Networking & Cloud Computing
epub |eng | 2014-12-01 | Author:Andrew Hinton
Figure 13-4. The Shazam mobile app’s primary control is a big simulated button that, when touched, scans the environment for musical patterns An on-screen button is just one way semantic ...
( Category:
Information Theory
January 17,2020 )
epub |eng | | Author:Michael Cassutt
* * * Down the hall they go, Bruno in front, Ruteb behind him, Wilson in the rear, reversing Bruno’s route of four hours earlier. The other rooms seem deserted. ...
( Category:
Historical
January 17,2020 )
epub |eng | 2009-04-14 | Author:Ryan Russell & Johnny Long & Timothy Mullen [Russell, Ryan & Long, Johnny & Mullen, Timothy]
In the Beginning… CHAPTER 21 497 It did not take long for her to begin the process anew with the top-tier boards, the regional and world headquarters for the groups ...
( Category:
Hacking
January 16,2020 )
epub |eng | | Author:Liehuang Zhu, Zijian Zhang & Chang Xu
The privacy-preserving key management(PARK) scheme is proposed in [X]. The privacy-preserving key management scheme uses adaptive key management and revocation to secure customer data from outsiders in the smart grid. ...
( Category:
Networking & Cloud Computing
January 14,2020 )
epub |eng | 2019-12-26 | Author:Delio D'Anna, Andrew Hayes, Sam Hennessy, Jeremy Leasor, Gobin Sougrakpam & Dániel Szabó
Figure 10.2: Measuring the execution time All that needs to be done is to capture the time when the script starts and ends. Then, we can calculate the duration by ...
( Category:
Networking & Cloud Computing
January 4,2020 )
epub |eng | 2019-12-26 | Author:Yuri Diogenes, Erdal Ozkaya
( Category:
Network Security
January 3,2020 )
mobi |eng | 2019-12-26 | Author:Erdal Ozkaya Yuri Diogenes [Yuri Diogenes, Erdal Ozkaya]
( Category:
Network Security
January 2,2020 )
epub, pdf |eng | | Author:Wolfgang W. Osterhage
Bibliography 1. I. Papadhopulli, N. Frasheri, Today’s challenges of symbolic execution and search based algorithms for automated structural testing. Open J. Commun. Softw. (2015) 2. W. Osterhage, Automatisierte Verfahren für ...
( Category:
Software Development
January 2,2020 )
epub |eng | | Author:Abhishek Chopra & Mukund Chaudhary
Where labeling is not required Evidence that can be prepared: Information classification policy and information classification guideline. Who prepares it: The information security team is responsible for preparing the information ...
( Category:
Storage & Retrieval
January 2,2020 )
epub |eng | 2018-10-30 | Author:Stuart Scott & Gabriel Ramirez [Stuart Scott]
( Category:
LAN
January 2,2020 )
epub |eng | | Author:Harvinder Atwal
Concept Drift Machine learning and deep learning models learn rules from historical input and output data to make predictions from new input data. The relationship between new input and output ...
( Category:
Storage & Retrieval
January 2,2020 )
epub |eng | | Author:Basel Solaiman & Éloi Bossé
m(An) = Π(Gn) − Π(Gn + 1), n = 1, 2, …, N − 1. 5.4.1 Transforming a b.p.a into a Possibility Distribution Let m(.) be a mass function on ...
( Category:
Networking & Cloud Computing
January 2,2020 )
epub |eng | 2018-06-21 | Author:Gus Khawaja [Gus Khawaja]
( Category:
Privacy & Online Safety
December 27,2019 )
epub, mobi, pdf |eng | 2018-08-03 | Author:Glyn Dewis
NOTETo make it easier to understand blend modes, I’ll talk about them in two parts—namely, the BASE (the bottom layer) and the BLEND (the layer to which the blend mode ...
( Category:
Adobe Photoshop
December 27,2019 )
epub |eng | | Author:Chris McCord, Bruce Tate, José Valim
( Category:
Internet, Groupware, & Telecommunications
December 25,2019 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9814)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7811)
Grails in Action by Glen Smith Peter Ledbrook(7722)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6875)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6871)
Running Windows Containers on AWS by Marcio Morales(6403)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5089)
Combating Crime on the Dark Web by Nearchos Nearchou(4664)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4655)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4355)
The Age of Surveillance Capitalism by Shoshana Zuboff(3989)
Python for Security and Networking - Third Edition by José Manuel Ortega(3907)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3573)
Learn Wireshark by Lisa Bock(3567)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3378)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3359)
Blockchain Basics by Daniel Drescher(3330)
