Computers & Technology	
					
					
								epub, pdf |eng | 2013-08-07  | Author:Thomas D. Nadeau & Ken Gray
								Billing system interface after provisioning operations are executed Workflow automation Adding and removing virtual machines to and from tenants Specifying the bandwidth, quality of service, and security attributes of a ...
							
							
								( Category:
								
								
									
										
									
										
									
										
									
										
									
										
										Networks
										
									
								
								
								March 26,2014 )
							
						
								epub |eng | 2013-01-14  | Author:Sander van Vugt
								Managing Linux Users and Groups in LDAP In this section, you'll learn how to manage Linux user and group accounts in an LDAP Directory. You'll learn how to add users ...
							
							
								( Category:
								
								
									
										
									
										
									
										
									
										
									
										
										Networks
										
									
								
								
								March 26,2014 )
							
						
								epub, pdf |eng | 2012-10-31  | Author:Doug Lowe [Lowe, Doug]
								Figure 4-5: Configuring a Windows client to obtain its DNS address from DHCP. Chapter 5: Using FTP In This Chapter Figuring out the basics of FTP Setting up an FTP ...
							
							
								( Category:
								
								
									
										
									
										
									
										
									
										
									
										
										Networks
										
									
								
								
								March 26,2014 )
							
						
								epub, azw3 |eng | 2013-06-05  | Author:Simon Gallagher & Aidan Dalgleish
								The product is distributed as an installable bin file that you downloaded and copied across to the cell server earlier. Perform the following steps: 1. Locate the bin file. 2. ...
							
							
								( Category:
								
								
									
										
									
										
									
										
										Networking & Cloud Computing
										
									
								
								
								March 26,2014 )
							
						
								epub |eng | 2012-03-25  | Author:Dinkar Sitaram & Geetha Manjunath
								• partition(key2) : Determine a data partition and return the reducer number The partition function is given the key with the number of reducers and returns the index of the ...
							
							
								( Category:
								
								
									
										
									
										
									
										
									
										
										Cloud Computing
										
									
								
								
								March 26,2014 )
							
						
								epub, mobi, pdf |eng | 2013-10-03  | Author:Elliotte Rusty Harold
								Disconnecting from the Server HTTP 1.1 supports persistent connections that allow multiple requests and responses to be sent over a single TCP socket. However, when Keep-Alive is used, the server ...
							
							
								( Category:
								
								
									
										
									
										
									
										
									
										
									
										
										LAN
										
									
								
								
								March 26,2014 )
							
						
								epub, pdf |eng | 2013-04-01  | Author:Charles E. Spurgeon & Joann Zimmerman [Charles E. Spurgeon and Joann Zimmerman]
								In this chapter, we will show some of the basic ways switches can be used to build an Ethernet system. Network design is a large topic, and there are many ...
							
							
								( Category:
								
								
									
										
									
										
									
										
									
										
									
										
										LAN
										
									
								
								
								March 26,2014 )
							
						
								epub |eng | 2012-10-23  | Author:Joe Fichera & Steven Bolt
								Snort One suggestion I have is to use another open source tool, Snort. Snort is a network intrusion prevention and detection system (IPS/IDS) that was developed by Sourcefire. Snort[5] can ...
							
							
								( Category:
								
								
									
										
									
										
									
										
									
										
										Network Security
										
									
								
								
								March 26,2014 )
							
						
								epub |eng | 0101-01-01  | Author:Ranganath, Karthik [Ranganath, Karthik]
								The following screenshot demonstrates the working of getuid in meterpreter. In the following screenshot, the attacker is accessing the system with the SYSTEM privilege. In a Windows environment, the SYSTEM ...
							
							
								( Category:
								
								
									
										
									
										
										Computers & Technology
										
									
								
								
								March 26,2014 )
							
						
								epub |eng | 2011-07-17  | Author:Jon Galloway & Phil Haack & Brad Wilson & K. Scott Allen
								The tmpl method combines the template with the JSON data to produce real DOM elements. Because the JSON data is an array of artists, the template engine renders the template ...
							
							
								( Category:
								
								
									
										
									
										
									
										
									
										
									
										
										Software Development
										
									
								
								
								March 26,2014 )
							
						
								epub, pdf |eng | 2013-03-28  | Author:Travis Lowdermilk
								Figure 7-2. Microsoft Word Ribbon interface Nothing is more frustrating than a disorganized application. It requires the user to hunt and peck through complex menus and options, looking for the ...
							
							
								( Category:
								
								
									
										
									
										
									
										
									
										
									
										
										Software Development
										
									
								
								
								March 26,2014 )
							
						
								epub |eng | 2013-03-11  | Author:Jessica McKellar & Abe Fettig
								$ twistd -n echo --auth memory:user:pass:foo:bar 2012-12-01 14:04:11-0500 [-] Log opened. 2012-12-01 14:04:11-0500 [-] twistd 12.1.0 (/usr/bin/python 2.7.1) ... 2012-12-01 14:04:11-0500 [-] reactor class: twisted.internet.select... 2012-12-22 14:07:26-0500 [-] EchoFactory starting ...
							
							
								( Category:
								
								
									
										
									
										
									
										
									
										
										Networks, Protocols & APIs
										
									
								
								
								March 26,2014 )
							
						
								epub, pdf |eng |   | Author:David Powers
								CHAPTER 12 Cross-Browser Layout Techniques Most websites use some sort of grid pattern for layout. In the early days of the Web, HTML tables provided the basic grid structure. But ...
							
							
								( Category:
								
								
									
										
									
										
									
										
										Programming
										
									
								
								
								March 26,2014 )
							
						
								epub, mobi |eng | 2013-07-25  | Author:Richard Bejtlich
								Part IV. NSM in Action Chapter 9. NSM Operations Analysts need tools to find intruders, but methodology is more important than software. Tools collect and interpret data, but methodology provides ...
							
							
								( Category:
								
								
									
										
									
										
									
										
									
										
									
										
										Networks
										
									
								
								
								March 26,2014 )
							
						
								epub |eng | 2010-12-26  | Author:Jacob Sanford & Randy Drisgill & David Drinkwine & Coskun Cavusoglu
								The Master Page Structure Master pages are ASP.NET pages written in either VB or C# and have a file extension of “.master”. Interesting enough, the language of the master page ...
							
							
								( Category:
								
								
									
										
									
										
									
										
									
										
									
										
										Software Development
										
									
								
								
								March 26,2014 )
							
						
							
								Categories
							
						
						
Popular ebooks
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16878)Deep Learning with Python by François Chollet(12894)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10282)
Hello! Python by Anthony Briggs(10140)
The Mikado Method by Ola Ellnestam Daniel Brolund(10038)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9997)
Dependency Injection in .NET by Mark Seemann(9534)
Hit Refresh by Satya Nadella(9011)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8540)
The Kubernetes Operator Framework Book by Michael Dame(8318)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8118)
Practical Computer Architecture with Python and ARM by Alan Clements(8050)
Robo-Advisor with Python by Aki Ranin(8043)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(8031)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7936)
Building Low Latency Applications with C++ by Sourav Ghosh(7918)
Svelte with Test-Driven Development by Daniel Irvine(7911)
Grails in Action by Glen Smith Peter Ledbrook(7903)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7871)
Becoming a Dynamics 365 Finance and Supply Chain Solution Architect by Brent Dawson(7831)
 
 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								 
								