Computers & Technology
epub, mobi |eng | 2016-11-14 | Author:Oliver Luckett & Michael J. Casey
As we’ve discussed, it takes more than simply pushing a message out to a broad number of influencers to make it grow. To harness the Social Organism’s global distribution system ...
( Category:
Communication & Media Studies
January 8,2017 )
epub |eng | | Author:Joseph Ashley
Occultations A third lunar activity very suited for video astronomy is timing occultations of stars by the Moon. An occultation is when some object passes between a star and an ...
( Category:
Computer Vision & Pattern Recognition
January 8,2017 )
epub, pdf |eng | 2016-06-28 | Author:Monk, Simon [Monk, Simon]
const int inputPin = 5; void setup() { pinMode(inputPin, INPUT_PULLUP); Serial.begin(9600); } void loop() { int reading = digitalRead(inputPin); Serial.println(reading); delay(1000); } Debouncing When you press a pushbutton, you would ...
( Category:
Electronics
December 12,2016 )
epub |eng | 2016-12-01 | Author:Walker, Matt [Walker, Matt]
CHAPTER 7 Wireless Network Hacking This chapter includes questions from the following topics: • Describe wireless network architecture and terminology • Identify wireless network types and forms of authentication • ...
( Category:
Hacking
December 11,2016 )
epub |eng | | Author:Frank M. Groom, Kevin Groom & Stephan S. Jones
Figure 14.4 Two main goals of issuing denial-of-service attacks. Stopping Services Locally, these attacks are focused on process crashing and forcing system reconfiguration. Remotely, the attacks are predominantly focused on ...
( Category:
Networks
December 11,2016 )
epub |eng | 2016-12-10 | Author:Shaharuddin Salleh & Zuraida Abal Abas
6.1.1 Greedy Algorithm for Finding the Maximum Clique We discuss a greedy algorithm for finding the maximum clique. The graph G(V, E) has nodes V = {v1, v2, v3…vn}. The ...
( Category:
Combinatorics
December 11,2016 )
epub |eng | | Author:STEPHEN BOSS & JASON CRANFORD TEAGUE
STYLE 5 “I AM BASICALLY ANALYTICAL, NOT CREATIVE; MY WRITING IS SIMPLY A CREATIVE WAY OF HANDLING ANALYSIS.” PHILLIP K. DICK The fonts are the voice you give your text, ...
( Category:
Programming
December 10,2016 )
epub, pdf |eng | | Author:Anthony J. Rhem
Insurance Business Challenges Knowledge drain: One of the primary challenges being faced by insurance companies today is the high turnover of employees, CSRs, brokers, and other third-party assessors. When they ...
( Category:
Business & Money
December 10,2016 )
epub |eng | | Author:Melvin B. Greer & Kevin L. Jackson
Cloud Strategy by digitalized base (CSA) 8.3 HEALTHCARE 8.3.1 Vertical View Healthcare cybersecurity is lagging behind other sectors. ABI Research says hospitals, clinics, trusts, and insurers are constantly under attack ...
( Category:
Network Security
December 9,2016 )
epub |eng | | Author:Jessica Keyes
Other techniques for generating innovation include Brainstorming: This technique is perhaps the most familiar of all the techniques discussed here. It is used to generate a large quantity of ideas ...
( Category:
Software Development
December 9,2016 )
epub, pdf |eng | 2013-12-07 | Author:Steven M. Kay
for the matched filter and for the energy detector. The performance of the autocorrelation detector is expected to be poorer than the matched filter but better than the energy detector. ...
( Category:
Signal Processing
December 8,2016 )
epub, mobi |eng | 2016-11-29 | Author:Toomey, Dan [Toomey, Dan]
When run, we get the results shown in the following screenshot: Interestingly, the 98.5 is considered an outlier. I assume there is an optional parameter to the command that would ...
( Category:
Software Development
December 8,2016 )
epub |eng | 2014-08-04 | Author:Lt. Col. Dave Grossman [Grossman, Lt. Col. Dave]
Once the external influences “get inside” of us, it can be confusing. We can’t always identify an external influence as a “cause” of our actions. The two may have been ...
( Category:
Communication & Media Studies
December 7,2016 )
epub |eng | 2009-06-29 | Author:Kathy Sierra [Kathy Sierra and Bert Bates]
And you need FIVE steps: Get a Sequencer and open it Sequencer player = MidiSystem.getSequencer(); player.open(); Make a new Sequence Sequence seq = new Sequence(timing,4); Get a new Track from ...
( Category:
Object-Oriented Design
December 7,2016 )
mobi |eng | 2009-05-30 | Author:Everest, F. Alton & Pohlmann, Ken [Everest, F. Alton]
The Bonello Criterion In reviewing various preferred room ratios, we have observed that choosing the right ratio of dimensions is crucial in obtaining good modal response. For example, the ratio ...
( Category:
Acoustics
December 7,2016 )
Categories
Popular ebooks
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16906)Deep Learning with Python by François Chollet(15296)
The Mikado Method by Ola Ellnestam Daniel Brolund(12563)
Hello! Python by Anthony Briggs(12427)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(11745)
Dependency Injection in .NET by Mark Seemann(11545)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10532)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(10359)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(10048)
Grails in Action by Glen Smith Peter Ledbrook(9682)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(9320)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(9168)
Hit Refresh by Satya Nadella(9040)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8500)
The Kubernetes Operator Framework Book by Michael Dame(8479)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8300)
Robo-Advisor with Python by Aki Ranin(8256)
Practical Computer Architecture with Python and ARM by Alan Clements(8228)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8198)
Building Low Latency Applications with C++ by Sourav Ghosh(8103)