Networking & Cloud Computing
epub |eng | 2019-04-29 | Author:Benjamin Caudill & Karl Gilbert [Benjamin Caudill]

( Category: LAN November 12,2019 )
epub |eng | 2018-03-23 | Author:Alexey Spizhevoy & Aleksandr Rybnikov

import cv2 Load the text image: img = cv2.imread('../data/scenetext01.jpg') Load the pre-trained convolutional neural network and detect the text messages: det = cv2.text.TextDetectorCNN_create( "../data/textbox.prototxt", "../data/TextBoxes_icdar13.caffemodel") rects, probs = det.detect(img) Draw ...
( Category: Networks November 5,2019 )
epub |eng | 2019-08-22 | Author:Lisa Bock [Lisa Bock]

( Category: Network Security November 3,2019 )
epub |eng | 2019-10-29 | Author:Valliappa Lakshmanan

JOIN versus denormalization What if we were to store the distance traveled in each trip in a denormalized table? CREATE OR REPLACE TABLE ch07eu.cycle_hire AS SELECT start_station_name , end_station_name , ...
( Category: Enterprise Applications October 30,2019 )
epub |eng | 2018-08-22 | Author:Julien Vehent [Julien Vehent]

( Category: Windows Administration October 21,2019 )
epub |eng | 2017-12-22 | Author:Pethuru Raj

Service-oriented architecture and event-driven architecture (SOA versus EDA) Organizations across the world are changing their structures rapidly and are moving toward on-demand business models. There is an increase in the ...
( Category: Design & Architecture October 20,2019 )
epub |eng | 2019-10-18 | Author:Jason Andress

Open Source Intelligence Open source intelligence (OSINT) is information collected from publicly available sources, such as job postings and public records. This publicly available data can reveal an enormous amount ...
( Category: Network Security October 19,2019 )
epub |eng | 2018-11-12 | Author:Wolf Halton

In the preceding screenshot, we can see that we have captured the Administrator login from the \\WIN10-01 workstation. This was captured when the user logged on to the domain from ...
( Category: Network Security October 19,2019 )
epub |eng | 2019-06-26 | Author:Erdal Ozkaya

EC-Council, Computer Hacking Forensic Investigator (CHFI) EC-Council also offers another certification for individuals who wish to take up a career in the digital forensics space: Computer Hacking Forensic Investigator, commonly ...
( Category: Linux & UNIX Administration October 15,2019 )
epub |eng | 2018-12-24 | Author:Mohamed Wali

App Service plans When you create an App Service, such as a Web App for example, you will be asked to specify the App Service plan. An App Service plan ...
( Category: LAN October 14,2019 )
epub |eng | 2019-08-24 | Author:Lee Calcote

Example 8-14 is a specific example of how you can conscientiously approach clarifying lines of responsibility and thoroughly decoupling service teams within your service mesh configuration at L5. Finally, VirtualServices ...
( Category: Tools October 12,2019 )
epub |eng | 2019-09-19 | Author:Michael Born

( Category: Linux & UNIX Administration October 12,2019 )
epub |eng | 2019-03-19 | Author:John Paul Mueller & Luca Massaron

( Category: Cloud Computing October 11,2019 )
epub |eng | 2018-04-03 | Author:Ana Bell [Ana Bell]

( Category: Software Development October 11,2019 )
epub |eng | 2019-03-28 | Author:José Manuel Ortega

Here is the output of the execution of the snmpwalk command, where we can see information being returned by the SNMP agent: iso.3.6.1.2.1.1.1.0 = STRING: "Linux debian6box 2.6.32-5-686 #1 SMP ...
( Category: Tools October 11,2019 )

Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(6422)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(5409)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(2635)
Kotlin in Action by Dmitry Jemerov(2109)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(1413)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(1294)
Blockchain Basics by Daniel Drescher(1185)
React Native - Building Mobile Apps with JavaScript by Novick Vladimir(1108)
Applied Network Security by Arthur Salmon & Michael McLafferty & Warun Levesque(1014)
TCP IP by Todd Lammle(988)
Owning Bitcoin: The Illustrated Guide to Security, Privacy, and Potential by Apodaca Richard(949)
Serious Cryptography: A Practical Introduction to Modern Encryption by Aumasson Jean-Philippe(907)
Wireless Hacking 101 by Karina Astudillo(865)
Blockchain: Ultimate Step By Step Guide To Understanding Blockchain Technology, Bitcoin Creation, and the future of Money (Novice to Expert) by Keizer Söze(861)
Networking A Beginner's Guide by Bruce Hallberg(847)
31 Days Before Your CompTIA A+ Exams (Shanette Luellen's Library) by Benjamin Patrick Conry(806)
Open-Source ESBs in Action: Example Implementations in Mule and ServiceMix by Tijs Rademakers Jos Dirksen(792)
The Age of Surveillance Capitalism by Shoshana Zuboff(760)
Spring: Developing Java Applications for the Enterprise by Ravi Kant Soni & Amuthan Ganeshan & Rajesh RV(750)
MCSA Windows Server 2016 Study Guide: Exam 70-741 by William Panek(735)