Networking & Cloud Computing
epub |eng | 2019-04-29 | Author:Benjamin Caudill & Karl Gilbert [Benjamin Caudill]

( Category: LAN November 12,2019 )
epub |eng | 2018-03-23 | Author:Alexey Spizhevoy & Aleksandr Rybnikov

import cv2 Load the text image: img = cv2.imread('../data/scenetext01.jpg') Load the pre-trained convolutional neural network and detect the text messages: det = cv2.text.TextDetectorCNN_create( "../data/textbox.prototxt", "../data/TextBoxes_icdar13.caffemodel") rects, probs = det.detect(img) Draw ...
( Category: Networks November 5,2019 )
epub |eng | 2019-08-22 | Author:Lisa Bock [Lisa Bock]

( Category: Network Security November 3,2019 )
epub |eng | 2019-10-29 | Author:Valliappa Lakshmanan

JOIN versus denormalization What if we were to store the distance traveled in each trip in a denormalized table? CREATE OR REPLACE TABLE ch07eu.cycle_hire AS SELECT start_station_name , end_station_name , ...
( Category: Enterprise Applications October 30,2019 )
epub |eng | 2018-08-22 | Author:Julien Vehent [Julien Vehent]

( Category: Windows Administration October 21,2019 )
epub |eng | 2017-12-22 | Author:Pethuru Raj

Service-oriented architecture and event-driven architecture (SOA versus EDA) Organizations across the world are changing their structures rapidly and are moving toward on-demand business models. There is an increase in the ...
( Category: Design & Architecture October 20,2019 )
epub |eng | 2019-10-18 | Author:Jason Andress

Open Source Intelligence Open source intelligence (OSINT) is information collected from publicly available sources, such as job postings and public records. This publicly available data can reveal an enormous amount ...
( Category: Network Security October 19,2019 )
epub |eng | 2018-11-12 | Author:Wolf Halton

In the preceding screenshot, we can see that we have captured the Administrator login from the \\WIN10-01 workstation. This was captured when the user logged on to the domain from ...
( Category: Network Security October 19,2019 )
epub |eng | 2019-06-26 | Author:Erdal Ozkaya

EC-Council, Computer Hacking Forensic Investigator (CHFI) EC-Council also offers another certification for individuals who wish to take up a career in the digital forensics space: Computer Hacking Forensic Investigator, commonly ...
( Category: Linux & UNIX Administration October 15,2019 )
epub |eng | 2018-12-24 | Author:Mohamed Wali

App Service plans When you create an App Service, such as a Web App for example, you will be asked to specify the App Service plan. An App Service plan ...
( Category: LAN October 14,2019 )
epub |eng | 2019-08-24 | Author:Lee Calcote

Example 8-14 is a specific example of how you can conscientiously approach clarifying lines of responsibility and thoroughly decoupling service teams within your service mesh configuration at L5. Finally, VirtualServices ...
( Category: Tools October 12,2019 )
epub |eng | 2019-09-19 | Author:Michael Born

( Category: Linux & UNIX Administration October 12,2019 )
epub |eng | 2019-03-19 | Author:John Paul Mueller & Luca Massaron

( Category: Cloud Computing October 11,2019 )
epub, pdf |eng | 2018-04-03 | Author:Ana Bell [Ana Bell]

( Category: Software Development October 11,2019 )
epub, pdf |eng | 2019-03-28 | Author:José Manuel Ortega

Here is the output of the execution of the snmpwalk command, where we can see information being returned by the SNMP agent: iso.3.6.1.2.1.1.1.0 = STRING: "Linux debian6box 2.6.32-5-686 #1 SMP ...
( Category: Tools October 11,2019 )