Search alternatives:
table 3ack » table back, tables back, table hacks
table 2a » table 2, table 21, table 27
table 3 » table 1, table 2

1
by Nash, Michael
Published 2017
O'Reilly Media
Table of Contents: ...'s Actors in the Actor Model; Message Passing; Actor Systems; The Akka Typed Project; Conclusion; Chapter 3...

2
by Calderon, Paulino
Published 2017
Packt Publishing
Table of Contents: ...Checking whether a host is flagged by Google Safe Browsing for malicious activities -- Getting...

3
by Nath, Anish
Published 2015
Packt Publishing
Table of Contents: ... -- Finding packets based on HTTP methods -- Finding sensitive information in a form post -- Using HTTP status...

4
by Chollet, François
Published 2018
Manning Publications
Table of Contents: ...5.2.5. Using data augmentation -- 5.3. Using a pretrained convnet -- 5.3.1. Feature extraction...