Search Results - (((((((ant OR wants) OR semantic) OR file) OR cantor) OR anne) OR shape) OR hints) algorithms.
Suggested Topics within your search.
Suggested Topics within your search.
- Data processing 107
- Mathematical models 79
- Mathematics 77
- Artificial intelligence 64
- Algorithms 50
- Machine learning 49
- algorithms 42
- Data mining 39
- artificial intelligence 39
- methods 35
- Mathematical optimization 34
- Computer networks 30
- Artificial Intelligence 28
- Digital techniques 27
- Technological innovations 26
- Computer science 25
- Python (Computer program language) 25
- Signal processing 24
- Data Mining 22
- Image processing 22
- Computer algorithms 21
- Development 21
- Application software 19
- Computer simulation 18
- Statistical methods 18
- Information technology 17
- Social aspects 17
- Big data 16
- Computational Biology 16
- Diseases 16
Search alternatives:
- ant »
- wants »
- semantic »
- cantor »
-
141
Mastering Active Directory
Published 2017Table of Contents: “…-- The update sequence number -- Directory Service Agent GUID and invocation ID -- The high watermark vector table -- The up-to-dateness vector table -- The read-only domain controllers -- Active Directory database maintenance -- The ntds.dit file -- The edb.log file -- The edb.chk file -- The temp.edb file -- Offline defragmentation -- Active Directory backup and recovery -- Preventing accidental deletion of objects -- Active Directory Recycle Bin -- Active Directory snapshots -- Active Directory system state backup -- Active Directory recovery from system state backup -- Summary -- Chapter 12: Active Directory Certificate Services -- PKI in action -- Symmetric keys versus asymmetric keys -- Digital encryption -- Digital signatures -- Signing, encryption, and decryption -- Secure Sockets Layer certificates -- Types of certification authorities -- How do certificates work with digital signatures and encryption? …”
Full text (MFA users only)
Electronic eBook -
142
-
143
Hands-on penetration testing on Windows : unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis
Published 2018Table of Contents: “…A real-world pen test scenario -- the chatty printerConfiguring our SMB listener; Authentication capture; Hash capture with LLMNR/NetBIOS NS spoofing; Let it rip -- cracking Windows hashes; The two philosophies of password cracking; John the Ripper cracking with a wordlist; John the Ripper cracking with masking; Reviewing your progress with the show flag; Summary; Questions; Further reading; Chapter 4: Advanced Network Attacks; Technical requirements; Binary injection with BetterCAP proxy modules; The Ruby file injection proxy module -- replace_file.rb…”
Full text (MFA users only)
Electronic eBook -
144
Evaluation and management for infectious diseases and dermatologic disorders
Published 2017Full text (MFA users only)
Electronic eBook -
145
The AI book : the artificial intelligence handbook for investors, entrepreneurs and FinTech visionaries
Published 2020Table of Contents: “…The AI Trends That Will Shape Winning Businesses. Mastering the AI Talent Transformation: Present and Future. …”
Full text (MFA users only)
Electronic eBook -
146
Data Mining for Business Analytics : Concepts, Techniques, and Applications with XLMiner.
Published 2016Full text (MFA users only)
Electronic eBook -
147
Crop Pest and Disease Remote Sensing Monitoring and Forecasting
Published 2022Full text (MFA users only)
Electronic eBook -
148
-
149
Pediatric Sensorineural Hearing Loss : Clinical Diagnosis and Management.
Published 2017Full text (MFA users only)
Electronic eBook -
150
-
151
-
152
Energy efficiency in manufacturing systems
Published 2012Full text (MFA users only)
Electronic eBook -
153
Introduction to GIS programming and fundamentals with Python and ArcGIS
Published 2017Table of Contents: “…File Input/Output --…”
Full text (MFA users only)
Electronic eBook -
154
Dependable software systems engineering
Published 2017Table of Contents: “…Reactive Synthesis: Towards Output-Sensitive Algorithms /…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
155
In the tradition of Ahlfors and Bers : proceedings of the First Ahlfors-Bers Colloquium, Ahlfors-Bers Colloquium, November 6-8, 1998, State University of New York at Stony Brook
Published 2000Table of Contents: “…Coverings of Cantor sets /…”
Full text (MFA users only)
Electronic Conference Proceeding eBook -
156
-
157
Genomic Perl : from bioinformatics basics to working code
Published 2003Table of Contents: “…Reading Sequence Files in Perl --…”
Full text (MFA users only)
Electronic eBook -
158
Komplexität : Design Strategy and World View.
Published 2008Table of Contents: “…ALGORITHMIC COMPLEXITY: OUT OF NOWHERE /…”
Full text (MFA users only)
Electronic eBook -
159
A short introduction to quantum information and quantum computation
Published 2006Full text (MFA users only)
Electronic eBook -
160
Intelligent fractional order systems and control : an introduction
Published 2013Full text (MFA users only)
Electronic eBook