Programming
epub |eng | 1995-03-02 | Author:Erich Gamma & Richard Helm & Ralph Johnson & John Vlissides
Sample Code The following code shows how to implement user interface decorators in C++. We’ll assume there’s a Component class called VisualComponent. We define a subclass of VisualComponent called Decorator, ...
( Category:
Software Reuse
March 3,2015 )
epub, pdf |eng | 2012-09-25 | Author:Eric Sammer [Eric Sammer]
Example: 0700 See Example 6-5 for a sample hdfs-site.xml file configured for security. Example 6-5. Updating hdfs-site.xml to enable Hadoop security <?xml version="1.0"?> <configuration> <property> <name>dfs.block.access.token.enable</name> <value>true</value> </property> <!-- NameNode ...
( Category:
Java
March 3,2015 )
epub, pdf |eng | 2013-12-09 | Author:Matt Neuburg
A UISearchDisplayController’s searchContentsController needn’t be a UITableViewController, and the data that the user is searching needn’t be the content of an existing table view. But they frequently are! That’s because ...
( Category:
Object-Oriented Design
March 3,2015 )
epub | | | Author:Bill Pretty
( Category:
Electronics
February 15,2015 )
epub |eng | 2011-04-26 | Author:Antony Kennedy, Inayaili de León
Fonts and Units Modern browsers have built-in page zooming, which enlarges the entire page, including fonts, images, layout elements, and so on. But this is not the silver bullet that ...
( Category:
CSS
February 15,2015 )
epub |eng | | Author:Michael Fogus, Chris Houser
In section 1.5.6, we mentioned quoting and its effects on evaluation, and in this chapter we’ll expand on that theme fully as it relates to Clojure’s macro facility. But the ...
( Category:
Software Development
February 15,2015 )
epub, pdf |eng | 2011-04-24 | Author:Vandad Nahavandipoor [Vandad Nahavandipoor]
--Game Center Documentation See Also Authenticating the Local Player in Game Center Creating Leaderboards in iTunes Connect Problem You don’t know how to start incorporating leaderboards into your iOS games. ...
( Category:
Game Programming
February 15,2015 )
epub, pdf |eng | 2011-04-18 | Author:Kristina Chodorow [Kristina Chodorow]
Figure 3-2. A B-tree, possibly for an index on a field with integer values. When your query includes x as part of the criteria, MongoDB will notice that it has ...
( Category:
Object-Oriented Design
February 15,2015 )
epub |eng | 2011-03-15 | Author:Jan Smith & Roman Joost
Figure 6-36. A blue and white scarf was added to the person in the middle of the picture on the right using the Clone Tool. Cloning an Item in an ...
( Category:
Digital Editing
February 13,2015 )
azw3 |eng | 2008-12-16 | Author:Bovet, Daniel P. [Bovet, Daniel P.]
SA_ONSTACK Use an alternative stack for the signal handler (see the later section "Catching the Signal“) SA_RESTART Interrupted system calls are automatically restarted (see the later section "Reexecution of System ...
( Category:
Kernel & Peripherals
February 13,2015 )
azw3, mobi |eng | 2009-02-08 | Author:Corbet, Jonathan & Rubini, Alessandro & Kroah-Hartman, Greg [Corbet, Jonathan]
Hardware Abstractions We complete the discussion of PCI by taking a quick look at how the system handles the plethora of PCI controllers available on the marketplace. This is just ...
( Category:
Device Drivers
February 13,2015 )
azw3 |eng | 2009-03-01 | Author:Donahoo, Michael J. & Calvert, Kenneth L. [Donahoo, Michael J.]
The method GetNextMsg() reads data from the given stream and places it in the given buffer until it runs out of room or determines that it has received a complete ...
( Category:
TCP-IP
February 13,2015 )
epub |eng | 2012-04-08 | Author:Burris, Eddie [Burris, Eddie]
Figure 45 Inheritance doesn’t work well when different combinations of features are valid The examples above highlight some of the weaknesses associated with common approaches to extending the behavior of ...
( Category:
Software Development
February 13,2015 )
azw3 |eng | 2012-05-24 | Author:Josuttis, Nicolai M. [Josuttis, Nicolai M.]
#include "algostuff.hpp" using namespace std; int main() { set<int> coll; INSERT_ELEMENTS(coll,1,9); PRINT_ELEMENTS(coll); // print elements rotated one element to the left set<int>::const_iterator pos = next(coll.cbegin()); rotate_copy(coll.cbegin(), // beginning of source ...
( Category:
Object-Oriented Design
February 13,2015 )
azw3 |eng | 2013-09-02 | Author:Pahlavan, Kaveh & Krishnamurthy, Prashant [Pahlavan, Kaveh]
Secret-key algorithms such as AES are based on two principles: confusion and diffusion. The former introduces a layer of scrambling that creates confusion as to what exactly might be the ...
( Category:
Mobile & Wireless
February 13,2015 )
Categories
Popular ebooks
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16756)Deep Learning with Python by François Chollet(12563)
Hello! Python by Anthony Briggs(9911)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9794)
The Mikado Method by Ola Ellnestam Daniel Brolund(9775)
Dependency Injection in .NET by Mark Seemann(9335)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8292)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7758)
Grails in Action by Glen Smith Peter Ledbrook(7693)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(7557)
Becoming a Dynamics 365 Finance and Supply Chain Solution Architect by Brent Dawson(7018)
Microservices with Go by Alexander Shuiskov(6786)
Practical Design Patterns for Java Developers by Miroslav Wengner(6698)
Test Automation Engineering Handbook by Manikandan Sambamurthy(6638)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6409)
Angular Projects - Third Edition by Aristeidis Bampakos(6047)
The Art of Crafting User Stories by The Art of Crafting User Stories(5579)
NetSuite for Consultants - Second Edition by Peter Ries(5510)
Demystifying Cryptography with OpenSSL 3.0 by Alexei Khlebnikov(5312)
Kotlin in Action by Dmitry Jemerov(5061)
