Computers & Technology
epub |eng | | Author:Gilberto Nájera-Gutiérrez
( Category:
Networking & Cloud Computing
January 3,2018 )
epub, pdf |eng | 2015-08-07 | Author:Michael Gregg
Key Terms Active Directory—A Windows implementation of a hierarchical directory service that is LDAP compliant. Brute-force attack—A method of breaking a cipher or encrypted value by trying a large number ...
( Category:
Networking & Cloud Computing
January 3,2018 )
epub, pdf |eng | 2012-02-27 | Author:Edward Amoroso
Figure 7.1 Size comparison issues in a trusted computing base. A major consideration in the protection of national infrastructure thus becomes how to manage, promote, and ensure proper human discretion ...
( Category:
Management & Leadership
January 3,2018 )
epub |eng | 2014-01-03 | Author:Sood, Aditya, Enbody, Richard & Richard Enbody
Inline hooking Inline hooking allows the attackers to overwrite the first few bytes of target function and place a jump instruction that redirects the execution flow to the attacker controlled ...
( Category:
Networking & Cloud Computing
January 3,2018 )
epub, pdf |eng | 2013-07-29 | Author:Foster Provost & Tom Fawcett
When working with a classifier that gives scores to instances, in some situations the classifier decisions should be very conservative, corresponding to the fact that the classifier should have high ...
( Category:
Databases & Big Data
January 3,2018 )
epub |eng | 2012-02-09 | Author:Green, Jennette [Green, Jennette]
Create a Table of Contents for Your eBook You may also want to include a hyperlinked Table of Contents (TOC) in your ebooks, even if you did not include a ...
( Category:
Graphics & Design
January 3,2018 )
epub, mobi |eng | 2016-12-27 | Author:admin
Пета глава След като Клариса се изкъпа, една прислужница закопча, завърза и закрепи с карфици взетата назаем рокля. Въпреки че моделът беше от преди две години, роклята от слонова кост, ...
( Category:
Networking & Cloud Computing
January 2,2018 )
azw3, epub |eng | 2017-06-12 | Author:Andreas M. Antonopoulos [Antonopoulos, Andreas M.]
Transaction Pools Almost every node on the bitcoin network maintains a temporary list of unconfirmed transactions called the memory pool, mempool, or transaction pool. Nodes use this pool to keep ...
( Category:
Processes & Infrastructure
January 2,2018 )
epub |eng | 2015-04-19 | Author:Asghar Ghori [Ghori, Asghar]
( Category:
Operating Systems
January 2,2018 )
epub, pdf |eng | 2017-01-08 | Author:Cyberpunk University [University, Cyberpunk]
#Now call the AgeChanger function ages = [10,15,20] AgeChanger(ages) print ("Values outside the function: ", ages) When you run this exercise, you should see something like this: C:\Python35-32\Exfiles>python Ex28.py Values ...
( Category:
Programming
January 2,2018 )
azw3 |eng | 2017-10-20 | Author:Dr. Engr. S.M. Farrukh Akhtar [Akhtar, Dr. Engr. S.M. Farrukh]
#for obstacle for Nan at (1,1) var_matrix_policy[1,1] = numP.NaN var_matrix_policy[0,3] = var_matrix_policy[1,3] = -1 # Matrix action-state (intilize with random values) parm_Matrix_Action_State_ = numP.random.random_sample((4,12)) Finally, we have the main loop ...
( Category:
Computer Science
January 2,2018 )
azw3, epub, mobi |eng | 2017-07-21 | Author:Manish Sethi [Sethi, Manish]
Summary In this chapter, you learned how to structure our application by using the Flux pattern, and we also got an understanding of the different concepts of Flux, such as ...
( Category:
Networking & Cloud Computing
January 2,2018 )
azw3 |eng | 2017-08-31 | Author:Prabhanjan Narayanachar Tattar [Tattar, Prabhanjan Narayanachar]
Time for action – testing probability of success We will use the R function binom.test for testing hypotheses problems related to p. This function takes as arguments n number of ...
( Category:
Databases & Big Data
January 2,2018 )
azw3 |eng | 2016-06-10 | Author:Dusty Phillips & Fabrizio Romano & Phuong Vo.T.H & Martin Czygan & Robert Layton [Phillips, Dusty]
The preceding snippet says that our MongoDB instance only has one database, named 'local'. If the databases and collections we point to do not exist, MongoDB will create them as ...
( Category:
Computers & Technology
January 2,2018 )
epub, azw3 |eng | 2016-11-29 | Author:Norris, Donald [Norris, Donald]
Figure 6-1 Backside of the AMP board. The front side of the AMP board is shown in Figure 6-2 , where you may clearly see all the labeled solder pads ...
( Category:
Programming Languages
January 2,2018 )
Categories
Popular ebooks
Deep Learning with Python by François Chollet(28003)The Mikado Method by Ola Ellnestam Daniel Brolund(25294)
Hello! Python by Anthony Briggs(24339)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(23434)
Kotlin in Action by Dmitry Jemerov(22512)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(21976)
Dependency Injection in .NET by Mark Seemann(21848)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(20715)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(19523)
Grails in Action by Glen Smith Peter Ledbrook(18609)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17034)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(15843)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(13695)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11857)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11151)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10627)
Hit Refresh by Satya Nadella(9202)
The Kubernetes Operator Framework Book by Michael Dame(8570)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8414)
Robo-Advisor with Python by Aki Ranin(8361)