loading
IEEE NETWORK MANAGEMENT - THE CURRENT GUIDE TO NETWORK MANAGEMENT (CD-ROM)
IEEE
A description is not available for this item.
PCMCIA CARDWARE SDK - CARDWARE SDK
PCMCIA
A description is not available for this item.
PCMCIA CARDBUS SYSTEM - PCMCIA CARDBUS SYSTEM ARCHITECTURE
PCMCIA
A description is not available for this item.
CSA ISO/IEC 29341-26-14 - Information technology - UPnP Device Architecture - Part 26-14: Telephony device control protocol - Level 2 - Address book service
January 1, 2019 - CSA

This service definition is compliant [1]. It defines a service type referred to herein as AddressBook. This service provides the following functionalities: Managing the network address book: accessing the network address book, adding new contact information in the network...

R Machine Learning Projects
January 14, 2019 - PACKT

Master a range of machine learning domains with real-world projects using TensorFlow for R, H2O, MXNet, and more Key Features *Master machine learning, deep learning, and predictive modeling concepts in R 3.5 *Build intelligent end-to-end projects for finance, retail, social media, and a variety of...

C# Machine Learning Projects
June 18, 2018 - PACKT

Power your C# and .NET applications with exciting machine learning models and modular projects About This Book • Produce classification, regression, association, and clustering models • Expand your understanding of machine learning and C# • Get to grips with C# packages such as Accord.net,...

CSA ISO/IEC 30100-1 - Information technology - Home network resource management - Part 1: Requirements
January 1, 2018 - CSA

This part of ISO/IEC 30100 specifies the minimum requirements of a home network resource management architecture to deliver applications in a safe and future-proof way without being prescriptive. The purpose of this standard is to collect all available home network information from...

R Deep Learning Projects
February 22, 2018 - PACKT

5 real-world projects to help you master deep learning concepts About This Book • Master the different deep learning paradigms and build real-world projects related to text generation, sentiment analysis, fraud detection, and more • Get to grips with R's impressive range of Deep Learning libraries...

ISO/IEC 29341-26-14 - Information technology - UPnP Device Architecture - Part 26-14: Telephony device control protocol - Level 2 - Address book service
September 1, 2017 - ISO

This service definition is compliant [1]. It defines a service type referred to herein as AddressBook. This service provides the following functionalities: • Managing the network address book: accessing the network address book, adding new contact information in the network...

ARINC 852 - GUIDANCE FOR SECURITY EVENT LOGGING IN AN IP ENVIRONMENT
June 21, 2017 - ARINC

This report sets forth guidance for IP-based onboard networks and systems residing in the Airline Information Services (AIS) and Passenger Information and Entertainment Services (PIES) Domains by establishing a common set of security related data elements and format(s) that are produced by...

ASTM E2458 - Standard Practices for Bulk Sample Collection and Swab Sample Collection of Visible Powders Suspected of Being Biological Agents and Toxins from Nonporous Surfaces
May 15, 2017 - ASTM

These practices address collection of visible powders that are suspected biological agents and toxins from solid nonporous surfaces using a bulk collection method, using a dry swab and laminated card, followed by a swab sampling method using a sterile moistened swab. Bulk powder samples are...

ISA INDUSTRIAL NETWORK SE - Industrial Network Security
January 1, 2010 - ISA

Nowadays one only needs to read the newspaper headlines to appreciate the importance of Industrial Network Security. Almost daily an article comes out describing the threat to our critical infrastructure, from spies in our electrical grid to the looming threat of cyberwar.Whether we talk...

Penetration Testing with Raspberry Pi
November 30, 2016 - PACKT

"Learn the art of building a low-cost, portable hacking arsenal using Raspberry Pi 3 and Kali Linux 2 About This Book • Quickly turn your Raspberry Pi 3 into a low-cost hacking tool using Kali Linux 2 • Protect your confidential data by deftly preventing various network security attacks •...

ATIS 0300230 - Telecommunications Charge Card and Billed Number Screening Validation Message Components
October 1, 2015 - ATIS

This standard applies to telecommunications charge card (aka "calling card") and billed number screening validation messages for use within the North American telecommunications interchange environment. The use of validation systems and networks also involves appropriate...

DS/ISO/IEC 30100-1 - Information technology – Home network resource management – Part 1: Requirements
May 3, 2016 - DS

This part of ISO/IEC 30100 specifies the minimum requirements of a home network resource management architecture to deliver applications in a safe and future-proof way without being prescriptive. The purpose of this standard is to collect all available home network information from...

ISO/IEC 30100-1 - Information technology – Home network resource management – Part 1: Requirements
April 1, 2016 - ISO

This part of ISO/IEC 30100 specifies the minimum requirements of a home network resource management architecture to deliver applications in a safe and future-proof way without being prescriptive. The purpose of this standard is to collect all available home network information from...

ANSI X9.24 PT 2 - Retail Financial Services Symmetric Key Management Part 2: Using Asymmetric Techniques for the Distribution of Symmetric Keys
November 25, 2016 - ASC/X9

This part of ANS X9.24 covers the establishment of device initial trust and management of keying material used for financial services such as point of sale (POS) transactions, automatic teller machine (ATM) transactions, messages among terminals and financial institutions, and interchange messages...

IoT: Building Arduino-Based Projects
August 31, 2016 - PACKT

Explore and learn about Internet of Things to develop interactive Arduino-based Internet projects About This Book • Learn the capabilities and differences between popular protocols and communication patterns and how they can be used, and should not be used, to create secure and interoperable...

API THIRD PARTY NETWORK - Standard for Third Party Network Connectivity
November 1, 2007 - API

This standard provides guidance to members of the American Petroleum Institute (API) for implementing secure third-party connections between the information technology systems and network of two companies that have a business relationship and a common objective.

Advertisement