Popular Books:
"brainpoolP256r1"“ - For 256-Bit ECC Keys
This section describes 'brainpoolP256r1' elliptic curve domain parameters for generating 256-Bit ECC Keys as specified by RFC 5639. 2022-10-01, ∼3432🔥, 0💬
Other XML Tools Functions
This section describes other nice functions in XML Tools Plugin: XML to text conversion, current XPath, and XPath expression evaluation. 2015-07-22, ∼3420🔥, 1💬
Full Version in PDF/EPUB
Information on how to obtain the full version of this book in PDF, EPUB, or other formats. 2023-04-15, ∼3414🔥, 10💬
💬 2017-05-24 basha: u r too good
💬 2017-04-15 Herong: You are welcome!
💬 2017-04-01 abdul: Thanks for the book
💬 2016-06-06 Jay: Thanks for the book
💬 2022-04-25 Хуй: Блять что дальше делать то суки... с этой хуйнёй.. для PHP
💬 2020-01-12 Herong: Walter, are you looking for an example to generate the SOAP message?
💬 2020-01-08 walter: thanks for the write up. Do you have an example in JAVA
💬 2019-11-27 Herong: Nurik, In what programming language?
💬 2019-11-24 nurik: plaese advice me tutorial about implementing soap security using x.509
Downloading and Installing Flex SDK 4.1
This section provides a tutorial example on how to download and install Adobe Flex SDK 4.1 on Windows system. 2021-01-13, ∼3400🔥, 15💬
💬 2020-06-30 liuzongcai: m=t think you
💬 2020-03-30 tonyzhangshi: thank you!
Full Version in PDF/EPUB
Information on how to obtain the PDF version of this book for printing. 2016-12-28, ∼3394🔥, 5💬
💬 2016-12-28 liab: wrote a meaningful comment
💬 2016-08-23 ericens: it meaning a lot to me
What Is ECDH Key Exchange
This section introduces what is ECDH Key Exchange - a protocol that uses the Elliptic Curve group property to establish a shared secret key without sending it directly to each other. 2023-11-09, ∼3369🔥, 3💬
javax.net.ssl.trustStore System Property
This section provides a tutorial example on how Java uses the default trusted KeyStore file, if the system property, javax.net.ssl.trustStore, is not specified. 2022-12-26, ∼3347🔥, 1💬
Listing All Databases - getCatalogs()
This section describes how to get a list of all databases on the SQL Server through the DatabaseMetaData object. 2022-10-01, ∼3341🔥, 0💬
What Is Cryptography?
This section describes what is cryptography - The study of techniques related to all aspects of data security. 2021-04-25, ∼3326🔥, 6💬
💬 2015-10-19 Ian T. Lee: Can you give me a simple example of how to do cryptography manually?
interrupt() - Method to Terminate Thread
This section provides a tutorial example on how to terminate running threads with the interrupt() method. 2016-03-02, ∼3309🔥, 1💬
Why Sorting Is Needed
This section describes why sorting is needed - Search in a sorted collection is much faster than an un-sorted collection. 2017-08-10, ∼3305🔥, 3💬
💬 2017-08-10 Caleb E: Very Nice
💬 2015-11-27 Herong: Palash, Good article. Thanks for sharing it.
Bitwise Operations on "byte" Values
This section describes 4 types of bitwise operations, 'And', 'Or', 'Exclusive Or', and 'Complement' that applies on 'byte' values indirectly through 'int' values. 2016-02-17, ∼3304🔥, 1💬
Popular Posts:
This section describes the automated process used by Windows to communicate to Windows Update Websit...
This section provides information on handling Chinese character string literals in Big5 encoding.
This section provides a tutorial example on how to see the list of trusted root CA (PKI Authorities)...
This section provides a tutorial example on how to find FreeCell registry keys with the 'regedit' se...
This PHP tutorial book is a collection of notes and sample codes written by the author while he was ...