Computers & Technology
epub |eng | 2019-12-26 | Author:Jelen, Bill;
( Category:
Spreadsheet Books
September 5,2020 )
epub |eng | 2014-07-02 | Author:unknow
Figure 14-4: WinLister on a live machine shows the IE window properties The next image in Figure 14-5 shows a similar situation, but this time the IE process is in ...
( Category:
Networking & Cloud Computing
September 5,2020 )
mobi |eng | 2012-03-30 | Author:Brian Carper Chas Emerick & Christophe Grand [Chas Emerick, Brian Carper]
We now have type acting as the dispatch function for run, so that it will return the :type metadata on any passed maps, falling back to returning the class of ...
( Category:
C & C++ Programming
September 5,2020 )
epub, pdf |eng | 2018-12-31 | Author:Sebastiaan Tammer [Sebastiaan Tammer]
( Category:
Linux Operating System
September 5,2020 )
azw3, epub, pdf |eng | 2020-09-03 | Author:Bell, Alexander [Bell, Alexander]
networks and the internet. Everything that is transmitted in modern networks is heavily encrypted and almost impossible to hack unless you have the proper authority to access it. However, there ...
( Category:
Computer Networks, Protocols & APIs
September 5,2020 )
azw3, epub, pdf |eng | 2020-09-03 | Author:Smith, Matthew [Smith, Matthew]
How can Crypto-Money Laundering be used? The fact that central banks or tax authorities have no power over crypto-monetary transactions means that transactions cannot always be attributed to a specific ...
( Category:
Computer History & Culture
September 5,2020 )
azw3, epub, pdf |eng | 2020-09-03 | Author:Karnel, Erickson [Karnel, Erickson]
Another major disadvantage results from the identification of a system as Honeypot. This can lead to an attacker bypassing the honeypot in the future and focusing on other systems. In ...
( Category:
Internet & Social Media
September 5,2020 )
azw3, epub, pdf |eng | 2020-09-03 | Author:Bell, Alexander [Bell, Alexander]
Chapter 4: Physical Security Hackers often use physical attack to gain information by getting access to a computer system. This kind of attack involves seeking physical access to your device ...
( Category:
Networking & Cloud Computing
September 5,2020 )
epub |eng | | Author:Mark Carrier
DECISION-MAKING When functioning well, our brains provide the mental processing that leads to good decision-making. Inhibition, for one—one of the key executive functions—is critical to decision-making. Inhibition allows us to ...
( Category:
Internet & Social Media
September 5,2020 )
azw3, mobi, epub, pdf |eng | 2020-09-03 | Author:Technical Academy, JANUS & Overton, Russell & Timaeus, John [Overton, Russell]
( Category:
Linux Operating System
September 5,2020 )
epub |eng | | Author:Somnath Paul & Swarup Bhunia
6. J. Cong, Y. Ding, “On Area/Depth Trade-Off in Lut-Based FPGA Technology Mapping”, in Design Automation Conference, 1993 Somnath Paul and Swarup BhuniaComputing with Memory for Energy-Efficient Robust Systems201410.1007/978-1-4614-7798-3_10© Springer ...
( Category:
Engineering
September 5,2020 )
epub |eng | | Author:Arvin Agah, John-John Cabibihan, Ayanna M. Howard, Miguel A. Salichs & Hongsheng He
12. Kanda, T., Miyashita, T., Osada, T., Haikawa, Y., Ishiguro, H.: Analysis of humanoid appearances in human-robot interaction. IEEE Trans. Robot. 24(3), 725–735 (2008)CrossRef 13. Kanoh, M., Shimizu, T.: Developing ...
( Category:
Computers & Technology
September 5,2020 )
mobi, epub, pdf |eng | 2020-02-10 | Author:Oswald Campesato
6.1What is Classification? Given a dataset that contains observations whose class membership is known, classification is the task of determining the class to which a new data point belongs. Classes ...
( Category:
Python Programming
September 5,2020 )
epub |eng | 2020-08-31 | Author:Bejtlich, Richard [Bejtlich, Richard]
Don't Fight the Future Friday, November 21, 2008 Digital security practitioners should fight today's battles while preparing for the future. I don't know what that future looks like, and neither ...
( Category:
Networking & Cloud Computing
September 4,2020 )
mobi |eng | 2019-01-31 | Author:S. M. Mohi Us Sunnat
NoSQL database A NoSQL database is normally used for a large set of distributed data. This database is very effective for big data where an organization analyzes large chunks of ...
( Category:
Introductory & Beginning Programming
September 4,2020 )
Categories
Popular ebooks
Deep Learning with Python by François Chollet(27864)The Mikado Method by Ola Ellnestam Daniel Brolund(25172)
Hello! Python by Anthony Briggs(24212)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(23297)
Kotlin in Action by Dmitry Jemerov(22389)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(21854)
Dependency Injection in .NET by Mark Seemann(21743)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(20608)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(19435)
Grails in Action by Glen Smith Peter Ledbrook(18512)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17013)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(15787)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(13636)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11778)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11116)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10615)
Hit Refresh by Satya Nadella(9166)
The Kubernetes Operator Framework Book by Michael Dame(8558)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8389)
Robo-Advisor with Python by Aki Ranin(8338)