Home
>
Computers & Technology
>
Networking & Cloud Computing
>
Internet, Groupware, & Telecommunications
Internet, Groupware, & Telecommunications
epub |eng | 2018-06-21 | Author:Gus Khawaja [Gus Khawaja]
( Category:
Privacy & Online Safety
December 27,2019 )
epub |eng | | Author:Chris McCord, Bruce Tate, José Valim
( Category:
Internet, Groupware, & Telecommunications
December 25,2019 )
epub, mobi |eng | 2013-04-14 | Author:John Pollock [Pollock, John]
( Category:
Java
December 17,2019 )
epub |eng | 2015-05-19 | Author:Jaime Levy
Step 3 Paste all the screenshots into the presentation tool. If I am working on my own, I do mockups in Photoshop. If I am working with a team of ...
( Category:
Internet, Groupware, & Telecommunications
December 16,2019 )
mobi |eng | 2018-01-22 | Author:Perry Lea
Public Data Network (PDN): This is the external interface, and for the most part, the internet. It can include other services, data centers, private services, and so on. In a ...
( Category:
Computer Design
December 7,2019 )
epub |eng | 2019-11-24 | Author:Shaun Lewis
public class Author { @SerializedName("name") private String mName; public String getName() { return mName; } public void setName(String name) { mName = name; } } Then the output would be ...
( Category:
Programming & App Development
November 29,2019 )
epub, pdf |eng | | Author:José Unpingco
where we have determined and from the data. Given a new point of interest, , we would certainly compute as the predicted value for . This is the same as ...
( Category:
Probability & Statistics
November 23,2019 )
epub |eng | 2018-08-10 | Author:Barbosa de Azevedo, Fernando Uilherme [Barbosa de Azevedo, Fernando Uilherme]
Chapter 15: Ransomware Ransomware, sometimes called crypto viral extortion, is a form of malicious software that prevents users from accessing their personal files, usually through encryption. Hackers require that a ...
( Category:
Hacking
November 17,2019 )
mobi |eng | 2019-01-16 | Author:Craig Clayton
( Category:
Programming & App Development
November 16,2019 )
epub |eng | 2019-04-29 | Author:Benjamin Caudill & Karl Gilbert [Benjamin Caudill]
( Category:
LAN
November 12,2019 )
epub |eng | 2018-03-23 | Author:Alexey Spizhevoy & Aleksandr Rybnikov
import cv2 Load the text image: img = cv2.imread('../data/scenetext01.jpg') Load the pre-trained convolutional neural network and detect the text messages: det = cv2.text.TextDetectorCNN_create( "../data/textbox.prototxt", "../data/TextBoxes_icdar13.caffemodel") rects, probs = det.detect(img) Draw ...
( Category:
Networks
November 5,2019 )
epub |eng | 2019-08-24 | Author:Lee Calcote
Example 8-14 is a specific example of how you can conscientiously approach clarifying lines of responsibility and thoroughly decoupling service teams within your service mesh configuration at L5. Finally, VirtualServices ...
( Category:
Tools
October 12,2019 )
epub, pdf |eng | 2018-04-03 | Author:Ana Bell [Ana Bell]
( Category:
Software Development
October 11,2019 )
epub |eng | 2013-11-11 | Author:Robert Gordon [Gordon, Robert]
Jesse Epps, left, assumed leadership of the AFSCME union after T.O. Jones. (University of Memphis Libraries/Special Collections) By late May, when Stax was hosting its soul explosion, Epps led a ...
( Category:
Company Profiles
October 11,2019 )
epub |eng | | Author:Sudhi R. Sinha & Youngchoon Park
9.Access rights—Provisioning users with elevated privileges beyond the minimum required, such as the use of administrator accounts for routing functions, creates a risk for unintentional and malicious incidents. An example ...
( Category:
Enterprise Applications
October 10,2019 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9787)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7792)
Grails in Action by Glen Smith Peter Ledbrook(7705)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6664)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6656)
Running Windows Containers on AWS by Marcio Morales(6179)
Kotlin in Action by Dmitry Jemerov(5076)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4967)
Combating Crime on the Dark Web by Nearchos Nearchou(4557)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4439)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4425)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4221)
The Age of Surveillance Capitalism by Shoshana Zuboff(3964)
Python for Security and Networking - Third Edition by José Manuel Ortega(3794)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3515)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3461)
Mastering Python for Networking and Security by José Manuel Ortega(3362)
Learn Wireshark by Lisa Bock(3359)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3308)
