Networking & Cloud Computing
epub |eng | 1996-06-14 | Author:Jerry Muelver
Creating Cool Web Pages with Perl The steps for using global variables with subroutines in monum.pl are clear: 1. Assign a value to $monthNum as a test. 2. Assign a ...
( Category:
Networking & Cloud Computing
June 23,2020 )
epub |eng | 2020-07-05 | Author:Avinash Shukla & Manuel Velasco & Jalpa Patel [Avinash Shukla]
( Category:
Networking & Cloud Computing
June 23,2020 )
epub |eng | 2020-06-05 | Author:Vogel, Matt [Vogel, Matt]
12.8 Copying and Moving Files and Directories It may be necessary to copy or move files and directories from time to time. The Linux command line interface has several commands ...
( Category:
Linux & UNIX Administration
June 23,2020 )
epub, azw3, pdf |eng | 2020-06-18 | Author:Chan, Jamie & Publishing, LCF [Chan, Jamie]
9.6 Getter and Setter In the previous section, we talked about the difference between public and private class members. Whenever possible, we should declare class members as private if code ...
( Category:
Networking & Cloud Computing
June 22,2020 )
azw3, epub |eng | 2020-06-18 | Author:HOFFMAN, HUGO & HOFFMAN, HUGO [HOFFMAN, HUGO]
Chapter 37 DMVPN & Site-to-site VPN When it comes to site-to-site VPN type of a connection, we're talking about IPSec in which case our routers are going to form a ...
( Category:
Encryption
June 21,2020 )
epub |eng | | Author:Chinese Academy of Cyberspace Studies
(4)The global e-commerce market is growing fast. In 2017, the world’s online retail volume was USD 2.3 trillion, up 24.8% from the previous year, accounting for 10.2% of the total ...
( Category:
Electronics
June 19,2020 )
azw3, epub |eng | 2020-06-16 | Author:Chris Marshal [Marshal, Chris]
The new devices are subjected to rigorous manufacturer tests before they leave the warehouse for sale. Even after completing these tests, many companies experience errors after receiving the devices. A ...
( Category:
Networking & Cloud Computing
June 19,2020 )
epub |eng | 2020-04-19 | Author:Alfredo Deza & Noah Gift [Alfredo Deza]
( Category:
Linux & UNIX Administration
June 19,2020 )
azw3, epub |eng | 2020-06-16 | Author:Singh, Ajit [Singh, Ajit]
OTHER APPLICATION S There some more really interesting areas where the RPi can be implemented. Following is a list of such possible applications of RPi : Remote Camera: When connected ...
( Category:
Networking & Cloud Computing
June 19,2020 )
epub |eng | 2020-05-20 | Author:Colin Dow [Colin Dow]
Paste in the Primary Connection String from the previous step in place of <ADD DEVICE CONNECTION STRING HERE>, and be sure to keep the quotes. You may click on Edit ...
( Category:
C & C++ Windows Programming
June 18,2020 )
epub |eng | | Author:Matt How
IF OBJECT_ID('Clean.DirtyCSVFile') IS NOT NULL DROP TABLE Clean.DirtyCSVFile; CREATE TABLE Clean.DirtyCSVFile WITH ( HEAP, DISTRIBUTION = HASH([OrderNo]) ) AS SELECT ISNULL(CAST([ID] AS INT),'0'), ISNULL(CAST([SkuItemId] AS VARCHAR(18)),''), ISNULL(CAST([CustomerId] AS INT),'0'), ISNULL(CAST([OrderNo] ...
( Category:
SQL Server
June 18,2020 )
epub |eng | 2020-02-26 | Author:Noah Gift & Alfredo Deza [Noah Gift]
Why and when to monkeypatch? Most of the code that a developer will interact with is already written. There is not that much chance to create large codebases from scratch. ...
( Category:
Linux & UNIX Administration
June 18,2020 )
epub |eng | 2020-03-26 | Author:Damian Scoles
Now we need to create the mailbox and then assign Full Mailbox and Send-As rights to all users in the Help Desk Active Directory group. First, let's create the Shared ...
( Category:
C & C++ Windows Programming
June 18,2020 )
epub |eng | 2020-06-13 | Author:khiami , Dr . sami [khiami , Dr . sami]
If the mapping and analysis level showed flaws on the client side it will be a good idea to begin there. The client (browser) is easily reachable by attacker and ...
( Category:
Networking & Cloud Computing
June 16,2020 )
azw3 |eng | 2020-06-13 | Author:Dr . sami khiami [khiami , Dr . sami]
If the mapping and analysis level showed flaws on the client side it will be a good idea to begin there. The client (browser) is easily reachable by attacker and ...
( Category:
Networking & Cloud Computing
June 16,2020 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6844)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6843)
Running Windows Containers on AWS by Marcio Morales(6371)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5072)
Combating Crime on the Dark Web by Nearchos Nearchou(4648)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4619)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4337)
The Age of Surveillance Capitalism by Shoshana Zuboff(3980)
Python for Security and Networking - Third Edition by José Manuel Ortega(3897)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3557)
Learn Wireshark by Lisa Bock(3534)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3356)
Blockchain Basics by Daniel Drescher(3326)
