Computers & Technology
epub |eng | 2013-07-04 | Author:Syed V. Ahamed
8.1.6 From SCP’S to Stand-By Servers The service control points (SCPs) discussed further in the chapter had been essential to provide the early IN functions have been replaced gradually by ...
( Category:
Engineering & Transportation
March 26,2014 )
epub |eng | 2012-09-12 | Author:David Catuhe [David Catuhe]
Creating a learning machine You now have a good pattern-matching algorithm and a tool to normalize your gestures. You are ready to create the learning machine that will aggregate these ...
( Category:
Computer Science
March 26,2014 )
epub |eng | 2012-12-18 | Author:Roderick W. Smith
Configuring KDM KDM is based partly on XDM and so shares many of its configuration options. Unfortunately, the location of the KDM configuration files is unpredictable; sometimes KDM uses the ...
( Category:
Certification
March 26,2014 )
CCNA Data Center - Introducing Cisco Data Center Networking Study Guide by Todd Lammle & John Swartz
epub |eng | 2013-05-29 | Author:Todd Lammle & John Swartz
Gathering Basic Information The show version command will provide you with a view of the basic configuration for the system hardware, plus the software version and the boot images. Here’s ...
( Category:
Networking & Cloud Computing
March 26,2014 )
epub |eng | 2012-10-24 | Author:Wendell Odom [Odom, Wendell]
( Category:
Certification
March 26,2014 )
epub |eng | 2012-07-17 | Author:Miller, Gregory, Peter [Miller, Gregory, Peter]
Figure 9-1: The main components of a CPU. The basic operation of a microprocessor consists of two distinct phases: fetch and execute. (It’s not too different from what your dog ...
( Category:
Security Certifications
March 26,2014 )
epub |eng | 2012-03-25 | Author:J.C. Mackin [Mackin, J.C.]
Figure 7-1. A NAP infrastructure. Network policies include health policies as matching conditions. Health policies determine whether a NAP client matches an indicated state of failing or passing a health ...
( Category:
Windows Administration
March 26,2014 )
epub |eng | 2008-07-13 | Author:James Shore & Chromatic [James Shore]
Figure 8-4. A release planning board “Done Done” and Release Planning Important No Bugs “Done done” applies to release planning as well as to stories. Just as you shouldn’t postpone ...
( Category:
Programming
March 26,2014 )
epub |eng | 2013-08-11 | Author:Karl E Wiegers & Joy Beatty
Games people play with priorities The knee-jerk response to a request for customers to set priorities sometimes is, “I need all these features. Just make it happen.” They feel that ...
( Category:
Management & Leadership
March 26,2014 )
epub |eng | 2012-04-30 | Author:Jesmond Allen & James Chudley
Figure 13-2: Usability testing in action In this example, I would give users the simple task of researching and attempting to purchase a new camera online having deliberately recruited people ...
( Category:
Book Design
March 26,2014 )
epub, pdf |eng | 2012-11-28 | Author:Preston Gralla [Preston Gralla]
Note Note: Many routers ship with a default channel of 6, so if you’re using that channel, you’re most likely to run into interference from nearby Wi-Fi networks. How you ...
( Category:
Microsoft Windows Registry
March 26,2014 )
epub |eng | 2012-11-09 | Author:Kenneth Tam & Martín H. Hoz Salvador & Ken McAlpine & Rick Basile & Bruce Matsugu & Josh More
The above result indicates that there is connectivity to both the Internet to one of the FDN servers. The name service.fortiguard.net has several IP addresses associated to it, so every ...
( Category:
Computers & Technology
March 26,2014 )
epub, pdf, mobi |eng | 2013-06-20 | Author:Pauli, Josh [Pauli, Josh]
Bypassing Authentication We can now construct a valid SQL statement that will execute gracefully and retrieve information that we have no right to retrieve. We know we are dealing with ...
( Category:
Hacking
March 26,2014 )
epub, pdf |eng | 2010-08-31 | Author:Wallace Wang [Wallace Wang]
Figure 13-1. A WHOIS search can reveal the true owner behind charity domain names. Even if you find a valid charity, be careful of their privacy policies. To earn additional ...
( Category:
Business Technology
March 26,2014 )
epub |eng | 2011-03-25 | Author:Martin L. Abbott & Michael T. Fisher
* * * Rule 28 has an ugly and slightly misleading and controversial title meant to provoke thought and discussion. Of course it makes sense to have a team responsible ...
( Category:
Programming
March 26,2014 )
Categories
Popular ebooks
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(16797)Deep Learning with Python by François Chollet(12647)
Hello! Python by Anthony Briggs(9948)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9825)
The Mikado Method by Ola Ellnestam Daniel Brolund(9814)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(9727)
Dependency Injection in .NET by Mark Seemann(9370)
Hit Refresh by Satya Nadella(8857)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(8335)
The Kubernetes Operator Framework Book by Michael Dame(7950)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7811)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(7791)
Exploring Deepfakes by Bryan Lyon and Matt Tora(7739)
Grails in Action by Glen Smith Peter Ledbrook(7722)
Practical Computer Architecture with Python and ARM by Alan Clements(7684)
Implementing Enterprise Observability for Success by Manisha Agrawal and Karun Krishnannair(7649)
Robo-Advisor with Python by Aki Ranin(7636)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(7592)
Building Low Latency Applications with C++ by Sourav Ghosh(7525)
Svelte with Test-Driven Development by Daniel Irvine(7506)
