Networking & Cloud Computing
epub |eng | | Author:Zhongmin Yang & Can Li & Shanhui Xu & Changsheng Yang
4.2 Raman and Brillouin Fiber Lasers In principle, the Raman and Brillouin scattering effects inside the optical fiber can both be utilized to achieve single-frequency lasers, given that the nonlinear ...
( Category:
Networking & Cloud Computing
March 31,2020 )
epub |eng | | Author:Rushikesh Kamalapurkar, Patrick Walters, Joel Rosenfeld & Warren Dixon
(4.36) The saturated least-squares update law in (4.34) ensures that there exist positive constants such that Using the bounds on and and the fact that , the candidate Lyapunov function ...
( Category:
Calculus
March 31,2020 )
epub |eng | 2018-03-14 | Author:Robert W. Bly
PACKAGE AND ELEMENT TESTING There are two approaches to testing, and each has its place. The first approach is to test two completely different DM packages and see which one ...
( Category:
Advertising
March 31,2020 )
epub |eng | | Author:Ihab F. Ilyas and Xu Chu
Figure 5.1 TANE. Algorithm 5.1TANE Input: One relational instance I, schema R Output: All minimal FDs Σ L1 ←{{A}|A ∈attr(R)} l ←1 while Ll = do forall Node Y ∈ ...
( Category:
Storage & Retrieval
March 31,2020 )
epub |eng | 2018-03-14 | Author:Shih-Fu Chang
Expected number of events in a cluster of offspring.The branching factor n* indicates whether the number of offspring associated with each immigrant is finite (n* < 1) or infinite (n* ...
( Category:
Intelligence & Semantics
March 31,2020 )
epub |eng | 2019-01-29 | Author:Yohan Wadia [Yohan Wadia]
Parameters: SubnetIds: Description: Subnet IDs where instances can be launched Type: List<AWS::EC2::Subnet::Id> Still under the Parameters section, add the optional instance configuration parameters: AmiId: Description: The application server's AMI ID ...
( Category:
Cloud Computing
March 30,2020 )
epub |eng | 2020-01-01 | Author:Bilgin Ibryam & Roland Huß [Bilgin Ibryam]
( Category:
Software Development
March 30,2020 )
epub, mobi |eng | 2019-11-28 | Author:Mike Brown [Mike Brown]
( Category:
Networks, Protocols & APIs
March 29,2020 )
epub |eng | | Author:Thomas G. Robertazzi
2.ODU (Optical Data Unit): ODU overhead includes optical path level monitoring, claim indication, protection switching bytes, and embedded communication channels. The ODU is the payload that is groomed and switched ...
( Category:
Networks
March 28,2020 )
epub |eng | 0101-01-01 | Author:Omar Santos,Joseph Muniz,Stefano De Crescenzo [Omar Santos,Joseph Muniz,Stefano De Crescenzo]
Foundation Topics Cryptography The word cryptography or cryptology comes from the Greek word kryptós, which means a secret. It is the study of the techniques used for encryption and secure ...
( Category:
Network Security
March 28,2020 )
epub |eng | 2019-09-20 | Author:Xun (Brian) Wu [Xun (Brian) Wu]
We were able to create the art token and list the art in the art market. Next, we will implement the buyer functions. Implementing the buyArt() function The users can ...
( Category:
Software Development
March 28,2020 )
epub |eng | 2013-07-16 | Author:James Chambers
Controlling Site State These are the bread-and-butter commands of any web developer. You’ve likely worked from the command line before to restart IIS, or perhaps you’ve even used WMI in ...
( Category:
Networking & Cloud Computing
March 28,2020 )
epub |eng | 2009-06-03 | Author:Rich Seifert [Rich Seifert]
8.2.1.1.2 Aggressive Backoff Analogous to the backpressure approaches discussed earlier, a switch or other device can modify the characteristics of the Ethernet backoff algorithm to obtain an unfair advantage and ...
( Category:
LAN
March 28,2020 )
epub |eng | 2016-03-14 | Author:Darril Gibson
EXAM TIP An alert provides notification of a potential adverse event. Personnel analyze the event to determine if it is an incident. An alert can be a false positive, which ...
( Category:
Encryption
March 28,2020 )
epub |eng | 2014-03-14 | Author:John M. Wargo
Defining a BlackBerry 10 Device Target To define a BlackBerry 10 target using a physical device, the process is similar to what was shown in the previous section, but additional ...
( Category:
Mobile & Wireless
March 28,2020 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6854)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6853)
Running Windows Containers on AWS by Marcio Morales(6379)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5077)
Combating Crime on the Dark Web by Nearchos Nearchou(4652)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4632)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4341)
The Age of Surveillance Capitalism by Shoshana Zuboff(3983)
Python for Security and Networking - Third Edition by José Manuel Ortega(3901)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3562)
Learn Wireshark by Lisa Bock(3543)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3356)
Blockchain Basics by Daniel Drescher(3327)
