Home
>
Computers & Technology
>
Networking & Cloud Computing
>
Internet, Groupware, & Telecommunications
Internet, Groupware, & Telecommunications
epub |eng | 2019-03-25 | Author:Anthony Brown [Anthony Brown]
( Category:
Software Development
March 22,2020 )
epub, pdf |eng | 2019-10-22 | Author:Arnaud Lauret [Arnaud Lauret]
The first step consists of identifying the main concept (or resource) for each goal. You begin by identifying the main noun in the goal. For example, both the list accounts ...
( Category:
Software Development
March 22,2020 )
epub |eng | 2018-05-28 | Author:Paul Groth & Ying Ding & Michael Uschold [Paul Groth]
( Category:
Intelligence & Semantics
March 22,2020 )
epub |eng | 2011-01-04 | Author:Joshua Davies
So what are these P_MD5 and P_SHA1 blocks that are XORed together to produce the final result? Well, if you recall from Chapter 4, MD5 produces 16 bytes of output, ...
( Category:
Encryption
March 21,2020 )
epub |eng | | Author:Brian Sullivan [Brian Sullivan]
CHAPTER 9 Assigning Roles and Responsibilities As soon as you determine to do a design studio, you need to decide who will participate. The product team can help you to ...
( Category:
Web Design
March 21,2020 )
epub |eng | 2015-01-30 | Author:Matt Kaufman & Michael Wicherski [Matt Kaufman]
( Category:
Software Development
March 21,2020 )
epub, pdf |eng | 2013-12-01 | Author:Richard Rogers [Rogers, Richard]
Figure 6.1 Alexa toolbar installation and registration process, with field for user’s postal code, August 2011. © 2012, Alexa Internet (www.alexa.com). Crowd-sourced sites such as the best-known Iranian example (Balatarin) ...
( Category:
General
March 21,2020 )
epub, pdf |eng | | Author:Saleh Faruque
3.10 Conclusions FDMA (frequency division multiple access) is the oldest communication technique used in broadcasting, land-mobile two-way radio, etc. It begins with a band of frequencies, which is allocated by ...
( Category:
Electronics
March 21,2020 )
mobi, epub, pdf |eng | 2020-03-16 | Author:Marco Faella
1 The original procedure goes here (modifies u and v). int gcd = -u * ( 1 <{}< k); assert isGcd(gcd, originalU, originalV) : "Wrong GCD!"; return gcd; } For ...
( Category:
Software Development
March 21,2020 )
epub |eng | 2016-01-17 | Author:Rahat Khanna [Khanna, Rahat]
List icons Generally, list items have mixed content and icons play an important role in highlighting any list item. The icons can be placed on either the left or right ...
( Category:
Software Development
March 21,2020 )
epub |eng | 2009-03-14 | Author:Jaizki Mendizabal Samper & Roc Berenguer Pérez & Juan Meléndez Lagunilla
S11 < –10 –20.2 dB OIP3 1.5 0.5 dBm Gain 23 18.1 dB NF 6.2 5.6 dB Current <13 5.9 mA 3.4 IF Limiting Amplifiers and Filters The design of ...
( Category:
Remote Sensing & GIS
March 21,2020 )
epub |eng | 2003-07-15 | Author:Bruce Berkowitz
Chapter 13 AN ELECTRONIC PEARL HARBOR? By now it ought to be clear how much our national security depends on our policies for promoting, regulating, and controlling information technology. We ...
( Category:
Telecommunications & Sensors
March 21,2020 )
azw3 |eng | 2015-11-05 | Author:Konstantin Cvetanov [Cvetanov, Konstantin]
Preparing your master image In the previous section, we briefly touched on the concept of VM provisioning, but what is a master image, anyway? It is the guest operating system ...
( Category:
Enterprise Applications
March 21,2020 )
epub |eng | | Author:Stojče Dimov Ilčev
3.5.6.3 Slot Reservation Aloha This solution of an extension for the slotted Aloha scheme allows time slots to be reserved for transmission by an Earth station. In general terms, this ...
( Category:
Satellite
March 21,2020 )
epub, azw3 |eng | 2015-12-23 | Author:Branko Ajzele [Ajzele, Branko]
This way, PhpStorm will know how to provide autocomplete while we type around XML files. As an example, let's take a look at how we could use the css directive ...
( Category:
Internet, Groupware, & Telecommunications
March 21,2020 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9787)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7790)
Grails in Action by Glen Smith Peter Ledbrook(7705)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6648)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6637)
Running Windows Containers on AWS by Marcio Morales(6162)
Kotlin in Action by Dmitry Jemerov(5074)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4960)
Combating Crime on the Dark Web by Nearchos Nearchou(4547)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4424)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4422)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4212)
The Age of Surveillance Capitalism by Shoshana Zuboff(3964)
Python for Security and Networking - Third Edition by José Manuel Ortega(3784)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3515)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3451)
Mastering Python for Networking and Security by José Manuel Ortega(3359)
Learn Wireshark by Lisa Bock(3344)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3308)
