Networking & Cloud Computing
epub |eng | 2015-02-08 | Author:Swan, Melanie [Swan, Melanie]
Blockchain Genomics 2.0: Industrialized All-Human-Scale Sequencing Solution At one level, there could be blockchain-enabled services where genomic data is sequenced and made available to individuals by private key outside the ...
( Category:
Cryptography
May 10,2019 )
epub |eng | 2019-04-21 | Author:Carl Albing & Paul Troncone [Carl Albing]
( Category:
Testing
May 9,2019 )
epub |eng | 2015-05-09 | Author:Wright, Joshua
* * * A sample packet capture of a Fitbit One device that can be displayed using the SmartRF Packet Sniffer software (without the CC2540 USB hardware) is available on ...
( Category:
Cryptography
May 9,2019 )
epub |eng | 2019-03-25 | Author:J. David Eisenberg [J. David Eisenberg]
( Category:
Internet, Groupware, & Telecommunications
May 8,2019 )
epub |eng | 2014-05-08 | Author:Scott Valentine
( Category:
Adobe Photoshop
May 8,2019 )
epub |eng | 2010-07-14 | Author:Nemeth, Evi & Snyder, Garth & Hein, Trent R. & Whaley, Ben [Nemeth, Evi]
generate for example.com a 1,024-bit ZSK pair that uses the RSA and SHA-1 algorithms and a corresponding 2,048-bit KSK pair.30 The outstanding issue of UDP packet size limits suggests that ...
( Category:
Linux & UNIX Administration
May 7,2019 )
epub, pdf |eng | 2019-05-03 | Author:Kalle Rosenbaum [Kalle Rosenbaum]
( Category:
Cryptography
May 7,2019 )
epub |eng | 2018-12-17 | Author:Stanley Siegel & Chris Williams & Scott Donaldson [Stanley Siegel]
Guarding Against Counterfeit E-Mails and Secure E-Mail Because e-mail protocols are inherently insecure, it may be possible for attackers to generate and send counterfeit e-mails. Counterfeit e-mails may appear to ...
( Category:
Hacking
May 6,2019 )
epub |eng | 2019-03-26 | Author:Gabriel N. Schenker
//run docker pull to download CentOS docker image $ docker pull centos Using default tag: latest latest: Pulling from library/centos d9aaf4d82f24: Pull complete Digest: sha256:4565fe2dd7f4770e825d4bd9c761a81b26e49cc9e3c9631c58cfc3188be9505a Status: Downloaded newer image for ...
( Category:
Software Development
May 6,2019 )
epub |eng | 2019-03-29 | Author:Mustafa Toroman
Getting ready Before you start, open a web browser and go to the Azure portal at https://portal.azure.com. How to do it... In order to modify local network gateway settings, we ...
( Category:
Enterprise Applications
May 6,2019 )
epub |eng | 2019-03-29 | Author:Shivakumar Gopalakrishnan
kubectl delete -f guestbook-all-in-one.yaml Congratulations, you have completed the upgrade! Helm upgrade This section will explain how to perform upgrades using helm operators in a similar way: Run the following ...
( Category:
Enterprise Applications
May 6,2019 )
epub |eng | 2016-05-04 | Author:Mohammad S Obaidat & Petros Nicopolitidis
Figure 10.5 Computing Optimal Policy for the Two-Smart Meter Examples As is discussed previously, the decision maker aims to choose the action with the maximum discounted expected reward. Assume the ...
( Category:
Mobile & Wireless
May 5,2019 )
epub |eng | 2019-03-25 | Author:Ted Hunter
( Category:
Cloud Computing
May 5,2019 )
epub |eng | 2019-03-29 | Author:Ajit Pratap Kundan
BIG-IP DNS assists with various kinds of queries when the A type query is used extensively. A BIG-IP DNS gets a query by matching the domain name and type with ...
( Category:
Intelligence & Semantics
May 4,2019 )
epub |eng | 2019-02-14 | Author:Roman Zabicki [Roman Zabicki]
( Category:
Hacking
May 3,2019 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9814)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7811)
Grails in Action by Glen Smith Peter Ledbrook(7722)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6879)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6873)
Running Windows Containers on AWS by Marcio Morales(6406)
Kotlin in Action by Dmitry Jemerov(5094)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5093)
Combating Crime on the Dark Web by Nearchos Nearchou(4666)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4661)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4357)
The Age of Surveillance Capitalism by Shoshana Zuboff(3989)
Python for Security and Networking - Third Edition by José Manuel Ortega(3909)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3575)
Learn Wireshark by Lisa Bock(3572)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3378)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3359)
Blockchain Basics by Daniel Drescher(3330)
