Networking & Cloud Computing
epub |eng | 2018-07-30 | Author:IP Specialist [Specialist, IP]
Chapter 5: Data Management Disaster Recovery Disaster recovery (DR) is about preparing for and recovering from a disaster. A disaster is an event that has a negative impact on a ...
( Category:
Networking & Cloud Computing
December 11,2018 )
epub |eng | 2018-07-29 | Author:Tony Hsu [Hsu, Tony]
Security-testing plan templates The testing plan defines the security baselines to achieve the business objective, testing approach, tools, and risk analysis. Depending on the business of the application, it's also ...
( Category:
Software
December 11,2018 )
epub |eng | 2016-12-30 | Author:Desjardins, Patrick
Release Date: 19-Jun-13 Url: http://patrickdesjardins.com/blog/?post_type=post&p=1888 In some scenarios you will want to update a specific property but not others. This can be for security reasons or for performance reasons. In ...
( Category:
Programming
December 11,2018 )
epub |eng | 2018-07-28 | Author:Shabda Raaj [Raaj, Shabda]
Created a mapping of tenants to schemas Set the tenant specific schema in middleware In this chapter, we will Use request header to find the tenant Create a mapping of ...
( Category:
Programming Languages
December 11,2018 )
epub |eng | 2016-04-12 | Author:Coll, Eric
Figure 103. OFDM In the simplest implementation, illustrated in Figure 103, the incoming bits are used to turn subcarriers on or off, splitting the incoming bit stream at a rate ...
( Category:
Engineering
December 11,2018 )
epub |eng | | Author:Nancy Hendrickson
“The Gentleman’s Magazine Library, 1731–1868” collection contains this description of Uffington, an ancient site in Britain. The Periodicals & Magazines category includes published genealogies that may include information about your ...
( Category:
Genealogy
December 11,2018 )
epub |eng | 2018-07-24 | Author:Ganapathi Pulipaka [Pulipaka, Ganapathi]
Facebook artificial intelligence group also developed a special open source library as part of Torch deep learning toolkit dubbed torch-rnnlib. This open source library allows developing newer recurrent network models ...
( Category:
Programming Languages
December 11,2018 )
epub, pdf |eng | 2016-12-10 | Author:Alasdair Gilchrist
However, upgrades are very risky; –Loss of power – Should the device, especially an IoT device lose power half why through a Firmware upgrade it could result in bricking the ...
( Category:
Internet & Social Media
December 11,2018 )
epub |eng | 2018-07-24 | Author:Richard Luckett, William Lefkovics, Bharat Suneja
( Category:
Networking & Cloud Computing
December 11,2018 )
epub |eng | 2017-12-10 | Author:Markus Mueck
4.3Communications There are two implementation areas where V2X communications has got an impact, intra-vehicle networking and connectivity and outside vehicle networking and connectivity. There is a steadily rising request for ...
( Category:
Engineering
December 11,2018 )
epub |eng | 2018-06-13 | Author:karina astudillo
( Category:
Internet & Social Media
December 10,2018 )
epub |eng | 2018-07-12 | Author:Mike Meyers & Jonathan S. Weissman [Meyers, Mike]
( Category:
Networking & Cloud Computing
December 10,2018 )
epub |eng | 2018-07-09 | Author:Joe Dockery & Rob Schwartz & Conrad Chavez [Dockery, Joe]
Obtaining model releases The purpose of a model release is to legally affirm that you have permission to depict the people in your video. It’s called a release because it ...
( Category:
Networking & Cloud Computing
December 10,2018 )
epub |eng | 2018-07-08 | Author:Brian Brazil [Brazil, Brian]
Finally, the custom collector object is instantiated and registered with the default registry, in the same way you would one of the direct instrumentation metrics: c := ConsulCollector{} prometheus.MustRegister(c) Exposition ...
( Category:
Networking & Cloud Computing
December 10,2018 )
epub |eng | 2018-07-05 | Author:Harri Holma, Antti Toskala
( Category:
Engineering
December 10,2018 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9814)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7811)
Grails in Action by Glen Smith Peter Ledbrook(7722)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6884)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6876)
Running Windows Containers on AWS by Marcio Morales(6408)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5096)
Kotlin in Action by Dmitry Jemerov(5094)
Combating Crime on the Dark Web by Nearchos Nearchou(4668)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4664)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4359)
The Age of Surveillance Capitalism by Shoshana Zuboff(3990)
Python for Security and Networking - Third Edition by José Manuel Ortega(3910)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3577)
Learn Wireshark by Lisa Bock(3575)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3531)
Mastering Python for Networking and Security by José Manuel Ortega(3378)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3359)
Blockchain Basics by Daniel Drescher(3331)
