Computers & Technology
epub |eng | 2015-12-20 | Author:Tran, Duong
Post: Security @riskmanageworks.com DTran’s Comment: The big four security concerns are the internal threat, external threats, business innovations and human error. Post: Security @spiresecurity.com DTran’s Comment: The big four security ...
( Category:
Computers & Technology
January 1,2016 )
mobi, epub |eng | 2012-06-22 | Author:Joy Deangdeelert Cho
COMMENTING 101 Comments allow you to know what readers have to say in response to the content you’re bringing to them. It gives your audience a place to interact with ...
( Category:
Entrepreneurship
January 1,2016 )
epub |eng | 2015-10-29 | Author:Unknown [Unknown]
Similar observations were found for cow’s authors’ experience with pilot plant and labora- milk (Chen, 2013 ). In a comparison study, 25 tory experiments on cow’s milk and goat’s milk ...
( Category:
Horror
January 1,2016 )
epub |eng | 2008-07-17 | Author:Tzouliadis, Tim [Tzouliadis, Tim]
IN JANUARY 1944, Kathleen Harriman was invited to visit a clearing in the Katyn Forest of Byelorussia, where the mass graves of several thousand Polish officers missing since 1940 had ...
( Category:
Immigrants
January 1,2016 )
epub |eng | 2015-07-08 | Author:Danny Ajini [Ajini, Danny]
.PNG's And .GIF's .PNG's and .GIF's are best used when the image in question is based on areas of solid color rather than thousands of pixels of various color. Figure ...
( Category:
Programming
January 1,2016 )
epub |eng | 2015-12-21 | Author:Soyinka, Wale
( Category:
Computers & Technology
January 1,2016 )
azw3 |eng | 2015-08-10 | Author:Spraul, V. Anton [Spraul, V. Anton]
Shadows Shadowing plays an important part in convincing the viewer to accept the reality of an image by giving models weight and realism. Producing shadows requires tracing beams of light; ...
( Category:
Software Development
January 1,2016 )
epub, pdf |eng | 0101-01-01 | Author:Sam Vila [Vila, Sam]
rendering 4 9 Here it is the original frame without overscan: And here is the same frame with overscan: Notice how the cyan area (original render size) becomes as big ...
( Category:
Graphics & Multimedia
January 1,2016 )
epub |eng | 2015-08-12 | Author:Kumar, Krishna
Figure 5.18 Primary Datacenter Virtual Directory Configuration Configure the primary datacenter Exchange server CAS ‘PRIEXCH01’ virtual directories URL using the below cmdlets. To configure other servers (PRIEXCH02 and PRIEXCH03) in ...
( Category:
Email Administration
December 31,2015 )
azw3 |eng | 2015-08-12 | Author:Kumar, Krishna [Kumar, Krishna]
Figure 5.18 Primary Datacenter Virtual Directory Configuration Configure the primary datacenter Exchange server CAS ‘PRIEXCH01’ virtual directories URL using the below cmdlets. To configure other servers (PRIEXCH02 and PRIEXCH03) in ...
( Category:
Email Administration
December 31,2015 )
epub |eng | 2015-07-26 | Author:Baesens, Bart & Van Vlasselaer, Veronique & Verbeke, Wouter
Figure 4.37 Calculating Predictions Using a Cut-Off A confusion matrix can now be calculated as shown in Table 4.5. Table 4.5 Confusion Matrix Actual Status Positive (Fraud) Negative (No Fraud) ...
( Category:
Data Mining
December 31,2015 )
azw3 |eng | 2015-07-26 | Author:Baesens, Bart & Van Vlasselaer, Veronique & Verbeke, Wouter [Baesens, Bart]
Figure 4.37 Calculating Predictions Using a Cut-Off A confusion matrix can now be calculated as shown in Table 4.5. Table 4.5 Confusion Matrix Actual Status Positive (Fraud) Negative (No Fraud) ...
( Category:
Data Mining
December 31,2015 )
azw3, epub |eng | 2015-12-27 | Author:Poole, Matthew [Poole, Matthew]
Prerequisites You'll need the following parts for this chapter, on top of the components used in the previous chapter: A Raspberry Pi standard camera module A Raspberry Pi NoIR camera ...
( Category:
Single Board Computers
December 31,2015 )
azw3, epub |eng | 2015-08-31 | Author:Castro, Jorge R. [Castro, Jorge R.]
Note WARNING! E-mail accounts have certain security measures to not accept requests from unusual origins, for example, blocking or regional or even continental requests. It may be that the process ...
( Category:
C
December 31,2015 )
azw3 |eng | 2015-12-29 | Author:Erl, Thomas & Khattak, Wajid & Buhler, Paul [Erl, Thomas]
Figure 5.14 An example of the combination of sharding and peer-to-peer replication. CAP Theorem The Consistency, Availability, and Partition tolerance (CAP) theorem, also known as Brewer’s theorem, expresses a triple ...
( Category:
Data Mining
December 31,2015 )
Categories
Popular ebooks
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16906)Deep Learning with Python by François Chollet(15032)
The Mikado Method by Ola Ellnestam Daniel Brolund(12292)
Hello! Python by Anthony Briggs(12183)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(11550)
Dependency Injection in .NET by Mark Seemann(11336)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10530)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(10150)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(9811)
Grails in Action by Glen Smith Peter Ledbrook(9479)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(9045)
Hit Refresh by Satya Nadella(9039)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(9032)
The Kubernetes Operator Framework Book by Michael Dame(8473)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8437)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8298)
Robo-Advisor with Python by Aki Ranin(8252)
Practical Computer Architecture with Python and ARM by Alan Clements(8225)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8193)
Building Low Latency Applications with C++ by Sourav Ghosh(8099)