-
-
Oziq-ovqat sanoati
-
-
Radio Frequency Identification System Security RFIDsec’13 Asia Workshop Proceedings
This volume contains the papers presented at the 2013 Workshop on Radio Frequency Identification/Internet of Things Security (RFIDsec’13 Asia) held in Guangzhou, China on November 27, 2013. The workshop was co-hosted by South China Normal University and Jinan University. The General Chairs were Yingjiu Li, from Singapore Management University, and Yong Tang from South China Normal University.
-
Mastering Proxmox Master Proxmox VE to effectively implement server virtualization technology within your network
This book is well overdue in the world of virtualization. When I first came in contact with Proxmox several years ago, I did not have anything to fall back on other than Proxmox Wiki and forum. I learned Proxmox through lots of trial and error and very much had to reinvent wheels on my own in some cases. Since a lot of us went through the frustration and I personally do not feel others should have to invest a lot of time just to get to know Proxmox the hard way, this book has been written
-
Managing IaaS and DBaaS Clouds with Oracle Enterprise Manager Cloud Control 12c
Cloud computing has become a ubiquitous buzzword in the software industry. While almost everyone was trying to define what cloud computing actually meant, few people realized that cloud computing is in fact an old idea. The term ''cloud computing'' is an attempt to group a lot of standard technologies under one umbrella and combine all of these little pieces into a unified shared infrastructure. Cloud computing essentially solves the problem of scale—a problem which otherwise seemed too daunting.
-
Mobile Security: How to Secure, Privatize, and Recover Your Devices
This book is intended as a guide; it has thus been organized for convenient reference in addressing the issues and challenges inherent in navigating the new mobile world.
-
МАЛАКАЛИ ДЗЮДОЧИЛАРНИНГ МАХСУС ВА МУСОБАҚА ОЛДИ ТАЙЁРГАРЛИГИНИ ШАКЛЛАНТИРИШ
Мамлакатимиз Президенти И.А. Каримов таъкидлаганидек, республикада турли тоифадаги аҳолини жисмоний ривожлантириш ва жисмоний тарбиялаш давлат сиёсатининг муҳим вазифаларидан бири саналади, айниқса, мамлакатимизда аҳолининг соғлигини сақлаш ва мустаҳкамлашга илмий асосланган ёндошув ҳамда уни амалга ошириш усулларини янада такомиллаштиришга катта аҳамият қаратилган.
-
Mastering KnockoutJS Use and extend Knockout to deliver feature-rich, modern web applications
Knockout is built around a pattern that started in Microsoft. This model is ModelView-ViewModel (MVVM), and I think introducing this pattern to newcomers is one of the biggest obstacles to wider adoption.
-
Raspberry Pi Cookbook for Python Programmers
Writing a book about the Raspberry Pi wouldn't have been possible without the creation itself, so thanks to the Raspberry Pi foundation for their hard work (and good humor) in making it a huge success. The Raspberry Pi community consists of an excellent group of exceptionally helpful people from all over the world, and it has been a pleasure to be involved with it from the start. In particular, I would like to thank The MagPi team that has supported me by reviewing the chapters and helping me achieve the best possible standard. Also thanks to the Pi3D team who worked hard to get their library running with Python 3 for the book.
-
Базы данных
Автором данного курса является Кузнецов Сергей Дмитриевич. Он закончил кафедру математической логики механико-математического факультета МГУ в 1971 г. Является специалистом в области системного программирования и баз дан- ных. С 1995 г. преподаёт в МГУ в должности профессора кафедры системного программирования факультета ВМК. Читает лекционные курсы по проблемам по- строения баз данных и систем управления базами данных (СУБД), по организации ОС UNIX. Дополнительные материалы по данному курсу могут быть найдены на citforum.ru/database.
-
Securing Hadoop Implement robust end-to-end security for your Hadoop ecosystem
Today, many organizations are implementing Hadoop in production environments. As organizations embark on the Big Data implementation journey, security of Big Data is one of the major concerns. Securing sensitive data is one of the top priorities for organizations.
-
The Talking Heads experiment Origins of words and meanings
I set up the Talking Heads experiment with a group of brilliant students and collaboratorsat the end of the nineteen nineties. It was intended to be the first large-scale, open-ended experiment in the emergence of a shared set of grounded concepts and a vocabulary for expressing these concepts by a population of autonomous agents.
-
ДЗЮДО
Дастур ва ўқув қўлланма дзюдочи курашчиларни спорт тайёргарликларини асосий бўлимлари ва спорт назарияси тасарруфидаги янги кўрсатмаларга асосланган ҳолда намоён қилинган. Асосий эътибор режалаштириш, бошланғич ва юқори малакали спортчи дзюдочиларни кўп йиллик тайёргарликлари жараёнини назорат қилиш, тузилиши ва режалаштиришга ҳамда спорт маҳоратини такомиллаштиришдаги восита ва услубларини ёритишга қаратилган. Дастур ва ўқув қўлланма болалар ва ўсмирлар спорти ва жисмоний тарбия ва спорт йўналишидаги мутахасисларга, мураббийларда катта қизиқиш ўйғотишига шубҳа йўқ.
-
ДОНЛИ ЭКИНЛАРНИ ЕТИШТИРИШ ТЕХНОЛОГИЯСИ
«Токи галла мустакиллигига эришмас эканмиз, иқтисодий мус- тақиллик ҳақида гапириш ортикча», дейди республикамиз президенти И.Каримов. Ўзбекистон республикасининг мустақил давлат сифатида шаклланиши, ўзбек халқи учун ҳар томонлама ўзгариш ва ривож- ланишга олиб келди. Бозор муносабатлари шароити иқтисодиётни ҳар томонлама янгича йўналишда, янги тизимда ривожланишини талаб қилади. Иқтисодий мустақиллик халқ хўжалигининг энг муҳим тармоғи ҳисобланган агросаноат мажмуида деҳқончилик тизимида ҳам туб ўзгаришлар бўлишига олиб келди.
-
Gitolite Essentials
Acknowledgments for this book must necessarily also include acknowledgments for the success and popularity of Gitolite itself, because without that, this book would not exist.
-
Applied SOA Patterns on the Oracle Platform
Arguably, distributed computing is the most complex concept in computer science. The practical realization of this concept in the form of service-oriented computing further adds to this complexity. Generally, there are two reasons: firstly, because of a compound architectural approach, SOA is based on already complex techniques, and secondly, to stay on the cutting edge of computing technology, SOA must appeal to non-IT businesses to be successfully adopted in modern enterprises. To achieve this goal of successful adoption, SOA architects must combine a vendor-neutral approach to systems design with a deep knowledge of platforms on which the solution will be realized.
-
Learning Android Forensics
This book covers various forensic approaches and techniques on Android devices. The content is organized in a manner that allows any user to examine an Android device and perform forensic investigation. No prerequisite knowledge is needed because all the topics are explained, from basic to in-depth. Knowledge of mobile platforms, especially Android, will definitely be an advantage. Wherever possible, the steps required to perform various forensic activities using tools are explained in detail
-
Bayesian Statistics The Fun way
No Starch Press and the No Starch Press logo are registered trademarks of No Starch Press, Inc. Other product and company names mentioned herein may be the trademarks of their respective owners. Rather than use a trademark symbol with every occurrence of a trademarked name, we are using the names only in an editorial fashion and to the benefit of the trademark owner, with no intention of infringement of the trademark. The information in this book is distributed on an "As Is" basis, without warranty. While every precaution has been taken in the preparation of this work, neither the author nor No Starch Press, Inc. shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the information contained in it.