| Core Android Test Automation Tools and Techniques Part of the Android Test Automation Series 22.71 Kb. 1 | read |
| - Ssl (Secure Sockets Layer) is the de facto standard for secure Internet communications. However, ssl certificate validation has been shown completely broken in many security-applications and libraries 31.24 Kb. 1 | read |
| Git + Github Exercises GitHub is a web-based Git repository hosting service. (BitBucket is another web site that offers git hosting.) GitHub offers both public free accounts and paid plans for private repositories 161.33 Kb. 1 | read |
| Mark Tyndall July 29, 2011 Creating a Custom Linux Kernel and Root File System for the ti omap3530 Processor 29.57 Kb. 1 | read |
| Step0: Preperation Gpu based. These devices are C2050(No. 0), Fx 4800(No. 1), Tesla C2050(No. 2) and you can use any of three divices for Gautomatch. If nothing are output 21.52 Kb. 1 | read |
| Troubleshooting Guide That still does not rule out the fact that there might be a few issues coming in the way, slowing down your objective of getting your resources monitored by OpManager. This document helps you troubleshoot the common problems that you might encounter when 103.15 Kb. 1 | read |
| Itis 3110 Lab 03 ntp, Syslog, and Secure Shell Finally you will deploy and configuration a secure shell (ssh) environment. You will learn how to install ssh, generate keys, edit the sshd configuration file to specify different types of authentication, and configure denyhosts 54.04 Kb. 1 | read |
| - Pi is to provide a computing environment where children can have the freedom to program without having to worry about the consequences of possibly breaking the family computer. It is a low-powered, low-cost web server, media centre 81.22 Kb. 1 | read |
| High-End Routers There are basically four series of routers in the Cisco high-end Those are more complex, multiple interface routers, which include large variety of features and activities, providing high flexibility and powerful decisions. They are out of scope of that document, thus they will not be discussed here 42.95 Kb. 1 | read |
| The Calling Program’s Conventions Ibm developed a series of rules called “Linkage Conventions” which specify the responsibilities of the cooperating programs. We will call the main program the “calling program” and the subroutine it calls the “called program” 17.25 Kb. 1 | read |
| Laboratory Work No 01 1 Introduction to Assembly Language Programming Introduction This experiment introduces the student to assembly language programming. In order 48.28 Kb. 1 | read |
| Laboratory Work No 1 1 Introduction to Assembly Language Programming Introduction This experiment introduces the student to assembly language programming. In order 80.75 Kb. 1 | read |
| Lab Configuring the Apache Web Server 189.02 Kb. 1 | read |
| Pwnie Express Pwn Phone Community Edition / Factory Image Installation Guide Copyright 2014 Pwnie Express. All rights reserved. Document revision 206.9 Kb. 1 | read |
| Lab3 : Introduction to data Part 1 : Introduction to R This command instructs r to access the OpenIntro website and fetch some data: the Arbuthnot baptism counts for boys and girls. You should see that the workspace area in the upper righthand corner of the rstudio window now lists a data set called arbuthnot that has 33.07 Kb. 8 | read |