Networking & Cloud Computing
mobi, epub |eng | 2016-05-30 | Author:Linux Journal
Microstar Laboratories, Inc.’s Accel64 for Linux Microstar Laboratories, Inc., develops Data Acquisition Processor (DAP) systems for PC-based high-performance multichannel measurement applications. Microstar observes that GNU/Linux distributions generally presume that if ...
( Category:
Linux & UNIX Administration
September 2,2019 )
mobi, epub |eng | 2018-05-30 | Author:Linux Journal
$ sudo cryptsetup luksOpen /dev/sda1 crypt-sda1 $ sudo mkfs -t ext4 /dev/mapper/crypt-sda1 Now the drive is ready to be mounted, but the next time the system reboots it won't mount ...
( Category:
Linux & UNIX Administration
September 2,2019 )
mobi, epub |eng | 2014-05-28 | Author:Linux Journal
Please send information about releases of Linux-related products to [email protected] or New Products c/o Linux Journal, PO Box 980985, Houston, TX 77098. Submissions are edited for length and content. FEATURES ...
( Category:
Linux & UNIX Administration
September 2,2019 )
mobi, epub |eng | 2017-05-28 | Author:Linux Journal
Shawn Powers is the Associate Editor for Linux Journal. He’s also the Gadget Guy for LinuxJournal.com, and he has an interesting collection of vintage Garfield coffee mugs. Don’t let his ...
( Category:
Linux & UNIX Administration
September 2,2019 )
mobi, epub |eng | 2013-05-29 | Author:Linux Journal
Erica Sadun and Steve Sande’s Pitch Perfect: The Art of Promoting Your App on the Web (Addison-Wesley) You’re about to pour your heart, soul, skill...and savings, into creating the next ...
( Category:
Linux & UNIX Administration
September 2,2019 )
epub, pdf |eng | 2013-02-18 | Author:Hughes, Cameron & Hughes, Tracey & Watkins, Trevor & Kramer, Bob
A Basic READ Set for D1R1, D1R2, and D3C1 We actually have to look at the capability matrix and the READ set at the same time to decide which robots ...
( Category:
Mobile & Wireless
August 31,2019 )
epub |eng | 2015-07-14 | Author:Ben Spivey & Joey Echeverria
Tip Using WITH GRANT OPTION is a great way to ease the administration burden on a global SQL administrator. A common example is to create a Hive database for a ...
( Category:
Data Processing
August 31,2019 )
epub, pdf |eng | 2019-09-11 | Author:Amy Lupold Bair
Deleting comments Unfortunately, not all the comments on your blog are fun to read or even should stay on your blog. When it comes right down to it, you control ...
( Category:
Blogging & Blogs
August 29,2019 )
epub |eng | 2019-08-26 | Author:Frank Abagnale
Rootkits: This is a collection of malicious and clandestine computer software that gives unauthorized users or criminals access to a computer and areas of its software system. It’s often installed ...
( Category:
Retirement Planning
August 28,2019 )
epub |eng | 2019-06-25 | Author:Daniel W. Dieterle [Dieterle, Daniel W.]
All instructions on how to use Pi-Tail for different connection techniques are covered in the Pi-Tail How To: https://github.com/Re4son/RPi-Tweaks/blob/master/pi-tail/Pi-Tail.HOWTO Additional Tips here: https://github.com/Re4son/RPi-Tweaks/blob/master/pi-tail/Pi-Tail.README Follow the Pi-Tail instructions carefully, as there ...
( Category:
Network Security
August 24,2019 )
azw3 |eng | 2019-06-30 | Author:Dieterle, Daniel [Dieterle, Daniel]
All instructions on how to use Pi-Tail for different connection techniques are covered in the Pi-Tail How To: https://github.com/Re4son/RPi-Tweaks/blob/master/pi-tail/Pi-Tail.HOWTO Additional Tips here: https://github.com/Re4son/RPi-Tweaks/blob/master/pi-tail/Pi-Tail.README Follow the Pi-Tail instructions carefully, as there ...
( Category:
Network Security
August 24,2019 )
epub, pdf |eng | 2019-02-19 | Author:Abraham Silberschatz [Silberschatz, Abraham]
( Category:
Network Administration
August 21,2019 )
epub |eng | 2019-07-13 | Author:Jim Kou [Kou, Jim]
This list is not complete, also considering that the steps we should take depend on our target. However, you can use this list as a good starting point. GOOGLE HACKING ...
( Category:
Expert Systems
August 19,2019 )
epub |eng | | Author:Sunil Cheruvu & Anil Kumar & Ned Smith & David M. Wheeler
In addition to thread execution priorities used to enforce time separation of threads, Zephyr assigns a thread privilege to each thread. There are only two privileges, supervisory and user. By ...
( Category:
Network Security
August 18,2019 )
epub |eng | 2019-07-01 | Author:Jeremy Fairbank [Jeremy Fairbank]
( Category:
Tools
August 14,2019 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9814)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7811)
Grails in Action by Glen Smith Peter Ledbrook(7722)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6874)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6870)
Running Windows Containers on AWS by Marcio Morales(6401)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5088)
Combating Crime on the Dark Web by Nearchos Nearchou(4663)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4653)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4354)
The Age of Surveillance Capitalism by Shoshana Zuboff(3989)
Python for Security and Networking - Third Edition by José Manuel Ortega(3906)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3572)
Learn Wireshark by Lisa Bock(3565)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3378)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3359)
Blockchain Basics by Daniel Drescher(3330)
