Computers & Technology
epub, pdf |eng | 2014-05-12 | Author:Glenn Greenwald [Greenwald, Glenn]
“Upstream” collection (from fiber-optic cables) and direct collection from the servers of Internet companies (PRISM) account for most of the records gathered by the NSA. In addition to such sweeping ...
( Category:
Politics & Government
August 20,2017 )
epub, azw3 |eng | 2016-09-29 | Author:Nipun Jaswal [Jaswal, Nipun]
We set the required options and payload as windows/meterpreter/bind_tcp that denotes a direct connection to the target. Let's see what happens when we exploit the system using the exploit command: ...
( Category:
Networking & Cloud Computing
August 20,2017 )
epub, mobi |eng | | Author:2016
The AuthenticationManager interface First of all, AuthenticationManager is a single-method interface: public interface AuthenticationManager { Authentication authenticate(Authentication authentication) throws AuthenticationException; } Spring Security provides one implementation: ProviderManager. This implementation allows ...
( Category:
Computers & Technology
August 20,2017 )
azw3, epub, pdf |eng | 2015-03-26 | Author:Chiu, Yu-Wei(David Chiu) [Chiu, Yu-Wei(David Chiu)]
How to do it... Perform the following steps to train the neural network with nnet: First, install and load the nnet package: > install.packages("nnet") > library(nnet) Next, split the dataset ...
( Category:
Graphics & Design
August 20,2017 )
mobi, epub, pdf |eng | 2015-03-25 | Author:Yu-Wei(David Chiu) Chiu
Estimating model performance with k-fold cross-validation The k-fold cross-validation technique is a common technique used to estimate the performance of a classifier as it overcomes the problem of over-fitting. For ...
( Category:
Graphics & Design
August 20,2017 )
epub |eng | 2016-02-25 | Author:Thodoris Greasidis [Greasidis, Thodoris]
As we have already seen in Chapter 1, A Refresher on jQuery and the Composite Pattern, the primary way to use the $() function is to invoke it with a ...
( Category:
Web Development & Design
August 20,2017 )
mobi |eng | | Author:2014
The entity used is env_projectedtexture, and the light color is set just like the Brightness parameter in any other light. However, Shadows have to be enabled manually. In this example, ...
( Category:
Computers & Technology
August 20,2017 )
epub, azw3, pdf |eng | 2011-09-01 | Author:Thomas L. Friedman & Michael Mandelbaum [Friedman, Thomas L. & Mandelbaum, Michael]
Honk If You Believe in Climate Change In February 2010, after a particularly heavy snowfall in Washington, D.C., Oklahoma Republican senator James Inhofe’s daughter, Molly Rapert, her husband, and their ...
( Category:
Politics & Government
August 20,2017 )
azw3, mobi |eng | 2016-03-03 | Author:Shepal, JM [Shepal, JM]
Hacking from the computer’s start screen Start the computer up and just before you see the ‘windows starting’ on your screen, hold down the F8 button. This will divert you ...
( Category:
Internet & Social Media
August 20,2017 )
mobi, azw3, epub, pdf |eng | 2016-03-11 | Author:Agus Kurniawan
Raspbian already installed it for you. You can run Scratch by clicking scratch logo (see it in Figure below). After that, you will get a Scratch application. If you don't ...
( Category:
Hardware & DIY
August 20,2017 )
epub |eng | 2016-06-15 | Author:Edward D. Hess [Hess, Edward D.]
1. Psychological distancing The self-control expert Walter Mischel explains that you can psychologically distance yourself from your negative emotions by imagining that you’re a “fly on the wall.”13 You can ...
( Category:
Success
August 20,2017 )
epub, mobi |eng | | Author:2015
If the value of the outliers fraction is very small, nu will be small and the SVM algorithm will try to fit the contour of the data points. On the ...
( Category:
Programming Languages
August 20,2017 )
epub | | 0101-01-01 | Author:Unknown
©istockphoto.com/t-lorien Image #5272702 Figure 1-5: The Impressionist Brush transforms your photo into a painting. Creating a custom brush After playing with the various options, if you like the personalized brush ...
( Category:
Computers & Technology
August 20,2017 )
epub |eng | 2004-08-20 | Author:Marc J. Rochkind
FreeBSD and Darwin don’t implement the whole thing, as you can see from the code.17 17. Actually, these calls originated with 4.2BSD, but the BSD-derived systems haven’t picked up some ...
( Category:
Programming
August 20,2017 )
epub, pdf |eng | 2012-02-24 | Author:Julia Lerman & Rowan Miller [Julia Lerman]
Warning There is a bug in Entity Framework 4.1 and 4.2 that blocks you from using the GetDatabaseValues method for an entity that is not in the same namespace as ...
( Category:
Computer Science
August 20,2017 )
Categories
Popular ebooks
Deep Learning with Python by François Chollet(24397)The Mikado Method by Ola Ellnestam Daniel Brolund(21661)
Hello! Python by Anthony Briggs(20890)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(19357)
Dependency Injection in .NET by Mark Seemann(18942)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(18567)
Kotlin in Action by Dmitry Jemerov(18357)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(18164)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(17026)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16953)
Grails in Action by Glen Smith Peter Ledbrook(16143)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(13828)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(11830)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(10650)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10591)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(9754)
Hit Refresh by Satya Nadella(9101)
The Kubernetes Operator Framework Book by Michael Dame(8534)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8358)
Robo-Advisor with Python by Aki Ranin(8303)