Networking & Cloud Computing
epub, pdf |eng | 2013-12-23 | Author:Krug, Steve [Krug, Steve]
Repeat after me: Focus groups are not usability tests. Sometimes that initial phone call is even scarier: When the last-minute request is for a focus group, it’s usually a sign ...
( Category:
User Experience & Usability
February 15,2020 )
azw3, epub |eng | 2015-03-23 | Author:Richard Freed
KIDS NEED AUTHORITATIVE PARENTING I suggest that you take your rightful place as your kids’ leader by using authoritative parenting strategies at home. How can we provide our children responsiveness ...
( Category:
Children's Studies
February 15,2020 )
Cybersecurity: Essential Guide for Beginners to Learn Basic Methods of Cybersecurity by George Henry
epub |eng | 2020-01-22 | Author:George, Henry [George, Henry]
Scan the file using anti-virus software. After scanning the file, open it. Following these simple steps can decrease the spreading of malicious code, which might be present in the attachment. ...
( Category:
Networking & Cloud Computing
February 15,2020 )
azw3, pdf |eng | 2016-01-08 | Author:Eberhard Wolff [Wolff, Eberhard]
For many messaging solutions a messaging server and therefore an additional infrastructure are required. This infrastructure has to be operated in a manner that prevents failures because failures would cause ...
( Category:
Software Development
February 15,2020 )
azw3 |eng | 2016-01-06 | Author:William Stanek [Stanek, William]
Your management tool of choice will determine your options for configuring group ownership and membership approval. When you create groups in Exchange Admin Center, you can specify ownership, membership, and ...
( Category:
Email Administration
February 15,2020 )
epub |eng | 2020-01-15 | Author:Armstrong, D [Armstrong, D]
Answer 25 You could do this: Dim filePath, fso, file, i filePath = "BigFile.html" Set fso = CreateObject("Scripting.FileSystemObject") Set file = fso.CreateTextFile(filePath, True) For i = 1 to 1000 If ...
( Category:
Windows Administration
February 13,2020 )
epub, pdf |eng | 2020-02-27 | Author:Ric Messier [Ric Messier]
Figure 6-6 VLAN ID in Windows network settings You won’t always be able to do this, though. This is a function of the driver and not of Windows. If your ...
( Category:
Networks, Protocols & APIs
February 10,2020 )
epub, pdf |eng | 2020-01-20 | Author:Dan Kottmann & Chris Patten & Tom Steele [Dan Kottmann]
( Category:
Testing
February 10,2020 )
epub |eng | | Author:Yates, Ben, Ayers, Phoebe, Matthews, Charles & Charles Matthews & Ben Yates [Phoebe Ayers]
Many complete proper names require disambiguation: John Smith, Thomas Adams, and Juan González are all examples of common names that need disambiguation pages to distinguish between individuals sharing that name. ...
( Category:
Internet, Groupware, & Telecommunications
February 10,2020 )
epub, azw3 |eng | 2018-09-03 | Author:Hillary Sanders & Joshua Saxe [Hillary Sanders]
Now suppose you want to test the detection system’s accuracy using a set of benignware and malware. You can run the detector on each binary and keep count of which ...
( Category:
Testing
February 10,2020 )
epub, pdf |eng | 2020-01-30 | Author:Silvano Gai [Silvano Gai]
( Category:
Networking & Cloud Computing
February 8,2020 )
epub |eng | 2020-02-19 | Author:Shiv Singh & Stephanie Diamond
Chapter 13 Discovering Snapchat IN THIS CHAPTER Understanding how to use Snapchat for marketing Taking advantage of Snapchat advertising Snapchat (www.snapchat.com) is a multimedia messaging app that was originally created ...
( Category:
Web Marketing
February 7,2020 )
epub |eng | 2020-01-29 | Author:Mitchell Henderson [Henderson, Mitchell]
Limiting artificial sweeteners is also a good idea when you are trying to eat healthier and lose weight. Not only are they proven to be cancer-causing agents, but they also ...
( Category:
Networking & Cloud Computing
February 6,2020 )
epub, azw3 |eng | 2020-02-05 | Author:Adam Bertram
Create and assign the user a random password Force the user to change their password at logon Set the department attribute based on the department given Assign the user an ...
( Category:
Windows Administration
February 6,2020 )
epub |eng | 2020-01-14 | Author:Todd Lammle
HTML Attacks Another new attack on the Internet scene exploits several new technologies: the Hypertext Markup Language (HTML) specification, web browser functionality, and HTTP. HTML attacks can include Java applets ...
( Category:
LAN
February 4,2020 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9814)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7811)
Grails in Action by Glen Smith Peter Ledbrook(7722)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6874)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6870)
Running Windows Containers on AWS by Marcio Morales(6401)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5088)
Combating Crime on the Dark Web by Nearchos Nearchou(4663)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4653)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4354)
The Age of Surveillance Capitalism by Shoshana Zuboff(3989)
Python for Security and Networking - Third Edition by José Manuel Ortega(3906)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3572)
Learn Wireshark by Lisa Bock(3565)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3378)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3359)
Blockchain Basics by Daniel Drescher(3330)
