Networks, Protocols & APIs
epub |eng | 2020-01-14 | Author:Todd Lammle

HTML Attacks Another new attack on the Internet scene exploits several new technologies: the Hypertext Markup Language (HTML) specification, web browser functionality, and HTTP. HTML attacks can include Java applets ...
( Category: LAN February 4,2020 )
mobi, epub |eng | 2017-09-07 | Author:James Pogran

Do one thing well A good DSC resource will do one thing, and it will do that one thing well. When crafting your DSC resources, you should choose the smallest ...
( Category: Microsoft OS Guides February 2,2020 )
epub |eng | 2020-01-13 | Author:Kasun Indrasiri

Setting a two-second deadline on the current context. Invoking the AddOrder remote method and capturing any possible errors into addErr. Using the status package to determine the error code. If ...
( Category: Design & Architecture January 31,2020 )
epub |eng | 2019-12-26 | Author:Yuri Diogenes, Erdal Ozkaya

( Category: Network Security January 3,2020 )
mobi |eng | 2019-12-26 | Author:Erdal Ozkaya Yuri Diogenes [Yuri Diogenes, Erdal Ozkaya]

( Category: Network Security January 2,2020 )
epub |eng | 2018-10-30 | Author:Stuart Scott & Gabriel Ramirez [Stuart Scott]

( Category: LAN January 2,2020 )
epub |eng | 2019-04-29 | Author:Benjamin Caudill & Karl Gilbert [Benjamin Caudill]

( Category: LAN November 12,2019 )
epub |eng | 2018-03-23 | Author:Alexey Spizhevoy & Aleksandr Rybnikov

import cv2 Load the text image: img = cv2.imread('../data/scenetext01.jpg') Load the pre-trained convolutional neural network and detect the text messages: det = cv2.text.TextDetectorCNN_create( "../data/textbox.prototxt", "../data/TextBoxes_icdar13.caffemodel") rects, probs = det.detect(img) Draw ...
( Category: Networks November 5,2019 )
epub |eng | 2019-08-22 | Author:Lisa Bock [Lisa Bock]

( Category: Network Security November 3,2019 )
epub |eng | 2019-06-26 | Author:Erdal Ozkaya

EC-Council, Computer Hacking Forensic Investigator (CHFI) EC-Council also offers another certification for individuals who wish to take up a career in the digital forensics space: Computer Hacking Forensic Investigator, commonly ...
( Category: Linux & UNIX Administration October 15,2019 )
epub |eng | 2018-12-24 | Author:Mohamed Wali

App Service plans When you create an App Service, such as a Web App for example, you will be asked to specify the App Service plan. An App Service plan ...
( Category: LAN October 14,2019 )
epub, pdf |eng | 2019-03-28 | Author:José Manuel Ortega

Here is the output of the execution of the snmpwalk command, where we can see information being returned by the SNMP agent: iso.3.6.1.2.1.1.1.0 = STRING: "Linux debian6box 2.6.32-5-686 #1 SMP ...
( Category: Tools October 11,2019 )
epub |eng | 2017-04-10 | Author:Amanda Berlin & Lee Brotherston [Amanda Berlin]

( Category: Networks September 24,2019 )
epub |eng | 2009-10-21 | Author:Robert Elsenpeter & Anthony Velte & Toby Velte [Robert Elsenpeter]

Application A cloud application is the software architecture that the cloud uses to eliminate the need to install and run on the client computer. There are many applications that can ...
( Category: Cloud Computing September 23,2019 )
epub |eng | | Author:Fadi Al-Turjman

Hybrid [10, 57, 73, 75, 76] Single-Sensor [3, 21, 55–65] Large Scale Application + Limited Flexibility + Limited Cost Effectiveness + (large scale) Sensor Dependent General Reliability + Low Service ...
( Category: Mobile & Wireless September 20,2019 )