Loading...
Internet, Groupware, & Telecommunications
epub |eng | 2016-05-10 | Author:Don Tapscott & Alex Tapscott [Tapscott, Don & Tapscott, Alex]

Prosperity Purgatory: An Exercise in Futility For centuries, banks have relied on network effects. Each successive customer, branch, product, dollar in, and dollar out increases the value of the bank’s ...
( Category: Mobile & Wireless January 18,2020 )
epub |eng | 2014-12-01 | Author:Andrew Hinton

Figure 13-4. The Shazam mobile app’s primary control is a big simulated button that, when touched, scans the environment for musical patterns An on-screen button is just one way semantic ...
( Category: Information Theory January 17,2020 )
epub |eng | 2019-12-26 | Author:Yuri Diogenes, Erdal Ozkaya

( Category: Network Security January 3,2020 )
mobi |eng | 2019-12-26 | Author:Erdal Ozkaya Yuri Diogenes [Yuri Diogenes, Erdal Ozkaya]

( Category: Network Security January 2,2020 )
epub |eng | 2018-06-21 | Author:Gus Khawaja [Gus Khawaja]

( Category: Privacy & Online Safety December 27,2019 )
epub |eng | | Author:Chris McCord, Bruce Tate, José Valim

( Category: Internet, Groupware, & Telecommunications December 25,2019 )
epub |eng | 2013-04-14 | Author:John Pollock [Pollock, John]

( Category: Java December 17,2019 )
epub |eng | 2015-05-19 | Author:Jaime Levy

Step 3 Paste all the screenshots into the presentation tool. If I am working on my own, I do mockups in Photoshop. If I am working with a team of ...
( Category: Internet, Groupware, & Telecommunications December 16,2019 )
mobi |eng | 2018-01-22 | Author:Perry Lea

Public Data Network (PDN): This is the external interface, and for the most part, the internet. It can include other services, data centers, private services, and so on. In a ...
( Category: Computer Design December 7,2019 )
epub |eng | 2019-11-24 | Author:Shaun Lewis

public class Author { @SerializedName("name") private String mName; public String getName() { return mName; } public void setName(String name) { mName = name; } } Then the output would be ...
( Category: Programming & App Development November 29,2019 )
epub |eng | | Author:José Unpingco

where we have determined and from the data. Given a new point of interest, , we would certainly compute as the predicted value for . This is the same as ...
( Category: Probability & Statistics November 23,2019 )
epub |eng | 2018-08-10 | Author:Barbosa de Azevedo, Fernando Uilherme [Barbosa de Azevedo, Fernando Uilherme]

Chapter 15: Ransomware Ransomware, sometimes called crypto viral extortion, is a form of malicious software that prevents users from accessing their personal files, usually through encryption. Hackers require that a ...
( Category: Hacking November 17,2019 )
mobi |eng | 2019-01-16 | Author:Craig Clayton

( Category: Programming & App Development November 16,2019 )
epub |eng | 2019-04-29 | Author:Benjamin Caudill & Karl Gilbert [Benjamin Caudill]

( Category: LAN November 12,2019 )
epub |eng | 2018-03-23 | Author:Alexey Spizhevoy & Aleksandr Rybnikov

import cv2 Load the text image: img = cv2.imread('../data/scenetext01.jpg') Load the pre-trained convolutional neural network and detect the text messages: det = cv2.text.TextDetectorCNN_create( "../data/textbox.prototxt", "../data/TextBoxes_icdar13.caffemodel") rects, probs = det.detect(img) Draw ...
( Category: Networks November 5,2019 )

Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(6504)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(5455)
Grails in Action by Glen Smith Peter Ledbrook(5096)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(2741)
Kotlin in Action by Dmitry Jemerov(2167)
Learn Windows PowerShell in a Month of Lunches by Don Jones(1602)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(1459)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(1343)
Blockchain Basics by Daniel Drescher(1271)
React Native - Building Mobile Apps with JavaScript by Novick Vladimir(1166)
TCP IP by Todd Lammle(1081)
Applied Network Security by Arthur Salmon & Michael McLafferty & Warun Levesque(1063)
The Age of Surveillance Capitalism by Shoshana Zuboff(1044)
Owning Bitcoin: The Illustrated Guide to Security, Privacy, and Potential by Apodaca Richard(1008)
Serious Cryptography: A Practical Introduction to Modern Encryption by Aumasson Jean-Philippe(951)
The Art Of Deception by Kevin Mitnick(942)
Networking A Beginner's Guide by Bruce Hallberg(922)
Wireless Hacking 101 by Karina Astudillo(917)
Blockchain: Ultimate Step By Step Guide To Understanding Blockchain Technology, Bitcoin Creation, and the future of Money (Novice to Expert) by Keizer Söze(907)
31 Days Before Your CompTIA A+ Exams (Shanette Luellen's Library) by Benjamin Patrick Conry(886)