Browse Results

Showing 18,801 through 18,825 of 54,013 results

Parallel Problem Solving from Nature – PPSN XIV

by Julia Handl Emma Hart Peter R. Lewis Manuel López-Ibáñez Gabriela Ochoa Ben Paechter

This book constitutes the refereed proceedings of the 14th International Conference on Parallel Problem Solving from Nature, PPSN 2016, held in Edinburgh, UK, in September 2016. The total of 93 revised full papers were carefully reviewed and selected from 224 submissions. The meeting began with four workshops which offered an ideal opportunity to explore specific topics in intelligent transportation Workshop, landscape-aware heuristic search, natural computing in scheduling and timetabling, and advances in multi-modal optimization. PPSN XIV also included sixteen free tutorials to give us all the opportunity to learn about new aspects: gray box optimization in theory; theory of evolutionary computation; graph-based and cartesian genetic programming; theory of parallel evolutionary algorithms; promoting diversity in evolutionary optimization: why and how; evolutionary multi-objective optimization; intelligent systems for smart cities; advances on multi-modal optimization; evolutionary computation in cryptography; evolutionary robotics - a practical guide to experiment with real hardware; evolutionary algorithms and hyper-heuristics; a bridge between optimization over manifolds and evolutionary computation; implementing evolutionary algorithms in the cloud; the attainment function approach to performance evaluation in EMO; runtime analysis of evolutionary algorithms: basic introduction; meta-model assisted (evolutionary) optimization. The papers are organized in topical sections on adaption, self-adaption and parameter tuning; differential evolution and swarm intelligence; dynamic, uncertain and constrained environments; genetic programming; multi-objective, many-objective and multi-level optimization; parallel algorithms and hardware issues; real-word applications and modeling; theory; diversity and landscape analysis.

Don't Teach Coding: Until You Read This Book

by Lindsey D. Handley Stephen R. Foster

The definitive resource for understanding what coding is, designed for educators and parents Even though the vast majority of teachers, parents, and students understand the importance of computer science in the 21st century, many struggle to find appropriate educational resources. Don't Teach Coding: Until You Read This Book fills a gap in current knowledge by explaining exactly what coding is and addressing why and how to teach the subject. Providing a historically grounded, philosophically sensitive description of computer coding, this book helps readers understand the best practices for teaching computer science to their students and their children. The authors, experts in teaching computer sciences to students of all ages, offer practical insights on whether coding is a field for everyone, as opposed to a field reserved for specialists. This innovative book provides an overview of recent scientific research on how the brain learns coding, and features practical exercises that strengthen coding skills. Clear, straightforward chapters discuss a broad range of questions using principles of computer science, such as why we should teach students to code and is coding a science, engineering, technology, mathematics, or language? Helping readers understand the principles and issues of coding education, this book: Helps those with no previous background in computer science education understand the questions and debates within the field Explores the history of computer science education and its influence on the present Views teaching practices through a computational lens Addresses why many schools fail to teach computer science adequately Explains contemporary issues in computer science such as the language wars and trends that equate coding with essential life skills like reading and writing Don't Teach Coding: Until You Read This Book is a valuable resource for K-12 educators in computer science education and parents wishing to understand the field to help chart their children’s education path.

Topics in Cryptology – CT-RSA 2017

by Helena Handschuh

This book constitutes the refereed proceedings of the Cryptographer's Track at the RSA Conference 2017, CT-RSA 2017, held in San Francisco, CA, USA, in February 2017. The 25 papers presented in this volume were carefully reviewed and selected from 77 submissions. CT-RSA has become a major publication venue in cryptography. It covers a wide variety of topics from public-key to symmetric key cryptography and from cryptographic protocols to primitives and their implementation security. This year selected topics such as cryptocurrencies and white-box cryptography were added to the call for papers.

