-08-27 | Author:Mike Shema
Protecting Information Compromising the information in a database is not the only goal of an attacker, but it surely exists as a major one. Many methods are available to protect ...
( Category:
Hacking
March 26,2014 )
epub, pdf |eng | 2012-11-22 | Author:Derrick Rountree
3.2.1. Using OpenID The OpenID process starts with user registration. The user must choose an OpenID provider with whom to register. There are several OpenID providers available including Facebook, Google, ...
( Category:
Network Security
March 26,2014 )
epub, mobi, pdf |eng | 2012-11-19 | Author:Matthew Metheny
Table 6.5 Key Process Activities—Step 3 Table 6.6 Key Process Activities—Step 4 Both NIST and the ISO/IEC processes address the ongoing communications and sharing of risk-related information with decision makers ...
( Category:
Cloud Computing
March 26,2014 )
epub |eng | 2013-03-26 | Author:Fortnow, Lance [Fortnow, Lance]
The Gödel Letter In 1956 Kurt Gödel wrote a letter to John von Neumann, one of the pioneers of computer science and many other fields. In this letter (written in ...
( Category:
Linear Programming
March 26,2014 )
epub |eng | 2012-11-08 | Author:Steve Winterfeld
Physical Warfare Cyber warfare can have great impact on the way physical war is waged. Given that even strictly physical warfare, in the sense of boots on the ground, depends ...
( Category:
Network Security
March 26,2014 )
epub, mobi |eng | 2012-11-19 | Author:Stephen D. Gantz & Daniel R. Philpott
Relevant Source Material Several NIST Special Publications and Federal Information Processing Standards provide guidance, recommendations, and instructions relevant to the development of system security plans and their use in support ...
( Category:
Network Security
March 26,2014 )
epub |eng | 2012-12-09 | Author:Brett Shavers
Figure 1.8 Spreadsheet timeline example with USB device data. Because a spreadsheet timeline can contain millions of rows of data, analysts may simply underutilize this method of analysis fearing being ...
( Category:
Computer Science
March 26,2014 )
epub |eng | 2012-06-11 | Author:Wallace Wang [Wallace Wang]
To jump to a particular chapter, you'll need to view the table of contents and then tap the chapter you want to read. (These steps work a little differently when ...
( Category:
Computer Science
March 26,2014 )
epub, pdf |eng | 2012-12-17 | Author:Jayant Varma [Varma, Jayant]
The Internet Browser In the earlier days, when the only way to make apps for iOS was using Objective-C, many people tried to place apps in HTML wrappers (UIWebView). They ...
( Category:
Computer Science
March 26,2014 )
epub, pdf |eng | | Author:Lucas Jordan
Adding Particle Systems to Your Game Particle systems in games are collections of many, usually small, images drawn together to create an overall affect. Particle systems are used in many ...
( Category:
Computer Science
March 26,2014 )
epub |eng | 2012-12-25 | Author:David Mark & James Bucanek
Configuring the PATH Variable The final command is a bit tricky. You need to reconfigure the shell so it also looks in your new, private, ~/bin folder in addition to ...
( Category:
Computer Science
March 26,2014 )
epub |eng | | Author:Hans-Eric Grönlund & Colin Francis & Shawn Grimes
#import <UIKit/UIKit.h> NSString * const TweetCellId = @"TweetCell"; @interface TweetCell : UITableViewCell @property (strong, nonatomic)NSDictionary *tweetData; @end This cell type uses the standard look with a subtitle and a disclosure ...
( Category:
Computer Science
March 26,2014 )
epub |eng | 2012-02-24 | Author:Shawn Grimes & Colin Francis [Grimes, Shawn & Francis, Colin]
CFRelease(dictionary); CFRelease(cityKey); CFRelease(stateKey); } else { self.cityLabel.text = @"..."; self.stateLabel.text = @"..."; } Finally, you can dismiss your modal view controller, as well as add your return value for this ...
( Category:
Computer Science
March 26,2014 )
epub |eng | 2011-12-08 | Author:Dave Mark, Jack Nutting, Jeff LaMarche
Figure 11–3. The default Master-Detail Application template in landscape mode. Note the similarity between this figure and Figure 11–1. Figure 11–4. The default Master-Detail Application template in portrait mode with ...
( Category:
Computer Science
March 26,2014 )
epub, pdf |eng | 2013-06-24 | Author:Adam Dawes [Dawes, Adam]
There is another mode that can be set for the depth buffer: read-only mode. In this mode, MonoGame will observe the values in the depth buffer when rendering objects and ...
( Category:
Computer Science
March 26,2014 )
Categories
AI & Machine Learning | Bioinformatics |
Computer Simulation | Cybernetics |
Human-Computer Interaction | Information Theory |
Robotics | Systems Analysis & Design |
Popular ebooks
Deep Learning with Python by François Chollet(12571)Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8299)
Test-Driven Development with Java by Alan Mellor(6721)
Data Augmentation with Python by Duc Haba(6635)
Principles of Data Fabric by Sonia Mezzetta(6386)
Learn Blender Simulations the Right Way by Stephen Pearson(6281)
Microservices with Spring Boot 3 and Spring Cloud by Magnus Larsson(6155)
Hadoop in Practice by Alex Holmes(5958)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(5806)
RPA Solution Architect's Handbook by Sachin Sahgal(5552)
Big Data Analysis with Python by Ivan Marin(5363)
The Infinite Retina by Robert Scoble Irena Cronin(5246)
Life 3.0: Being Human in the Age of Artificial Intelligence by Tegmark Max(5147)
Pretrain Vision and Large Language Models in Python by Emily Webber(4327)
Infrastructure as Code for Beginners by Russ McKendrick(4086)
Functional Programming in JavaScript by Mantyla Dan(4038)
The Age of Surveillance Capitalism by Shoshana Zuboff(3950)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3801)
Embracing Microservices Design by Ovais Mehboob Ahmed Khan Nabil Siddiqui and Timothy Oleson(3605)
Applied Machine Learning for Healthcare and Life Sciences Using AWS by Ujjwal Ratan(3576)
