Computers & Technology
epub |eng | 2019-06-23 | Author:Dedov, Florian [Dedov, Florian]
import socket target = "10.0.0.5" def portscan(port): try : s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) conn = s.connect((target, port)) return True except : return False for x in range ( 1 , ...
( Category:
Python
March 28,2020 )
epub |eng | | Author:Shuli Guo & Lina Han
Rule 2: If is about 0.04 m Then where E, , and are known, and they represent the structural information of uncertain parameters and . System (5.35) can be inferred ...
( Category:
Computer Science
March 28,2020 )
epub |eng | | Author:Unknown
4 Applications of Network Centralities as an Evaluation Index In this section, I show two applications of the proposed evaluation index. One is “evaluation of researchers selected for funding programs”, ...
( Category:
Computer Science
March 28,2020 )
epub |eng | | Author:Basab Bijoy Purkayastha & Kandarpa Kumar Sarma
Fig. 5.10Nyquist rate phase detector Fig. 5.11Nyquist rate phase detector waveform 5.6.3 Nyquist Rate (NR) Phase Detector A very common and easy to implement PD is the Nyquist rate PD ...
( Category:
Hardware & DIY
March 28,2020 )
azw3, epub |eng | 2017-06-30 | Author:Thomas LaRock
Cascading Changes You can also use triggers to enforce cascading changes that aren’t necessarily tied to referential integrity (i.e., primary and foreign key definitions). For example, you might need to ...
( Category:
Data Modeling & Design
March 28,2020 )
epub |eng | 2013-03-14 | Author:Torgeir K. Haavik
7.5.2 Scenario: Understanding a Mud Kick During Drilling The following scenario might illustrate the seamless nature of a sociotechnical system, represented by drilling operations in a future where Alpha-Drill, Beta-Drill ...
( Category:
Economics
March 28,2020 )
epub |eng | | Author:Goldstine, Herman H.; Goldstine, Herman H. H.;
These few illustrations should serve to show the true situation: all members of the discussion group shared their ideas with each other without restraint and therefore all deserve credit. Eckert ...
( Category:
Electronics
March 28,2020 )
epub |eng | 2009-06-03 | Author:Rich Seifert [Rich Seifert]
8.2.1.1.2 Aggressive Backoff Analogous to the backpressure approaches discussed earlier, a switch or other device can modify the characteristics of the Ethernet backoff algorithm to obtain an unfair advantage and ...
( Category:
LAN
March 28,2020 )
epub |eng | | Author:Unknown
The generated obligations are:PO1. We have to prove that using the hypotheses given above and the additional one it follows that . PO2. Proves that from the same preconditions follows. ...
( Category:
Computer Science
March 28,2020 )
epub |eng | 2013-03-14 | Author:Chris Bearman & Anjum Naweed & Jillian Dorrian & Janette Rose & Drew Dawson
Figure 7.7 One sub-goal of GDTA for achieving Flexible Manufacturing System planned output (adapted from Usher and Kaber, 2000, used by permission of John Wiley & Sons, Inc.) Figure 7.8 ...
( Category:
Economics
March 28,2020 )
epub, mobi, pdf |eng | 2016-11-12 | Author:Agus Kurniawan
In this chapter, we try to access MicroPython Analog I/O using MicroPython program. There are two scenarios for our cases: Controlling RGB LED Reading Analog input using Potentiometer Let's start. ...
( Category:
Hardware & DIY
March 28,2020 )
epub, mobi |eng | | Author:Doug Turnbull John Berryman
Given this specification, you can express the ideal document to Elasticsearch for your Star Trek search. One simple improvement, shown in the following listing, is to group people to more ...
( Category:
Computer Science
March 28,2020 )
epub |eng | 2016-03-14 | Author:Darril Gibson
EXAM TIP An alert provides notification of a potential adverse event. Personnel analyze the event to determine if it is an incident. An alert can be a false positive, which ...
( Category:
Encryption
March 28,2020 )
epub |eng | 2017-04-13 | Author:Jason McDonald [McDonald, Jason]
And here’s a screenshot of an ad with a location extension and stars (coming from their Google reviews): Notice how DeVry has added their phone number of 855-604-8442 as a ...
( Category:
Advertising
March 28,2020 )
epub |eng | 2010-03-14 | Author:Jeremy Siek & Lie-Quan Lee & Andrew Lumsdaine
u = vertex(0, digraph); v = vertex(1, digraph); add_edge(u, v, Weight(1.2), digraph); add_edge(v, u, Weight(2.4), digraph); tie(e1, found) = edge(u, v, digraph); tie(e2, found) = edge(v, u, digraph); std::cout << ...
( Category:
C++
March 28,2020 )
Categories
Popular ebooks
Deep Learning with Python by François Chollet(27922)The Mikado Method by Ola Ellnestam Daniel Brolund(25230)
Hello! Python by Anthony Briggs(24263)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(23352)
Kotlin in Action by Dmitry Jemerov(22437)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(21903)
Dependency Injection in .NET by Mark Seemann(21786)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(20648)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(19477)
Grails in Action by Glen Smith Peter Ledbrook(18553)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17020)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(15810)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(13660)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11807)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11133)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10618)
Hit Refresh by Satya Nadella(9175)
The Kubernetes Operator Framework Book by Michael Dame(8559)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8396)
Robo-Advisor with Python by Aki Ranin(8340)