Networking & Cloud Computing
epub, azw3 |eng | 2017-02-10 | Author:Eric Frick [Frick, Eric]
Select the Instance Image Scroll down through the list and select the instance you would like to create. in this case I will use the Windows Server 2016 Base image. ...
( Category:
Cloud Computing
June 29,2020 )
epub, pdf |eng | 2017-09-24 | Author:Gavin M. Roy [Gavin M. Roy]
6.3. Selectively routing messages with the topic exchange Like direct exchanges, topic exchanges will route messages to any queue bound with a matching routing key. But by using a period-delimited ...
( Category:
Networks
June 29,2020 )
mobi, epub, pdf |eng | 2017-10-31 | Author:Minko Gechev
Event bubbling In Angular, we have the same bubbling behavior we're used to in the DOM. For instance, let's suppose we have the following template: <input-box inputPlaceholder="New todo..." buttonLabel="Add" (click)="handleClick($event)" ...
( Category:
Networking & Cloud Computing
June 29,2020 )
epub |eng | 2014-12-02 | Author:Steven Rosenbaum [Rosenbaum, Steven]
Chapter 25: Curation with Text Tools Text is the center of the curation universe. Why? Because it’s far and away the most prevalent form of communication on the Web and ...
( Category:
General
June 29,2020 )
epub |eng | | Author:Steffi O. Muhanji & Alison E. Flint & Amro M. Farid
269. K. Zipp, What is a Smart Solar Inverter? Solar Power World Online, Tech. Rep., 2014. https://www.solarpowerworldonline.com/2014/01/smart-solar-inverter/ 270. L. Morales-Velazquez, R. de Jesus Romero-Troncoso, G. Herrera-Ruiz, D. Morinigo-Sotelo, R.A. Osornio-Rios, ...
( Category:
Alternative & Renewable
June 29,2020 )
epub |eng | 2019-11-11 | Author:A. O'Connor [O'Connor, A.]
As the train pulled into Euston Station the British police officers who had been travelling on the train entered Michael’s carriage. “We have a police protection unit waiting to escort ...
( Category:
Collections, Catalogs & Exhibitions
June 29,2020 )
epub, pdf |eng | | Author:Shamayel M. Farooqui
Scaling on Cloud The momentum around migration seemed to be gaining steadily. We were already building our roadmap of the next applications to be deployed on the Cloud while the ...
( Category:
Cloud Computing
June 29,2020 )
epub |eng | 2012-05-31 | Author:Robin M. Fay [Fay, Robin M.]
• Search for Reusable Online Content There are times when you, your coworkers, or one of your patrons will look for online content to reuse or repurpose. For example, your ...
( Category:
Networking & Cloud Computing
June 29,2020 )
epub |eng | 2020-07-13 | Author:Peter F. Drucker [Peter F. Drucker]
The Job Which Most Managers Were Brought Up to Spend Most Time On Will Disappear The literature of management has been concerned, over the last fifty years, with the management ...
( Category:
Internet, Groupware, & Telecommunications
June 29,2020 )
epub |eng | | Author:Ted Huffmire, Cynthia Irvine, Thuy D. Nguyen, Timothy Levin, Ryan Kastner & Timothy Sherwood
3.1.3 Physical Attacks The intentional insertion of malicious inclusions into circuits makes it possible to subsequently mount attacks on those circuits (vulnerabilities may also exist in hardware due to unintentional ...
( Category:
Encryption
June 29,2020 )
mobi |eng | 2020-06-10 | Author:Maik van der Gaag Henry Been [Henry Been, Maik van der Gaag]
public Person(string name, string city) { Name = name ?? throw new ArgumentNullException(); City = city ?? throw new ArgumentNullException(); } [JsonProperty] public string Name { get; private set; } ...
( Category:
Networking & Cloud Computing
June 29,2020 )
azw3 |eng | 2020-04-12 | Author:Learn Computer Hacking In Deep [Hacking In Deep, Learn Computer]
Chapter 6: Programming Linux Programming on Linux is used for creating interfaces, applications, software and programs. Linux code is often used for the desktop, embedded systems as well as for ...
( Category:
Networks
June 29,2020 )
azw3 |eng | 2020-05-06 | Author:Daniel Jones [Jones, Daniel]
Chapter Four Determining Compliance Requirements In this chapter, we will be looking into the legal frameworks, how and why compliance is critical to information security. To stay in compliance with ...
( Category:
Network Security
June 29,2020 )
azw3 |eng | 2018-02-28 | Author:Leonard Eddison [Eddison, Leonard]
Chapter 2: The Technical Side Since bitcoin is a digital currency that is dealt with entirely online, it is only natural that it has a technical side to it. As ...
( Category:
Privacy & Online Safety
June 29,2020 )
azw3 |eng | 2019-08-12 | Author:Florian Dedov [Dedov, Florian]
6 – S&P 500 Index When we talk about how the markets are doing, we are usually looking at indices. One of the most important indices is the so-called S&P ...
( Category:
Intelligence & Semantics
June 29,2020 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6844)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6843)
Running Windows Containers on AWS by Marcio Morales(6371)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5072)
Combating Crime on the Dark Web by Nearchos Nearchou(4648)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4619)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4337)
The Age of Surveillance Capitalism by Shoshana Zuboff(3980)
Python for Security and Networking - Third Edition by José Manuel Ortega(3897)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3557)
Learn Wireshark by Lisa Bock(3534)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3356)
Blockchain Basics by Daniel Drescher(3326)
