Networking & Cloud Computing
epub |eng | 2014-04-08 | Author:Richard G. Lyons,D. Lee Fugal & D. Lee Fugal

Figure 5-20 Hypothetical analog music signal: (a) original music signal spectrum; (b) digital signal spectrum showing overlapped spectral replications; (c) contaminated spectrum of the analog playback signal from a CD. ...
( Category: Signal Processing April 9,2019 )
epub, azw3, pdf |eng | 2015-03-17 | Author:Christopher Hadnagy & Michele Fincher [Hadnagy, Christopher]

My Mobile Is Secure I have actually overheard someone telling another person, “If you think it's a malicious e-mail, just open it up on your <iPad/iPhone/Android device/Windows mobile device/insert other ...
( Category: Electronic Data Interchange (EDI) April 8,2019 )
mobi |eng | 2019-03-20 | Author:Novelli, Stefano & Silvestri, Marco [Novelli, Stefano]

Figure 23: results of a conventional Opera browser on Panopticlick 6.10.2 Defending yourself from Browser Fingerprinting If you accurately followed each single recommendation from the previous topics, your browser is ...
( Category: Hacking April 7,2019 )
azw3 |eng | 2018-08-20 | Author:Blank-Edelman, David N. [Blank-Edelman, David N.]

Deep learning Machine learning Developer: Google Adversary: Fan Hui But the first game that gripped the world’s attention in AI was checkers, with the pioneer Arthur Samuel, who coined the ...
( Category: Testing April 6,2019 )
azw3 |eng | 2017-01-05 | Author:Nadia El Mrabet & Marc Joye

parametrized by selecting an arbitrary x ∈ Z such that are both prime. Constant-time hashing to In Latincrypt 2012, Fouque and Tibouchi [25] presented a specialization of the procedure proposed ...
( Category: Combinatorics April 5,2019 )
epub |eng | 2015-12-23 | Author:Andrew Mallett [Mallett, Andrew]

We have provided two functions within the script. The first, is_file, simply tests to ensure that the filename we have entered is a regular file. Then we declare the clean_file ...
( Category: Linux & UNIX Administration April 4,2019 )
epub, pdf |eng | 2015-12-21 | Author:Jonathan Baier [Baier, Jonathan]

Listing 3-13: http-pd-controller.yaml Let's also create an external service, so we can see it from outside the cluster: apiVersion: v1 kind: Service metadata: name: http-pd labels: name: http-pd spec: type: ...
( Category: Tools April 4,2019 )
epub, pdf |eng | 2016-03-29 | Author:Silvio Moreto [Moreto, Silvio]

The HTML code for creating this alert is really simple: <div class="alert alert-success" role="alert"> You have made a new Tweet. </div> As mentioned before, just create an element with the ...
epub, pdf |eng | | Author:Chandra, Rakesh Vidya; Varanasi, Bala Subrahmanyam

Creating an authentication Request If we remember the theme of the third chapter, we learned different kinds of authentication with requests, such as Basic authentication, Digest authentication, and OAuth authentication. ...
( Category: Software Development April 4,2019 )
epub |eng | 2016-03-29 | Author:Minko Gechev [Gechev, Minko]

Note In order to get platform independent reference to a DOM element, again, we can use @ContentChildren and @ViewChildren. For instance, if we have the following template: <input #todo> we ...
( Category: Network Security April 4,2019 )
epub |eng | 2016-10-24 | Author:Jordan Krause [Krause, Jordan]

Network Location Server This major component in a DirectAccess infrastructure is something that does not even exist on the DA server itself, or at least it shouldn't if you are ...
( Category: Network Administration April 4,2019 )
epub |eng | 2014-10-09 | Author:Alexandre Borges [Borges, Alexandre]

Getting ready This recipe requires three virtual machines (VirtualBox or VMware) running Oracle Solaris 11 with 4 GB RAM. It is recommended that all machines be on an isolated network ...
( Category: Linux & UNIX Administration April 4,2019 )
epub |eng | 2015-06-28 | Author:Raj, Pethuru & Chelladhurai, Jeeva S. & Singh, Vinod

Alternatively, you can apply the format option to the docker inspect subcommand in order to narrow down the output to very specific information. In this case, the ExposedPorts field of ...
( Category: Linux & UNIX Administration April 4,2019 )
mobi |eng | | Author:Second Edition

The PNG files are provided with this book in the DroidBlaster_Part6/assets directory. What just happened? Run the application and you should not see much difference. Indeed, we have loaded two ...
mobi, epub |eng | | Author:A Rapid Guide to the Fundamental Features of Python

Wait. What just happened? How is this possible? As a hint, we'll need to search through the code for an object with a hidden, shared state. Earlier, we noted that ...