Internet & Networking
epub, pdf |eng | | Author:Joseph Migga Kizza
Other configurations of firewalls depend on the structure of the network. For example, in a set up with multiple networks, several firewalls may be used, one per network. Security in ...
( Category:
Networks
March 4,2017 )
epub |eng | | Author:Mike Halsey
bcdedit [/store filename] /default id sets the default boot entry for the PC. This might be used in the format bcdedit /default { e397815a-15a9-11e5-9622-fc025c6ab93c } bcdedit [/store filename] /delete id ...
( Category:
NET
September 14,2016 )
epub |eng | 2011-12-21 | Author:Peder Jungck; Ralph Duncan; Dwight Mulcahy
A pragma may appear in a packetC module at any location that a packetC declaration or statement could legally appear. Best practices for pragmas encourage locating or including them near ...
( Category:
Software Development
August 6,2016 )
epub |eng | | Author:Luis Ayala
Firewall access control lists Firewall hard disk image IDS rules IDS image Back up of firewall, router, and switch IOS Backup of PLC configurations and firmware Backup RTU software, database, ...
( Category:
Embedded Systems
July 28,2016 )
epub |eng | 2014-03-01 | Author:Andrew Oliviero
Spread Spectrum Spread-spectrum transmissions use the same frequencies as other radio-frequency transmissions, but they use several frequencies simultaneously rather than just one. Two modulation schemes can be used to accomplish ...
( Category:
LAN
July 5,2016 )
epub, pdf |eng | | Author:Song Y. Yan
(b) (c) 3.Use Silver–Pohlig–Hellman algorithm to solve the discrete logarithms k: (a) (b) (c) . 4.Use Pollard’s ρ method to find the discrete logarithms k such that (a) (b) . ...
( Category:
Internet & Networking
April 8,2016 )
epub |eng | 2014-06-17 | Author:Matt Walker
What is the attacker attempting to perform? A. A SQL injection attack against the blog’s underlying database B. A cross-site scripting attack C. A buffer overflow DoS attack D. A ...
( Category:
Security
February 15,2016 )
mobi |eng | 2010-06-27 | Author:Teare, Diane [Teare, Diane]
In both cases, routing can be either static or dynamic (typically BGP). Multihomed ISP Connectivity Figure 6-9 illustrates a company connected to two different ISPs. The benefits of doing so ...
( Category:
Networks
February 14,2016 )
epub |eng | 2015-01-30 | Author:Mark Edward Soper
* * * AMD 3D Settings AMD provides two ways to adjust 3D settings: Manually through its CATALYST (for systems with AMD GPUs) or VISION (for systems with AMD APUs) ...
( Category:
Maintenance, Repair & Upgrading
January 31,2016 )
azw3, epub |eng | 2015-08-31 | Author:Castro, Jorge R. [Castro, Jorge R.]
Note WARNING! E-mail accounts have certain security measures to not accept requests from unusual origins, for example, blocking or regional or even continental requests. It may be that the process ...
( Category:
C
December 31,2015 )
epub |eng | 2012-10-15 | Author:Mike Meyers
Figure 19-50 Compatibility mode options in Windows 7 The newer Compatibility tab also adds some new options (see Figure 19-51) to help older programs run: Figure 19-51 Windows 7 Compatibility ...
( Category:
LAN
October 16,2015 )
epub |eng | 2014-10-30 | Author:Nestler, Vincent & Harrison, Keith & Hirsch, Matthew & Conklin, Wm. Arthur
Note If you are using virtual machines and have the ability to create snapshots, now would be a good time to take another one. At this point, if you have ...
( Category:
Network Security
August 17,2015 )
mobi, epub, pdf |eng | 2011-09-04 | Author:Massimo Banzi
( Category:
Robotics & Automation
February 12,2015 )
epub, pdf |eng | 2010-12-14 | Author:Robert Faludi [Robert Faludi]
Chapter 6. Sleeping, Then Changing the World Whew! At this point, the book has covered a lot of ground and you have come a long way in a very short ...
( Category:
Networks
January 25,2015 )
mobi, pdf |eng | | Author:Francis daCosta
Neighborhoods and Affinities Internet of Things neighborhoods may be thought of as interesting aggregations of data sources that may be examined and collected by an integrator function. Locating and subscribing ...
( Category:
Robotics & Automation
October 27,2014 )
Categories
Popular ebooks
Building Low Latency Applications with C++ by Sourav Ghosh(7255)Linux Device Driver Development Cookbook by Rodolfo Giometti(3936)
Embedded Programming with Modern C++ Cookbook by Igor Viarheichyk(3637)
Implementing Cellular IoT Solutions for Digital Transformation by Dennis McCain(3572)
Embedded Linux Development Using Yocto Project - Third Edition by Otavio Salvador & Daiane Angolini(3410)
TinyML Cookbook by Gian Marco Iodice(3339)
Simplifying 3D Printing with OpenSCAD by Colin Dow(2844)
TinyML Cookbook by Gian Marco Iodice & Ronan Naughton(2606)
Fusion 360 for Makers by Lydia Sloan Cline(2223)
Networking A Beginner's Guide by Bruce Hallberg(2211)
Hands-On Linux for Architects by Denis Salamanca(2053)
But How Do It Know? by J. Clark Scott(2035)
Computers For Seniors For Dummies by Nancy C. Muir(2004)
Raspberry Pi and MQTT Essentials by Dhairya Parikh(1956)
Arduino Project Handbook, Volume 2: 25 Simple Electronics Projects for Beginners by Geddes Mark(1953)
9781803246888-ENHANCING DEEP LEARNING WITH BAYESIAN INFERENCE by Unknown(1905)
Hack and HHVM by Owen Yamauchi(1885)
31 Days Before Your CompTIA A+ Exams (Shanette Luellen's Library) by Benjamin Patrick Conry(1864)
MicroPython Projects by Jacob Beningo(1742)
Hands-On Internet of Things with MQTT by Tim Pulver(1714)