Advances in Cryptology – CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part IV (Lecture Notes in Computer Science #14084)

by Helena Handschuh Anna Lysyanskaya

The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023. The conference took place at Santa Barbara, USA, during August 19-24, 2023.The 124 full papers presented in the proceedings were carefully reviewed and selected from a total of 479 submissions. The papers are organized in the following topical sections: Part I: Consensus, secret sharing, and multi-party computation; Part II: Succinctness; anonymous credentials; new paradigms and foundations; Part III: Cryptanalysis; side channels; symmetric constructions; isogenies; Part IV: Faster fully homomorphic encryption; oblivious RAM; obfuscation; secure messaging; functional encryption; correlated pseudorandomness; proof systems in the discrete-logarithm setting.

Advances in Cryptology – CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part II (Lecture Notes in Computer Science #14082)

by Helena Handschuh Anna Lysyanskaya

The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023. The conference took place at Santa Barbara, USA, during August 19-24, 2023.The 124 full papers presented in the proceedings were carefully reviewed and selected from a total of 479 submissions. The papers are organized in the following topical sections: Part I: Consensus, secret sharing, and multi-party computation; Part II: Succinctness; anonymous credentials; new paradigms and foundations; Part III: Cryptanalysis; side channels; symmetric constructions; isogenies; Part IV: Faster fully homomorphic encryption; oblivious RAM; obfuscation; secure messaging; functional encryption; correlated pseudorandomness; proof systems in the discrete-logarithm setting.

Advances in Cryptology – CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part V (Lecture Notes in Computer Science #14085)

by Helena Handschuh Anna Lysyanskaya

The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023. The conference took place at Santa Barbara, USA, during August 19-24, 2023.The 124 full papers presented in the proceedings were carefully reviewed and selected from a total of 479 submissions. The papers are organized in the following topical sections: Part I: Consensus, secret sharing, and multi-party computation; Part II: Succinctness; anonymous credentials; new paradigms and foundations; Part III: Cryptanalysis; side channels; symmetric constructions; isogenies; Part IV: Faster fully homomorphic encryption; oblivious RAM; obfuscation; secure messaging; functional encryption; correlated pseudorandomness; proof systems in the discrete-logarithm setting.

Advances in Cryptology – CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part I (Lecture Notes in Computer Science #14081)

by Helena Handschuh Anna Lysyanskaya

The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023. The conference took place at Santa Barbara, USA, during August 19-24, 2023.The 124 full papers presented in the proceedings were carefully reviewed and selected from a total of 479 submissions. The papers are organized in the following topical sections: Part I: Consensus, secret sharing, and multi-party computation; Part II: Succinctness; anonymous credentials; new paradigms and foundations; Part III: Cryptanalysis; side channels; symmetric constructions; isogenies; Part IV: Faster fully homomorphic encryption; oblivious RAM; obfuscation; secure messaging; functional encryption; correlated pseudorandomness; proof systems in the discrete-logarithm setting.

Advances in Cryptology – CRYPTO 2023: 43rd Annual International Cryptology Conference, CRYPTO 2023, Santa Barbara, CA, USA, August 20–24, 2023, Proceedings, Part III (Lecture Notes in Computer Science #14083)

by Helena Handschuh Anna Lysyanskaya

The five-volume set, LNCS 14081, 140825, 14083, 14084, and 14085 constitutes the refereed proceedings of the 43rd Annual International Cryptology Conference, CRYPTO 2023. The conference took place at Santa Barbara, USA, during August 19-24, 2023.The 124 full papers presented in the proceedings were carefully reviewed and selected from a total of 479 submissions. The papers are organized in the following topical sections: Part I: Consensus, secret sharing, and multi-party computation; Part II: Succinctness; anonymous credentials; new paradigms and foundations; Part III: Cryptanalysis; side channels; symmetric constructions; isogenies; Part IV: Faster fully homomorphic encryption; oblivious RAM; obfuscation; secure messaging; functional encryption; correlated pseudorandomness; proof systems in the discrete-logarithm setting.

