Networking & Cloud Computing
epub |eng | 2018-12-18 | Author:Andrew Coburn & Éireann Leverett & Gordon Woo
7.2.2 The Origins of US Legislation The legend of the computer whiz kid is part of hacking folklore, and has also had an influence on the development of US legislation ...
( Category:
Internet & Social Media
January 22,2019 )
azw3 |eng | 2015-05-18 | Author:Froom, Richard & Frahim, Erum [Froom, Richard]
* * * Note Some devices, usually running Linux, do not send client identifiers with DHCP messages. In these cases, you can bind an IP address to a device using ...
( Category:
Networking & Cloud Computing
January 21,2019 )
mobi |eng | 2012-10-05 | Author:Crawley, Don R. [Crawley, Don R.]
Simple configuration Extremely rapid convergence due to DUAL (Diffusing Update Algorithm) Multiple protocol support (EIGRP supports IP, IPv6, IPX, and AppleTalk) Communication between routers using multicast and unicast instead of ...
( Category:
Networking & Cloud Computing
January 20,2019 )
mobi |eng | 2012-10-05 | Author:Don R. Crawley [Crawley, Don R.]
Simple configuration Extremely rapid convergence due to DUAL (Diffusing Update Algorithm) Multiple protocol support (EIGRP supports IP, IPv6, IPX, and AppleTalk) Communication between routers using multicast and unicast instead of ...
( Category:
Networking & Cloud Computing
January 20,2019 )
azw3 |eng | 2013-03-03 | Author:Young, John G. [Young, John G.]
The Anti-virus Protection Response As a base to evaluate the existing free anti-virus programs, we have been relying on an excellent study project from a non-profit Austrian organization. Though it ...
( Category:
Security & Encryption
January 20,2019 )
azw3 |eng | 2011-12-18 | Author:Grosso, by: Matthew [Grosso, by: Matthew]
10.0.0.0 - 10.255.255.255 (10/8 prefix) 172.16.0.0 - 172.31.255.255 (172.16/12 prefix) 192.168.0.0 - 192.168.255.255 (192.168/16 prefix) ^^ This is an example of a Linksys Wireless N router ^^ The first thing ...
( Category:
Networking & Cloud Computing
January 18,2019 )
epub |eng | 2018-10-28 | Author:Diana Graber
THE DOWNSIDES OF GAMING One morning Jules, a twelve-year-old boy whose sweet face makes him look barely ten, arrived early to class. I asked him how his weekend was, and ...
( Category:
Security & Encryption
January 16,2019 )
epub, azw3, pdf |eng | 2019-01-14 | Author:Shoshana Zuboff
He whose interest is centered in souls thinks, when he has forced others to speak his prayer, pronounce his creed, kneel before his altar, that he has saved their souls, ...
( Category:
Computer Science
January 16,2019 )
azw3 |eng | 2018-01-29 | Author:Tim, Mark [Tim, Mark]
69. What is Spring IoC? It stands for Inversion of Control Principle. The Spring framework is based on this principle. The dependency injection enables the IoC in the application. The ...
( Category:
Networking & Cloud Computing
January 10,2019 )
epub |eng | | Author:Python Penetration Testing Essentials
Testing the security system using custom packet crafting and injection So far, you have seen the implementation of ARP spoofing. Now, let's learn about an attack called the network disassociation ...
( Category:
Programming Languages
January 7,2019 )
azw3 |eng | 2018-04-21 | Author:Takahiro Kurose [Kurose, Takahiro]
As a result, registered product is displayed. Next, we prepare the image of the product which is used when registering the product on EC site. We download the image from ...
( Category:
Programming
January 6,2019 )
azw3 |eng | 2018-04-21 | Author:Takahiro Kurose [Kurose, Takahiro]
HTML of operation target element <input name="post_title" size="30" value="" id="title" spellcheck="true" autocomplete="off" type="text"> Automatic operation code driver.FindElement(By.Id("title")).SendKeys("This is title"); 【8】 Enter "This is content" in the content HTML of operation ...
( Category:
Programming
January 6,2019 )
epub |eng | | Author:Felipe Gutierrez
</head> <body> <div class="container"> <div class="header clearfix"> <nav> <a href="#" id="logoutLink">Logout</a> </nav> </div> <div class="jumbotron"> <h1>ToDo's Rest API</h1> <p class="lead">Welcome to the ToDo App. A Spring Boot application!</p> </div> </div> ...
( Category:
Networking & Cloud Computing
January 1,2019 )
epub, pdf |eng | | Author:Kjell Jørgen Hole
7.4 Robust Access Networks Using the above understanding of fragility to downtime in telecom infrastructures, we now consider how to make future infrastructures robust to downtime. The expected seamless integration ...
( Category:
Networking & Cloud Computing
January 1,2019 )
epub |eng | 2009-12-30 | Author:Stan Gibilisco
Practice Exercises This is an open-book quiz. You may (and should) refer to the text as you solve these problems. Don't hurry! You'll find worked-out answers in App. C. The ...
( Category:
Mathematics
December 31,2018 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9815)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7811)
Grails in Action by Glen Smith Peter Ledbrook(7724)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6899)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6895)
Running Windows Containers on AWS by Marcio Morales(6427)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5104)
Kotlin in Action by Dmitry Jemerov(5097)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4680)
Combating Crime on the Dark Web by Nearchos Nearchou(4674)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4440)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4367)
The Age of Surveillance Capitalism by Shoshana Zuboff(3990)
Python for Security and Networking - Third Edition by José Manuel Ortega(3920)
Learn Wireshark by Lisa Bock(3592)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3585)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3531)
Mastering Python for Networking and Security by José Manuel Ortega(3378)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3364)
Blockchain Basics by Daniel Drescher(3332)
