Home
>
Computers & Technology
>
Networking & Cloud Computing
>
Networks, Protocols & APIs
>
Networks
Networks
epub |eng | 2022-08-16 | Author:Josh Lothian & Mike Younkers & Jason King & Steven Carter [Josh Lothian]
Pull Requests With Git, the typical way to contribute code to a repo is via the branch-commit-merge process. By itself, this process helps keep the code version controlled and allows ...
( Category:
Networks
July 6,2022 )
pdf |en | | Author: Julio Cesar Bueno de Camargo
( Category:
Networks
June 26,2022 )
pdf | | 2007-12-31 | Author:Power System Relaying Committee of the IEEE Power Engineering Society
( Category:
Networks
June 17,2022 )
epub |eng | 2018-09-26 | Author:John Goerzen, Brandon Rhodes [John Goerzen, Brandon Rhodes]
( Category:
Networks
May 14,2022 )
pdf | | 1600-12-31 | Author:Computer Concepts & Application (gnv64)
( Category:
Networks
May 8,2022 )
pdf | | 2009-08-18 | Author:Wai-Kai Chen
( Category:
Networks
February 24,2022 )
pdf | | 2015-05-09 | Author:Yi-Hsuan Ho & Audrey P. Gasch
( Category:
Networks
February 13,2022 )
pdf | | 2008-11-18 | Author:Luis M. Camarinha-Matos
( Category:
Networks
February 12,2022 )
epub |eng | 2012-02-03 | Author:Yochai Benkler [Benkler, Yochai]
464 The networked public sphere is not only more resistant to control by money, but it is also less susceptible to the lowest-common-denominator orientation that the pursuit of money often ...
( Category:
Networks
August 6,2020 )
epub, pdf |eng | 2020-03-26 | Author:Doug Lowe
It’s a RAID! I mention in Chapter 10 that individual disk drives are usually combined in groups using a technique called RAID, which stands for redundant array of inexpensive disks. ...
( Category:
Networks
July 29,2020 )
epub |eng | | Author:Pethuru Raj & Anupama Raman
Pretty Good Privacy (PGP) Pretty Good Privacy (PGP) is a strong data encryption and decryption program which is widely used by federal government for protecting all types of government data ...
( Category:
Software Development
July 24,2020 )
epub |eng | | Author:John Cowley
Method Description INVITE Request that a session be created ACK Acknowledge that a session has been created BYE Request that a session be terminated CANCEL Cancel a request that is ...
( Category:
Networks
July 21,2020 )
epub |eng | | Author:Shamshad Ansari
Convolution layer 7: Kernel 3×3, filters 256, activation ReLU Pooling layer: MaxPooling, kernel size 2×2 and strides 2×2 Convolution layer 8: Kernel 3×3, filters 512, activation ReLU Convolution layer 9: ...
( Category:
Software Development
July 21,2020 )
epub |eng | | Author:Thomas B. Moeslund
Bounding box of a BLOB is the minimum rectangle which contains the BLOB, see Fig. 7.5. It is defined by going through all pixels for a BLOB and finding the ...
( Category:
Networks
July 20,2020 )
azw3 |eng | 2015-06-18 | Author:Luis Enrique Sucar [Sucar, Luis Enrique]
7.4.1 Information Validation Many systems use information to make decisions; if this information is erroneous it could lead to nonoptimal decisions, and in some cases decisions made based on erroneous ...
( Category:
Networks
July 19,2020 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9787)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7789)
Grails in Action by Glen Smith Peter Ledbrook(7705)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6639)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6626)
Running Windows Containers on AWS by Marcio Morales(6153)
Kotlin in Action by Dmitry Jemerov(5073)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4954)
Combating Crime on the Dark Web by Nearchos Nearchou(4541)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4422)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4410)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4208)
The Age of Surveillance Capitalism by Shoshana Zuboff(3964)
Python for Security and Networking - Third Edition by José Manuel Ortega(3779)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3515)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3445)
Mastering Python for Networking and Security by José Manuel Ortega(3358)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Learn Wireshark by Lisa Bock(3334)
Blockchain Basics by Daniel Drescher(3306)
