Networking & Cloud Computing
epub |eng | 2009-08-09 | Author:Gibilisco, Stan
A SIMPLE TRANSMITTER Figure 6-4 is a block diagram of a simple modulated-light voice transmitter that can be built for a few dollars using parts available from electronics supply houses. ...
( Category:
Telecommunications & Sensors
August 10,2019 )
epub |eng | 2016-05-09 | Author:Don Tapscott & Alex Tapscott
THE TWELVE DISRUPTIONS: ANIMATING THINGS What possibilities are there for animating the physical world? Unlike Pinocchio, we don’t have a Blue Fairy. (And unlike Pinocchio, the blockchain doesn’t lie.) But ...
( Category:
Digital Currencies
August 9,2019 )
epub |eng | 1997-08-05 | Author:Behrouz A. Forouzan
*/ void getData ( int int int k b, "c ) { /* Statements */ printf( "Please enter coefficients a, scanf ( "%d%d%d", a, b, c ) ; b, & ...
( Category:
Networks
August 6,2019 )
epub |eng | 2010-08-31 | Author:Frank M. Ahearn
ABANDONMENT If you’re leaving a husband, wife, or kids, I hope you’re doing it the right way (if there is a right way) by finding a lawyer and giving them ...
( Category:
Privacy & Online Safety
August 3,2019 )
azw3, epub |eng | 2019-01-18 | Author:Paul Rosenberg
And here’s some explanatory dialog from the site: Mailvault was our first success and it was used fairly widely in those days. We were proud of it, and justifiably, I ...
( Category:
Internet, Groupware, & Telecommunications
August 2,2019 )
epub |swe | 1656-03-15 | Author:Valery Kholodkov; [Kholodkov;, Valery]
Choosing an outbound IP address Sometimes, when your proxy server has multiple network interfaces, it becomes necessary to choose which IP address should be used as outbound address for upstream ...
( Category:
Internet, Groupware, & Telecommunications
August 1,2019 )
epub |eng | 2018-03-18 | Author:Peter H. Gregory [Peter H. Gregory]
NOTE It is typically not the auditor’s role to describe how an audit finding should be remediated. Deciding the methods used to apply remediation is the role of auditee management. ...
( Category:
Network Security
July 30,2019 )
epub |eng | 2018-07-27 | Author:Sravani Bhattacharjee
Definitions – networking, communications, and connectivity The terms networking, communications, and connectivity are often used interchangeably, although these terms do have context-specific differences. For the sake of clarity, in this ...
( Category:
Network Security
July 24,2019 )
epub |eng | | Author:Brian P. Hogan
Handling .bash_profile As you learned earlier in this section, the .bashrc file isn’t read by macOS and might not be read on other systems. The best solution is to tell ...
( Category:
Software Development
July 23,2019 )
epub, pdf |eng | 2019-06-20 | Author:Alan D. Moore
( Category:
Internet, Groupware, & Telecommunications
July 23,2019 )
epub |eng | 2017-04-24 | Author:Lucas Chan
Each entry in the log will contain useful information, such as: The service that was called The action that was requested The parameters sent with the request The response that ...
( Category:
Linux & UNIX Administration
July 19,2019 )
epub, pdf |eng | 2019-07-16 | Author:Peter H. Gregory [Peter H. Gregory]
CHAPTER 4 Information Security Program Development and Management This domain includes questions from the following topics: • Benefits and outcomes from an information risk management perspective • Risk assessment and ...
( Category:
Network Security
July 18,2019 )
epub |eng | 2018-11-28 | Author:Earl Waud [Earl Waud]
( Category:
Software Development
July 17,2019 )
epub |eng | 2015-07-15 | Author:Sean P. Murphy
Containment, Eradication, and Recovery Phase There is probably no other responsibility of the incident response team that is more important than evidence collection and preservation, which happens primarily in containment. ...
( Category:
Cryptography
July 16,2019 )
epub |eng | 2019-07-02 | Author:Mark Wilkins [Mark Wilkins]
( Category:
Client-Server Systems
July 14,2019 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9814)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7811)
Grails in Action by Glen Smith Peter Ledbrook(7722)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6874)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6870)
Running Windows Containers on AWS by Marcio Morales(6401)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5088)
Combating Crime on the Dark Web by Nearchos Nearchou(4663)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4653)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4354)
The Age of Surveillance Capitalism by Shoshana Zuboff(3989)
Python for Security and Networking - Third Edition by José Manuel Ortega(3906)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3572)
Learn Wireshark by Lisa Bock(3565)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3378)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3359)
Blockchain Basics by Daniel Drescher(3330)
