Computers & Technology
epub, pdf |eng | 2013-08-07 | Author:Thomas D. Nadeau & Ken Gray
Billing system interface after provisioning operations are executed Workflow automation Adding and removing virtual machines to and from tenants Specifying the bandwidth, quality of service, and security attributes of a ...
( Category:
Networks
March 26,2014 )
epub |eng | 2013-01-14 | Author:Sander van Vugt
Managing Linux Users and Groups in LDAP In this section, you'll learn how to manage Linux user and group accounts in an LDAP Directory. You'll learn how to add users ...
( Category:
Networks
March 26,2014 )
epub, pdf |eng | 2012-10-31 | Author:Doug Lowe [Lowe, Doug]
Figure 4-5: Configuring a Windows client to obtain its DNS address from DHCP. Chapter 5: Using FTP In This Chapter Figuring out the basics of FTP Setting up an FTP ...
( Category:
Networks
March 26,2014 )
epub, azw3 |eng | 2013-06-05 | Author:Simon Gallagher & Aidan Dalgleish
The product is distributed as an installable bin file that you downloaded and copied across to the cell server earlier. Perform the following steps: 1. Locate the bin file. 2. ...
( Category:
Networking & Cloud Computing
March 26,2014 )
epub |eng | 2012-03-25 | Author:Dinkar Sitaram & Geetha Manjunath
• partition(key2) : Determine a data partition and return the reducer number The partition function is given the key with the number of reducers and returns the index of the ...
( Category:
Cloud Computing
March 26,2014 )
epub, mobi, pdf |eng | 2013-10-03 | Author:Elliotte Rusty Harold
Disconnecting from the Server HTTP 1.1 supports persistent connections that allow multiple requests and responses to be sent over a single TCP socket. However, when Keep-Alive is used, the server ...
( Category:
LAN
March 26,2014 )
epub, pdf |eng | 2013-04-01 | Author:Charles E. Spurgeon & Joann Zimmerman [Charles E. Spurgeon and Joann Zimmerman]
In this chapter, we will show some of the basic ways switches can be used to build an Ethernet system. Network design is a large topic, and there are many ...
( Category:
LAN
March 26,2014 )
epub |eng | 2012-10-23 | Author:Joe Fichera & Steven Bolt
Snort One suggestion I have is to use another open source tool, Snort. Snort is a network intrusion prevention and detection system (IPS/IDS) that was developed by Sourcefire. Snort[5] can ...
( Category:
Network Security
March 26,2014 )
epub |eng | 0101-01-01 | Author:Ranganath, Karthik [Ranganath, Karthik]
The following screenshot demonstrates the working of getuid in meterpreter. In the following screenshot, the attacker is accessing the system with the SYSTEM privilege. In a Windows environment, the SYSTEM ...
( Category:
Computers & Technology
March 26,2014 )
epub |eng | 2011-07-17 | Author:Jon Galloway & Phil Haack & Brad Wilson & K. Scott Allen
The tmpl method combines the template with the JSON data to produce real DOM elements. Because the JSON data is an array of artists, the template engine renders the template ...
( Category:
Software Development
March 26,2014 )
epub, pdf |eng | 2013-03-28 | Author:Travis Lowdermilk
Figure 7-2. Microsoft Word Ribbon interface Nothing is more frustrating than a disorganized application. It requires the user to hunt and peck through complex menus and options, looking for the ...
( Category:
Software Development
March 26,2014 )
epub |eng | 2013-03-11 | Author:Jessica McKellar & Abe Fettig
$ twistd -n echo --auth memory:user:pass:foo:bar 2012-12-01 14:04:11-0500 [-] Log opened. 2012-12-01 14:04:11-0500 [-] twistd 12.1.0 (/usr/bin/python 2.7.1) ... 2012-12-01 14:04:11-0500 [-] reactor class: twisted.internet.select... 2012-12-22 14:07:26-0500 [-] EchoFactory starting ...
( Category:
Networks, Protocols & APIs
March 26,2014 )
epub, pdf |eng | | Author:David Powers
CHAPTER 12 Cross-Browser Layout Techniques Most websites use some sort of grid pattern for layout. In the early days of the Web, HTML tables provided the basic grid structure. But ...
( Category:
Programming
March 26,2014 )
epub, mobi |eng | 2013-07-25 | Author:Richard Bejtlich
Part IV. NSM in Action Chapter 9. NSM Operations Analysts need tools to find intruders, but methodology is more important than software. Tools collect and interpret data, but methodology provides ...
( Category:
Networks
March 26,2014 )
epub |eng | 2010-12-26 | Author:Jacob Sanford & Randy Drisgill & David Drinkwine & Coskun Cavusoglu
The Master Page Structure Master pages are ASP.NET pages written in either VB or C# and have a file extension of “.master”. Interesting enough, the language of the master page ...
( Category:
Software Development
March 26,2014 )
Categories
Popular ebooks
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16904)Deep Learning with Python by François Chollet(14616)
The Mikado Method by Ola Ellnestam Daniel Brolund(11877)
Hello! Python by Anthony Briggs(11791)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(11240)
Dependency Injection in .NET by Mark Seemann(11001)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10517)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(9832)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(9420)
Grails in Action by Glen Smith Peter Ledbrook(9163)
Hit Refresh by Satya Nadella(9038)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(8808)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(8594)
The Kubernetes Operator Framework Book by Michael Dame(8468)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(8309)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8288)
Robo-Advisor with Python by Aki Ranin(8242)
Practical Computer Architecture with Python and ARM by Alan Clements(8217)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8187)
Building Low Latency Applications with C++ by Sourav Ghosh(8089)