Networking & Cloud Computing
epub, azw3, pdf |eng | 2019-03-24 | Author:Jimmy Song [Jimmy Song]
>>> from ecc import FieldElement, Point >>> a = FieldElement(num=0, prime=223) >>> b = FieldElement(num=7, prime=223) >>> x = FieldElement(num=192, prime=223) >>> y = FieldElement(num=105, prime=223) >>> p1 = Point(x, ...
( Category:
Security & Encryption
December 1,2018 )
epub |eng | 2018-11-08 | Author:Jason R. Rich
If you take a more aggressive approach and land in the heart of a point of interest, like Tilted Towers, Paradise Palms, or Lazy Links, you will definitely encounter enemies, ...
( Category:
Games & Strategy Guides
November 28,2018 )
epub, mobi, pdf |eng | 2018-01-28 | Author:Keith J. Grant [Keith J. Grant]
1 Supplies a normal src for browsers that don’t support srcset (for example, IE and Opera Mini) 2 URL of each image and its width Most browsers now support srcset, ...
( Category:
Web Development & Design
November 25,2018 )
epub |eng | 2018-11-22 | Author:Paul Bedell
( Category:
Engineering
November 24,2018 )
azw3 |eng | 2018-10-04 | Author:David D. Clark [Clark, David D.]
Attacks on the Attached Hosts Today, we see a wide range of attacks in this category, ranging from attacks that involve a malicious sequence of packets sent to a machine ...
( Category:
Networking & Cloud Computing
November 23,2018 )
epub |eng | | Author:Jason Farman
5 A DELAYED CROSSING This past winter, I stood on the Fredericksburg side of the Rappahannock River in Virginia, next to the railroad bridge leading into town. In the early ...
( Category:
Engineering
November 20,2018 )
epub |eng | | Author:Frédéric Cohen Tenoudji
( Category:
Mathematics
November 18,2018 )
azw3, pdf |eng | 2018-07-23 | Author:Sunil Gupta
Disney’s use of technology in its park and Amazon’s foray into the offline market demonstrate that companies need to reimagine the synergies between physical and digital channels for creating a ...
( Category:
Processes & Infrastructure
November 17,2018 )
epub |eng | 2018-11-15 | Author:Matthew Hart, Robert G. Freeman
FIGURE 11-1. Traditional enterprise computing Requisition as powerful a computer as can be found Manage as small a list of computers as can be reasonably grouped Manage multiple databases on ...
( Category:
Databases & Big Data
November 16,2018 )
epub, pdf |eng | 2018-11-13 | Author:Dennis Roddy
11.6 Concatenated Codes Codes designed to correct for burst errors can be combined with codes designed to correct for random errors, a process known as concatenation. Figure 11.6 shows the ...
( Category:
Networking & Cloud Computing
November 14,2018 )
epub |eng | 2015-07-09 | Author:Wang, Jie & Kissel, Zachary A.
Both compositions are then furnished to the verifier. The transcripts of the proofs are posted to the bulletin board. 5.8.4.3 Tally In the tally phase, the ballots are decrypted and ...
( Category:
Networking & Cloud Computing
November 13,2018 )
azw3 |eng | 2015-07-09 | Author:Jie Wang & Zachary A. Kissel [Wang, Jie]
Both compositions are then furnished to the verifier. The transcripts of the proofs are posted to the bulletin board. 5.8.4.3 Tally In the tally phase, the ballots are decrypted and ...
( Category:
Networking & Cloud Computing
November 13,2018 )
epub |eng | 2018-11-09 | Author:Charlie Holland
( Category:
Programming
November 10,2018 )
epub, pdf |eng | 2018-11-08 | Author:Rakesh Kumar
( Category:
Engineering
November 9,2018 )
epub |eng | 2018-06-30 | Author:Oliver Pelz
-l outputs the file owner in the third column. Here, it is root, and for this file it is olip. In the fourth column, the ls -l outputs the group ...
( Category:
Operating Systems
November 6,2018 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9814)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7811)
Grails in Action by Glen Smith Peter Ledbrook(7722)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6886)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6880)
Running Windows Containers on AWS by Marcio Morales(6411)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5097)
Kotlin in Action by Dmitry Jemerov(5094)
Combating Crime on the Dark Web by Nearchos Nearchou(4669)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4666)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4360)
The Age of Surveillance Capitalism by Shoshana Zuboff(3990)
Python for Security and Networking - Third Edition by José Manuel Ortega(3912)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3578)
Learn Wireshark by Lisa Bock(3577)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3531)
Mastering Python for Networking and Security by José Manuel Ortega(3378)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3360)
Blockchain Basics by Daniel Drescher(3331)
