Computers & Technology
epub |eng | 2016-05-25 | Author:Troy McMillan
Certification Authority The certification authority (CA) is the entity that creates and signs digital certificates, generates the key pairs, maintains the certificates, and revokes them when necessary. To participate in ...
( Category:
Networking & Cloud Computing
January 7,2018 )
epub |eng | 2015-07-25 | Author:Quentin Docter
Chapter 5 Lab The Chapter 5 lab has two parts to it. In part 1, you will set up your own secure network. In part 2, you will see how ...
( Category:
Certification
January 7,2018 )
epub |eng | 2017-10-22 | Author:K.L. Hughes [Hughes, K.L.]
Charlee stands in the open doorway of her old bedroom and stares at the partially covered lump in her bed. She takes in the long, bare leg sticking out from ...
( Category:
Arts & Photography
January 6,2018 )
epub |eng | 2017-12-06 | Author:James M. Stewart
Protocol/service Port(s) Notes FTP TCP ports 20 (data) and 21 (control) SSH TCP port 22 All protocols encrypted by SSH also use TCP port 22, such as SFTP, SHTTP, SCP, ...
( Category:
Certification
January 6,2018 )
epub |eng | | Author:Nilanjan Dey
The energy is stored in the super conducting coil (E) in the SMES unit, and the rated power (P) is given by (Tam, & Kumar, 1990): (7) (8) where, L ...
( Category:
Computers & Technology
January 6,2018 )
epub |eng | | Author:Information Resources Management Association
Section 3 Environmental Management Chapter 9 Coastal Impervious Cover and Watershed Scale: Implications for Environmental Management, New Hanover County, North Carolina Michael T. Griffin East Carolina University, USA James Dean ...
( Category:
Business & Money
January 6,2018 )
epub |eng | | Author:Henry Garner
We could implement SGD with Tesser by taking advantage of the fact that the combiner is applied serially, and treat each chunk as a mini-batch from which the coefficients could ...
( Category:
Software
January 6,2018 )
epub |eng | | Author:Pawan Kumar [Pawan Kumar]
Note that events are also inherited from supertypes just like properties. The events shown in the previous screenshot, are inherited from dm_document— these are system events and cannot be modified ...
( Category:
Computers & Technology
January 6,2018 )
epub |eng | 0101-01-01 | Author:S.L. Gape [Gape, S.L.]
Chapter Twenty-Three Heidi had a fantastic couple of days with her parents. They ate the Indian last night and stayed up late playing cards. Today was spent lazing by the ...
( Category:
History & Criticism
January 6,2018 )
epub |eng | 2007-06-01 | Author:K.M. [K.M.]
The smell of freshly brewing coffee permeated the hallway, its enticing aroma too much for a mere mortal to resist. The young associate breezed her way toward the apparent source, ...
( Category:
Architecture
January 6,2018 )
azw3 |eng | 2014-07-04 | Author:Jeremy Gibson [Gibson, Jeremy]
* * * 1 using UnityEngine; 2 using System.Collections; 3 using System.Collections.Generic; // Necessary to use generic Lists 4 5 public class Boid : MonoBehaviour { 6 // This static ...
( Category:
Programming
January 6,2018 )
epub |eng | 2016-01-05 | Author:Patrick J. Lynch & Sarah Horton
FIGURE 6.10 This example responsive site design expands at three breakpoints, and sets a maximum width of 960 pixels for laptop and desktop displays. Prioritized content and functionality Given the ...
( Category:
Web Development & Design
January 5,2018 )
epub |eng | 2017-01-05 | Author:Christian Hur
parseInt(str [, radix]) These functions return a numeric value when given a string as an argument. The parseInt function parses its first argument, the string str, and attempts to return ...
( Category:
Web Development & Design
January 5,2018 )
azw3 |eng | 2015-05-28 | Author:Dmitriy Nesterkin [Nesterkin, Dmitriy]
Listing 3.31: Size each list of skills to one third of its container and stack the lists next to each other #skills .skillset ul { float: left; width: 33%; } ...
( Category:
Web Development & Design
January 5,2018 )
epub |eng | 2014-08-04 | Author:Alan Cooper & Robert Reimann & David Cronin & Chris Noessel
Audit, don’t edit. Microsoft Word has an excellent example of auditing, as well as a nasty counterexample. This excellent example is how it handles real-time spell checking. As you type, ...
( Category:
Computers & Technology
January 5,2018 )
Categories
Popular ebooks
Deep Learning with Python by François Chollet(28003)The Mikado Method by Ola Ellnestam Daniel Brolund(25294)
Hello! Python by Anthony Briggs(24339)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(23434)
Kotlin in Action by Dmitry Jemerov(22512)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(21976)
Dependency Injection in .NET by Mark Seemann(21849)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(20715)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(19523)
Grails in Action by Glen Smith Peter Ledbrook(18609)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17034)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(15843)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(13696)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11857)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11151)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10627)
Hit Refresh by Satya Nadella(9202)
The Kubernetes Operator Framework Book by Michael Dame(8570)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8414)
Robo-Advisor with Python by Aki Ranin(8361)