Networking & Cloud Computing
epub |eng | 2018-10-30 | Author:Rosemarie Withee & Ken Withee & Jennifer Reed
GOING BEHIND THE SCENES The cloud is just a fancy way of describing the act of accessing software and computer resources over the Internet. For example, when you create a ...
( Category:
Software
November 2,2018 )
epub |eng | 2018-01-24 | Author:Vipul Tankariya
Life cycle configuration use cases It is advisable to configure life cycle rules on objects where there is absolute clarity on the life cycle of the objects. The following are ...
( Category:
Networking & Cloud Computing
October 31,2018 )
epub |eng | 2018-03-23 | Author:Alexey Spizhevoy
import cv2 Load the text image: img = cv2.imread('../data/scenetext01.jpg') Load the pre-trained convolutional neural network and detect the text messages: det = cv2.text.TextDetectorCNN_create( "../data/textbox.prototxt", "../data/TextBoxes_icdar13.caffemodel") rects, probs = det.detect(img) Draw ...
( Category:
Networking & Cloud Computing
October 27,2018 )
epub |eng | | Author:Pierluigi Riti
With the secret created, we want to add our account to the administrative roles of the role-based access control (RBAC) . This gives us the right to manage the cluster. ...
( Category:
Mobile Phones, Tablets & E-Readers
October 26,2018 )
epub, pdf |eng | | Author:Eric Rosenberg
(5.1) More formally, for a positive integer s and , define (5.2) where I(z) ≡ 1 if z > 0 and I(z) ≡ 0 otherwise. Thus C(n, s) is the ...
( Category:
Networking & Cloud Computing
October 26,2018 )
epub |eng | 2018-05-24 | Author:Pradeeka Seneviratne
Settings for working with virtual pin V1 Tap the back icon on the toolbar to go to the canvas. You can use the same C++ project you built in the ...
( Category:
Software
October 26,2018 )
epub |eng | 2018-10-24 | Author:Stan Gibilisco
( Category:
Networking & Cloud Computing
October 26,2018 )
epub |eng | 2018-10-23 | Author:Allan G. Bluman
( Category:
Engineering
October 24,2018 )
epub |eng | 2018-06-19 | Author:Mohamed Waly
Figure 4.15: Point-to-Site configuration blade Click on Configure now, and the following fields will appear in the same blade: Address pool: The IP address range of your environment. Tunnel type: ...
( Category:
Software
October 24,2018 )
epub |eng | 2017-12-06 | Author:Bekim Dauti
Figure 5.30. Auditing in Windows Server 2016 References from Windows IT Pro Center Remote Server Administration Tools (https://docs.microsoft.com/en-us/windows-server/remote/remote-server-administration-tools) Get started with Remote Desktop Services in Windows Server 2016 (https://docs.microsoft.com/en-us/windows-server/remote/remote-desktop-services/rds-get-started) Remote ...
( Category:
Software
October 24,2018 )
epub, mobi |eng | 2018-08-18 | Author:Brian McCullough
12 RIP. MIX. BURN. The iPod, iTunes and Netflix At the turn of the century, Apple was not anywhere close to the technology behemoth it is today. In fact, Apple ...
( Category:
Networking & Cloud Computing
October 23,2018 )
epub |eng | | Author:Dov Dori
The OPD on the right of Fig. 14.4 demonstrates that a structural relation can exist also between two processes. As the OPL sentences in Fig. 14.4 demonstrate, the syntax of ...
( Category:
Programming Languages
October 23,2018 )
epub |eng | 2017-12-20 | Author:Pradeep Kumar Singh
Uploading an image to Swift We will try to upload an image to Swift. First, check the account details: $ openstack object store account show +------------+---------------------------------------+ | Field | Value ...
( Category:
Networking & Cloud Computing
October 23,2018 )
epub |eng | 2018-10-22 | Author:Michael W. Lucas
/etc/login.* You can control who may log into your system—and what resources those users may access—by using /etc/login.access and /etc/login.conf. See Chapter 9 for instructions. /etc/mail Most of the contents ...
( Category:
Operating Systems
October 23,2018 )
epub, pdf |eng | 2018-10-20 | Author:Robin Nixon
( Category:
Web Development & Design
October 21,2018 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9814)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7811)
Grails in Action by Glen Smith Peter Ledbrook(7722)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6884)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6876)
Running Windows Containers on AWS by Marcio Morales(6408)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5096)
Kotlin in Action by Dmitry Jemerov(5094)
Combating Crime on the Dark Web by Nearchos Nearchou(4668)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4664)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4359)
The Age of Surveillance Capitalism by Shoshana Zuboff(3990)
Python for Security and Networking - Third Edition by José Manuel Ortega(3910)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3577)
Learn Wireshark by Lisa Bock(3575)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3531)
Mastering Python for Networking and Security by José Manuel Ortega(3378)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3359)
Blockchain Basics by Daniel Drescher(3331)
