Networks, Protocols & APIs
epub |eng | 2019-04-21 | Author:rajendra chayapathi, syed f. hassan, paresh shah
The architecture also defines reference points for the functional blocks to interact, communicate and work with each other. Figure 1-7 shows the detailed view of the framework as defined by ...
( Category:
Networks
March 21,2020 )
epub |eng | 2019-01-30 | Author:Annette Harper
( Category:
LAN
March 21,2020 )
epub |eng | 2020-03-20 | Author:Mike Meyers
CAUTION Restoring a factory recovery partition wipes out all user data and apps, restoring the system to its as-shipped condition. This feature should be used only if there is no ...
( Category:
LAN
March 21,2020 )
azw3 |eng | 2015-11-05 | Author:Konstantin Cvetanov [Cvetanov, Konstantin]
Preparing your master image In the previous section, we briefly touched on the concept of VM provisioning, but what is a master image, anyway? It is the guest operating system ...
( Category:
Enterprise Applications
March 21,2020 )
epub |eng | | Author:Kim-Kwang Raymond Choo & Ali Dehghantanha
3. F.N. Dezfouli, A. Dehghantanha, R. Mahmod, N.F.B.M. Sani, S.B. Shamsuddin, F. Daryabar, A survey on malware analysis and detection techniques. Int. J. Adv. Comput. Technol. 5(14), 42 (2013) 4. ...
( Category:
Intelligence & Semantics
March 21,2020 )
epub |eng | 2018-11-30 | Author:David Millán Escrivá [David Millán Escrivá]
In Chapter 5, Automated Optical Inspection, Object Segmentation, and Detection, we pre-processed the input images and extracted the regions of interest, isolating each object using different techniques. Now, we are ...
( Category:
Computer Vision & Pattern Recognition
March 20,2020 )
epub |eng | 2019-05-22 | Author:Alexander Dean & Valentin Crettaz [Alexander Dean]
( Category:
Data in the Enterprise
March 20,2020 )
epub |eng | | Author:Zaigham Mahmood
8.2 IaaS Cloud Management Systems While the number and scale of cloud computing services and systems are continuing to grow rapidly, significant amount of research is being conducted both in ...
( Category:
Client-Server Systems
March 19,2020 )
epub |eng | | Author:John Viega & David LeBlanc & Michael Howard
( Category:
Software Development
March 19,2020 )
epub |eng | 2016-12-20 | Author:Narasimha Karumanchi & Damodaram A & Sreenivasa M [Karumanchi, Narasimha]
8.9.3.1 Point-to-point networks A point-to-point network is a link between exactly two routers. A packet sent from one of the routers will always have exactly one recipient on the local ...
( Category:
Networks
March 18,2020 )
epub, pdf |eng | 2014-12-16 | Author:Darren R. Hayes [Darren R. Hayes]
( Category:
Network Security
March 18,2020 )
epub |eng | 2019-11-11 | Author:Ross, Axel [Ross, Axel]
Determine the wireless router that is currently connected and search for the PHY mode in the menu In the diagram shown below, the current router uses the 802.11n wireless protocol ...
( Category:
Networks
March 17,2020 )
epub |eng | 2020-03-12 | Author:Firas Ahmed & Somit Maloo [Firas Ahmed]
( Category:
Networks, Protocols & APIs
March 17,2020 )
epub |eng | | Author:Charles David Waghmare
Seven Steps to Building an Intranet Using SharePoint Communication Sites In this section, we will learn about seven practical steps that you can consider when building an Intranet for your ...
( Category:
LAN
March 17,2020 )
epub |eng | | Author:Eduardo Bayro-Corrochano
(12.88) where is the vector of Plücker coordinates and the matrix contains the and ’s, that is, information about the camera configuration. When we back-project a point or line l ...
( Category:
Networks
March 17,2020 )
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9787)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7792)
Grails in Action by Glen Smith Peter Ledbrook(7705)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6667)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6659)
Running Windows Containers on AWS by Marcio Morales(6183)
Kotlin in Action by Dmitry Jemerov(5076)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4968)
Combating Crime on the Dark Web by Nearchos Nearchou(4559)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4441)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4426)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4223)
The Age of Surveillance Capitalism by Shoshana Zuboff(3964)
Python for Security and Networking - Third Edition by José Manuel Ortega(3795)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3515)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3464)
Mastering Python for Networking and Security by José Manuel Ortega(3362)
Learn Wireshark by Lisa Bock(3361)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3338)
Blockchain Basics by Daniel Drescher(3308)
