Networking & Cloud Computing
epub |eng | 2019-04-29 | Author:Benjamin Caudill & Karl Gilbert [Benjamin Caudill]
( Category:
LAN
November 12,2019 )
epub |eng | 2018-03-23 | Author:Alexey Spizhevoy & Aleksandr Rybnikov
import cv2 Load the text image: img = cv2.imread('../data/scenetext01.jpg') Load the pre-trained convolutional neural network and detect the text messages: det = cv2.text.TextDetectorCNN_create( "../data/textbox.prototxt", "../data/TextBoxes_icdar13.caffemodel") rects, probs = det.detect(img) Draw ...
( Category:
Networks
November 5,2019 )
epub |eng | 2019-08-22 | Author:Lisa Bock [Lisa Bock]
( Category:
Network Security
November 3,2019 )
epub |eng | 2019-10-29 | Author:Valliappa Lakshmanan
JOIN versus denormalization What if we were to store the distance traveled in each trip in a denormalized table? CREATE OR REPLACE TABLE ch07eu.cycle_hire AS SELECT start_station_name , end_station_name , ...
( Category:
Enterprise Applications
October 30,2019 )
epub |eng | 2018-08-22 | Author:Julien Vehent [Julien Vehent]
( Category:
Windows Administration
October 21,2019 )
epub |eng | 2017-12-22 | Author:Pethuru Raj
Service-oriented architecture and event-driven architecture (SOA versus EDA) Organizations across the world are changing their structures rapidly and are moving toward on-demand business models. There is an increase in the ...
( Category:
Design & Architecture
October 20,2019 )
epub |eng | 2019-10-18 | Author:Jason Andress
Open Source Intelligence Open source intelligence (OSINT) is information collected from publicly available sources, such as job postings and public records. This publicly available data can reveal an enormous amount ...
( Category:
Network Security
October 19,2019 )
epub |eng | 2018-11-12 | Author:Wolf Halton
In the preceding screenshot, we can see that we have captured the Administrator login from the \\WIN10-01 workstation. This was captured when the user logged on to the domain from ...
( Category:
Network Security
October 19,2019 )
epub |eng | 2019-06-26 | Author:Erdal Ozkaya
EC-Council, Computer Hacking Forensic Investigator (CHFI) EC-Council also offers another certification for individuals who wish to take up a career in the digital forensics space: Computer Hacking Forensic Investigator, commonly ...
( Category:
Linux & UNIX Administration
October 15,2019 )
epub |eng | 2018-12-24 | Author:Mohamed Wali
App Service plans When you create an App Service, such as a Web App for example, you will be asked to specify the App Service plan. An App Service plan ...
( Category:
LAN
October 14,2019 )
epub |eng | 2019-08-24 | Author:Lee Calcote
Example 8-14 is a specific example of how you can conscientiously approach clarifying lines of responsibility and thoroughly decoupling service teams within your service mesh configuration at L5. Finally, VirtualServices ...
( Category:
Tools
October 12,2019 )
epub |eng | 2019-09-19 | Author:Michael Born
( Category:
Linux & UNIX Administration
October 12,2019 )
epub |eng | 2019-03-19 | Author:John Paul Mueller & Luca Massaron
( Category:
Cloud Computing
October 11,2019 )
epub, pdf |eng | 2018-04-03 | Author:Ana Bell [Ana Bell]
( Category:
Software Development
October 11,2019 )
epub, pdf |eng | 2019-03-28 | Author:José Manuel Ortega
Here is the output of the execution of the snmpwalk command, where we can see information being returned by the SNMP agent: iso.3.6.1.2.1.1.1.0 = STRING: "Linux debian6box 2.6.32-5-686 #1 SMP ...
( Category:
Tools
October 11,2019 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9814)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7811)
Grails in Action by Glen Smith Peter Ledbrook(7722)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6882)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6875)
Running Windows Containers on AWS by Marcio Morales(6408)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5095)
Kotlin in Action by Dmitry Jemerov(5094)
Combating Crime on the Dark Web by Nearchos Nearchou(4668)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4661)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4358)
The Age of Surveillance Capitalism by Shoshana Zuboff(3990)
Python for Security and Networking - Third Edition by José Manuel Ortega(3909)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3577)
Learn Wireshark by Lisa Bock(3572)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3531)
Mastering Python for Networking and Security by José Manuel Ortega(3378)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3359)
Blockchain Basics by Daniel Drescher(3331)
