Computers & Technology
epub, mobi |eng | 2020-03-27 | Author:West, Levi [West, Levi]
Ensure the Latest Firmware is Installed Why it’s important: Firmware is software that is embedded on your hardware to help it run. Many Internet users do not update the firmware ...
( Category:
Respiratory
April 3,2020 )
epub |eng | 2005-02-27 | Author:David D. Woods & Erik Hollnagel [David D. Woods]
( Category:
Health & Safety
April 3,2020 )
epub |eng | 2020-03-06 | Author:Bren , Bryan [Bren , Bryan]
Chapter 13: Build a Community Importance of Building Community Facebook is not about people; it's about the community. Facebook is a means of communicating with other people, and that’s the ...
( Category:
E-Commerce
April 3,2020 )
epub |eng | 2020-03-19 | Author:Fiordelis, Stephen [Fiordelis, Stephen]
Phases of Ethical Hacking Ethical hacking is divided into five phases. Not every hacker needs to use this step sequentially. Depending on the targets, these phases can be utilized accordingly. ...
( Category:
Software Development
April 3,2020 )
epub |eng | 2020-03-21 | Author:Losik Ph.D, Len [Losik Ph.D, Len]
W hen recording PCM telemetry, it is important to ensure that the recorder provides sufficient frequency response to capture and reproduce the PCM signal. The following general rules may be ...
( Category:
Aircraft Design & Construction
April 3,2020 )
epub |eng | 2020-03-22 | Author:Morgan, Kevin [Morgan, Kevin]
Quick Notes: · Hubs and switches are employed to build networks · Routers are designed to affix networks What is the difference between a modem and a router? Others may ...
( Category:
Networks
April 3,2020 )
epub |eng | 2019-12-08 | Author:Steve Tudor [Tudor, Steve]
( Category:
Hardware & DIY
April 3,2020 )
epub |eng | 2019-11-27 | Author:unknow
( Category:
Architecture
April 2,2020 )
epub, mobi |eng | 2020-03-30 | Author:Antonio Melé
RabbitMQ is running and ready to receive messages. Adding Celery to your project You have to provide a configuration for the Celery instance. Create a new file next to the ...
( Category:
Software Development
April 2,2020 )
epub |eng | 2020-03-27 | Author:Anjali Khatri [Anjali Khatri]
Allow developers to focus only on business logic and leave security implementation to the application infrastructure team. Next, we will enable simple TLS for the bookinfo application. Enabling bookinfo for ...
( Category:
Cloud Computing
April 2,2020 )
epub, mobi |eng | 2019-08-12 | Author:Ajay Baranwal [Ajay Baranwal]
Technical requirements It's assumed that readers of this chapter and this book know the basics of machine learning, neural networks, and deep neural networks. Also, as a prerequisite, it's assumed ...
( Category:
Intelligence & Semantics
April 2,2020 )
epub |eng | 2020-03-30 | Author:Johann Rehberger
Figure 6.27: Loading CSV files into the graph database Here we see the successful load of a CSV file so that it can be processed by Neo4j. However, at this ...
( Category:
Networking & Cloud Computing
April 2,2020 )
epub |eng | 2020-03-31 | Author:Piotr Tylenda [Piotr Tylenda]
md .\declarative-demo cd .\declarative-demo Create the windows-example-deployment.yaml manifest file, which contains the Deployment definition: --- apiVersion: apps/v1 kind: Deployment metadata: name: windows-example labels: app: sample spec: replicas: 1 selector: matchLabels: ...
( Category:
Business Technology
April 2,2020 )
epub |eng | 2016-06-06 | Author:DICE [DICE]
( Category:
Media Tie-In
April 2,2020 )
epub |eng | | Author:Daniel T. Jessie & Donald G. Saari
© Springer Nature Switzerland AG 2019 D. T. Jessie, D. G. SaariCoordinate Systems for GamesStatic & Dynamic Game Theory: Foundations & Applicationshttps://doi.org/10.1007/978-3-030-35847-1_4 4. Two-Person Multi-strategy Games Daniel T. Jessie1 and ...
( Category:
Game Theory
April 2,2020 )
Categories
Popular ebooks
Deep Learning with Python by François Chollet(27921)The Mikado Method by Ola Ellnestam Daniel Brolund(25229)
Hello! Python by Anthony Briggs(24262)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(23351)
Kotlin in Action by Dmitry Jemerov(22436)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(21902)
Dependency Injection in .NET by Mark Seemann(21786)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(20648)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(19476)
Grails in Action by Glen Smith Peter Ledbrook(18552)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17020)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(15810)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(13660)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11806)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11133)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10618)
Hit Refresh by Satya Nadella(9175)
The Kubernetes Operator Framework Book by Michael Dame(8559)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8396)
Robo-Advisor with Python by Aki Ranin(8340)