Networks, Protocols & APIs
epub |eng | 2020-01-14 | Author:Todd Lammle
HTML Attacks Another new attack on the Internet scene exploits several new technologies: the Hypertext Markup Language (HTML) specification, web browser functionality, and HTTP. HTML attacks can include Java applets ...
( Category:
LAN
February 4,2020 )
mobi, epub |eng | 2017-09-07 | Author:James Pogran
Do one thing well A good DSC resource will do one thing, and it will do that one thing well. When crafting your DSC resources, you should choose the smallest ...
( Category:
Microsoft OS Guides
February 2,2020 )
epub |eng | 2020-01-13 | Author:Kasun Indrasiri
Setting a two-second deadline on the current context. Invoking the AddOrder remote method and capturing any possible errors into addErr. Using the status package to determine the error code. If ...
( Category:
Design & Architecture
January 31,2020 )
epub |eng | 2019-12-26 | Author:Yuri Diogenes, Erdal Ozkaya
( Category:
Network Security
January 3,2020 )
mobi |eng | 2019-12-26 | Author:Erdal Ozkaya Yuri Diogenes [Yuri Diogenes, Erdal Ozkaya]
( Category:
Network Security
January 2,2020 )
epub |eng | 2018-10-30 | Author:Stuart Scott & Gabriel Ramirez [Stuart Scott]
( Category:
LAN
January 2,2020 )
epub |eng | 2019-04-29 | Author:Benjamin Caudill & Karl Gilbert [Benjamin Caudill]
( Category:
LAN
November 12,2019 )
epub |eng | 2018-03-23 | Author:Alexey Spizhevoy & Aleksandr Rybnikov
import cv2 Load the text image: img = cv2.imread('../data/scenetext01.jpg') Load the pre-trained convolutional neural network and detect the text messages: det = cv2.text.TextDetectorCNN_create( "../data/textbox.prototxt", "../data/TextBoxes_icdar13.caffemodel") rects, probs = det.detect(img) Draw ...
( Category:
Networks
November 5,2019 )
epub |eng | 2019-08-22 | Author:Lisa Bock [Lisa Bock]
( Category:
Network Security
November 3,2019 )
epub |eng | 2019-06-26 | Author:Erdal Ozkaya
EC-Council, Computer Hacking Forensic Investigator (CHFI) EC-Council also offers another certification for individuals who wish to take up a career in the digital forensics space: Computer Hacking Forensic Investigator, commonly ...
( Category:
Linux & UNIX Administration
October 15,2019 )
epub |eng | 2018-12-24 | Author:Mohamed Wali
App Service plans When you create an App Service, such as a Web App for example, you will be asked to specify the App Service plan. An App Service plan ...
( Category:
LAN
October 14,2019 )
epub, pdf |eng | 2019-03-28 | Author:José Manuel Ortega
Here is the output of the execution of the snmpwalk command, where we can see information being returned by the SNMP agent: iso.3.6.1.2.1.1.1.0 = STRING: "Linux debian6box 2.6.32-5-686 #1 SMP ...
( Category:
Tools
October 11,2019 )
epub |eng | 2017-04-10 | Author:Amanda Berlin & Lee Brotherston [Amanda Berlin]
( Category:
Networks
September 24,2019 )
epub |eng | 2009-10-21 | Author:Robert Elsenpeter & Anthony Velte & Toby Velte [Robert Elsenpeter]
Application A cloud application is the software architecture that the cloud uses to eliminate the need to install and run on the client computer. There are many applications that can ...
( Category:
Cloud Computing
September 23,2019 )
epub |eng | | Author:Fadi Al-Turjman
Hybrid [10, 57, 73, 75, 76] Single-Sensor [3, 21, 55–65] Large Scale Application + Limited Flexibility + Limited Cost Effectiveness + (large scale) Sensor Dependent General Reliability + Low Service ...
( Category:
Mobile & Wireless
September 20,2019 )
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9797)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7797)
Grails in Action by Glen Smith Peter Ledbrook(7708)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6712)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6711)
Running Windows Containers on AWS by Marcio Morales(6227)
Kotlin in Action by Dmitry Jemerov(5077)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4993)
Combating Crime on the Dark Web by Nearchos Nearchou(4580)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4488)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4429)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4252)
The Age of Surveillance Capitalism by Shoshana Zuboff(3968)
Python for Security and Networking - Third Edition by José Manuel Ortega(3820)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3518)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3488)
Learn Wireshark by Lisa Bock(3403)
Mastering Python for Networking and Security by José Manuel Ortega(3365)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3339)
Blockchain Basics by Daniel Drescher(3310)
