Computer Science
pdf | | 0101-01-01 | Author:Stephen Wolfram (2017)
( Category:
Programming Languages
November 13,2023 )
epub |eng | 2024-11-15 | Author:Lee Phillips
Defining structs with Base.@kwdef The default method for defining composite types leaves a bit to be desired. Its main deficiency is that the constructor it creates requires the programmer to ...
( Category:
Algorithms
November 12,2023 )
epub |eng | 2023-11-15 | Author:Antonio Nappa & Eduardo Blázquez
Passing inputs to the guest system While the Driver binary is running within the guest, a communication channel between the Driver inside the VM and AFL is established through a ...
( Category:
Operating Systems
November 8,2023 )
pdf | | 2023-09-19 | Author:Joshua Jahani [Jahani, Joshua]
( Category:
Database Storage & Design
November 8,2023 )
epub |eng | 2021-11-15 | Author:Oswald Campesato [Oswald Campesato]
THE TRANSPOSE OF A MATRIX As a reminder, the transpose of matrix A is matrix At, where the rows and columns of A are the columns and rows, respectively, of ...
( Category:
Database Storage & Design
November 5,2023 )
pdf | | 2023-10-23 | Author:Joseph A. Cazier [Cazier, Joseph A.]
( Category:
Database Storage & Design
November 4,2023 )
pdf | | 2023-10-24 | Author:Unknown
( Category:
Database Storage & Design
November 1,2023 )
epub |eng | 2022-11-15 | Author:Dr. Davide Aversa
Chapter 6: Path Following and Steering Behaviors In this short chapter, we will implement two Unity3D demos to explore steering behaviors. In the first demo, we will implement a script ...
( Category:
Graphics & Visualization
November 1,2023 )
epub |eng | 2023-10-03 | Author:Cesar Bravo , Desilda Toska
Figure 6.3 â Example of an Instagram attack One of the most famous Instagram attacks occurred in 2017 and involved the manipulation of Instagramâs email recovery system. Hackers exploited a ...
( Category:
Networking
October 30,2023 )
epub |eng | 2023-09-26 | Author:Aspen Olmsted
Arrays:Fixed Size: Arrays have a fixed size thatâs determined at the time of declaration and cannot be changed during runtime. Homogeneous elements: Arrays only store elements of the same data ...
( Category:
Object-Oriented Software Design
October 30,2023 )
epub |eng | 2023-10-15 | Author:Chris Seferlis & Christopher Nellis & Andy Roberts
Now that our data has been processed and aggregated, we can send it to the Anomaly Detector directly and get our results back to determine what to do with our ...
( Category:
Database Storage & Design
October 30,2023 )
pdf | | 2023-09-11 | Author:Nabil, Moataz;
( Category:
Operating Systems
October 29,2023 )
epub |eng | 2023-10-15 | Author:ZHENYU GEORGE LI
Controlling Characters In Chapter 6, we created our player character, the PlayerAvatar class, and the BP_PlayerAvatar blueprint. The next thing we want to do is to control the player character. ...
( Category:
Graphics & Visualization
October 24,2023 )
epub |eng | 2023-10-15 | Author:Nicolas Leiva & Michael Kashin
Further reading To learn more about the topics that were covered in this chapter, take a look at the following resources: NetDevOps 2020 Survey: https://dgarros.github.io/netdevops-survey/reports/2020 topo directory: https://github.com/PacktPublishing/Network-Automation-with-Go/blob/main/topo-base/topo.yml ch06/ssh folder: ...
( Category:
Networking
October 24,2023 )
epub, pdf |eng | 2023-10-15 | Author:Steven F. Lott
7.5 Extras Here are some ideas for you to add to the projects in this chapter. 7.5.1 Markdown cells with dates and data source information A minor feature of an ...
( Category:
Programming Languages
October 20,2023 )
Categories
Popular ebooks
Developing Robust Date and Time Oriented Applications in Oracle Cloud by Michal Kvet(3200)Serverless ETL and Analytics with AWS Glue by Vishal Pathak Subramanya Vajiraya Noritaka Sekiyama Tomohiro Tanaka Albert Quiroga Ishan Gaur(2779)
Practical Guide to Azure Cognitive Services by Chris Seferlis & Christopher Nellis & Andy Roberts(2298)
Unity Artificial Intelligence Programming - Fifth Edition by Dr. Davide Aversa(1957)
Open Source Projects - Beyond Code by John Mertic(1840)
The AI Product Manager's Handbook by Irene Bratsis(1832)
Graph Data Modeling in Python by Gary Hutson and Matt Jackson(1808)
Cloud Auditing Best Practices by Shinesa Cambric & Michael Ratemo(1443)
Aligning Security Operations with the MITRE ATT&CK Framework by Rebecca Blair(1427)
Graph Data Processing with Cypher by Ravindranatha Anthapu(1139)
Data Literacy in Practice by Angelika Klidas Kevin Hanegan(1128)
Applied Machine Learning and High-Performance Computing on AWS by Mani Khanuja | Farooq Sabir | Shreyas Subramanian | Trenton Potgieter(1125)
Fuzzing Against the Machine: Automate vulnerability research with emulated IoT devices on QEMU by Antonio Nappa Eduardo Blazquez(972)
Implementing Multifactor Authentication: Protect your applications from cyberattacks with the help of MFA by Marco Fanti(970)
The AI Product Manager's Handbook: Develop a product that takes advantage of machine learning to solve AI problems by Irene Bratsis(855)
Data Literacy in Practice - A complete guide to data literacy and making smarter decisions with data through intelligent actions (2022) by Packt(849)
The SQL Workshop by Frank Solomon(822)
Graph Data Processing with Cypher by Anthapu Ravindranatha;(796)
Serverless Machine Learning with Amazon Redshift ML: Create, train, and deploy machine learning models using familiar SQL commands by Debu Panda Phil Bates Bhanu Pittampally Sumeet Joshi(746)
Network Automation with Go by Nicolas Leiva & Michael Kashin(631)