Adaptive Middleware for the Internet of Things: The GAMBAS Approach

by Marcus Handte Pedro José Marrón Gregor Schiele Matoses Manuel Serrano

Over the past years, a considerable amount of effort has been devoted, both in industry and academia, towards the development of basic technology as well as innovative applications for the Internet of Things. Adaptive Middleware for the Internet of Things introduces a scalable, interoperable and privacy-preserving approach to realize IoT applications and discusses abstractions and mechanisms at the middleware level that simplify the realization of services that can adapt autonomously to the behavior of their users. Technical topics discussed in the book include:Behavior-driven Autonomous ServicesGAMBAS Middleware ArchitectureGeneric and Efficient Data AcquisitionInteroperable and Scalable Data ProcessingAutomated Privacy PreservationAdaptive Middleware for the Internet of Things summarizes the results of the GAMBAS research project funded by the European Commission under Framework Programme 7. It provides an in-depth description of the middleware system developed by the project consortium. In addition, the book describes several innovative mobility and monitoring applications that have been built, deployed and operated to evaluate the middleware under realistic conditions with a large number of users. Adaptive Middleware for the Internet of Things is ideal for personnel in the computer and communication industries as well as academic staff and research students in computer science interested in the development of systems and applications for the Internet of Things.

Knowledge Management, Arts, and Humanities: Interdisciplinary Approaches and the Benefits of Collaboration (Knowledge Management and Organizational Learning #7)

by Meliha Handzic Daniela Carlucci

This book presents a series of studies that demonstrate the value of interactions between knowledge management with the arts and humanities. The carefully compiled chapters show, on the one hand, how traditional methods from the arts and humanities – e.g. theatrical improvisation, clay modelling, theory of aesthetics – can be used to enhance knowledge creation and evolution. On the other, the chapters discuss knowledge management models and practices such as virtual knowledge space (BA) design, social networking and knowledge sharing, data mining and knowledge discovery tools. The book also demonstrates how these practices can yield valuable benefits in terms of organizing and analyzing big arts and humanities data in a digital environment.

Build Your Own PaaS with Docker

by Oskar Hane

This book is intended for those who want to take full advantage of separating services into module containers and connect them to form a complete platform. It will give you all the insights and knowledge needed to run your own PaaS.

Cyber Kids, Cyber Bullying, Cyber Balance

by Constance Hanel Barbara C. Trolley

Emphasizing prevention, assessment, and evaluation, this proactive guide shows how to advance learning, reduce cyber bullying, and improve school climate by helping students use technology responsibly.

Artificial Intelligence and Its Discontents: Critiques from the Social Sciences and Humanities (Social and Cultural Studies of Robots and AI)

by Ariane Hanemaayer

On what basis can we challenge Artificial Intelligence (AI) - its infusion, investment, and implementation across the globe? This book answers this question by drawing on a range of critical approaches from the social sciences and humanities, including posthumanism, ethics and human values, surveillance studies, Black feminism, and other strategies for social and political resistance. The authors analyse timely topics, including bias and language processing, responsibility and machine learning, COVID-19 and AI in health technologies, bio-AI and nanotechnology, digital ethics, AI and the gig economy, representations of AI in literature and culture, and many more. This book is for those who are currently working in the field of AI critique and disruption as well as in AI development and programming. It is also for those who want to learn more about how to doubt, question, challenge, reject, reform and otherwise reprise AI as it been practiced and promoted.

Game Development with Swift

by Stephen Haney

If you wish to create and publish fun iOS games using Swift, then this book is for you. You should be familiar with basic programming concepts. However, no prior game development or Apple ecosystem experience is required.

