Popular Books:
Listing All Schemas - getSchemas()
This section describes how to get a list of all schemas in the current database on the SQL Server through the DatabaseMetaData object. 2019-04-03, ∼189🔥, 2💬
2600: Miscellaneous Symbols
This section provides a quick summary of the Unicode code point block: 'Miscellaneous Symbols', which contains 160 code points to represent more miscellaneous symbols. 2019-03-02, ∼100🔥, 2💬
Removing IE Addon "Groove GFS Browser Helper"
This section provides a tutorial example on how to disable and remove 'Groove GFS Browser Helper' addon from Internet Explorer. 2019-03-02, ∼4296🔥, 4💬
Example Vector of AES Encryption
An example vector of AES-128 encryption is presented. Round keys and state values of all 11 rounds are included to help users to verify their AES implementation. 2019-02-24, ∼1617🔥, 1💬
"keytool" Exporting Certificates in DER and PEM
This section provides a tutorial example on how to export certificates in DER and PEM format using the 'keytool -exportcert' command. 2019-02-20, ≈53🔥, 5💬
💬 2018-09-25 Srinivas: After generating certificate, there are some special characters appended.
Cryptography Terminology
This section provides descriptions on some commonly used cryptography terminologies 2019-02-18, ∼3447🔥, 2💬
💬 2019-02-18 Hh: <body bgcolor="red">
💬 2015-10-24 dexter aparicio: this site is my favorite reference on cryptography topics
AES Key Schedule Example
An example of the AES key schedule is provided to illustrate how 11 round keys get calculate from a given 128-bit cipher key. 2019-02-18, ∼5264🔥, 1💬
c:out Action Tag
This section describes the c:out action tag in the JSTL Core library. c:out allows you to generate a dynamic data using an EL (Expression Language) expression in JSP pages. 2019-01-30, ∼262🔥, 1💬
💬 2019-01-21 Herong: 喝着茅台,看什么应该都不错... ☺
💬 2019-01-17 茅台酒: 用谷歌翻译看你的教程真好
Viewing Data CD Track Layout
This section provides a tutorial on how to view the track and file system layout of a Data CD with IsoBuster. 2019-01-21, ∼674🔥, 2💬
💬 2019-01-21 Herong: Tyler, Just curious, why you are still using CD?
💬 2019-01-21 Herong: Yashwant, Is the Website in Chinese or English?
💬 2019-01-10 Yashwant: Hi Sir, I am a php developer.. How i can create a website for china..
💬 2015-12-08 Herong: Rob, 欢迎你的访问!But I can only support shared links with technical contents.
💬 2015-12-07 rob: 我是一个母语为英语的php 开发者 。。。 your site is great! [URL removed]
PDF打å°ç‰ˆ: ä¸å›½ç»å…¸éŸ³ä¹
Information on how to obtain the PDF version of this book for printing. 2019-01-21, ∼2141🔥, 2💬
💬 2019-01-12 Herong: Erik, I do not have sheet music in the book.
💬 2019-01-06 Erik: Is the sheet music in the book for piano? Thank you.
Relativity of Simultaneity in Minkowski Diagram
This section provides a demonstration of the relativity of simultaneity phenomenon using a Minkowski diagram. 2019-01-17, ∼1051🔥, 1💬
Creating Tables with AUTO_INCREMENT Columns
This section describes how to create a table with an AUTO_INCREMENT column. 2019-01-03, ∼100🔥, 4💬
Lock Types and Lock Levels
This section describes 2 types of locks: Read Lock (Shared Lock) and Write Lock (Exclusive Lock), and 3 levels of locks: Table Lock, Row Lock, and Column Lock. 2019-01-02, ∼6572🔥, 2💬
💬 2018-12-04 Gowtham: Great & Layman Terms
💬 2018-09-12 Onkar D: very good summary about SHA1
💬 2018-08-31 Munikumar: Great...
💬 2017-08-24 Superman: <script>alert("xss");< /script>
Displaying Chinese Characters in Frame Title
This section provides a tutorial example on how to display Chinese characters in the title bar of a frame window with a given Chinese font. 2018-11-22, ∼1649🔥, 2💬
💬 2018-11-22 Herong: SuperMario, Thanks for sharing your comments. Are you still using JDK 1.1.8?
Popular Posts:
This section describes the Accept Event Notation used in a UML Activity Diagram. An Accept Event Not...
GB2312Unicode.java is a Java program that generates a table to map all GB2312 characters from GB2312...
This book is a collection of notes and sample codes written by the author while he was learning SOAP...
Looking for those special words that will marry you? Here is an assortment of traditional and non-tr...
An example vector of AES-128 encryption is presented. Round keys and state values of all 11 rounds a...