Computers & Technology
epub |eng | | Author:Joe Larson
The Boolean modifier is one of the most important tools in Blender that's used to create 3D printable objects. However, it can also be one of the most frustrating to ...
( Category:
Architecture
January 15,2020 )
epub |eng | 2019-12-10 | Author:Joe Hutsko & Barbara Boyd & Jesse Feiler & Doug Sahlin
If you want a more robust firewall than the one that comes with the Mac (and the added security of antivirus and antimalware protection), consider one of the following: ClamXAV: ...
( Category:
Macs
January 15,2020 )
azw3, epub, pdf |eng | 2015-12-07 | Author:David Willson & Henry Dalziel [Willson, David]
Yet another bank email. This one appears to have come from Capital One. The real point here, like many others is that the scammers want you to click the link. ...
( Category:
Business Technology
January 15,2020 )
azw3 |eng | 2015-12-08 | Author:David Willson & Henry Dalziel [Willson, David]
Yet another bank email. This one appears to have come from Capital One. The real point here, like many others is that the scammers want you to click the link. ...
( Category:
Accounting
January 15,2020 )
azw3, pdf |eng | 2015-12-08 | Author:David Willson & Henry Dalziel [Willson, David]
Again, never, never ever click on links and emails. If you are on LinkedIn, you likely have received many connection requests, or a friend requests if you are on Facebook. ...
( Category:
Databases & Big Data
January 15,2020 )
epub |eng | 2019-10-02 | Author:Damian Bradfield
What is the actual culture of Silicon Valley? Does it really beat what we’ve got in Amsterdam? In Europe? They are able to push forward with intrusion, tracking, data mining, ...
( Category:
Decorative Arts & Design
January 14,2020 )
epub |eng | 2019-12-11 | Author:John Paul Mueller & Luca Massaron
Touching the nonseparability limit The secret to perceptron calculations is in how the algorithm updates the vector w values. Such updates happen by randomly picking one of the misclassified examples. ...
( Category:
Data Mining
January 14,2020 )
epub |eng | 2020-02-19 | Author:Rafael Concepcion [Rafael Concepcion]
( Category:
Adobe Photoshop
January 14,2020 )
epub |eng | | Author:Flávia C. Delicato, Paulo F. Pires & Thais Batista
5.3.2 Discussion Unlike approaches that consider the IoT devices as passive data sources and delegate all work to the cloud, the proposals presented in this section leverage the collaborative processing ...
( Category:
Computer Science
January 14,2020 )
epub |eng | | Author:Chintan Bhatt, Nilanjan Dey & Amira S. Ashour
Importance of Unsupervised Learning Algorithms in Big data Analytics: Unsupervised learning is one of the most effective way for analyzing big data as no training set data is required here. ...
( Category:
Computer Science
January 14,2020 )
epub |eng | | Author:Nik Bessis & Ciprian Dobre
6 Design Decisions and Applications We made a number of design decisions during the development of the CADDOT model. These decisions address the challenges we highlighted in earlier sections. Security ...
( Category:
Computer Science
January 14,2020 )
epub |eng | | Author:Liehuang Zhu, Zijian Zhang & Chang Xu
The privacy-preserving key management(PARK) scheme is proposed in [X]. The privacy-preserving key management scheme uses adaptive key management and revocation to secure customer data from outsiders in the smart grid. ...
( Category:
Networking & Cloud Computing
January 14,2020 )
epub |eng | | Author:Christoph Guger, Brendan Allison & Junichi Ushiba
22. D. Coyle, G. Prasad, T.M. McGinnity, A time-series prediction approach for feature extraction in a brain-computer interface. IEEE Trans. Neural Syst. Rehabil. Eng. 13(4), 461–467 (2005)CrossRefMATH 23. F. Lotte, ...
( Category:
Computer Science
January 13,2020 )
epub |eng | 2019-10-31 | Author:Isa Mazzei
Girls Just Want To Have Fun I landed in Vegas with my heart in my throat, nervous for my show with Ginger. A lot was riding on this. I needed ...
( Category:
Pornography
January 13,2020 )
epub, azw3 |eng | 2016-01-25 | Author:Aniket Pataskar
Java program to print Floyd's triangle This java program prints Floyd's triangle. Java programming source code import java.util.Scanner; class FloydTriangle { public static void main(String args[]) { Scanner in = ...
( Category:
Computer Science
January 13,2020 )
Categories
Popular ebooks
Deep Learning with Python by François Chollet(27999)The Mikado Method by Ola Ellnestam Daniel Brolund(25282)
Hello! Python by Anthony Briggs(24335)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(23421)
Kotlin in Action by Dmitry Jemerov(22504)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(21961)
Dependency Injection in .NET by Mark Seemann(21838)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(20707)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(19517)
Grails in Action by Glen Smith Peter Ledbrook(18595)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17031)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(15836)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(13684)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11851)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11151)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10621)
Hit Refresh by Satya Nadella(9188)
The Kubernetes Operator Framework Book by Michael Dame(8563)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8400)
Robo-Advisor with Python by Aki Ranin(8358)