Do not miss any new update

implementation of Luhn algorithm using java 8

Posted by aamir khan


this post has moved here


/*---google search--*/
More aboutimplementation of Luhn algorithm using java 8

How to Convert RGB to CMYK and CMYK to RGB in java

Posted by aamir khan

This post moved here
/*---google search--*/
More aboutHow to Convert RGB to CMYK and CMYK to RGB in java

[pdf] The Healthy Programmer: Get Fit, Feel Better, and Keep Coding

Posted by aamir khan





















The Healthy Programmer

Get Fit, Feel Better, and Keep Coding



This book will guide you in a transformation from an achy, unhealthy, and
possibly grumpy hacker to a happy and productive programmer.

Although this book should appeal to a wide range of programmers, it’s primarily
directed at those that are sedentary. The less you are doing for your health
right now, the more you’ll get out of this book.

The number-one reason you should read this book is that your life depends
on it. But the second most important reason is that your career depends on
it. If you want to continue doing the job you love for years to come, this book
is for you.


Details:

Author : Joe Kutner
254 pages
Published: 2013-06-21
Release: P1.0 (2013-07-10)
ISBN: 978-1-93778-531-4

format: PDF


CLICK TO DOWNLOAD


The Digital Edition of this Book is Only and Only for Educational Purpose..
/*---google search--*/
More about[pdf] The Healthy Programmer: Get Fit, Feel Better, and Keep Coding

Which Browser is safest in 2014

Posted by aamir khan
















NSSLabs conducted a test in which the Eight browsing programs

  • Qihoo 360 V 6.3.1.132
  • Firefox V 27.0.1
  • Google Chrome V 6.3.1.132
  • Internet Explorer V 11.0.9600.16384
  • Kingsoft Liebao V 4.5.37.6837
  • Opera V 19.0.1326.63
  • Safari V 5.1.7 (7534.57.2)
  • Sogou Explorer V 4.2.6.10812

Environment

Operating System:

Windows 8.1 Enterprise with Windows Defender disable

Security Stack:

Testing Methodology V1.5


Eight leading browsers, including three from China, were tested against the Security Stack: Testing Methodology V1.5, using 657 samples of socially engineered malware (SEM) that were captured over 14 days in NSS Labs’ unique live testing harness. SEM attacks use several different methods to deceive users into downloading malicious software, but the browser is the primary vector for
delivery of SEM and therefore is the first line of defense against such attacks.


Average Block Rate for SEM


You Can Download the Complete test as PDF here
/*---google search--*/
More aboutWhich Browser is safest in 2014

[pdf] 101 Excel 2013 Tips, Tricks and Timesavers

Posted by aamir khan

101 Excel Tips and Tricks[img]






Book Details
Publisher: Wiley
By: John Walkenbach
ISBN: 978-1-118-64218-4
Year: 2013
Pages: 312
Language: English
File size: 47.8 MB
File format: PDF


Book Description:

Excel! In this latest addition to his popular Mr. Spreadsheet's Bookshelf series, John Walkenbach, aka "Mr. Spreadsheet," shares new and exciting ways to accomplish and master all of your spreadsheet tasks. From taming the Ribbon bar to testing and tables, creating custom functions, and overcoming "impossible" charts, mixing nesting limits, and more, 101 Excel 2013 Tips, Tricks, & Timesavers will save you time and help you avoid common spreadsheet stumbling blocks.

Download

Note: The Purpose of posting this Digital book is Only for Educational use.
/*---google search--*/
More about[pdf] 101 Excel 2013 Tips, Tricks and Timesavers

ASCII Values and Hex Codes of Math Symbols

Posted by aamir khan

Here is the List of ASCII Values and Hex Codes of Math Symbols...


Name
Symbol
Web Friendly Code
Numerical Code
Hex Code
Minus Sign

8722
−
Plus Sign
+
+
43
+
Plus or Minus Sign
±
±
177
±
Multiplication Sign
×
×
215
×
Division Sign
÷
÷
247
÷
Percent Sign
%
%
37
%
Per Mille Sign (per thousand)

137
‰
Equal Sign
=
=
61
=
Not Equal To Sign

8800
≠
Approximately Equal Sign

8776;
≈
Identical To Sign

8801;
≡
Less Than Sign
<
60;
<
Greater Than Sign
>
62;
>
Less Than or Equal To Sign

8804;
≤
Greater Than or Equal To Sign

8805;
≥
Infinity Sign

8734;
∞
One Eighth Fraction

8539;
⅛
One Quarter Fraction
¼
¼
188;
¼
Three Eighths Fraction

8540;
⅜
One Half Fraction
½
½
189;
½
Five Eighths Fraction

8541;
⅝
Three Quarters Fraction
¾
¾
190;
¾
Seven Eighths Fraction

8542;
⅞
Integral Sign

8747;
∫
Partial Differential Sign

8706;
∂
Increment Sign

8710;
∆
N-ary Product Sign

8719;
∏
N-ary Sum Sign

8721;
∑
Square Root Sign

8730;
√
Right Angle Sign

8735;
∟
Intersection Sign

8745;
∩
Bullet Operator

8729;
∙
Function Sign
ƒ

131;
ƒ
Fraction Slash

8260;
⁄

Inherit from about.com
/*---google search--*/
More aboutASCII Values and Hex Codes of Math Symbols

..-

Related Posts Plugin for WordPress, Blogger...

If you like this blog,then link back to me.
This is what you will see.



Optionally use this Widget installer to add this link to your blogger blog.