Home
>
Computers & Technology
>
Networking & Cloud Computing
>
Networks, Protocols & APIs
>
Networks
Networks
pdf | | 2013-01-14 | Author:Simon Haykin
( Category:
Networks
December 9,2022 )
pdf |en | | Author: Carlos Andre Reis Pinheiro
( Category:
Networks
December 8,2022 )
epub |eng | 2019-03-30 | Author:Nipun Jaswal [Nipun Jaswal]
We can see the first-byte word is 1200, which implies 00 12(18) being divided by 10, which means that we have the LokiBot version 1.8. Have a look at the ...
( Category:
Networks
October 6,2022 )
epub |eng | 2012-02-03 | Author:Yochai Benkler [Benkler, Yochai]
464 The networked public sphere is not only more resistant to control by money, but it is also less susceptible to the lowest-common-denominator orientation that the pursuit of money often ...
( Category:
Networks
August 6,2020 )
epub, pdf |eng | 2020-03-26 | Author:Doug Lowe
It’s a RAID! I mention in Chapter 10 that individual disk drives are usually combined in groups using a technique called RAID, which stands for redundant array of inexpensive disks. ...
( Category:
Networks
July 29,2020 )
epub |eng | | Author:Pethuru Raj & Anupama Raman
Pretty Good Privacy (PGP) Pretty Good Privacy (PGP) is a strong data encryption and decryption program which is widely used by federal government for protecting all types of government data ...
( Category:
Software Development
July 24,2020 )
epub |eng | | Author:John Cowley
Method Description INVITE Request that a session be created ACK Acknowledge that a session has been created BYE Request that a session be terminated CANCEL Cancel a request that is ...
( Category:
Networks
July 21,2020 )
epub |eng | | Author:Shamshad Ansari
Convolution layer 7: Kernel 3×3, filters 256, activation ReLU Pooling layer: MaxPooling, kernel size 2×2 and strides 2×2 Convolution layer 8: Kernel 3×3, filters 512, activation ReLU Convolution layer 9: ...
( Category:
Software Development
July 21,2020 )
epub |eng | | Author:Thomas B. Moeslund
Bounding box of a BLOB is the minimum rectangle which contains the BLOB, see Fig. 7.5. It is defined by going through all pixels for a BLOB and finding the ...
( Category:
Networks
July 20,2020 )
azw3 |eng | 2015-06-18 | Author:Luis Enrique Sucar [Sucar, Luis Enrique]
7.4.1 Information Validation Many systems use information to make decisions; if this information is erroneous it could lead to nonoptimal decisions, and in some cases decisions made based on erroneous ...
( Category:
Networks
July 19,2020 )
epub |eng | 2016-12-28 | Author:Martinez, Santos & Daalmans, Peter & Bennett, Brett
Click Next. Review the settings and click Next; the updates will be downloaded. When the wizard is done, the software updates will show up under Overview ➢ Software Updates ➢ ...
( Category:
Networks
July 12,2020 )
azw3 |eng | 2015-09-29 | Author:Charlie Pownall [Pownall, Charlie]
chapter 10 The Committed Activist The fortunes of big pressure groups such as Greenpeace, Friends of the Earth and Amnesty International have been transformed by the internet and by social ...
( Category:
Networks
July 10,2020 )
epub |eng | 2012-03-27 | Author:David Pollino
“Click on that link,” Jay commanded. Joel clicked the link and the Order History page was displayed (Figure C16-2). Figure C16-2. Order History page “What does the Reorder button do?” ...
( Category:
Networks
July 7,2020 )
epub |eng | 2015-07-15 | Author:Comer, Douglas E.;
17.5 Datagram Modification The temporary IP address that a wireless router assigns to a device is not valid on the Internet. So how can a device with a temporary address ...
( Category:
Networks
July 5,2020 )
epub |eng | 2020-04-08 | Author:Hacking In Deep, Learn Computer [Hacking In Deep, Learn Computer]
Utilizing the GUI to Start, Stop, or Restart the Apache Server Utilizing the GUI is the most effortless approach to begin, stop, or restart/reset the web administration. To do this, ...
( Category:
Networks
July 5,2020 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9321)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7411)
Grails in Action by Glen Smith Peter Ledbrook(7303)
Kotlin in Action by Dmitry Jemerov(4653)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4135)
The Age of Surveillance Capitalism by Shoshana Zuboff(3432)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3252)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3034)
Mastering Python for Networking and Security by José Manuel Ortega(2964)
Blockchain Basics by Daniel Drescher(2896)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(2693)
TCP IP by Todd Lammle(2646)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(2518)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2487)
Hands-On Azure for Developers by Kamil Mrzyglod(2427)
Azure Containers Explained by Wesley Haakman & Richard Hooper(2402)
React Native - Building Mobile Apps with JavaScript by Novick Vladimir(2344)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(2316)
The Social Psychology of Inequality by Unknown(2316)
The Art Of Deception by Kevin Mitnick(2303)