Computers & Technology
epub, azw3 |eng | 2016-03-29 | Author:Rashid, Tariq
In the next cell, the following code. a = numpy.zeros( [3,2] ) print(a) This uses the imported numpy module to create an array of shape 3 by 2, with all ...
( Category:
Computer Science
January 15,2018 )
azw3 |eng | 2017-07-31 | Author:Dan Van Boxel [Boxel, Dan Van]
So we know where to start let's look at the example image using the following code: # Let's take a look import matplotlib.pyplot as plt plt.ion() # Original plt.matshow(image[0]) plt.colorbar() ...
( Category:
Databases & Big Data
January 15,2018 )
epub |eng | | Author:Ignacio Rojas, Héctor Pomares & Olga Valenzuela
( Category:
Education & Reference
January 15,2018 )
epub |eng | 2017-12-28 | Author:Zeal Vora
( Category:
other
January 15,2018 )
epub |eng | 2017-12-28 | Author:Ty Audronis
Summary In this chapter, you got a good primer for all that is involved in designing an aircraft and the differences between an aircraft and a rover. I'm sure now ...
( Category:
Operating Systems
January 15,2018 )
epub |eng | 2014-11-18 | Author:HIDDENSTUFF ENTERTAINMENT [Entertainment, HiddenStuff]
Don’t camp at spawn points. When the enemies respawn, they will have the advantage (extra health), so killing them will be much harder. It’s best to distance yourself from the ...
( Category:
Games & Strategy Guides
January 15,2018 )
epub, azw3 |eng | 2016-05-02 | Author:Andreas Kolokithas [Kolokithas, Andreas]
Figure 5-35: Creation of monitor interface using airmon-ng STEP 2: The second step is to launch the beacon flooding attack against the listening wireless clients. Before proceeding with this step ...
( Category:
Internet & Social Media
January 14,2018 )
epub, azw3 |eng | 2013-06-12 | Author:Baldwin, Breck
Servos Operate But Motor Does Not This is a fairly common problem that has several possible causes: 1. The cutoff voltage has been reached for the ESC, and the motor ...
( Category:
Miscellaneous
January 14,2018 )
epub, azw3, pdf |eng | 2016-12-18 | Author:Mark Anderson [Anderson, Mark]
The process - For any commands that you enter, a nix terminal should be used. Programs such as Nmap or Cygwin are going to have nix terminals that will be ...
( Category:
Computers & Technology
January 14,2018 )
azw3 |eng | 2016-07-28 | Author:Kaushik, Anshul [Kaushik, Anshul]
Before starting the jail breaking process make sure that your battery is 100 percent charged & your device has at least 2gb free space. There are certain other things which ...
( Category:
Internet & Social Media
January 14,2018 )
epub |eng | 2016-01-28 | Author:Vince Reynolds [Reynolds, Vince]
Influence and Persuasion Apart from the four basic psychological tactics mentioned previously, there are other psychological techniques involved in social engineering. These include influence and persuasion. Social engineering psychology, just ...
( Category:
Internet & Social Media
January 14,2018 )
epub, pdf |eng | 2016-09-15 | Author:Jeff Simon & Hacking [Simon, Jeff]
Manual Penetration Tests You will run manual tests most of the time. Here, you will use your tools, skills, and knowledge to find the weaknesses of a network. Manual tests ...
( Category:
Internet & Social Media
January 14,2018 )
epub |eng | 2013-06-24 | Author:Fernandez-Buglioni, Eduardo
[Bha04] proves security properties of combinations of WS-TRUST and WS-Secure conversation to implement secure sessions. The WS-Trust specification was created as part of the Global XML Web Services Architecture (GXA) ...
( Category:
Programming
January 14,2018 )
azw3 |eng | 2014-07-14 | Author:Fryer, Andrew [Fryer, Andrew]
Now, we need to repeat the process to add this server in as a gateway: Right-click on the RD Gateway icon and select Add RD Gateway Servers. In the Select ...
( Category:
Operating Systems
January 14,2018 )
mobi, epub, azw3 |eng | 2015-01-09 | Author:Sean Murphy
NOTE Depending on the type of exploit or attack, the incident response team will tailor its actions. If the incident is entirely internal (a lost removable media), certain actions are ...
( Category:
Hardware & DIY
January 14,2018 )
Categories
Popular ebooks
Deep Learning with Python by François Chollet(28003)The Mikado Method by Ola Ellnestam Daniel Brolund(25294)
Hello! Python by Anthony Briggs(24339)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(23434)
Kotlin in Action by Dmitry Jemerov(22512)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(21976)
Dependency Injection in .NET by Mark Seemann(21849)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(20715)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(19524)
Grails in Action by Glen Smith Peter Ledbrook(18609)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17034)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(15843)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(13697)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11857)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11151)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10627)
Hit Refresh by Satya Nadella(9202)
The Kubernetes Operator Framework Book by Michael Dame(8570)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8415)
Robo-Advisor with Python by Aki Ranin(8361)