Swift 3 Game Development - Second Edition

by Stephen Haney

Embrace the mobile gaming revolution by creating popular iOS games with Swift 3.0 About This Book • Create and design games for iPhone and iPad using SpriteKit and Swift 3.0 • Learn the core fundamentals of SpriteKit game development and mix and match techniques to customize your game • This step-by-step practical guide will teach you to build games from scratch using little-known tips and strategies for maximum fun Who This Book Is For If you wish to create and publish fun iOS games using Swift, then this book is for you. You should be familiar with basic programming concepts. However, no prior game development or Apple ecosystem experience is required. What You Will Learn • Deliver powerful graphics, physics, and sound in your game by using SpriteKit • Set up the scene using the new capabilities of the scene editor and custom classes • Maximize gameplay with little-known tips and strategies for fun and repeatable action • Make use of animations, graphics, and particles to polish your game • Understand the current mobile monetization landscape to choose the best option for your own situation • Integrate your game with Game Center so that your players can share their high scores and achievements • Publish your game to the App Store and enjoy people playing your games In Detail Swift is the perfect choice for game development. Developers are intrigued by Swift 3.0 and want to make use of new features to develop their best games yet. Packed with best practices and easy-to-use examples, this book leads you step by step through the development of your first Swift game. This book starts by introducing SpriteKit and Swift's new features that can be used for game development. After setting up your first Swift project, you will build your first custom class, learn how to draw and animate your game, and add physics simulations. Then, you will add the player character, NPCs, and powerups. To make your game more fun and engaging, you will learn how to set up scenes and backgrounds, build fun menus, and integrate with Apple Game Center to add leaderboards and achievements. You will then make your game stand out by adding animations when game objects collide, and incorporate proven techniques such as the advanced particle system and graphics. Finally, you will explore the various options available to start down the path towards monetization and publish your finished games to the App Store. By the end of this book, you will be able to create your own iOS games using Swift and SpriteKit. Style and approach This project-based guide is engaging with a visually-rich approach rather than a text-heavy approach. With every chapter containing practical examples, you will understand how Swift programming works and make the most of the new features in version 3.0.

Analogue Quantum Simulation: A New Instrument for Scientific Understanding

by Dominik Hangleiter Jacques Carolan Karim P. Thébault

This book presents fresh insights into analogue quantum simulation. It argues that these simulations are a new instrument of science. They require a bespoke philosophical analysis, sensitive to both the similarities to and the differences with conventional scientific practices such as analogical argument, experimentation, and classical simulation.The analysis situates the various forms of analogue quantum simulation on the methodological map of modern science. In doing so, it clarifies the functions that analogue quantum simulation serves in scientific practice. To this end, the authors introduce a number of important terminological distinctions. They establish that analogue quantum ‘computation' and ‘emulation' are distinct scientific practices and lead to distinct forms of scientific understanding. The authors also demonstrate the normative value of the computation vs. emulation distinction at both an epistemic and a pragmatic level.The volume features a range of detailed case studies focusing on: i) cold atom computation of many-body localisation and the Higgs mode; ii) photonic emulation of quantum effects in biological systems; and iii) emulation of Hawing radiation in dispersive optical media. Overall, readers will discover a normative framework to isolate and support the goals of scientists undertaking analogue quantum simulation and emulation. This framework will prove useful to both working scientists and philosophers of science interested in cutting-edge scientific practice.

Recent Advances in Electrical and Information Technologies for Sustainable Development: Proceedings of the 3rd International Conference on Electrical and Information Technologies — ICEIT 2017, Morocco (Advances in Science, Technology & Innovation)

by Soumia El Hani Mohamad Essaaidi

The book includes the best extended papers which were selected from the 3rd International Conference of Electrical and Information Technologies (ICEIT 2017, Morocco). The book spans two inter-related research domains which shaped modern societies, solved many of their development problems, and contributed to their unprecedented economic growth and social welfare. Selected papers are based on original and high quality research. They were peer reviewed by experts in the field. They are grouped into five parts. Part I deals with Power System and Electronics topics that include Power Electronics & Energy Conversion, Actuators & Micro/Nanotechnology, etc. Part II relates to Control Systems and their applications. Part III concerns the topic of Information Technology that basically includes Smart Grid, Information Security, Cloud Computing Distributed, Big Data, etc. Part IV discusses Telecommunications and Vehicular Technologies topics that include, Green Networking and Communications, Wireless Ad-hoc and Sensor Networks, etc. Part V covers Green Applications and Interdisciplinary topics, that include intelligent and Green Technologies for Transportation Systems, Smart Cities, etc. This book offers a good opportunity for young researchers, novice scholars and whole academic sphere to explore new trends in Electrical and information Technologies.

