Search Results - ((java programming) OR ((games OR names) programming))

Search alternatives:

Refine Results
  1. 1881

    The essential retirement guide : a contrarian's perspective by Vettese, Frederick, 1953-

    Published 2015
    Table of Contents: “…; Examples of recent financial bubbles; Common characteristics; The everything bubble -- Carpe Diem: The numbers; Healthy life years; Trends; Personal genome testing; -- A Life Well Lived: Retirement and happiness; Final thoughts Notes -- Appendix A: Similarities between the US and Canada: Social Security programs; High-level comparison of retirement vehicles; A tax comparison -- Appendix B: Social Security in the US and Canada: Name of Social Security pension plan; Purpose of Social Security; Earnings base for pension calculation; How pension is calculated; How the plans are funded; Normal retirement age; Early retirement age; Delayed retirement; Indexation; Other government-sponsored pension plans; Taxability -- Appendix C: Retirement income targets under other scenarios -- Appendix D: About the assumptions used in the book: Thoughts on Conservatism; Assumptions used to estimate personal consumption; Assumptions used to calculate future retirement savings; Assumptions used to estimate the historical accumulation of savings; Couple contemplating long-term care insurance; Assets needed to cover long-term care (LTC).…”
    Full text (MFA users only)
    Electronic eBook
  2. 1882

    Culture work : folklore for the public good

    Published 2022
    Table of Contents: “…Engaging with the Past -- "The Wisconsin Historical Society Gave Me Your Name": Doing Out-(and In-)reach on Campus, in Wisconsin, and Beyond / Troy Reeves -- Shoemaker, Frey, and Yoder and the Pennsylvania Dutch Idea / Mark L. …”
    Full text (MFA users only)
    Electronic eBook
  3. 1883

    Security configuration in a TCP/IP Sysplex environment

    Published 2003
    Table of Contents: “….* FACILITY class profiles -- 1.5.15 Programs in the Hierarchical File System -- 1.5.16 z/OS UNIX kernel address space -- 1.5.17 z/OS UNIX security considerations for TCP/IP -- 1.5.18 IBM-supplied daemons -- 1.5.19 MVS sockets server applications -- 1.5.20 Summary -- 1.6 Access control list (ACL) support for z/OS 1.3 -- 1.6.1 File access authorization checking -- 1.6.2 New UNIXPRIV profiles with z/OS V1R3 -- 1.6.3 ACL overview -- 1.6.4 Security product and ACLs -- 1.7 Enhancements for UID/GID support in z/OS 1.4 -- 1.7.1 RACF database and AIM.…”
    Full text (MFA users only)
    Electronic eBook
  4. 1884
  5. 1885
  6. 1886
  7. 1887
  8. 1888

    Advanced penetration testing for highly-secured environments by Allen, Lee (Information security specialist), Cardwell, Kevin

    Published 2016
    Table of Contents: “…C"ing is believing -- Create a vulnerable program -- Turning ASLR on and off in Kali -- Understanding the basics of buffer overflows -- 64-bit exploitation -- Introducing vulnserver -- Fuzzing tools included in Kali -- Bruteforce Exploit Detector (BED) -- sfuzz -- Simple fuzzer -- Social Engineering Toolkit -- Fast-Track -- Reader challenge -- Summary -- Chapter 9: Post-Exploitation -- Rules of Engagement -- What is permitted? …”
    Full text (MFA users only)
    Electronic eBook
  9. 1889
  10. 1890
  11. 1891
  12. 1892
  13. 1893
  14. 1894

    V5 TCP/IP applications on the IBM e-server iSeries server

    Published 2004
    Table of Contents: “…Telnet on the iSeries -- 2.1 Virtual device descriptions -- 2.2 QAUTOVRT system value -- 2.3 Telnet naming conventions for virtual devices/controllers -- 2.3.1 Unpredictable system-assigned devices -- 2.3.2 Specifically assigned Telnet session device names -- 2.4 Telnet device initialization and termination exit points -- 2.4.1 Registering an exit program -- 2.5 Mapping a Virtual device description to an IP address -- 2.6 Other Telnet enhancements -- 2.6.1 Connection feedback to the Telnet client -- 2.6.2 Number of servers to start -- 2.7 Extended administrative flexibility -- 2.8 Security -- 2.8.1 Prevent Telnet access -- 2.8.2 Control Telnet client access -- 2.8.3 Telnet exit program security -- 2.9 Telnet problem determination -- 2.10 More information -- Chapter 3. …”
    Full text (MFA users only)
    Electronic eBook
  15. 1895

    AutoCAD 2015 and AutoCAD LT 2015 Bible by Finkelstein, Ellen, Ambrosius, Lee

    Published 2014
    Table of Contents: “…Ch. 7 Drawing Curves and Points -- Drawing Circles -- Understanding the circle options -- Creating circles -- Drawing Arcs -- Understanding arc options -- Creating arcs -- Creating Ellipses and Elliptical Arcs -- Understanding ellipse options -- Understanding elliptical arc options -- Drawing ellipses and elliptical arcs -- Making Donuts -- Understanding DONUT options -- Drawing donuts -- Placing Points -- Changing the point style -- Creating points -- Summary -- ch. 8 Viewing Your Drawing -- Regenerating and Redrawing the Display -- Panning -- Using the ZOOM Command -- Understanding ZOOM options -- Using ZOOM Dynamic -- Using the SteeringWheels -- Creating Named Views -- Saving a view -- Displaying a view -- Managing named views -- Creating animated presentations from named views -- Using named views to manage a drawing -- Working with Tiled Viewports -- Configuring tiled viewports -- Using tiled viewports.…”
    Full text (MFA users only)
    Electronic eBook
  16. 1896

    Filemaker Pro 7 bible by Schwartz, Steven A., 1951-

    Published 2004
    Full text (MFA users only)
    Electronic eBook
  17. 1897
  18. 1898

    Quantum theory : a philosopher's overview by Cannavo, S. (Salvator)

    Published 2009
    Full text (MFA users only)
    Electronic eBook
  19. 1899

    Participatory archives : theory and practice

    Published 2019
    Full text (MFA users only)
    Electronic eBook
  20. 1900