Computer Science
epub |eng | | Author:Unknown

Chapter 3 analyzing layer 2 and layer 3 traffiC Figure 3-18. Wireshark capture of last fragmented packet For simplicity and ease of remembering, the IP packets can be categorized into ...
( Category: Networking August 16,2022 )
pdf | | 2005-07-23 | Author:ReadySoft

( Category: Software Design & Engineering August 13,2022 )
pdf |en | | Author: Carol Woodbury, Victoria Mack (editor)

( Category: Networking August 12,2022 )
pdf | | 2006-12-13 | Author:Martin Harvan

( Category: Programming Languages August 7,2022 )
pdf | | 2013-07-18 | Author:Unknown

( Category: Artificial Intelligence August 6,2022 )
pdf | | 2014-02-14 | Author:Pollyanna Pixton & Paul Gibson & Niel Nickolaisen

( Category: Software Design & Engineering August 6,2022 )
epub |eng | 2022-07-27 | Author:Hart-Davis, Ted;Hart-Davis, Guy; & Ted Hart-Davis [Hart-Davis, Guy & Hart-Davis, Ted]

Using the range() Function to Create a Numeric for Loop When you need to loop through a sequence of nonsequential numbers, you can put them in a set and loop ...
( Category: Programming Languages August 2,2022 )
epub |eng | 2022-08-15 | Author:Bhardwaj, Akashdeep; [Bhardwaj, Dr. Akashdeep]

Active: To gather information about a target, active fingerprinting techniques send the packet to remote hosts and analyze the responses for clues about the responding system, such as using NMAP ...
( Category: Networking August 2,2022 )
epub |eng | 2022-08-15 | Author:Kumar, Abhishek; [Kumar, Abhishek]

Type inference Unlike functions, providing types for arguments and return value is optional for closures. The types are implicitly inferred by the compiler. In the following example, we have defined ...
( Category: Programming Languages August 2,2022 )
epub |eng | 2022-07-15 | Author:Lad, Sagar;Kumar, Anjani; & Anjani Kumar [Lad, Sagar & Kumar, Anjani]

Multiple choice questions Which of the following cloud-based tool sets can be used to orchestrate Databricks workflows? Airflow on AWS (Amazon managed apache airflow) Data Factory on Azure Delta Live ...
( Category: Database Storage & Design July 30,2022 )

Popular ebooks
In-Memory Analytics with Apache Arrow by Matthew Topol(2712)
Data Forecasting and Segmentation Using Microsoft Excel by Fernando Roque(2709)
PostgreSQL 14 Administration Cookbook by Simon Riggs(2240)
Cloud Auditing Best Practices: Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans by Shinesa Cambric Michael Ratemo(1935)
Architects of Intelligence_The Truth About AI From the People Building It by Martin Ford(1256)
In-Memory Analytics with Apache Arrow: Perform fast and efficient data analytics on both flat and hierarchical structured data by Matthew Topol(1056)
Mastering Azure Virtual Desktop: The Ultimate Guide to the Implementation and Management of Azure Virtual Desktop by Ryan Mangan(1036)
Automated Machine Learning in Action by Qingquan Song Haifeng Jin Xia Hu(924)
Python GUI Programming with Tkinter, 2nd edition by Alan D. Moore(894)
Learn Wireshark - A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark - 2nd Edition (2022) by Packt(766)
Ansible for Real-Life Automation - A complete Ansible handbook filled with practical IT automation use cases (2022) by Packt(762)
Data Engineering with Scala and Spark by Eric Tome Rupam Bhattacharjee David Radford(440)
Introduction to Algorithms, Fourth Edition by unknow(410)
ABAP Development for SAP HANA by Unknown(376)
Automated Machine Learning in Action by Qingquan Song & Haifeng Jin & Xia Hu(319)
Kubernetes Secrets Handbook by Emmanouil Gkatziouras | 
Rom Adams
 | Chen Xi(300)
The AWK Programming Language by Aho Alfred V. Kernighan Brian W. Weinberger Peter J. & Brian W. Kernighan & Peter J. Weinberger(295)
Asynchronous Programming in Rust by Carl Fredrik Samson;(280)
Learn Enough Developer Tools to Be Dangerous: Git Version Control, Command Line, and Text Editors Essentials by Michael Hartl(270)
Machine Learning for Imbalanced Data by Kumar Abhishek Dr. Mounir Abdelaziz(269)