A Cursed Place: A page-turning thriller of the dark world of cyber surveillance (William Carver Novels)

by Peter Hanington

Reporter William Carver comes up against Big Tech's manipulation and suppression of truth from the mines of Chile to the turbulent streets of Hong Kong.Knowledge is power. And they know everything.The tech company Public Square believes in 'doing well by doing good'. It's built a multi-billion dollar business on this philosophy and by getting to know what people want. They know a lot. But who else can access all that information and what are they planning to do with it?Reporter William Carver is an analogue man in a digital world. He isn't the most tech-savvy reporter, he's definitely old school, but he needs to learn fast - the people he cares most about are in harm's way.From the Chilean mines where they dig for raw materials that enable the tech revolution, to the streets of Hong Kong where anti-government protesters are fighting against the Chinese State, to the shiny research laboratories of Silicon Valley where personal data is being mined everyday - A Cursed Place is a gripping thriller set against the global forces that shape our times.(P) 2021 Hodder & Stoughton

A Cursed Place: A page-turning thriller of the dark world of cyber surveillance (William Carver Novels)

by Peter Hanington

*ONE OF 40 BOOKS FOR SUMMER* 'gripping'- iNews'A panoramic thriller ...chockful of vivid characters.' - THE SUNDAY TIMES'An intriguing, timely and unsettling new thriller' - SAM BOURNE'Exhilarating and beautiful' - AMOL RAJAN'Catapults you from first word to last... pacy, sinister and timely read.' - ALAN JUDD'Another page-turner from a writer who can take you into gripping worlds, real and virtual.' MISHAL HUSAIN 'A terrific thriller - vivid, quick-witted and dynamic, crackling with energy, dread and rage as it crosses continents and digs down into the human heart.' - NICCI GERRARD 'The dark world of private cyber-surveillance crackles off the page - full of jeopardy and suspense.' - ALLAN LITTLE 'A vividly written thriller of ruthless tech entrepreneurs exploiting their surveillance powers and morally compromised journalists feeling their way in the dark towards the truth.' - RORY CELLAN-JONES'Carver is a marvellous creation.' - MIKE RIPLEY, SHOTS MAGKNOWLEDGE IS POWER. AND THEY KNOW EVERYTHING.The tech company Public Square believes in 'doing well by doing good'. It's built a multi-billion dollar business on this philosophy and by getting to know what people want. They know a lot. But who else can access all that information and what are they planning to do with it?Reporter William Carver is an analogue man in a digital world. He isn't the most tech-savvy reporter, he's definitely old school, but he needs to learn fast - the people he cares most about are in harm's way.From the Chilean mines where they dig for raw materials that enable the tech revolution, to the streets of Hong Kong where anti-government protesters are fighting against the Chinese State, to the shiny research laboratories of Silicon Valley where personal data is being mined everyday - A Cursed Place is a gripping thriller set against the global forces that shape our times.'A true page turner - highly recommended'. TORTOISE

Heroku Cloud Application Development

by Anubhav Hanjura

An easy-to-follow, hands-on guide that clearly explains the various components of the Heroku platform and provides step-by-step guidance as well as numerous examples on how to build and troubleshoot robust and scalable production-ready web applications on the Heroku platform. This book is intended for those who want to learn Heroku the right way. Perhaps you are new to Heroku or are someone who has heard about Heroku but have not built anything significant with it. You should have knowledge or familiarity with cloud computing and basic knowledge of database and network deployment.

Airline e-Commerce: Log on. Take off.

by Michael Hanke

From the few tickets that were sold by Alaska Airlines and former British Midland in December 1995 via the industry’s first airline booking engine websites, global online travel has grown to generate today more than half a trillion dollars in annual revenue. This development has brought significant changes to the airline business, travel markets, and consumers. Today, airlines worldwide not only use e-commerce for online marketing and selling but also as a platform to offer unique services and capabilities that have no counterpart in the physical world. This book is an in-depth introduction to airline e-commerce. It covers a broad scope of areas that are essential to an airline’s ongoing digital transformation. Digital properties & features E-marketing E-sales & distribution Web customer service E-commerce organization E-commerce strategy Written by an airline e-commerce expert and illustrated with numerous examples of leading airlines in this area, Dr. Hanke provides for comprehensive "behind-the-scenes" details of how airline e-commerce works. This book is a crucial companion for students and practitioners alike because it allows the reader to acquire a thorough foundation of airline e-commerce. Furthermore, the book enables the reader to appreciate the ramifications of airline e-commerce in certain corporate areas and to take effective action for a successful e-commerce strategy.

