Networking & Cloud Computing
azw3 |eng | 2016-10-27 | Author:Orhan Ergun [Ergun, Orhan]
BGP Add-Path With shadow RR or shadow sessions, there are secondary IBGP sessions between RR and PEs. But the same behavior can be achieved with BGP Add-Path without an extra ...
( Category:
Networks, Protocols & APIs
February 29,2020 )
epub |eng | 2017-08-23 | Author:Michael Rothman,Vincent Zimmer,Tim Lewis [Неизв.]
Loading and Unloading UEFI Drivers Two UEFI Shell commands are available to load and start UEFI drivers, Load and LoadPciRom. The UEFI Shell command that can be used to unload ...
( Category:
Software Development
February 29,2020 )
epub |eng | 2020-01-06 | Author:Todd Miller & Ryan Ripley [Todd Miller]
( Category:
Enterprise Applications
February 29,2020 )
epub |eng | | Author:Sergei Kurgalin & Sergei Borzunov
(c) // filling the array res[] in the order in which // iterations follow in a sequential loop #pragma omp parallel ordered for(int i=0;i<ceil(log2(N));i++) res[i]=func(1.0/(i+1)); (d) // writing the values ...
( Category:
Software Development
February 29,2020 )
epub |eng | 2018-11-29 | Author:Lim Mei Ying [Lim Mei Ying]
( Category:
Enterprise Applications
February 28,2020 )
epub |eng | 2015-02-27 | Author:Lena Wiese
fig 8.6. Compaction on disk 8.2.4 Compaction After some time, several flushes of memtables will have occurred and hence there will be quite a lot of data files stored on ...
( Category:
Total Quality Management
February 28,2020 )
epub |eng | 2019-07-07 | Author:Neal Davis [Davis, Neal]
There is no need to make any changes as all environment variables are encrypted by default with AWS Lambda Use encryption helpers that leverage AWS Key Management Service to store ...
( Category:
Client-Server Systems
February 28,2020 )
epub |eng | 2019-10-27 | Author:Sherri Davidoff [Sherri Davidoff]
( Category:
Networks, Protocols & APIs
February 28,2020 )
epub, pdf |eng | 2019-12-17 | Author:Grig Gheorghiu & Alfredo Deza & Kennedy Behrman & Noah Gift [Grig Gheorghiu]
( Category:
Software Development
February 28,2020 )
epub |eng | 2012-11-02 | Author:Dobkin, Daniel M.
We can use the tools introduced in section (2) above to understand in a semi-quantitative way what antenna configurations make sense. For example, in the portal configuration of Figure 6.21, ...
( Category:
Circuits
February 28,2020 )
epub |eng | | Author:Sébastien Ziegler
The initial UPRAAM model developed in Privacy Flag was including about 150 checks and controls, defined to assess the compliance with most applicable data protection obligations. However, this initial theoretical ...
( Category:
Electronics
February 28,2020 )
epub |eng | 2016-01-26 | Author:Scott Malcomson [Malcomson, Scott]
[T]he Administration will support removal, over time, under appropriate conditions, of judicial and legislative restrictions on all types of telecommunications companies: cable, telephone, utilities, television and satellite . … Our ...
( Category:
Internet, Groupware, & Telecommunications
February 28,2020 )
epub, pdf |eng | 2019-02-27 | Author:Abhik Chaudhuri
Ramaswami, A., Russell, A. G., Culligan, P. J., Sharma, K. R., & Kumar E. (2016). Meta-principles for developing smart, sustainable, and healthy cities. Science, 352(6288), 940–943. Robert, J., Kubler, S., ...
( Category:
Networking & Cloud Computing
February 28,2020 )
epub |eng | 2010-05-10 | Author:Goldstein, Emmanuel
Enough, Phiber, now tell me about the switch! OK, OK. The two most common GSM switches are the Ericsson AXE MSC, based on the AXE 10, and the Nortel DMS-MSC, ...
( Category:
Hacking
February 28,2020 )
epub |eng | | Author:Sweeney, Patrick J.
Choosing a Hand-held, Mobile, or Fixed-location Reader You can choose from three types of readers for your RFID network: hand-held, mobile, or fixed-location. Many criteria enter into this decision, including ...
( Category:
Manufacturing
February 28,2020 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7720)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6866)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6862)
Running Windows Containers on AWS by Marcio Morales(6394)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5083)
Combating Crime on the Dark Web by Nearchos Nearchou(4660)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4645)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4349)
The Age of Surveillance Capitalism by Shoshana Zuboff(3985)
Python for Security and Networking - Third Edition by José Manuel Ortega(3904)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3569)
Learn Wireshark by Lisa Bock(3556)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3377)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3359)
Blockchain Basics by Daniel Drescher(3329)
