Computer Science
pdf | | 2015-11-05 | Author:Brian W. Kernighan [Kernighan, Brian W.]
( Category:
Programming Languages
April 29,2022 )
pdf | | | Author:Unknown
( Category:
Database Storage & Design
April 28,2022 )
pdf | | | Author:Unknown
( Category:
Object-Oriented Software Design
April 26,2022 )
epub |eng | 2022-04-06 | Author:Paul McFedries [McFedries, Paul]
You can create a digital copy of a photo or other image by using a document scanner, or the scanner component of an all-in-one printer. The scanner copies the image ...
( Category:
Operating Systems
April 19,2022 )
pdf |en | | Author: Daniel D. Stancil
( Category:
Artificial Intelligence
April 13,2022 )
epub, pdf |eng | | Author:unknow
( Category:
Algorithms
April 8,2022 )
pdf |en | | Author: Alan Dennis, Barbara Haley Wixom, Roberta M. Roth
( Category:
Programming Languages
April 7,2022 )
pdf | | 0101-01-01 | Author:Rosemary Wang
( Category:
Programming Languages
April 6,2022 )
pdf | | 2016-05-25 | Author:Richard Boddington (2016)
( Category:
Operating Systems
March 28,2022 )
epub |eng | | Author:Unknown
Chapter 6 Implement and manage FSlogIx By default, the Windows operating system creates a local user profile that is tightly integrated with the OS, but FSLogix allows you to use ...
( Category:
Operating Systems
March 22,2022 )
epub |eng | 2022-03-07 | Author:Beena Ammanath [Ammanath, Beena]
What Does AI Compromise Look Like? Many business leaders understand the core elements in cybersecurity: strong access credentials, active system monitoring, and employee training for effective cyber hygiene and avoiding ...
( Category:
Artificial Intelligence
March 21,2022 )
pdf | | 1997-01-06 | Author:Sreedhar, V. V.
( Category:
Artificial Intelligence
March 16,2022 )
pdf | | | Author:Ian's Computer
( Category:
Artificial Intelligence
March 15,2022 )
epub |eng | 2022-04-24 | Author:Michael Hartl [Michael Hartl]
Figure 7.5: The result of applying HTML tab triggers. Figure 7.6: The result of applying tab triggers to an HTML page. Similarly, when writing Ruby code, typing def ⥠in ...
( Category:
Programming Languages
March 15,2022 )
epub |eng | 2022-04-12 | Author:Wills, Mike; [Wills, Michael S.]
Key Strength Cryptographic key strength was introduced in the first section of this chapter as being strongly related to the number of bits in the encryption key used by a ...
( Category:
Networking
March 15,2022 )
Categories
Popular ebooks
In-Memory Analytics with Apache Arrow by Matthew Topol(2712)Data Forecasting and Segmentation Using Microsoft Excel by Fernando Roque(2709)
PostgreSQL 14 Administration Cookbook by Simon Riggs(2240)
Cloud Auditing Best Practices: Perform Security and IT Audits across AWS, Azure, and GCP by building effective cloud auditing plans by Shinesa Cambric Michael Ratemo(1934)
Architects of Intelligence_The Truth About AI From the People Building It by Martin Ford(1256)
In-Memory Analytics with Apache Arrow: Perform fast and efficient data analytics on both flat and hierarchical structured data by Matthew Topol(1056)
Mastering Azure Virtual Desktop: The Ultimate Guide to the Implementation and Management of Azure Virtual Desktop by Ryan Mangan(1036)
Automated Machine Learning in Action by Qingquan Song Haifeng Jin Xia Hu(924)
Python GUI Programming with Tkinter, 2nd edition by Alan D. Moore(894)
Learn Wireshark - A definitive guide to expertly analyzing protocols and troubleshooting networks using Wireshark - 2nd Edition (2022) by Packt(764)
Ansible for Real-Life Automation - A complete Ansible handbook filled with practical IT automation use cases (2022) by Packt(762)
Data Engineering with Scala and Spark by Eric Tome Rupam Bhattacharjee David Radford(440)
Introduction to Algorithms, Fourth Edition by unknow(410)
ABAP Development for SAP HANA by Unknown(376)
Automated Machine Learning in Action by Qingquan Song & Haifeng Jin & Xia Hu(319)
Kubernetes Secrets Handbook by Emmanouil Gkatziouras | Rom Adams | Chen Xi(300)
The AWK Programming Language by Aho Alfred V. Kernighan Brian W. Weinberger Peter J. & Brian W. Kernighan & Peter J. Weinberger(295)
Asynchronous Programming in Rust by Carl Fredrik Samson;(280)
Learn Enough Developer Tools to Be Dangerous: Git Version Control, Command Line, and Text Editors Essentials by Michael Hartl(270)
Machine Learning for Imbalanced Data by Kumar Abhishek Dr. Mounir Abdelaziz(269)
