Networking & Cloud Computing
epub, pdf |eng | | Author:Xiaodong Lin
( Category:
Pathology
April 24,2020 )
epub, pdf |eng | | Author:Charu C. Aggarwal
( Category:
Intelligence & Semantics
April 24,2020 )
azw3, epub |eng | 2019-11-26 | Author:Bartlett, Jonathan [Bartlett, Jonathan]
After this concludes successfully, you need to tell PostgreSQL that this server is to be used as a hot standby. This is done by telling the server to go into ...
( Category:
Cloud Computing
April 23,2020 )
epub, azw3, pdf |eng | 2017-05-08 | Author:Francis John Thottungal [Thottungal, Francis John]
Chapter 13. Date A date object in JavaScript is created with new Date(). The properties of the date object are as follows: Constructor - gives the function that created the ...
( Category:
Networking & Cloud Computing
April 22,2020 )
epub |eng | 2020-05-25 | Author:Peter F. Drucker [Peter F. Drucker]
( Category:
Strategic Planning
April 22,2020 )
epub |eng | 2020-03-31 | Author:John Medicine [Medicine, John]
If you find this book helpful for your business in any way, kindly leave a review on Amazon. Hacking with Kali Linux: The Complete Guide to Kali Linux and the ...
( Category:
Viruses
April 20,2020 )
epub |rus | 2020-01-06 | Author:LOUIS GOMERA [GOMERA, LOUIS]
Introducing the Scratch 2 interface Stage Area – Like actors in a play, your nymphs move around the stage under the control of your program. Sprite – The characters or ...
( Category:
Superconductivity
April 19,2020 )
epub |eng | 2020-04-15 | Author:Nagy, Helmut & Blumauer, Andreas [Nagy, Helmut]
Constraint: If a Legal Entity has a Country and a City assigned, then both places must be related with a skos:narrower path, so that the geographical information is consistent. More ...
( Category:
Networking & Cloud Computing
April 18,2020 )
epub |eng | | Author:Arthur M. Langer [Langer, Arthur M.]
6.2.4 Exclusive Pair Model This model is bi-directional or full-duplex with an ongoing open two-way communication between a client and server (Fig. 6.8). The server is aware of all connections ...
( Category:
Software Development
April 16,2020 )
epub |eng | 2018-04-23 | Author:Jordan Krause [Jordan Krause]
In this recipe, we requested a new SSL certificate from our favorite public Certification Authority. In order to receive a certificate from them, we had to issue a CSR from ...
( Category:
Windows Administration
April 16,2020 )
epub |eng | | Author:Marilyn Wolf & Dimitrios Serpanos
[EIA16] Electricity Information Sharing and Analysis Center, TLP: White, Analysis of the Cyber Attack on the Ukranian Power Grid, Defense Use Case (Mar 18, 2016) [Fag76] M.E. Fagan, Design and ...
( Category:
Microprocessor Design
April 16,2020 )
epub, pdf |eng | | Author:Ameet V Joshi
12.4.2.1 Forget Gate At forget gate the input is combined with the previous output to generate a fraction between 0 and 1, that determines how much of the previous state ...
( Category:
Intelligence & Semantics
April 16,2020 )
epub |eng | | Author:Walker H. Land Jr. & J. David Schaffer
frac_len_p_gt_2s Fraction of utterance length that is pauses greater than 2 s frac_len_p_gt_5s Fraction of utterance length that is pauses greater than 5 s frac_len_p_gt_10s Fraction of utterance length that ...
( Category:
Intelligence & Semantics
April 16,2020 )
epub |eng | | Author:Baji Shaik & Avinash Vallarapu
Cloud for PostgreSQL This service was introduced recently and is still in its beta version. However, still you can choose this for your POCs and test your applications. As this ...
( Category:
Software Development
April 16,2020 )
epub |eng | 2015-08-16 | Author:Wouter Verbeke & Veronique Van Vlasselaer & Bart Baesens [Wouter Verbeke]
Figure 4.37 Calculating Predictions Using a Cut-Off A confusion matrix can now be calculated as shown in Table 4.5. Table 4.5 Confusion Matrix Actual Status Positive (Fraud) Negative (No Fraud) ...
( Category:
Network Security
April 16,2020 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6854)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6853)
Running Windows Containers on AWS by Marcio Morales(6379)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5077)
Combating Crime on the Dark Web by Nearchos Nearchou(4652)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4632)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4341)
The Age of Surveillance Capitalism by Shoshana Zuboff(3983)
Python for Security and Networking - Third Edition by José Manuel Ortega(3901)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3562)
Learn Wireshark by Lisa Bock(3543)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3356)
Blockchain Basics by Daniel Drescher(3327)
