Software Design, Testing & Engineering
mobi |eng | 2014-03-13 | Author:Peter Kim
privilege::debug sekurlsa::logonPasswords full Figure 66 - Mimikatz Again, it doesn’t matter how long their password is and you don’t have to even worry about the hashes. You can now take ...
( Category:
Testing
March 3,2015 )
mobi, epub |eng | 2012-12-19 | Author:Jason R. Briggs
We can add another irregular polygon (a shape with uneven angles or sides) using this code: canvas.create_polygon(200, 10, 240, 30, 120, 100, 140, 120, fill="", outline="black") This code begins with ...
( Category:
Python
March 3,2015 )
epub |eng | | Author:Jeff Langr
purchases_.push_back(PurchaseRecord(shareChange, transactionDate)); } One more little expressiveness thing is that the name of our exception type InvalidSellException is not very good. Let’s change it to InsufficientSharesException. c6/14/PortfolioTest.cpp ...
( Category:
Testing
March 3,2015 )
epub |eng | 2013-10-14 | Author:Nahavandipoor, Vandad [Nahavandipoor, Vandad]
Chapter 12. Audio and Video 12.0. Introduction The AV Foundation (Audio and Video Foundation) framework in the iOS SDK allows developers to play and/or record audio and video with ease. ...
( Category:
Software Development
March 3,2015 )
mobi |eng | 2008-10-13 | Author:McDowell, Gayle Laakmann [McDowell, Gayle Laakmann]
SOLUTION * * * Observation: Regardless of how we drop Egg1, Egg2 must do a linear search. i.e., if Egg1 breaks between floor 10 and 15, we have to check ...
( Category:
Software Development
March 3,2015 )
epub, mobi |eng | 2014-10-08 | Author:Thomas, Dave [Thomas, Dave]
Erlang/OTP 17 [erts-6.0] [source] [64-bit] [smp:4:4] [async-threads:10] [hipe] [kernel-poll:false] [dtrace] ==> idna (compile) Compiled src/idna_ucs.erl Compiled src/idna.erl : : Compiled lib/issues/cli.ex Generated issues.app iex(1)> Let’s try it out: iex> Issues.GithubIssues.fetch("elixir-lang", ...
( Category:
Software Development
March 3,2015 )
epub, pdf |eng | 2011-10-30 | Author:Nick Kuh
birthday = [NSEntityDescription insertNewObjectForEntityForName:@"BRDBirthday" inManagedObjectContext:context]; name = dictionary[@"name"]; pic = dictionary[@"pic"]; birthdate = dictionary[@"birthdate"]; pathForPic = [[NSBundle mainBundle] pathForResource:pic ofType:nil]; imageData = [NSData dataWithContentsOfFile:pathForPic]; birthday.name = name; birthday.imageData = imageData; ...
( Category:
Electronics
March 3,2015 )
mobi |eng | 2012-03-20 | Author:Whittaker, James A. & Arbon, Jason & Carollo, Jeff [Whittaker, James A.]
There is also a lot of internal recruiting going on. Engineers are encouraged to change projects so there is always movement from team to team. Internal recruiting is focused on ...
( Category:
Software Development
March 3,2015 )
epub |eng | 1995-03-02 | Author:Erich Gamma & Richard Helm & Ralph Johnson & John Vlissides
Sample Code The following code shows how to implement user interface decorators in C++. We’ll assume there’s a Component class called VisualComponent. We define a subclass of VisualComponent called Decorator, ...
( Category:
Software Reuse
March 3,2015 )
epub, pdf |eng | 2013-12-09 | Author:Matt Neuburg
A UISearchDisplayController’s searchContentsController needn’t be a UITableViewController, and the data that the user is searching needn’t be the content of an existing table view. But they frequently are! That’s because ...
( Category:
Object-Oriented Design
March 3,2015 )
epub |eng | | Author:Michael Fogus, Chris Houser
In section 1.5.6, we mentioned quoting and its effects on evaluation, and in this chapter we’ll expand on that theme fully as it relates to Clojure’s macro facility. But the ...
( Category:
Software Development
February 15,2015 )
epub, pdf |eng | 2011-04-18 | Author:Kristina Chodorow [Kristina Chodorow]
Figure 3-2. A B-tree, possibly for an index on a field with integer values. When your query includes x as part of the criteria, MongoDB will notice that it has ...
( Category:
Object-Oriented Design
February 15,2015 )
epub |eng | 2012-04-08 | Author:Burris, Eddie [Burris, Eddie]
Figure 45 Inheritance doesn’t work well when different combinations of features are valid The examples above highlight some of the weaknesses associated with common approaches to extending the behavior of ...
( Category:
Software Development
February 13,2015 )
azw3 |eng | 2012-05-24 | Author:Josuttis, Nicolai M. [Josuttis, Nicolai M.]
#include "algostuff.hpp" using namespace std; int main() { set<int> coll; INSERT_ELEMENTS(coll,1,9); PRINT_ELEMENTS(coll); // print elements rotated one element to the left set<int>::const_iterator pos = next(coll.cbegin()); rotate_copy(coll.cbegin(), // beginning of source ...
( Category:
Object-Oriented Design
February 13,2015 )
azw3 |eng | 2013-09-02 | Author:Pahlavan, Kaveh & Krishnamurthy, Prashant [Pahlavan, Kaveh]
Secret-key algorithms such as AES are based on two principles: confusion and diffusion. The former introduces a layer of scrambling that creates confusion as to what exactly might be the ...
( Category:
Mobile & Wireless
February 13,2015 )
Categories
Coding Theory | Localization |
Logic | Object-Oriented Design |
Performance Optimization | Quality Control |
Reengineering | Robohelp |
Software Development | Software Reuse |
Structured Design | Testing |
Tools | UML |
Popular ebooks
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16756)Deep Learning with Python by François Chollet(12563)
Hello! Python by Anthony Briggs(9911)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9794)
The Mikado Method by Ola Ellnestam Daniel Brolund(9775)
Dependency Injection in .NET by Mark Seemann(9335)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8292)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7758)
Grails in Action by Glen Smith Peter Ledbrook(7693)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(7557)
Becoming a Dynamics 365 Finance and Supply Chain Solution Architect by Brent Dawson(7017)
Microservices with Go by Alexander Shuiskov(6784)
Practical Design Patterns for Java Developers by Miroslav Wengner(6698)
Test Automation Engineering Handbook by Manikandan Sambamurthy(6637)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(6409)
Angular Projects - Third Edition by Aristeidis Bampakos(6047)
The Art of Crafting User Stories by The Art of Crafting User Stories(5577)
NetSuite for Consultants - Second Edition by Peter Ries(5510)
Demystifying Cryptography with OpenSSL 3.0 by Alexei Khlebnikov(5312)
Kotlin in Action by Dmitry Jemerov(5061)
