Networking & Cloud Computing
epub |eng | 2018-05-29 | Author:Glenn Fleishman

Reserved Addresses Reservation allows a given device on a network to obtain the same IP address, whether public or private, each time it joins the network. This works whether or ...
( Category: Network Security May 29,2020 )
epub |eng | 2020-04-17 | Author:Karim Okasha [Karim Okasha]

( Category: Tools May 29,2020 )
epub |eng | 2018-08-27 | Author:Iffat Zafar [Leonardo Araujo]

Fast R-CNN In 2015, Fast R-CNN was proposed to remedy the speed problems of R-CNN. In this method, the main change is where we get proposal regions in the pipeline. ...
( Category: Networks May 29,2020 )
epub, azw3 |eng | 2020-05-08 | Author:Bernstein, James [Bernstein, James]

Zoom Outlook Plugin I had previously discussed the Zoom Google Chrome web browser extension back in Chapter 3 but now I would like to discuss the Microsoft Outlook plugin for ...
( Category: Enterprise Applications May 28,2020 )
epub |eng | 2020-03-15 | Author:Jonathan Rasmusson [Rasmusson, Jonathan]

Copyright © 2020, The Pragmatic Bookshelf. Chapter 6 Working At a Tech Lead Company Working at a tech company feels different. And no small part of that is due to ...
( Category: Testing May 27,2020 )
epub, mobi |eng | 2020-05-01 | Author:Richard Bejtlich [Bejtlich, Richard]

Calculating Security ROI Is a Waste of Time Sunday, April 18, 2004 I was pleased to read Infosec Economics by Lawrence Gordon and Robert Richardson in the 1 Apr 04 ...
( Category: Network Security May 25,2020 )
azw3 |eng | 2018-01-22 | Author:Norman, Alan T. [Norman, Alan T.]

Figure 28 - Tor Settings Dialog If you have your own list of bridge relays that you prefer to connect, choose the “Enter custom bridges” radio button and paste the ...
( Category: Hacking May 25,2020 )
epub |eng | | Author:Dmitri Korotkevitch

begin tran while @id < 100000 begin update Delivery.Orders set OrderStatusId = 1 where OrderId between @id and @id + 4998; select @id += 4999; end select count(*) as [Lock ...
( Category: Storage & Retrieval May 24,2020 )
epub, pdf |eng | 2020-02-24 | Author:Carmine Zaccagnino [Carmine Zaccagnino]

( Category: Software Development May 24,2020 )
epub |eng | | Author:Roger Cornejo

when upper(metric_name) like 'DB TIME' then 'cpu' when upper(metric_name) like '%CPU%' then 'cpu' -- ... when upper(metric_name) like '%SQL*NET%' then 'network' when upper(metric_name) like '%NETWORK%' then 'network' -- ... when ...
( Category: Storage & Retrieval May 24,2020 )
epub |eng | | Author:Brian Peasland

Tip Read the Oracle documentation. It is a must for advancing your skillset. I have worked with some products where the documentation was a 20- or 40-page PDF file. It ...
( Category: Storage & Retrieval May 24,2020 )
epub |eng | | Author:Sten Vesterli

This action chain is automatically triggered when you load the main-start page. You can click the Call REST Endpoint action and investigate its properties. There is an Endpoint property pointing ...
( Category: Programming & App Development May 24,2020 )
epub |eng | | Author:Peter A. Carter

Full and Transaction Log Backups If your database is in FULL recovery model, then you are able to take transaction log backups, as well as the full backups. This means ...
( Category: Storage & Retrieval May 24,2020 )
epub |eng | 2018-12-26 | Author:Sion Retzkin [Sion Retzkin]

But, even with all its security, privacy, and anonymity options, Tails has weaknesses. For example (according to the Tails website documentation), note the following: Tails does not protect against compromised ...
( Category: Networking & Cloud Computing May 23,2020 )
epub |eng | 2018-11-30 | Author:Jordan Krause [Jordan Krause]

But I'm an IT guy, right? Don't you think I could find some way of circumnavigating this setting, even though my account only has regular user permissions? Nope, not that ...
( Category: Windows Administration May 23,2020 )