Search Results - ((((java programming) OR (games programming))) OR ((games OR names) programming))

Search alternatives:

Refine Results
  1. 1901

    Learning pandas by Heydt, Michael

    Published 2017
    Full text (MFA users only)
    Electronic eBook
  2. 1902

    IBM Lotus Domino 6 for iSeries implementation

    Published 2003
    Table of Contents: “…Prerequisites for running Domino 6 on an iSeries server -- 2.1 iSeries hardware -- 2.1.1 Capacity planning considerations -- 2.1.2 Sizing considerations -- 2.2 iSeries software -- 2.2.1 Program temporary fixes -- 2.2.2 Domino software -- 2.2.3 iSeries Access for Windows -- 2.3 TCP/IP considerations -- 2.3.1 Configuring TCP/IP on your iSeries server -- 2.3.2 Naming the Domino server…”
    Full text (MFA users only)
    Electronic eBook
  3. 1903

    The essential retirement guide : a contrarian's perspective by Vettese, Frederick, 1953-

    Published 2015
    Table of Contents: “…; Examples of recent financial bubbles; Common characteristics; The everything bubble -- Carpe Diem: The numbers; Healthy life years; Trends; Personal genome testing; -- A Life Well Lived: Retirement and happiness; Final thoughts Notes -- Appendix A: Similarities between the US and Canada: Social Security programs; High-level comparison of retirement vehicles; A tax comparison -- Appendix B: Social Security in the US and Canada: Name of Social Security pension plan; Purpose of Social Security; Earnings base for pension calculation; How pension is calculated; How the plans are funded; Normal retirement age; Early retirement age; Delayed retirement; Indexation; Other government-sponsored pension plans; Taxability -- Appendix C: Retirement income targets under other scenarios -- Appendix D: About the assumptions used in the book: Thoughts on Conservatism; Assumptions used to estimate personal consumption; Assumptions used to calculate future retirement savings; Assumptions used to estimate the historical accumulation of savings; Couple contemplating long-term care insurance; Assets needed to cover long-term care (LTC).…”
    Full text (MFA users only)
    Electronic eBook
  4. 1904

    Culture work : folklore for the public good

    Published 2022
    Table of Contents: “…Engaging with the Past -- "The Wisconsin Historical Society Gave Me Your Name": Doing Out-(and In-)reach on Campus, in Wisconsin, and Beyond / Troy Reeves -- Shoemaker, Frey, and Yoder and the Pennsylvania Dutch Idea / Mark L. …”
    Full text (MFA users only)
    Electronic eBook
  5. 1905

    Security configuration in a TCP/IP Sysplex environment

    Published 2003
    Table of Contents: “….* FACILITY class profiles -- 1.5.15 Programs in the Hierarchical File System -- 1.5.16 z/OS UNIX kernel address space -- 1.5.17 z/OS UNIX security considerations for TCP/IP -- 1.5.18 IBM-supplied daemons -- 1.5.19 MVS sockets server applications -- 1.5.20 Summary -- 1.6 Access control list (ACL) support for z/OS 1.3 -- 1.6.1 File access authorization checking -- 1.6.2 New UNIXPRIV profiles with z/OS V1R3 -- 1.6.3 ACL overview -- 1.6.4 Security product and ACLs -- 1.7 Enhancements for UID/GID support in z/OS 1.4 -- 1.7.1 RACF database and AIM.…”
    Full text (MFA users only)
    Electronic eBook
  6. 1906
  7. 1907
  8. 1908
  9. 1909

    Advanced penetration testing for highly-secured environments by Allen, Lee (Information security specialist), Cardwell, Kevin

    Published 2016
    Table of Contents: “…C"ing is believing -- Create a vulnerable program -- Turning ASLR on and off in Kali -- Understanding the basics of buffer overflows -- 64-bit exploitation -- Introducing vulnserver -- Fuzzing tools included in Kali -- Bruteforce Exploit Detector (BED) -- sfuzz -- Simple fuzzer -- Social Engineering Toolkit -- Fast-Track -- Reader challenge -- Summary -- Chapter 9: Post-Exploitation -- Rules of Engagement -- What is permitted? …”
    Full text (MFA users only)
    Electronic eBook
  10. 1910
  11. 1911
  12. 1912

