-
Aloqa. Kommunikatsiya texnologiyalari
-
Aloqa. Kommunikatsiya texnologiyalari
-
Aloqa. Kommunikatsiya texnologiyalari
-
Aloqa. Kommunikatsiya texnologiyalari
-
-
Aloqa. Kommunikatsiya texnologiyalari
-
Aloqa. Kommunikatsiya texnologiyalari
-
-
Aloqa. Kommunikatsiya texnologiyalari
-
-
Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity
The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world’s leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions for correcting security flaws, Red Team hackers are in high demand. Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity takes the valuable lessons and popular interview format from the original Tribe of Hackers and dives deeper into the world of Red Team security with expert perspectives on issues like penetration testing and ethical hacking. This unique guide includes inspiring interviews from influential security specialists, including David Kennedy, Rob Fuller, Jayson E. Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and tactics to careers and communication, presentation strategies, legal concerns, and more
-
Аналитическая химия
В учебнике подробно изложены основные закономерности аналитической химии, а также основные физико-химические методы анализа, ввиденные в Государственную фармакопею СССР Х издания.
-
Third Generation Internet Revealed: Reinventing Computer Networks with IPv6
This book covers the inexorable exhaustion of the IPv4 address space, the interim fix to this based on Network Address Translation (NAT) and Private Addresses, and the differences between IPv4 and IPv6. It will help you understand the limitations and problems introduced by the use of NAT and introduce you to the far simpler network and software designs possible, using a larger, unified address space. IPv6, a mature and viable replacement for IPv4, is currently used by more than 36% of all global Internet traffic. Wireless telephone service providers in many countries have migrated their networks to IPv6 with great success. The elimination of NAT and Private Addresses has vastly simplified network design and implementation. Further, there are now enough public addresses allocated to accommodate all anticipated uses for the foreseeable future. Most networking products and software, especially open-source software, are already fully IPv6 compliant. Today, no business should purchase obsolete products that support only IPv4. The global IPv6 Forum estimates that there are millions of networking professionals still needing to learn the fundamentals of IPv6 technologies to move forward. This book is for them. With plans in place for a shutdown of IPv4 on global networks (“Sunset IPv4”) the time to learn is now. If you want a job in IT, especially network hardware or software, and you don’t know IPv6, you are already obsolete.
-
Kasbiy psixologiya
Darslikda ta`lim va taraqqiyotning o`zaro bog`liqligi, ta`lim psixologiyasi kursining asosiy mazmuni bo`lgan talabalarning o`qish va uqish faoliyati shakllantirish hamda tarbiya psixologiyasining ta`lim-tarbiya jarayonida talaba shaxsini shakllantirish kabi muhim ma`lumotlar keltirilgan.
-
The Illustrated Network How TCP/IP Works in a Modern Network
The Illustrated Network: How TCP/IP Works in a Modern Network, Second Edition presents an illustrated explanation on how TCP/IP works, using consistent examples from a working network configuration that includes servers, routers and workstations. Diagnostic traces allow the reader to follow the discussion with unprecedented clarity and precision. True to its title, there are 330+ diagrams and screenshots, as well as topology diagrams and a unique repeating chapter opening diagram. Illustrations are also used as end-of-chapter questions. Based on examples of a complete and modern network, all the material comes from real objects connected and running on the network. The book emphasizes the similarities across all networks, since all share similar components, from the smallest LAN to the global internet. Layered protocols are the rule, and all hosts attached to the Internet run certain core protocols to enable their applications to function properly. This second edition includes updates throughout, along with four completely new chapters that introduce developments that have occurred since the publication of the first edition, including optical networking, cloud concepts and VXLAN.
-
Deutsch fur hochschulen
Мазкур дарслик Гёте институт Интер Натионес проекти асосида Германия академик алмашув хизмати (DAAD) билан ҳамкорликда ёзилган бўлиб, чет тиллар ихтисослигини берувчи институтлар ва университетларнинг чет тиллар факультетлари учун тавсия этилган.
-
Создание облачных, мобильных и веб-приложений на F#
Книга рассказывает о ключевых аспектах создания облачных, мобильных и веб-решений на языке F# в комбинации с различными технологиями для платформы .NET. На практических примерах демонстрируется, как решать проблемы конкуренции, асинхронного выполнения и другие, встречающиеся на стороне сервера. Вы узнаете, как повысить свою продуктивность с помощью языка F#, интегрируя его в существующие веб-приложения или используя его для создания новых проектов. Опытные разработчики для .NET узнают, как этот выразительный язык функционального программирования помогает писать надежные и простые в сопровождении решения, легко масштабируемые и способные адаптироваться для работы на самых разных устройствах.
