Networking & Cloud Computing
epub |eng | 2018-11-30 | Author:Prashanth Jayaram [Prashanth Jayaram]
This is what we did: We listed out the files to delete: we subtracted the LastWriteTime from today, and performed a Floor() operation on it since we were not allowed ...
( Category:
Linux & UNIX Administration
May 23,2020 )
epub |eng | 2018-12-31 | Author:Sebastiaan Tammer [Sebastiaan Tammer]
Summary This chapter explained regular expressions, and two common tools that use them under Linux: grep and sed. We began by explaining that regular expressions are search patterns, used in ...
( Category:
Linux & UNIX Administration
May 23,2020 )
epub |eng | 2018-08-30 | Author:Dan Toomey [Dan Toomey]
Adding JavaScript scripting to your installation In this section, we will install JavaScript scripting on macOS and Windows. There are separate steps for getting JavaScript scripting available on your Jupyter ...
( Category:
Software Development
May 22,2020 )
epub |eng | 2020-03-30 | Author:Keith Martin
How to Save the World Here’s cryptography in action, as often witnessed on television dramas (and the likes of James Bond movies). Two intelligence agents sit tensely in a car, ...
( Category:
Cryptography
May 22,2020 )
epub |eng | 2020-05-18 | Author:Keith Martin [Martin, Keith]
How to Save the World Here’s cryptography in action, as often witnessed on television dramas (and the likes of James Bond movies). Two intelligence agents sit tensely in a car, ...
( Category:
Cryptography
May 19,2020 )
epub |eng | 2018-07-30 | Author:Ganesh Naik & Ron Brash [Ganesh Naik]
( Category:
Networking & Cloud Computing
May 18,2020 )
epub |eng | | Author:Amal Banerjee
3.3 1800 MHz (1.8 GHz) Common-Emitter Negative Resistance Clapp Resonator GSM Carrier Frequency Oscillator The C computer language [7] executable amplifierce (available for both the popular Linux and Windows operating ...
( Category:
Electronics
May 14,2020 )
epub |eng | 2020-05-15 | Author:Andrew Faulkner & Conrad Chavez
First, you’ll configure the Pen tool options and the work area. In the Tools panel, select the Pen tool (). In the options bar, select or verify the following settings: ...
( Category:
Adobe Photoshop
May 8,2020 )
epub |eng | 2019-09-09 | Author:OECD
Promoting common and widespread expectations A lack of common expectations is also an obstacle to more widespread adoption of responsible investment strategies by institutional investors. A survey conducted in 2016-2017 ...
( Category:
Biography & History
May 5,2020 )
epub |eng | 2019-05-09 | Author:OECD
The Internet also provides people with a new arena in which to engage in civic and political debates, to exchange ideas and to voice frustration (OECD, 2019[4]). In 2017, 11% ...
( Category:
Economics
May 5,2020 )
epub |eng | | Author:Sarah T. Roberts
Social Media Expertise as Brand Protection Although the firm began as a strictly commercial content moderation operation, offering its services to news and media companies challenged by the comments sections ...
( Category:
Communication & Media Studies
May 5,2020 )
epub |eng | 2014-10-14 | Author:Andrew Tink
27 All the way with LBJ A keen spear fisherman with an athlete’s body, Harold Holt seemed made for the ‘swinging sixties’. Photographed in a wet suit, posing with his ...
( Category:
Satellite
May 5,2020 )
epub |eng | 2020-03-13 | Author:Foster, Matt [Foster, Matt]
Security Concerns The insight and spy administrations of the United States and different countries consider the TOR organize as a danger to national security, accepting such an unknown system empowers ...
( Category:
Operating Systems Theory
May 3,2020 )
epub |eng | | Author:Follis, Luca; Fish, Adam; & Adam Fish
Hacking Civil Law: Lauri Love v. National Crime Agency Lauri Love’s case, much like that of McKinnon, illustrates the powerful offline resources that remain available to states when projecting authority ...
( Category:
Media & Internet
May 3,2020 )
azw3 |eng | 2020-04-07 | Author:Tony Chan [Chan, Tony]
The class statement In Python, due to class statement, you may execute a square of code and appends its nearby namespace to a class, so that you may use it ...
( Category:
Linux & UNIX Administration
May 3,2020 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6850)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6848)
Running Windows Containers on AWS by Marcio Morales(6375)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5075)
Combating Crime on the Dark Web by Nearchos Nearchou(4650)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4626)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4339)
The Age of Surveillance Capitalism by Shoshana Zuboff(3981)
Python for Security and Networking - Third Edition by José Manuel Ortega(3900)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3560)
Learn Wireshark by Lisa Bock(3540)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3356)
Blockchain Basics by Daniel Drescher(3327)