Coding Theory and Cryptography: The Essentials, Second Edition (Chapman & Hall/CRC Pure and Applied Mathematics)

by D.C. Hankerson Gary Hoffman D.A. Leonard Charles C. Lindner K.T. Phelps C.A. Rodger J.R. Wall

Containing data on number theory, encryption schemes, and cyclic codes, this highly successful textbook, proven by the authors in a popular two-quarter course, presents coding theory, construction, encoding, and decoding of specific code families in an "easy-to-use" manner appropriate for students with only a basic background in mathematics offerin

Juniper QFX10000 Series: A Comprehensive Guide to Building Next-Generation Data Centers

by Hanks

Like the popular guides The MX Series and Juniper QFX5100 Series, this practical book--written by the same author--introduces new QFX10000 concepts in switching and virtualization, specifically in the core of the data center network.The rise of cloud computing with service providers and the need to create private clouds for enterprise, government agencies, and research institutions of all shapes and sizes is creating a high demand for high-density 40GbE and 100GbE in the core of the data center network.The Juniper QFX10000 Series was introduced by Juniper Networks to solve these challenges, and it is a game-changer. This new book by Douglas Hanks is the authoritative guide.Topics include:Device ArchitectureFlexible Deployment ScenariosPerformance and ScalingDisaggregation of Software and HardwareData Center APINext Generation QFabricNetwork-Based Overlay FabricNetwork Analytics

Juniper QFX5100 Series

by Douglas Richard Hanks Jr.

Ideal for network engineers involved in building a data center, this practical guide provides a comprehensive and technical deep-dive into the new Juniper QFX5100 switching family. You'll learn how the Juniper QFX5100 enables you to create simple-to-use data centers or build some of the largest IP Fabrics in the world.This book is chock-full of helpful technical illustrations and code examples to help you get started on all of the major architectures and features of Juniper QFX5100 switches, whether you're an enterprise or service provider. With this book, you'll be well on your way to becoming a Juniper QFX5100 expert.All of the examples and features are based on Junos releases 13.2X51-D20.2 and 14.1X53-D10.Fully understand the hardware and software architecture of the Juniper QFX5100Design your own IP Fabric architecturePerform in-service software upgradesBe familiar with the performance and scaling maximumsCreate a data center switching fabric with Virtual Chassis FabricAutomate networking devices with Python, Ruby, Perl, and GoBuild an overlay architecture with VMware NSX and Juniper ContrailExport real-time analytics information to graph latency, jitter, bandwidth, and other features

Juniper MX Series

by Douglas Richard Hanks Jr. Harry Reynolds

Discover why routers in the Juniper MX Series, with their advanced feature sets and record breaking scale, are so popular among enterprises and network service providers. This authoritative book shows you step-by-step how to implement high-density, high-speed Layer 2 and Layer 3 Ethernet services, using Router Engine DDoS Protection, Multi-chassis LAG, Inline NAT, IPFLOW, and many other Juniper MX features. Written by Juniper Network engineers, each chapter covers a specific Juniper MX vertical and includes review questions to help you test what you learn. Delve into the Juniper MX architecture, including the next generation Junos Trio chipset Explore Juniper MX's bridging, VLAN mapping, and support for thousands of virtual switches Add an extra layer of security by combining Junos DDoS protection with firewall filters Create a firewall filter framework that only applies filters specific to your network Discover the advantages of hierarchical scheduling Combine Juniper MX routers, using a virtual chassis or Multi-chassis LAG Install network services such as Network Address Translation (NAT) inside the Trio chipset Examine Junos high availability features and protocols on Juniper MX "For the no-nonsense engineer who likes to get down to it, The Juniper MX Series targets both service providers and enterprises with an illustrative style supported by diagrams, tables, code blocks, and CLI output. Readers will discover features they didn't know about before and can't resist putting them into production." --Ethan Banks, CCIE #20655, Packet Pushers Podcast Host

Refine Search

Showing 18,801 through 18,825 of 54,013 results