Computer Science
epub, pdf |eng | 2012-12-12 | Author:Dave Smith, Jeff Friesen
Photo Overlay We can now add on to the previous example any controls or views that are appropriate to display on top of the camera preview. Let’s modify the preview ...
( Category:
Computer Science
March 26,2014 )
epub |eng | 2013-07-01 | Author:Wilhelm, Thomas [Wilhelm, Thomas]
TCP Scanning Most of the interesting applications from a pentest perspective use TCP to communicate across the networks, including Web servers, file transfer applications, databases, and more. There are a ...
( Category:
Hacking
March 26,2014 )
epub |eng | 2012-03-25 | Author:Jack Wiles & Terry Gudaitis & Jennifer Jabbusch & Russ Rogers & Sean Lowther
• Secured management interfaces for the APs, controllers, chassis hosting controllers • Strict change management policies • Monitoring and auditing configuration changes and alerts on changes • Annual or semi-annual ...
( Category:
Hacking
March 26,2014 )
epub |eng | 2013-03-25 | Author:Henry S. Warren
Thus, (27) always has a solution. If p is not forced to equal W, then from (25) and (28), If p is forced to equal W, then from (25), Because ...
( Category:
Computer Science
March 26,2014 )
epub, pdf |eng | 2013-01-27 | Author:Eric Cole
There is a lot of focus, energy and effort put against incident response today, but what we have found is not everyone is using the same definitions. Therefore in order ...
( Category:
Hacking
March 26,2014 )
epub |eng | 2012-08-01 | Author:Anton Chuvakin & Branden R. Williams
Other aspects of your vulnerability management program apply to securing the software developed in-house. Section 6.3 states that one needs to “develop software applications based on industry best practices and ...
( Category:
Enterprise Applications
March 26,2014 )
epub, pdf |eng | 2012-10-31 | Author:Lisa Sabin-Wilson [Sabin-Wilson, Lisa]
Figure 8-5: Add a new link with the Add New Link page. Figure 8-6: You can assign a link to an existing category or add a new category here. If ...
( Category:
Blogging & Blogs
March 26,2014 )
epub |eng | 2012-10-30 | Author:Shane Cook
// Increment this run’s count results_processed++; } } } } return results_processed; } The collect result function simply iterates over all devices and each stream of every device and calls ...
( Category:
Computer Science
March 26,2014 )
epub |eng | 2012-12-05 | Author:David B. Kirk & Wen-mei W. Hwu
Figure 10.14 A sequential loop that implements SpMV/COO. The loop is extremely simple. It iterates through all the data elements and performs the multiply and accumulate operations on the appropriate ...
( Category:
Design & Architecture
March 26,2014 )
epub, pdf |eng | 2012-10-29 | Author:Benedict R. Gaster & Lee Howes & David R. Kaeli & Perhaad Mistry & Dana Schaa
This is a pair of instruction packets, each containing up to four operations. The first one is only half full: this is where vector operations came in. In addition, the ...
( Category:
Software Development
March 26,2014 )
epub |eng | 2012-11-15 | Author:James J. Trobaugh & Mannie Lowe [Trobaugh, James J. & Lowe, Mannie]
You can perform the calibration in two ways: by using NXT-G’s own Light Calibration block that stores the calibrated values in the NXT’s memory or by creating your own calibration ...
( Category:
Computer Science
March 26,2014 )
epub, pdf |eng | 2011-12-26 | Author:Mark Rollins
If you are going to make a LEGO Technic creation that will be lit up like a float at the Disneyland Main Street parade, I suggest using multiple battery packs. ...
( Category:
Toymaking
March 26,2014 )
epub, pdf |eng | 2013-05-07 | Author:Krish Krishnan
Figure 8.1 Classic systems architecture. An additional aspect to keep in perspective is the ever-changing nature of data and its associated structures. The impact of data itself is one of ...
( Category:
Storage & Retrieval
March 26,2014 )
epub |eng | 2012-12-13 | Author:Dejan Sarka, Matija Lah & Grega Jerkic [Dejan Sarka, Matija Lah, and Grega Jerkic]
Executions As mentioned earlier in this lesson, the execution of an SSISDB package begins with the creation of a new execution instance; the principal purpose of the execution instance is ...
( Category:
Software Development
March 26,2014 )
epub |eng | 2012-10-23 | Author:Mark Talabis & Jason Martin
Chapter 4 Information Security Risk Assessment: Data Analysis Information in this chapter: • Introduction • Compiling Observations from Organizational Risk Documents • Preparation of Threat and Vulnerability Catalogs • Overview ...
( Category:
Operations Research
March 26,2014 )
Categories
AI & Machine Learning | Bioinformatics |
Computer Simulation | Cybernetics |
Human-Computer Interaction | Information Theory |
Robotics | Systems Analysis & Design |
Popular ebooks
Deep Learning with Python by François Chollet(12571)Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8300)
Test-Driven Development with Java by Alan Mellor(6721)
Data Augmentation with Python by Duc Haba(6637)
Principles of Data Fabric by Sonia Mezzetta(6387)
Learn Blender Simulations the Right Way by Stephen Pearson(6284)
Microservices with Spring Boot 3 and Spring Cloud by Magnus Larsson(6158)
Hadoop in Practice by Alex Holmes(5958)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(5806)
RPA Solution Architect's Handbook by Sachin Sahgal(5553)
Big Data Analysis with Python by Ivan Marin(5363)
The Infinite Retina by Robert Scoble Irena Cronin(5247)
Life 3.0: Being Human in the Age of Artificial Intelligence by Tegmark Max(5147)
Pretrain Vision and Large Language Models in Python by Emily Webber(4327)
Infrastructure as Code for Beginners by Russ McKendrick(4088)
Functional Programming in JavaScript by Mantyla Dan(4038)
The Age of Surveillance Capitalism by Shoshana Zuboff(3950)
WordPress Plugin Development Cookbook by Yannick Lefebvre(3802)
Embracing Microservices Design by Ovais Mehboob Ahmed Khan Nabil Siddiqui and Timothy Oleson(3606)
Applied Machine Learning for Healthcare and Life Sciences Using AWS by Ujjwal Ratan(3578)
