Computer Science
pdf | | 0101-01-01 | Author:Stephen Wolfram (2017)

( Category: Programming Languages November 13,2023 )
epub |eng | 2024-11-15 | Author:Lee Phillips

Defining structs with Base.@kwdef The default method for defining composite types leaves a bit to be desired. Its main deficiency is that the constructor it creates requires the programmer to ...
( Category: Algorithms November 12,2023 )
epub |eng | 2023-11-15 | Author:Antonio Nappa & Eduardo Blázquez

Passing inputs to the guest system While the Driver binary is running within the guest, a communication channel between the Driver inside the VM and AFL is established through a ...
( Category: Operating Systems November 8,2023 )
pdf | | 2023-09-19 | Author:Joshua Jahani [Jahani, Joshua]

( Category: Database Storage & Design November 8,2023 )
epub |eng | 2021-11-15 | Author:Oswald Campesato [Oswald Campesato]

THE TRANSPOSE OF A MATRIX As a reminder, the transpose of matrix A is matrix At, where the rows and columns of A are the columns and rows, respectively, of ...
( Category: Database Storage & Design November 5,2023 )
pdf | | 2023-10-24 | Author:Unknown

( Category: Database Storage & Design November 1,2023 )
epub |eng | 2022-11-15 | Author:Dr. Davide Aversa

Chapter 6: Path Following and Steering Behaviors In this short chapter, we will implement two Unity3D demos to explore steering behaviors. In the first demo, we will implement a script ...
( Category: Graphics & Visualization November 1,2023 )
epub |eng | 2023-10-03 | Author:Cesar Bravo , Desilda Toska

Figure 6.3 – Example of an Instagram attack One of the most famous Instagram attacks occurred in 2017 and involved the manipulation of Instagram’s email recovery system. Hackers exploited a ...
( Category: Networking October 30,2023 )
epub |eng | 2023-09-26 | Author:Aspen Olmsted

Arrays:Fixed Size: Arrays have a fixed size that’s determined at the time of declaration and cannot be changed during runtime. Homogeneous elements: Arrays only store elements of the same data ...
( Category: Object-Oriented Software Design October 30,2023 )
epub |eng | 2023-10-15 | Author:Chris Seferlis & Christopher Nellis & Andy Roberts

Now that our data has been processed and aggregated, we can send it to the Anomaly Detector directly and get our results back to determine what to do with our ...
( Category: Database Storage & Design October 30,2023 )
pdf | | 2023-09-11 | Author:Nabil, Moataz;

( Category: Operating Systems October 29,2023 )
epub |eng | 2023-10-15 | Author:ZHENYU GEORGE LI

Controlling Characters In Chapter 6, we created our player character, the PlayerAvatar class, and the BP_PlayerAvatar blueprint. The next thing we want to do is to control the player character. ...
( Category: Graphics & Visualization October 24,2023 )
epub |eng | 2023-10-15 | Author:Nicolas Leiva & Michael Kashin

Further reading To learn more about the topics that were covered in this chapter, take a look at the following resources: NetDevOps 2020 Survey: https://dgarros.github.io/netdevops-survey/reports/2020 topo directory: https://github.com/PacktPublishing/Network-Automation-with-Go/blob/main/topo-base/topo.yml ch06/ssh folder: ...
( Category: Networking October 24,2023 )
epub, pdf |eng | 2023-10-15 | Author:Steven F. Lott

7.5 Extras Here are some ideas for you to add to the projects in this chapter. 7.5.1 Markdown cells with dates and data source information A minor feature of an ...
( Category: Programming Languages October 20,2023 )

Popular ebooks
Developing Robust Date and Time Oriented Applications in Oracle Cloud by Michal Kvet(3200)
Serverless ETL and Analytics with AWS Glue by Vishal Pathak Subramanya Vajiraya Noritaka Sekiyama Tomohiro Tanaka Albert Quiroga Ishan Gaur(2779)
Practical Guide to Azure Cognitive Services by Chris Seferlis & Christopher Nellis & Andy Roberts(2298)
Unity Artificial Intelligence Programming - Fifth Edition by Dr. Davide Aversa(1957)
Open Source Projects - Beyond Code by John Mertic(1840)
The AI Product Manager's Handbook by Irene Bratsis(1832)
Graph Data Modeling in Python by Gary Hutson and Matt Jackson(1808)
Cloud Auditing Best Practices by Shinesa Cambric & Michael Ratemo(1443)
Aligning Security Operations with the MITRE ATT&CK Framework by Rebecca Blair(1427)
Graph Data Processing with Cypher by Ravindranatha Anthapu(1139)
Data Literacy in Practice by Angelika Klidas Kevin Hanegan(1128)
Applied Machine Learning and High-Performance Computing on AWS by Mani Khanuja | Farooq Sabir | Shreyas Subramanian | Trenton Potgieter(1125)
Fuzzing Against the Machine: Automate vulnerability research with emulated IoT devices on QEMU by Antonio Nappa Eduardo Blazquez(972)
Implementing Multifactor Authentication: Protect your applications from cyberattacks with the help of MFA by Marco Fanti(970)
The AI Product Manager's Handbook: Develop a product that takes advantage of machine learning to solve AI problems by Irene Bratsis(855)
Data Literacy in Practice - A complete guide to data literacy and making smarter decisions with data through intelligent actions (2022) by Packt(849)
The SQL Workshop by Frank Solomon(822)
Graph Data Processing with Cypher by Anthapu Ravindranatha;(796)
Serverless Machine Learning with Amazon Redshift ML: Create, train, and deploy machine learning models using familiar SQL commands by Debu Panda Phil Bates Bhanu Pittampally Sumeet Joshi(746)
Network Automation with Go by Nicolas Leiva & Michael Kashin(631)