Networking & Cloud Computing
epub | | | Author:Elizabeth Harrin
Communicate, Communicate, Communicate Any change to the way in which people do their jobs should be communicated effectively. Good communication will mean that people know what is coming and how ...
( Category:
Enterprise Applications
March 1,2020 )
epub | | | Author:Unknown
And again: I know for certain that millions, I say deliberately, millions, in every civilised land are waiting for the message that will save them from the hideous abyss of ...
( Category:
Architecture
March 1,2020 )
epub |eng | 2017-12-19 | Author:Vandad Nahavandipoor
See Also Recipe 9.1 9.6 Customizing Your Document Browser Problem You want to adjust the look and feel of the document browser of type UIDocumentBrowserViewController so that it matches your ...
( Category:
Macs
March 1,2020 )
epub |eng | 2014-01-02 | Author:Christian Mohn [Mohn, Christian]
( Category:
Client-Server Systems
March 1,2020 )
epub, pdf |eng | 2013-04-14 | Author:Robb Tracy [Tracy, Robb]
Figure 8-1 The tux user’s system environment Notice that tux has his own directory in /home named tux. Within his home directory, he has a variety of subdirectories, including the ...
( Category:
Linux & UNIX Administration
March 1,2020 )
epub |eng | 2017-07-09 | Author:Mostafa Khalil [Khalil, Mostafa]
Figure 16.64 Enabling DES encryption types in an AD local computer account * * * Note You need to enable only the highest encryption type required by both the vSphere ...
( Category:
Networks, Protocols & APIs
March 1,2020 )
epub |eng | 2019-11-21 | Author:Melody Karle
Search and Browse To search in Instagram, you can click on the icon that looks like a magnifying glass. The Magnifying Glass menu option helps users explore posts and news ...
( Category:
Social Media
February 29,2020 )
epub |eng | | Author:Dafydd Stuttard, Marcus Pinto
Chapter 11 Attacking Application Logic 427 The vulnerability arose from the same kind of mistake as in the error message example described previously: the application was using static storage to ...
( Category:
Privacy & Online Safety
February 29,2020 )
epub |eng | 2016-08-29 | Author:Pialorsi, Paolo
* * * Through the Drive instance, you can also access the Owner of the drive and the Quota numbers of the current drive. For example, by leveraging the Owner ...
( Category:
NET
February 29,2020 )
epub |eng | | Author:Storment, J. R. Fuller, Mike
Serverless Computing Serverless computing is a model in which the cloud provider runs the server and dynamically manages the allocation of machine resources. Pricing is based on actual functions performed ...
( Category:
Cloud Computing
February 29,2020 )
azw3 |eng | 2017-01-18 | Author:Alexander Drogin [Drogin, Alexander]
Understanding static classes and methods All DotNet variables used in the previous recipe had to be instantiated before they could be used, which means that methods called on such variables ...
( Category:
C & C++ Windows Programming
February 29,2020 )
azw3, epub |eng | 2016-01-28 | Author:Amit Malik [Malik, Amit]
VM Role Authoring tool is published as an open source project on CodePlex. It provides an easy-to use-GUI for developing custom gallery resources for Windows Azure Pack VM Role. With ...
( Category:
Networking & Cloud Computing
February 29,2020 )
epub, pdf |eng | 2016-12-11 | Author:Steven Ovadia [Ovadia, Steven]
2. Remove it using the command line. 3. Find all of the mentions of root in the manual for sudo. 4. Use a single-line command to copy the sudo manual ...
( Category:
Email Administration
February 29,2020 )
epub |eng | | Author:Manuel Amunategui & Mehdi Roopaei
Listing 6-10Aggregating by Months Figure 6-5Month-of-the-year total reported crime counts table As expected, we have 12 groups. Let’s plot them and see what month has the most reported crime (Listing ...
( Category:
Intelligence & Semantics
February 29,2020 )
epub, pdf |eng | 2017-07-06 | Author:John Carnell [Douglas Crockford]
Figure 6.11 shows how the pre-, post, and route filters fit together in terms of processing a service client’s request. Figure 6.11. The pre-, route, and post filters form a ...
( Category:
Java
February 29,2020 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7720)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6866)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6862)
Running Windows Containers on AWS by Marcio Morales(6394)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5083)
Combating Crime on the Dark Web by Nearchos Nearchou(4660)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4645)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4349)
The Age of Surveillance Capitalism by Shoshana Zuboff(3985)
Python for Security and Networking - Third Edition by José Manuel Ortega(3904)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3569)
Learn Wireshark by Lisa Bock(3556)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3377)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3359)
Blockchain Basics by Daniel Drescher(3329)
