Warning: file_put_contents(cache/omni_6899112cdbeb2857e5910379658352dd.json): Failed to open stream: Permission denied in /home/moozonian/public_html/classes/BooksResultsProvider.php on line 304
Heterogeneity, High Performance Computing, Self-Organization and the Cloud
...
View Book →
Microsoft Platform and Tools for Mobile App Development
...
View Book →
The Design and Implementation of the Anykernel and Rump Kernels
The definitive technical guide to the core of the Rump Kernel project...
View Book →
Embedded Firmware Solutions
Development Best Practices for the Internet of Things...
View Book →
NASA Technical Reports Server (NTRS) 20240000497: Depositional History of the Upper Sequence of the
Within Jezero crater, a 45 km diameter Noachian-aged crater on Mars, the Upper Fan group (UFg) stratigraphy records the youngest interval of sediment deposition via aqueous activity on the western fan...
View Book →
Managing Cloud Native Data on Kubernetes
Architecting Cloud Native Data Services Using Open Source Technology...
View Book →
Reverse Engineering For Beginners
There are several popular meanings of the term “reverse engineering”: The reverse engineering of software: researching compiled programs; The scanning of 3D structures and the subsequent digital m...
View Book →The mystery of husbandry: or, arable, pasture, and wood-land improved
First published in 1697...
View Book →
dec :: pdp11 :: rt11 :: swDisp :: 8206 AD-C740C-28 rtSwDisp
From the bitsavers.org collection, a scanned-in computer-related document. dec :: pdp11 :: rt11 :: swDisp :: 8206 AD-C740C-28 rtSwDisp...
View Book →
Examining Wikipedia With a Broader Lens: Quantifying the Value of Wikipedia’s Relationships with O
The extensive Wikipedia literature has largely considered Wikipedia in isolation, outside of the context of its broader Internet ecosystem. Very recent research has demonstrated the significance of th...
View Book →
Stack Overflow: A Code Laundering Platform?
Developers use Question and Answer (Q&A) websites to exchange knowledge and expertise. Stack Overflow is a popular Q&A website where developers discuss coding problems and share code examples. Althoug...
View Book →
Rethinking the Internet of Things
A Scalable Approach to Connecting Everything...
View Book →18-642: L11 Stack Overflow Lecture
18-642 Lecture #11 Carnegie Mellon University, Fall 2021 Stack overflow mechanics; memory corruption; stack sentinels; static analysis; memory protection; avoid recursion...
View Book →
Kubernetes for Full-Stack Developers
...
View Book →
RCQ
This data-set consists of 170091 Question title of R language from stack-overflow (between 2013-2017)....
View Book →
php-es.3
programación en lengua PHP en español...
View Book →
C Notes for Professionals
The C Notes for Professionals book is compiled from Stack Overflow Documentation , the content is written by the beautiful people at Stack Overflow. Text content is released under Creative Commons BY-...
View Book →dec :: pdp11 :: 1160 :: MAINDEC-11-DQKDB-A 1160traps Mar77
From the bitsavers.org collection, a scanned-in computer-related document. dec :: pdp11 :: 1160 :: MAINDEC-11-DQKDB-A 1160traps Mar77...
View Book →
Making Servers Work
A Practical Guide to Linux System Administration...
View Book →
dg :: eclipse :: 014-000704-03 32-bit Eclipse PrincOps Aug84
From the bitsavers.org collection, a scanned-in computer-related document. dg :: eclipse :: 014-000704-03 32-bit Eclipse PrincOps Aug84...
View Book →dec :: pdp11 :: xxdp :: diag listings :: 1140 45 :: 004 DCKBF-A STACK LIMIT
From the bitsavers.org collection, a scanned-in computer-related document. dec :: pdp11 :: xxdp :: diag listings :: 1140 45 :: 004 DCKBF-A STACK LIMIT...
View Book →
Smashing the stack in Windows 8
Since Windows Vista, many security features have been added to Windows [1], these got even better with version 7 of the OS [2]. The upcoming Windows 8 brings better security in the user interaction (l...
View Book →
Categorization and Naming in Childern
First published in 1991...
View Book →
Model-Driven Development and Operation of Multi-Cloud Applications
The MODAClouds Approach...
View Book →
Think Data Structures
Algorithms and Information Retrieval in Java...
View Book →
Ernst Denert Award for Software Engineering 2019
Practice Meets Foundations...
View Book →
Web mining and sentiment analysis of COVID-19 discourse in online forum communities
Recently, various discussions, solutions, data, and methods related to coronavirus disease 2019 (COVID-19) have been posted in online forum communities. Although a vast amount of posting on COVID-19 a...
View Book →
Evaluating Developers’ Expertise in Serverless Functions by Mining Activities from Multiple Platfo
Abstract-- In the domain of software development, the evaluation of developer expertise has gained prominence, particularly with the rise of serverless functions. These functions, which simplify the d...
View Book →
Optimizing software in C++
An optimization guide for Windows, Linux and Mac platforms...
View Book →
Operating Systems and Middleware
Supporting Controlled Interaction...
View Book →
DTIC ADA632443: Evaluating the Generality and Limits of Blind Return-Oriented Programming Attacks
We consider a recently proposed information disclosure vulnerability called blind return-oriented programming (BROP). Under certain conditions, this attack allows a return-oriented programming attack ...
View Book →
A Practical Guide to TPM 2.0
Using the New Trusted Platform Module in the New Age of Security...
View Book →
Why Should I Care? Mobile Security for The Rest of Us
10 Simple Things You Can Do to Protect Yourself and Your Organization from Today's Mobile Computing Threats...
View Book →
Disable Developer Mode Extensions Pop Up In Chrome Stack Overflow
Disable Developer Mode Extensions Pop Up In Chrome Stack Overflow...
View Book →
USPTO Patents Application 09856615
Device and method for detecting stack overflow in a storage unit and franking machine using same...
View Book →
How to Think Like a Computer Scientist
Learning with Python...
View Book →
national :: imp :: 4200011A User of RALU Flags Application Note Jun72
From the bitsavers.org collection, a scanned-in computer-related document. national :: imp :: 4200011A User of RALU Flags Application Note Jun72...
View Book →
Debugging with GDB
The GNU Source-Level Debugger...
View Book →
Demystifying Internet of Things Security
Successful IoT Device/Edge and Platform Security Deployment...
View Book →