Networking & Cloud Computing
epub |eng | 2014-04-08 | Author:Richard G. Lyons,D. Lee Fugal & D. Lee Fugal
Figure 5-20 Hypothetical analog music signal: (a) original music signal spectrum; (b) digital signal spectrum showing overlapped spectral replications; (c) contaminated spectrum of the analog playback signal from a CD. ...
( Category:
Signal Processing
April 9,2019 )
epub, azw3, pdf |eng | 2015-03-17 | Author:Christopher Hadnagy & Michele Fincher [Hadnagy, Christopher]
My Mobile Is Secure I have actually overheard someone telling another person, “If you think it's a malicious e-mail, just open it up on your <iPad/iPhone/Android device/Windows mobile device/insert other ...
( Category:
Electronic Data Interchange (EDI)
April 8,2019 )
mobi |eng | 2019-03-20 | Author:Novelli, Stefano & Silvestri, Marco [Novelli, Stefano]
Figure 23: results of a conventional Opera browser on Panopticlick 6.10.2 Defending yourself from Browser Fingerprinting If you accurately followed each single recommendation from the previous topics, your browser is ...
( Category:
Hacking
April 7,2019 )
azw3 |eng | 2018-08-20 | Author:Blank-Edelman, David N. [Blank-Edelman, David N.]
Deep learning Machine learning Developer: Google Adversary: Fan Hui But the first game that gripped the world’s attention in AI was checkers, with the pioneer Arthur Samuel, who coined the ...
( Category:
Testing
April 6,2019 )
azw3 |eng | 2017-01-05 | Author:Nadia El Mrabet & Marc Joye
parametrized by selecting an arbitrary x ∈ Z such that are both prime. Constant-time hashing to In Latincrypt 2012, Fouque and Tibouchi [25] presented a specialization of the procedure proposed ...
( Category:
Combinatorics
April 5,2019 )
epub |eng | 2015-12-23 | Author:Andrew Mallett [Mallett, Andrew]
We have provided two functions within the script. The first, is_file, simply tests to ensure that the filename we have entered is a regular file. Then we declare the clean_file ...
( Category:
Linux & UNIX Administration
April 4,2019 )
epub, pdf |eng | 2015-12-21 | Author:Jonathan Baier [Baier, Jonathan]
Listing 3-13: http-pd-controller.yaml Let's also create an external service, so we can see it from outside the cluster: apiVersion: v1 kind: Service metadata: name: http-pd labels: name: http-pd spec: type: ...
( Category:
Tools
April 4,2019 )
epub, pdf |eng | 2016-03-29 | Author:Silvio Moreto [Moreto, Silvio]
The HTML code for creating this alert is really simple: <div class="alert alert-success" role="alert"> You have made a new Tweet. </div> As mentioned before, just create an element with the ...
( Category:
Internet, Groupware, & Telecommunications
April 4,2019 )
epub, pdf |eng | | Author:Chandra, Rakesh Vidya; Varanasi, Bala Subrahmanyam
Creating an authentication Request If we remember the theme of the third chapter, we learned different kinds of authentication with requests, such as Basic authentication, Digest authentication, and OAuth authentication. ...
( Category:
Software Development
April 4,2019 )
epub |eng | 2016-03-29 | Author:Minko Gechev [Gechev, Minko]
Note In order to get platform independent reference to a DOM element, again, we can use @ContentChildren and @ViewChildren. For instance, if we have the following template: <input #todo> we ...
( Category:
Network Security
April 4,2019 )
epub |eng | 2016-10-24 | Author:Jordan Krause [Krause, Jordan]
Network Location Server This major component in a DirectAccess infrastructure is something that does not even exist on the DA server itself, or at least it shouldn't if you are ...
( Category:
Network Administration
April 4,2019 )
epub |eng | 2014-10-09 | Author:Alexandre Borges [Borges, Alexandre]
Getting ready This recipe requires three virtual machines (VirtualBox or VMware) running Oracle Solaris 11 with 4 GB RAM. It is recommended that all machines be on an isolated network ...
( Category:
Linux & UNIX Administration
April 4,2019 )
epub |eng | 2015-06-28 | Author:Raj, Pethuru & Chelladhurai, Jeeva S. & Singh, Vinod
Alternatively, you can apply the format option to the docker inspect subcommand in order to narrow down the output to very specific information. In this case, the ExposedPorts field of ...
( Category:
Linux & UNIX Administration
April 4,2019 )
mobi |eng | | Author:Second Edition
The PNG files are provided with this book in the DroidBlaster_Part6/assets directory. What just happened? Run the application and you should not see much difference. Indeed, we have loaded two ...
( Category:
Internet, Groupware, & Telecommunications
April 4,2019 )
mobi, epub |eng | | Author:A Rapid Guide to the Fundamental Features of Python
Wait. What just happened? How is this possible? As a hint, we'll need to search through the code for an object with a hidden, shared state. Earlier, we noted that ...
( Category:
Internet, Groupware, & Telecommunications
April 4,2019 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9814)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7811)
Grails in Action by Glen Smith Peter Ledbrook(7722)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6875)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6871)
Running Windows Containers on AWS by Marcio Morales(6403)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5089)
Combating Crime on the Dark Web by Nearchos Nearchou(4664)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4655)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4355)
The Age of Surveillance Capitalism by Shoshana Zuboff(3989)
Python for Security and Networking - Third Edition by José Manuel Ortega(3907)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3573)
Learn Wireshark by Lisa Bock(3567)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3378)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3359)
Blockchain Basics by Daniel Drescher(3330)
