Networking & Cloud Computing
azw3 |eng | 2015-01-31 | Author:Adamy, David L. [Adamy, David L.]
Figure 6.42Two precision emitter location sites determine a mathematically defined locus of possible emitter locations from analysis of the same signal as received at two emitter location sites that are ...
( Category:
Telecommunications & Sensors
March 30,2019 )
epub |eng | 2019-03-26 | Author:Michael Miller
Read It Before You Share It Believe it or not, more than half the people who share stories via Facebook don’t actually read the stories they share. A lot of ...
( Category:
Social Media
March 27,2019 )
epub |eng | 2018-08-12 | Author:John Arundel
In other words, labels exist to tag resources with information that’s meaningful to us, but they don’t mean anything to Kubernetes. For example, it’s common to label Pods with the ...
( Category:
Cloud Computing
March 23,2019 )
epub |eng | | Author:John Horton
Note There is still one error in the code because we are missing the return statement, which we will add when we have finished coding the rest of the method ...
( Category:
Object-Oriented Design
March 18,2019 )
epub |eng | 2019-01-31 | Author:Bekim Dauti
Figure 8.7. Printers & scanners in Devices navigation menu Within the Printers & scanners section, select the printer you want to share and click Manage (see Figure 8.8): Figure 8.8. ...
( Category:
Windows Administration
March 16,2019 )
epub |eng | 2019-03-05 | Author:Amy Webb [Webb, Amy]
2029: Comfortably Nudged With the G-MAFIA collaborating and GAIA leading to lots of new trade agreements, citizens around the world have better, cheaper access to ANI-powered products and services. GAIA ...
( Category:
Intelligence & Semantics
March 16,2019 )
epub |eng | 2017-03-27 | Author:Rajiv Chopra
3.4 CREATING A VIRTUALIZED ARCHITECTURE During virtualization, software known as a Virtual Machine Monitor (VMM) or a Hypervisor is used. What is a Hypervisor? A hypervisor is an operating system ...
( Category:
Cloud Computing
March 15,2019 )
epub |eng | 2019-01-31 | Author:Preston Miller
Writing Excel spreadsheets – xlsx_writer.py The xlsx_writer.py script contains the logic for creating an excel document containing our processed UserAssist values. In addition to this, this script also creates an ...
( Category:
Network Security
March 11,2019 )
epub |eng | | Author:Adrian Pruteanu
Since this is a custom TCP protocol, we have to intercept the traffic using Wireshark or tcpdump, as opposed to Burp or ZAP. With Wireshark running, we can capture and ...
( Category:
Hacking
March 11,2019 )
epub, azw3 |eng | 2019-01-29 | Author:Michael Hackett
( Category:
LAN
March 11,2019 )
epub |eng | 2019-01-29 | Author:Marko Sluga
( Category:
Cloud Computing
March 11,2019 )
epub, pdf |eng | 2019-01-25 | Author:Ganesh Sanjiv Naik
Appending values In this section, we are going to append values in Excel. For that, we are going to use the append() method. We can add a group of values ...
( Category:
Networks, Protocols & APIs
March 11,2019 )
mobi, epub, pdf |eng | 2014-07-08 | Author:Otavio Salvador & Daiane Angolini
Deciphering the software development kit A software development kit (SDK) is a set of tools and files used to develop and debug. These tools include compilers, linkers, debuggers, external library ...
( Category:
Systems Analysis & Design
March 9,2019 )
azw3 |eng | 2014-07-08 | Author:Salvador, Otavio & Angolini, Daiane [Salvador, Otavio]
Usually, we need to access the BitBake database when writing a Python function. A convention among all metadata is that the d variable is used to point to the BitBake's ...
( Category:
Systems Analysis & Design
March 9,2019 )
epub, pdf |eng | 2019-01-29 | Author:Ahmad Osama
Distributed Availability Groups Introduced in SQL Server 2016, a distributed availability group is a group of two separate availability groups. The two availability groups that are part of a distributed ...
( Category:
Cloud Computing
March 9,2019 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9814)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7811)
Grails in Action by Glen Smith Peter Ledbrook(7722)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6875)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6871)
Running Windows Containers on AWS by Marcio Morales(6403)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5089)
Combating Crime on the Dark Web by Nearchos Nearchou(4664)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4655)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4355)
The Age of Surveillance Capitalism by Shoshana Zuboff(3989)
Python for Security and Networking - Third Edition by José Manuel Ortega(3907)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3573)
Learn Wireshark by Lisa Bock(3567)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3378)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3359)
Blockchain Basics by Daniel Drescher(3330)
