Search Results - ((java programming) OR ((games OR names) programming))
Suggested Topics within your search.
Suggested Topics within your search.
- Development 198
- Application software 182
- Programming 152
- Computer programs 129
- Java (Computer program language) 128
- History 127
- Video games 116
- JavaScript (Computer program language) 109
- Design 103
- Web site development 95
- Web sites 68
- Data processing 61
- Social aspects 55
- Computer programming 48
- Management 48
- Study and teaching 46
- Activity programs 45
- Internet programming 45
- computer programming 40
- Computer software 38
- Computer graphics 34
- Python (Computer program language) 34
- Web applications 33
- Research 32
- Computer networks 31
- Web servers 31
- Artificial intelligence 30
- Business 30
- History and criticism 30
- Authoring programs 28
Search alternatives:
- java programming »
-
1881
The essential retirement guide : a contrarian's perspective
Published 2015Table of Contents: “…; Examples of recent financial bubbles; Common characteristics; The everything bubble -- Carpe Diem: The numbers; Healthy life years; Trends; Personal genome testing; -- A Life Well Lived: Retirement and happiness; Final thoughts Notes -- Appendix A: Similarities between the US and Canada: Social Security programs; High-level comparison of retirement vehicles; A tax comparison -- Appendix B: Social Security in the US and Canada: Name of Social Security pension plan; Purpose of Social Security; Earnings base for pension calculation; How pension is calculated; How the plans are funded; Normal retirement age; Early retirement age; Delayed retirement; Indexation; Other government-sponsored pension plans; Taxability -- Appendix C: Retirement income targets under other scenarios -- Appendix D: About the assumptions used in the book: Thoughts on Conservatism; Assumptions used to estimate personal consumption; Assumptions used to calculate future retirement savings; Assumptions used to estimate the historical accumulation of savings; Couple contemplating long-term care insurance; Assets needed to cover long-term care (LTC).…”
Full text (MFA users only)
Electronic eBook -
1882
Culture work : folklore for the public good
Published 2022Table of Contents: “…Engaging with the Past -- "The Wisconsin Historical Society Gave Me Your Name": Doing Out-(and In-)reach on Campus, in Wisconsin, and Beyond / Troy Reeves -- Shoemaker, Frey, and Yoder and the Pennsylvania Dutch Idea / Mark L. …”
Full text (MFA users only)
Electronic eBook -
1883
Security configuration in a TCP/IP Sysplex environment
Published 2003Table of Contents: “….* FACILITY class profiles -- 1.5.15 Programs in the Hierarchical File System -- 1.5.16 z/OS UNIX kernel address space -- 1.5.17 z/OS UNIX security considerations for TCP/IP -- 1.5.18 IBM-supplied daemons -- 1.5.19 MVS sockets server applications -- 1.5.20 Summary -- 1.6 Access control list (ACL) support for z/OS 1.3 -- 1.6.1 File access authorization checking -- 1.6.2 New UNIXPRIV profiles with z/OS V1R3 -- 1.6.3 ACL overview -- 1.6.4 Security product and ACLs -- 1.7 Enhancements for UID/GID support in z/OS 1.4 -- 1.7.1 RACF database and AIM.…”
Full text (MFA users only)
Electronic eBook -
1884
That sheep may safely graze : rebuilding animal health care in war-torn Afghanistan
Published 2019Full text (MFA users only)
Electronic eBook -
1885
Content-based image classification : efficient machine learning using robust feature extraction techniques
Published 2020Full text (MFA users only)
Electronic eBook -
1886
How to Cheat in Adobe Flash CC : the Art of Design and Animation.
Published 2014Full text (MFA users only)
Electronic eBook -
1887
Current Perspectives on Pedagogy for English as a Lingua Franca.
Published 2015Full text (MFA users only)
Electronic eBook -
1888
Advanced penetration testing for highly-secured environments
Published 2016Table of Contents: “…C"ing is believing -- Create a vulnerable program -- Turning ASLR on and off in Kali -- Understanding the basics of buffer overflows -- 64-bit exploitation -- Introducing vulnserver -- Fuzzing tools included in Kali -- Bruteforce Exploit Detector (BED) -- sfuzz -- Simple fuzzer -- Social Engineering Toolkit -- Fast-Track -- Reader challenge -- Summary -- Chapter 9: Post-Exploitation -- Rules of Engagement -- What is permitted? …”
Full text (MFA users only)
Electronic eBook -
1889
-
1890
Data Analytics : Effective Methods for Presenting Results.
Published 2019Full text (MFA users only)
Electronic eBook -
1891
American Protestantism in the age of psychology
Published 2011Full text (MFA users only)
Electronic eBook -
1892
Living Economics : Yesterday, Today, and Tomorrow.
Published 2012Full text (MFA users only)
Electronic eBook -
1893
Reading without limits : a practical step-by-step guide for helping kids become lifelong readers
Published 2013Full text (MFA users only)
Electronic eBook -
1894
V5 TCP/IP applications on the IBM e-server iSeries server
Published 2004Table of Contents: “…Telnet on the iSeries -- 2.1 Virtual device descriptions -- 2.2 QAUTOVRT system value -- 2.3 Telnet naming conventions for virtual devices/controllers -- 2.3.1 Unpredictable system-assigned devices -- 2.3.2 Specifically assigned Telnet session device names -- 2.4 Telnet device initialization and termination exit points -- 2.4.1 Registering an exit program -- 2.5 Mapping a Virtual device description to an IP address -- 2.6 Other Telnet enhancements -- 2.6.1 Connection feedback to the Telnet client -- 2.6.2 Number of servers to start -- 2.7 Extended administrative flexibility -- 2.8 Security -- 2.8.1 Prevent Telnet access -- 2.8.2 Control Telnet client access -- 2.8.3 Telnet exit program security -- 2.9 Telnet problem determination -- 2.10 More information -- Chapter 3. …”
Full text (MFA users only)
Electronic eBook -
1895
AutoCAD 2015 and AutoCAD LT 2015 Bible
Published 2014Table of Contents: “…Ch. 7 Drawing Curves and Points -- Drawing Circles -- Understanding the circle options -- Creating circles -- Drawing Arcs -- Understanding arc options -- Creating arcs -- Creating Ellipses and Elliptical Arcs -- Understanding ellipse options -- Understanding elliptical arc options -- Drawing ellipses and elliptical arcs -- Making Donuts -- Understanding DONUT options -- Drawing donuts -- Placing Points -- Changing the point style -- Creating points -- Summary -- ch. 8 Viewing Your Drawing -- Regenerating and Redrawing the Display -- Panning -- Using the ZOOM Command -- Understanding ZOOM options -- Using ZOOM Dynamic -- Using the SteeringWheels -- Creating Named Views -- Saving a view -- Displaying a view -- Managing named views -- Creating animated presentations from named views -- Using named views to manage a drawing -- Working with Tiled Viewports -- Configuring tiled viewports -- Using tiled viewports.…”
Full text (MFA users only)
Electronic eBook -
1896
-
1897
Trend Following : Learn to Make Millions in up or down Markets.
Published 2017Full text (MFA users only)
Electronic eBook -
1898
Quantum theory : a philosopher's overview
Published 2009Full text (MFA users only)
Electronic eBook -
1899
Participatory archives : theory and practice
Published 2019Full text (MFA users only)
Electronic eBook -
1900
Debating Disney : pedagogical perspectives on commercial cinema
Published 2016Full text (MFA users only)
Electronic eBook