Home
>
Computers & Technology
>
Networking & Cloud Computing
>
Internet, Groupware, & Telecommunications
Internet, Groupware, & Telecommunications
epub |eng | | Author:Ruiyun Qi & Gang Tao & Bin Jiang
( Category:
Intelligence & Semantics
March 15,2020 )
epub, pdf |eng | | Author:Jordan Goldmeier
Figure 5-27.The result of using the Array formula to pull back data 4.Once you have the first row, you can simply drag down to fill the entire region, as shown ...
( Category:
NET
March 15,2020 )
epub |eng | | Author:Alan Pearce
Record Calls — Top Secret Call Recorder for Android and Call Log Pro for iOS. Confirm Contacts — if you receive a call and want to know who actually called, ...
( Category:
Internet, Groupware, & Telecommunications
March 15,2020 )
epub, pdf |eng | 2019-11-21 | Author:Gerard Gallant [Gerard Gallant]
( Category:
Software Development
March 15,2020 )
epub |eng | 2018-09-25 | Author:Tarek Ziadé
The bin folder contains a local buildout script, in which three other folders are created: parts corresponds to the sections defined in the configuration file. It is a standard place ...
( Category:
Python
March 15,2020 )
epub |eng | 2018-10-02 | Author:Cathy Wang, Martino Sabia
( Category:
Software Development
March 14,2020 )
epub |eng | | Author:Sushil Jajodia & George Cybenko & Peng Liu & Cliff Wang & Michael Wellman
Phillips, C., Swiler, L.P.: A graph-based system for network-vulnerability analysis. In: Workshop on New Security Paradigms, pp. 71–79 (1998) Prakash, A., Wellman, M.P.: Empirical game-theoretic analysis for moving target defense. ...
( Category:
Hacking
March 14,2020 )
epub |eng | | Author:Simon Foucart & Holger Rauhut
9.10. D-RIP Let (the dictionary) with M ≥ N and let (the measurement matrix). The restricted isometry constants δ s adapted to are defined as the smallest constants such that ...
( Category:
Electronics
March 14,2020 )
epub |eng | 2016-07-18 | Author:David Steadman & Jeff Ingalls [Steadman, David]
( Category:
C & C++ Windows Programming
March 14,2020 )
epub |eng | 2019-10-21 | Author:Richard Brian Davis & William Irwin
I Think, Therefore I Am? There is something else you need to know about Descartes. He endorsed a stoic attitude toward the body, even if that body was in a ...
( Category:
History & Surveys
March 14,2020 )
epub, pdf |eng | | Author:Timothy V. Kelly
Moving up to wireless Wireless networks take the idea of network access to a new, never-before-seen level of service, allowing more flexibility in how users may connect to the network. ...
( Category:
Home Networks
March 14,2020 )
epub |eng | 2016-11-07 | Author:Petar Zečević Marko Bonaći [Petar Zečević Marko Bonaći]
( Category:
Neural Networks
March 14,2020 )
epub |eng | | Author:Cypher, Allen, Lau, Tessa, Dontcheva, Mira, Nichols, Jeffrey
DISCUSSION The interaction techniques embodied in the Web Summaries system enable users to transform the Web into their own personal Web that provides personalized access to the information they care ...
( Category:
User Experience & Usability
March 13,2020 )
mobi |eng | 2013-02-02 | Author:Goodman, Jonathan [Goodman, Jonathan]
How Americans Use Social Media The chart below says it all. The percentage of Internet users in the United States and Canada dwarfs every other region in the world. So ...
( Category:
Marketing
March 13,2020 )
epub, azw3 |eng | 2019-01-31 | Author:Harihara Subramanian
Mutation or dumb fuzz tests are a simple approach, wherein we create new test data by altering existing data samples. Sample data generation starts with valid samples of protocols and ...
( Category:
Software Development
March 13,2020 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9794)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7796)
Grails in Action by Glen Smith Peter Ledbrook(7706)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6699)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6692)
Running Windows Containers on AWS by Marcio Morales(6215)
Kotlin in Action by Dmitry Jemerov(5077)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4987)
Combating Crime on the Dark Web by Nearchos Nearchou(4575)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4477)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4427)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4243)
The Age of Surveillance Capitalism by Shoshana Zuboff(3966)
Python for Security and Networking - Third Edition by José Manuel Ortega(3815)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3517)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3483)
Learn Wireshark by Lisa Bock(3393)
Mastering Python for Networking and Security by José Manuel Ortega(3364)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3339)
Blockchain Basics by Daniel Drescher(3309)
