Computers & Technology
epub |eng | 2023-11-15 | Author:Andrew Fawcett
This is how it is shown in the Salesforce Classic standard UI: Figure 9.2: Viewing an app in Salesforce Classic LEX brings with it an entirely new client-side architecture, which ...
( Category:
Business Intelligence Tools
November 13,2023 )
pdf | | 2023-11-06 | Author:Erik Cuevas · Daniel Zaldívar · Marco Pérez-Cisneros
( Category:
Computers & Technology
November 13,2023 )
epub |eng | | Author:Erik Cuevas & Daniel Zaldívar & Marco Pérez-Cisneros
( Category:
Computers & Technology
November 13,2023 )
epub, pdf |eng | 2024-11-15 | Author:Qian Han & Salvador Mandujano & Sebastian Porst & V.S. Subrahmanian & Sai Deep Tetali & Yanhai Xiong
Decrypting the Command-and-Control Communications As in the previous chapter, one of the most important properties of the malware weâll want to reverse engineer is its encrypted communication with the command-and-control ...
( Category:
Viruses
November 13,2023 )
pdf | | 2023-08-15 | Author:Eric A. Eager and Richard A. Erickson
( Category:
Data Mining
November 13,2023 )
pdf, epub | | 2023-06-18 | Author:Jeffrey Leon Stroup [Stroup, Jeffrey Leon]
( Category:
Educational Software
November 13,2023 )
epub |eng | 2023-11-15 | Author:Anand Rai
Figure 7.14 â Configuring the threshold to raise an alert Next, you configure the name of the alert rule and where the alert should be stored in Grafana: Figure 7.15 ...
( Category:
Distributed Systems & Computing
November 13,2023 )
epub |eng | 2023-11-15 | Author:Hemang Doshi
The Types of Servers From the CISA exam perspective, it is important that you understand the basic workings of the following servers: Print server: For multiple users, a network printer ...
( Category:
Security
November 13,2023 )
epub |eng | 2023-11-15 | Author:Harry G. Smeenk
The digital twin continues to get smarter as more and more data is added and can be used at every stage, including design, build, commissioning, operations, and maintenance. It benefits ...
( Category:
Personal Computers
November 13,2023 )
epub |eng | 2023-11-15 | Author:Mihir Shah
Pod/container name similarity: Attackers may create Pods or containers with names similar to legitimate ones, making it difficult to identify malicious activity. To mitigate this risk during threat modeling, security ...
( Category:
Encryption
November 12,2023 )
epub, mobi |eng | 2019-03-15 | Author:Antonio Mallia and Francesco Zoffoli
The deserialize() static method takes an std::array of 100 characters representing the object, and creates an object from it. The connection objects are already provided. Create the header connection.h with ...
( Category:
C++
November 12,2023 )
epub |eng | 2023-11-14 | Author:Daniel Vaughan
Implementing the Windowing Methodology Once you have defined them, you can enforce these on your code with something like the following snippet: import datetime from dateutil.relativedelta import relativedelta def query_data(len_obs: ...
( Category:
Business Intelligence Tools
November 12,2023 )
epub |eng | 2023-11-15 | Author:Susan Nelson Spencer
Figure 4.4 â The design thinking process (https://creativecommons.org/licenses/by-sa/4.0/) Phase I: Empathize: Empathy is central to the human-centered design process. This is where you will strive to better understand your learnersâ ...
( Category:
Business Intelligence Tools
November 11,2023 )
pdf, epub | | 2023-07-06 | Author:Dylan Hildenbrand[2023]
( Category:
Application Development
November 11,2023 )
pdf | | 2020-05-16 | Author:Pedro J. Aphalo
( Category:
Assembly Language Programming
November 11,2023 )
Categories
Popular ebooks
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16906)Deep Learning with Python by François Chollet(14999)
The Mikado Method by Ola Ellnestam Daniel Brolund(12258)
Hello! Python by Anthony Briggs(12152)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(11529)
Dependency Injection in .NET by Mark Seemann(11313)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10528)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(10128)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(9781)
Grails in Action by Glen Smith Peter Ledbrook(9455)
Hit Refresh by Satya Nadella(9039)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(9007)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(9003)
The Kubernetes Operator Framework Book by Michael Dame(8473)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8424)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8298)
Robo-Advisor with Python by Aki Ranin(8248)
Practical Computer Architecture with Python and ARM by Alan Clements(8224)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8193)
Building Low Latency Applications with C++ by Sourav Ghosh(8098)