Home
>
Computers & Technology
>
Networking & Cloud Computing
>
Internet, Groupware, & Telecommunications
Internet, Groupware, & Telecommunications
epub |eng | 2015-07-15 | Author:Comer, Douglas E.;
17.5 Datagram Modification The temporary IP address that a wireless router assigns to a device is not valid on the Internet. So how can a device with a temporary address ...
( Category:
Networks
July 5,2020 )
epub |eng | | Author:Konstantinos Markantonakis & Keith Mayes
10.8.1 Value Added Service Management The situation for value-added service management is less clear than the core SIM functionality and there are a number of different scenarios that need to ...
( Category:
Electronics
July 5,2020 )
epub |eng | 2019-04-06 | Author:nader dabit [nader dabit]
( Category:
Object-Oriented Design
July 5,2020 )
epub |eng | 2020-02-09 | Author:Dave Thomas & David B. Copeland & Sam Ruby [Dave Thomas]
( Category:
Software Development
July 5,2020 )
epub |eng | 2020-06-26 | Author:Gaurav Mahajan and Sudeep Ghatak [Gaurav Mahajan and Sudeep Ghatak]
The Item content type is the base content type for all practical purposes (although it inherits from a hidden System content type). These links discuss the content type hierarchy and, ...
( Category:
Windows Administration
July 5,2020 )
epub |eng | | Author:Aboelmagd Noureldin, Tashfeen B. Karamat & Jacques Georgy
The accelerometers are attached to the moving platform in order to monitor its accelerations in three mutually orthogonal directions. The gyroscopes provide the attitude (pitch, roll and azimuth) of the ...
( Category:
Astronautics & Space Flight
July 5,2020 )
epub, pdf |eng | 2012-02-13 | Author:Stan Gibilisco
= 10 log10 (1/15) = 10 log10 0.06667 = 10 × (−1.176) = −11.76dB Because we’re told the attenuation factor is exact, we can leave this figure as it is. ...
( Category:
Electronics
July 5,2020 )
epub |eng | 2015-03-26 | Author:Isaac Sharpe [Sharpe, Isaac]
Chapter Ten Wireless Hacking & Security A wireless network is a type of network that employs connections between desktops, laptops, printers, etc. using absolutely no wired media, e.g. LAN cables. ...
( Category:
Electronics
July 5,2020 )
epub |eng | 2016-11-29 | Author:Nunez, Alfonso Garcia-Caro & Fahad, Suhaib [Nunez, Alfonso Garcia-Caro]
Note Note that you should always keep the reply channel as the last parameter in your union type definition. To use this calculator agent, we will simply create an object ...
( Category:
Software Development
July 5,2020 )
epub |eng | | Author:Izzat Alsmadi & Chuck Easttom & Lo’ai Tawalbeh
The more modern and desirable approach though, would be using machine learning. Machine learning allows computers to process new conditions through analysis, self-training and observation [9]. This allows the machine ...
( Category:
Internet, Groupware, & Telecommunications
July 4,2020 )
epub, pdf |eng | | Author:Rainer Strobel
3.6.2 Mutual Couplings Between G.fast and VDSL2 Due to the different duplexing schemes and the overlapping spectrum between 2.2 and , there is crosstalk between G.fast and VDSL2. As shown ...
( Category:
Electronics
July 4,2020 )
epub |eng | 2014-10-03 | Author:Dover, Thomas [Dover, Thomas]
Echo Echo takes place when you talk to yourself! Echo is a major problem in the following cases: 2W hybrid circuits. Cellular circuits using 2W connections to switches. Terminating equipment. ...
( Category:
Telecommunications & Sensors
July 4,2020 )
epub, pdf |eng | | Author:Abdulbaki Uzun
An omn-owl:Cell has an omn-owl:ServiceEvent (e.g., omn:cell34203_20453_262_3_org_openmobilenetwork_app) comprising various parameters of a mobile service collected within the past minute. Using the property omn-owl:hasService, this omn-owl:ServiceEvent is related to an omn-owl:MobileService, ...
( Category:
Telecommunications & Sensors
July 3,2020 )
epub |eng | 2019-11-01 | Author:Boris Cherny [Boris Cherny]
( Category:
Internet, Groupware, & Telecommunications
July 3,2020 )
epub |eng | 2019-03-29 | Author:James D. Miller [James D. Miller]
Without digging too deep into the theories behind parameter selection, we'll say here that this step involves determining the possible parameter value combinations, looking at their overall fitting results, running ...
( Category:
Computer Vision & Pattern Recognition
July 2,2020 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9787)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7790)
Grails in Action by Glen Smith Peter Ledbrook(7705)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6647)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6631)
Running Windows Containers on AWS by Marcio Morales(6158)
Kotlin in Action by Dmitry Jemerov(5074)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4959)
Combating Crime on the Dark Web by Nearchos Nearchou(4545)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4422)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4418)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4210)
The Age of Surveillance Capitalism by Shoshana Zuboff(3964)
Python for Security and Networking - Third Edition by José Manuel Ortega(3782)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3515)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3449)
Mastering Python for Networking and Security by José Manuel Ortega(3358)
Learn Wireshark by Lisa Bock(3341)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3307)
