Networking & Cloud Computing
epub, mobi, pdf |eng | 2016-12-01 | Author:Jean-Philippe Aumasson
How SipHash Works SipHash uses a trick that makes it more secure than basic sponge functions: instead of XORing message blocks only once before the permutation, SipHash XORs them before ...
( Category:
Security & Encryption
December 1,2017 )
epub |eng | 2015-09-29 | Author:Minichino, Joe & Howse, Joseph
The most important parameter here is the third one, which defines the aperture of the Sobel operator. The Sobel operator performs the change detection in the rows and columns of ...
( Category:
Networking & Cloud Computing
November 30,2017 )
azw3 |eng | 2015-09-29 | Author:Minichino, Joe & Howse, Joseph [Minichino, Joe]
The most important parameter here is the third one, which defines the aperture of the Sobel operator. The Sobel operator performs the change detection in the rows and columns of ...
( Category:
Networking & Cloud Computing
November 30,2017 )
azw3 |eng | 2016-09-27 | Author:Vaduva, Alexandru & Gonzalez, Alex & Simmonds, Chris [Vaduva, Alexandru]
Then we need to explicitly accept the Oracle Java license by adding the following to our conf/local.conf file: LICENSE_FLAGS_WHITELIST += "oracle_java" We want to build the newest update available, so ...
( Category:
Operating Systems
November 30,2017 )
azw3 |eng | 2017-07-13 | Author:Stoneman, Elton [Stoneman, Elton]
Managing application images Docker Compose can manage Docker images as well as containers. In the Compose file, you can include attributes that tell Docker Compose how to build your images. ...
( Category:
Operating Systems
November 30,2017 )
epub, mobi |eng | 2016-02-28 | Author:Rafal Kuc & Marek Rogozinski [Kuc, Rafal]
Field value factor function The field_value_factor function allows us to influence the score of the document by using a value of the field in that document. For example, to multiply ...
( Category:
Programming
November 29,2017 )
epub |eng | 2015-05-30 | Author:Martin Wood [Wood, Martin]
Tip In this chapter, we focus on how the data is retrieved. Chapter 7, Securing Applications and Data, looks at authentication in more detail. The structure of the data in ...
( Category:
Software
November 29,2017 )
epub |eng | 2012-06-05 | Author:Joe Waters [Waters, Joe]
Figure 5-3: This QR Code shows and tells. Think about placement. Large QR Codes on billboards get people thinking, “Where will it take me if I scan it?” But if ...
( Category:
Networking & Cloud Computing
November 29,2017 )
azw3 |eng | 2013-08-01 | Author:Nate Anderson
The anonymity. Unlike early spammers, the Mega-D owner covered his tracks better, at least in public. He sent messages composed by others, which pointed to websites that were managed by ...
( Category:
Security & Encryption
November 29,2017 )
epub |eng | 2013-03-05 | Author:Evgeny Morozov [Morozov, Evgeny]
Against Technological Defeatism Viewed in the abstract, it may seem that the tides of digital preemption, situational crime prevention, and reputation-based controls are unstoppable and irreversible. Information is everywhere, and ...
( Category:
Politics & Government
November 29,2017 )
epub |eng | 2015-03-13 | Author:Brandon Atkinson [Atkinson, Brandon]
Click Add to place the web part on the page. The web part will display search results immediately. The default search for the Content Search Web Part is called Recently ...
( Category:
Software
November 29,2017 )
epub |eng | 2015-05-29 | Author:Colin Holgate & Joel Gerdeen [Holgate, Colin & Gerdeen, Joel]
Lastly, if all of these checks fail, we will return an empty string, so that this strange structured link URL doesn't go on to confuse us later: return "" end ...
( Category:
Programming
November 29,2017 )
epub |eng | 2011-10-15 | Author:Evgeny Morozov [Morozov, Evgeny]
No Such Thing as Virtual Politics The danger that “slacktivism” poses in the context of authoritarian states is that it may give young people living there the wrong impression that ...
( Category:
Politics & Government
November 29,2017 )
epub, pdf |eng | 2010-12-06 | Author:Dustyn Roberts [Roberts, Dustyn]
4. Connect pin 1 to ground. 5. Connect pin 2 and pin 6 of the 555 timer with a short jumper. 6. Also connect pin 2 to one of the ...
( Category:
Crafts & Hobbies
November 29,2017 )
mobi |eng | 2015-06-02 | Author:Jamie Bartlett
* * * fn1 This ad hoc dealing continues today, often on forums related to prescription drugs. fn2 Charges that Ulbricht, at the time of writing, denies. fn3 In 2014 ...
( Category:
Internet & Social Media
November 29,2017 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6859)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6857)
Running Windows Containers on AWS by Marcio Morales(6383)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5078)
Combating Crime on the Dark Web by Nearchos Nearchou(4654)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4636)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4342)
The Age of Surveillance Capitalism by Shoshana Zuboff(3983)
Python for Security and Networking - Third Edition by José Manuel Ortega(3901)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3565)
Learn Wireshark by Lisa Bock(3546)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3356)
Blockchain Basics by Daniel Drescher(3329)