    V5 TCP/IP applications on the IBM e-server iSeries server

    Published 2004
    Table of Contents: “…Telnet on the iSeries -- 2.1 Virtual device descriptions -- 2.2 QAUTOVRT system value -- 2.3 Telnet naming conventions for virtual devices/controllers -- 2.3.1 Unpredictable system-assigned devices -- 2.3.2 Specifically assigned Telnet session device names -- 2.4 Telnet device initialization and termination exit points -- 2.4.1 Registering an exit program -- 2.5 Mapping a Virtual device description to an IP address -- 2.6 Other Telnet enhancements -- 2.6.1 Connection feedback to the Telnet client -- 2.6.2 Number of servers to start -- 2.7 Extended administrative flexibility -- 2.8 Security -- 2.8.1 Prevent Telnet access -- 2.8.2 Control Telnet client access -- 2.8.3 Telnet exit program security -- 2.9 Telnet problem determination -- 2.10 More information -- Chapter 3. …”
    Full text (MFA users only)
    Electronic eBook
  13. 1913

    AutoCAD 2015 and AutoCAD LT 2015 Bible by Finkelstein, Ellen, Ambrosius, Lee

    Published 2014
    Table of Contents: “…Ch. 7 Drawing Curves and Points -- Drawing Circles -- Understanding the circle options -- Creating circles -- Drawing Arcs -- Understanding arc options -- Creating arcs -- Creating Ellipses and Elliptical Arcs -- Understanding ellipse options -- Understanding elliptical arc options -- Drawing ellipses and elliptical arcs -- Making Donuts -- Understanding DONUT options -- Drawing donuts -- Placing Points -- Changing the point style -- Creating points -- Summary -- ch. 8 Viewing Your Drawing -- Regenerating and Redrawing the Display -- Panning -- Using the ZOOM Command -- Understanding ZOOM options -- Using ZOOM Dynamic -- Using the SteeringWheels -- Creating Named Views -- Saving a view -- Displaying a view -- Managing named views -- Creating animated presentations from named views -- Using named views to manage a drawing -- Working with Tiled Viewports -- Configuring tiled viewports -- Using tiled viewports.…”
    Full text (MFA users only)
    Electronic eBook
  14. 1914

    Filemaker Pro 7 bible by Schwartz, Steven A., 1951-

    Published 2004
    Full text (MFA users only)
    Electronic eBook
  15. 1915

    Quantum theory : a philosopher's overview by Cannavo, S. (Salvator)

    Published 2009
    Full text (MFA users only)
    Electronic eBook
  16. 1916

    Participatory archives : theory and practice

    Published 2019
    Full text (MFA users only)
    Electronic eBook
  17. 1917

    IMS DataPropagator implementation guide

    Published 2002
    Table of Contents: “…Installing a DPROP environment -- 3.1 Starting the installation panels -- 3.2 Defining the DPROP environment name -- 3.3 Defining the DPROP environment parameters -- 3.3.1 Defining the DPROP environment elements -- 3.3.2 Defining DPROP systems data set names -- 3.3.3 Defining the system data sets Panel 2 -- 3.3.4 Defining the OS/390 copy program -- 3.3.5 Defining environment JOB parameters -- 3.3.6 Defining installation library -- 3.3.7 Defining EKYGSYS parameters -- 3.3.8 Defining the JOB card information -- 3.3.9 Defining the audit trail table -- 3.3.10 Defining the audit trail table information -- 3.3.11 Defining the audit trail table DB2 objects -- 3.3.12 Defining the Language Interface environment.…”
    Full text (MFA users only)
    Electronic eBook
  18. 1918
  19. 1919

    Managing Stress for Mental Fitness. by Raber, Merill F.

    Published 1993
    Full text (MFA users only)
    Electronic eBook
  20. 1920

    The habitat of Australia's aboriginal languages : past, present and future

    Published 2007
    Table of Contents: “…Tjykim/Blekbala reflections on experiences and current issues -- References -- Name and Author Index -- Subject Index.…”
    Full text (MFA users only)
    Electronic eBook