-
OAuth 2 in Action
This book tells about program OAuth 2 in Action teaches you practical use and deployment of OAuth 2 from the perspectives of a client, an authorization server, and a resource server. You'll begin with an overview of OAuth and its components and interactions. Next, you'll get hands-on and build an OAuth client, an authorization server, and a protected resource. Then you'll dig into tokens, dynamic client registration, and more advanced topics. By the end, you'll be able to confidently and securely build and deploy OAuth on both the client and server sides. About this technology think of OAuth 2 as the web version of a valet key. It is an HTTP-based security protocol that allows users of a service to enable applications to use that service on their behalf without handing over full control. And OAuth is used everywhere, from Facebook and Google, to startups and cloud services.
-
Аналитическая химия
Во втором издании учебника (1-е вышло в 1977г.) освещаются основные разделы аналитической химии, необходимые фармацевту в его практичиской работе.
-
The Essential Guide to HTML5 Using Games to Learn HTML5 and JavaScript
Gain a deep, practical knowledge of HTML and JavaScript that will provide an introduction to programming and enable you to build interactive websites. This completely updated second edition explains HTML, JavaScript and CSS in the context of working examples and contains full-color screen shots of the programs in action. You'll begin at an introductory level, learning the essentials of HTML5 and JavaScript and programming techniques. Each chapter features either a familiar game such as Hangman, Rock-Paper-Scissors, Craps, Memory, and Blackjack, or a simple type of game, such as a quiz, a maze, or animated simulations. You’ll develop solid programming skills that will help when learning other programming languages. Each chapter contains tables revealing the structure of the program with comments for each line of code. These examples demonstrate the features introduced with HTML5. You’ll see how to use canvas elements for line drawing. You can include your own audio and video clips, directly controlled by your JavaScript code. For example, the reward for correct completion of a quiz can be the playing of an audio clip and a video clip. You’ll also learn how to use localStorage to store high scores or game preferences on a user's computer for retrieval next time they play. The Essential Guide to HTML5 explores all of this and more.
-
The DevOps 2.0 Toolkit Automating the Continuous Deployment Pipeline with Containerized Microservices
This book is about different techniques that help us architect software in a better and more efficient way with microservices packed as immutable containers, tested and deployed continuously to servers that are automatically provisioned with configuration management tools. It's about fast, reliable and continuous deployments with zero-downtime and ability to roll-back. It's about scaling to any number of servers, design of self-healing systems capable of recuperation from both hardware and software failures and about centralized logging and monitoring of the cluster.In other words, this book envelops the whole microservices development and deployment lifecycle using some of the latest and greatest practices and tools. We'll use Docker, Kubernetes, Ansible, Ubuntu, Docker Swarm and Docker Compose, Consul, etcd, Registrator, confd, and so on. We'll go through many practices and even more tools. Finally, while there will be a lot of theory, this is a hands-on book. You won't be able to complete it by reading it in a metro on a way to work. You'll have to read this book while in front of the computer and get your hands dirty.
-
Neural Networks: A Visual Introduction for Beginners
This book give about a deep understanding of how a Neural Network works and how to build a Neural Network from scratch using Python. This book is for, beginners who want to fully understand how networks work, and learn to build two step by step examples in Python. Programmers who need an easy to read, but solid refresher, on the math of neural networks. In this building Neural Networks in Python, there are many ways to build a neural network and lots of tools to get the job done. This is fantastic, but it can also be overwhelming when you start, because there are so many tools to choose from. We are going to take a look at what tools are needed and help you nail down the essentials. To build a neural network
-
Hozirgi o'zbek tili
Darslik 5120100-Filologiya va tillarni o'qitish (O'zbek tili) va 5111200-O'zbek tili va adabiyoti, 5112400-O'zga tilli guruhlarda o'zbek tili bakalavriat yo'nalishida tahsil olayotgan talabalar uchun tayyorlangan
-
The Big Book of Small Python Projects: 81 Easy Practice Programs
If you’ve mastered basic Python syntax and you’re ready to start writing programs, you’ll find The Big Book of Small Python Projects both enlightening and fun. This collection of 81 Python projects will have you making digital art, games, animations, counting pro- grams, and more right away. Once you see how the code works, you’ll practice re-creating the programs and experiment by adding your own custom touches. These simple, text-based programs are 256 lines of code or less. And whether it’s a vintage screensaver, a snail-racing game, a clickbait headline generator, or animated strands of DNA, each project is designed to be self-contained so you can easily share it online.
-
TensorFlow in Action
In TensorFlow in Action, you'll dig into the newest version of Google's amazing TensorFlow framework as you learn to create incredible deep learning applications. Author Thushan Ganegedara uses quirky stories, practical examples, and behind-the-scenes explanations to demystify concepts otherwise trapped in dense academic papers. As you dive into modern deep learning techniques like transformer and attention models, you’ll benefit from the unique insights of a top StackOverflow contributor for deep learning and NLP. Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.
-
Hozirgi o`zbek adabiy tili
Siz qo‘lingizdagi kitobni o‘qish, ona tilingizning ichki qonunqoidalarini o‘zlashtirish orqali uning boy imkoniyatlarini amaliyotga qo‘llashga, o‘z nutqingizni o‘stirishga, muayyan bir fikrni turli shaklda ifodalashga o‘rganasiz.