| Testing for Security in the Age of Ajax Programming However, just like Uncle Ben said to Peter Parker (aka Spider-Man™)1, with great power comes great responsibility. Web applications have become prime targets for malicious users and hackers performing sql injection and similar attacks 14.91 Kb. 1 | read |
| Multi-Factor Phishing Attack Detection and Prevention with Support Vector Machine Assistant Professor, Computer Engineering Department, ucoE, Punjabi University, Patiala, India 23.07 Kb. 1 | read |
| Paternoster of Programmers Reloaded Paternoster of Programmers Reloaded: C, C++, Java, Python and Aspectj case Studies 0.51 Mb. 5 | read |
| Software packages for next gen sequence analysis A reasonably thorough table of next-gen-seq software available in the commercial and public domain 24.44 Kb. 1 | read |
| Doctor of philosophy The programmer then requests the system to change the current core image to incorporate new code and data. New object code is inserted by a dynamic modification process that is executed in parallel with other user processes 0.56 Mb. 11 | read |
| Researching: different flavour of linux This technical report discusses the current advances in Linux world and how are they distributed 34.97 Kb. 1 | read |
| 2012 Visual Programming Using c sharp. Net Language: Language Language may refer either to the specifically human capacity for acquiring and using complex systems of communication, or to a specific instance of such a system of complex communication 38.21 Kb. 1 | read |
| Shaun’s Online Riddle Url, find something hidden in a picture, there are so many different possibilities for puzzles and riddles born from very simple web pages 18.55 Kb. 1 | read |
| Asr newsletter, Issue 1, April 1986 Ada (tm) Software Repository (asr) Newsletter Issue 1, April 1986 Richard Conn, Newsletter Editor Published by Echelon, Inc. This issue page I Displays. The Ftp (the ddn file Transfer Protocol) program (available in various versions on every ddn host computer) can provide users with a directory display of all files in any of the archives in the asr 30.64 Kb. 1 | read |
| Ait580 Lab Journal Report Comment on the benefits and drawbacks of having all your input and output stored on 13 Report 43.41 Kb. 1 | read |
| Linux Project Professor: Glen Gray Department of Information Systems is 311 tth 3: 30 4: 45 pm This makes Linux and open source operating system. It is the antithesis of the proprietary model that most mainstream operating systems follow. Linux is licenses under the gnu general Public Licenses (gpl) 110.87 Kb. 1 | read |
| Ant Forage Simulations in StarLogo and gpl The Challenge: Simple and Autonomous Members via Sophisticated Global behaviors 4 51.61 Kb. 1 | read |
| 2014 Skillsusa ocean County nj computer programming contest This contest consists of project coding and output, a written quiz, and an interview. This packet includes the written test and instructions for two projects. The project specifications are written for Visual Basic 26.76 Kb. 1 | read |
| Android Home screen displayed by Samsung Galaxy Nexus, running Android 0 "Ice Cream Sandwich" Company /developer Home screen displayed by Samsung Galaxy Nexus, running Android 0 "Ice Cream Sandwich" 202.04 Kb. 1 | read |
| Huazhong university of science and technology Students should understand the structure of Android application installation package 31.25 Kb. 1 | read |