Computers & Technology
epub |eng | 2019-12-26 | Author:Jelen, Bill;

( Category: Spreadsheet Books September 5,2020 )
epub |eng | 2014-07-02 | Author:unknow

Figure 14-4: WinLister on a live machine shows the IE window properties The next image in Figure 14-5 shows a similar situation, but this time the IE process is in ...
( Category: Networking & Cloud Computing September 5,2020 )
mobi |eng | 2012-03-30 | Author:Brian Carper Chas Emerick & Christophe Grand [Chas Emerick, Brian Carper]

We now have type acting as the dispatch function for run, so that it will return the :type metadata on any passed maps, falling back to returning the class of ...
( Category: C & C++ Programming September 5,2020 )
epub, pdf |eng | 2018-12-31 | Author:Sebastiaan Tammer [Sebastiaan Tammer]

( Category: Linux Operating System September 5,2020 )
azw3, epub, pdf |eng | 2020-09-03 | Author:Bell, Alexander [Bell, Alexander]

networks and the internet. Everything that is transmitted in modern networks is heavily encrypted and almost impossible to hack unless you have the proper authority to access it. However, there ...
( Category: Computer Networks, Protocols & APIs September 5,2020 )
azw3, epub, pdf |eng | 2020-09-03 | Author:Smith, Matthew [Smith, Matthew]

How can Crypto-Money Laundering be used? The fact that central banks or tax authorities have no power over crypto-monetary transactions means that transactions cannot always be attributed to a specific ...
( Category: Computer History & Culture September 5,2020 )
azw3, epub, pdf |eng | 2020-09-03 | Author:Karnel, Erickson [Karnel, Erickson]

Another major disadvantage results from the identification of a system as Honeypot. This can lead to an attacker bypassing the honeypot in the future and focusing on other systems. In ...
( Category: Internet & Social Media September 5,2020 )
azw3, epub, pdf |eng | 2020-09-03 | Author:Bell, Alexander [Bell, Alexander]

Chapter 4: Physical Security Hackers often use physical attack to gain information by getting access to a computer system. This kind of attack involves seeking physical access to your device ...
( Category: Networking & Cloud Computing September 5,2020 )
epub |eng | | Author:Mark Carrier

DECISION-MAKING When functioning well, our brains provide the mental processing that leads to good decision-making. Inhibition, for one—one of the key executive functions—is critical to decision-making. Inhibition allows us to ...
( Category: Internet & Social Media September 5,2020 )
azw3, mobi, epub, pdf |eng | 2020-09-03 | Author:Technical Academy, JANUS & Overton, Russell & Timaeus, John [Overton, Russell]

( Category: Linux Operating System September 5,2020 )
epub |eng | | Author:Somnath Paul & Swarup Bhunia

6. J. Cong, Y. Ding, “On Area/Depth Trade-Off in Lut-Based FPGA Technology Mapping”, in Design Automation Conference, 1993 Somnath Paul and Swarup BhuniaComputing with Memory for Energy-Efficient Robust Systems201410.1007/978-1-4614-7798-3_10© Springer ...
( Category: Engineering September 5,2020 )
epub |eng | | Author:Arvin Agah, John-John Cabibihan, Ayanna M. Howard, Miguel A. Salichs & Hongsheng He

12. Kanda, T., Miyashita, T., Osada, T., Haikawa, Y., Ishiguro, H.: Analysis of humanoid appearances in human-robot interaction. IEEE Trans. Robot. 24(3), 725–735 (2008)CrossRef 13. Kanoh, M., Shimizu, T.: Developing ...
( Category: Computers & Technology September 5,2020 )
mobi, epub, pdf |eng | 2020-02-10 | Author:Oswald Campesato

6.1What is Classification? Given a dataset that contains observations whose class membership is known, classification is the task of determining the class to which a new data point belongs. Classes ...
( Category: Python Programming September 5,2020 )
epub |eng | 2020-08-31 | Author:Bejtlich, Richard [Bejtlich, Richard]

Don't Fight the Future Friday, November 21, 2008 Digital security practitioners should fight today's battles while preparing for the future. I don't know what that future looks like, and neither ...
( Category: Networking & Cloud Computing September 4,2020 )
mobi |eng | 2019-01-31 | Author:S. M. Mohi Us Sunnat

NoSQL database A NoSQL database is normally used for a large set of distributed data. This database is very effective for big data where an organization analyzes large chunks of ...
( Category: Introductory & Beginning Programming September 4,2020 )