Networking & Cloud Computing
epub |eng | 2018-07-24 | Author:Betsy Beyer
What Is NALSD? This chapter presents a NALSD approach: we begin with the problem statement, gather requirements, and iterate through designs that become increasingly sophisticated until we reach a viable ...
( Category:
Networking & Cloud Computing
September 18,2018 )
azw3 |eng | 2017-01-25 | Author:Christian Czarnecki & Christian Dietze [Czarnecki, Christian]
Process Layer The process layer is structured according to the reference model eTOM, which provides a specific recommendation for the telecommunications industry. On a high level, processes are differentiated into ...
( Category:
Processes & Infrastructure
September 15,2018 )
epub |eng | 2018-09-13 | Author:Matt Burrough
Accessing Queues Azure Storage queues provide a place to line up transactions and process them sequentially as resources become available. Mainly software developers use queues; after all, few people other ...
( Category:
Internet & Social Media
September 14,2018 )
epub |eng | 2018-08-20 | Author:Bruce Schneier
THE US WILL DO NOTHING SOON As you read the previous four chapters, you might have found it easy to accuse me of painting a nightmare and responding with daydreams—that ...
( Category:
Security & Encryption
September 14,2018 )
epub |eng | 2015-08-29 | Author:Henderson, Lance
After that monstrosity, I hatched a scheme of hunting the author down with a rather twisted colleague of mine. That colleague is a genius when it comes to pranks, some ...
( Category:
Security & Encryption
September 13,2018 )
azw3 |eng | 2011-08-17 | Author:Pfleeger, Charles P. & Pfleeger, Shari Lawrence [Pfleeger, Charles P.]
Reconfiguring the architecture of a network limits or complicates movement, but it does not address the central security goal of controlled access. To accomplish that we depend on a device ...
( Category:
Security & Encryption
September 10,2018 )
azw3 |eng | 2011-08-17 | Author:Charles P. Pfleeger & Shari Lawrence Pfleeger [Pfleeger, Charles P.]
Reconfiguring the architecture of a network limits or complicates movement, but it does not address the central security goal of controlled access. To accomplish that we depend on a device ...
( Category:
Security & Encryption
September 10,2018 )
epub |eng | | Author:Wong, Wei Ning Zechariah, Shi, Jianping
Storage and disposal The essence of an effective documentation management process is to ensure the constant availability of key BCM documents. Like other organizational activities, the BCMS is a document-driven ...
( Category:
Management & Leadership
September 10,2018 )
azw3, pdf |eng | 2015-01-22 | Author:Steve Suehring [Suehring, Steve]
NAT Semantics with iptables and nftables Both iptables and nftables provide full NAT functionality, including both source (SNAT) and destination (DNAT) address mapping. The term full NAT isn’t a formal ...
( Category:
Operating Systems
September 10,2018 )
epub |eng | | Author:Wendell Odom
QoS ECG.book Page 347 Tuesday, October 19, 2004 1:40 PM Traffic Policing and Traffic Shaping Concepts 347 Figure 6-5 Mechanics of Traffic Shaping—128-kbps AR, 64-kbps Shaped Rate Send packets for ...
( Category:
Networking & Cloud Computing
September 7,2018 )
epub |eng | 2018-07-23 | Author:Brian Brazil
for _, g := range metrics.Gauges { name := invalidChars.ReplaceAllLiteralString(g.Name, "_") desc := prometheus.NewDesc(name, "Consul metric "+g.Name, nil, nil) ch <- prometheus.MustNewConstMetric( desc, prometheus.GaugeValue, float64(g.Value)) } Processing of counters is ...
( Category:
Programming
September 6,2018 )
epub |eng | 2013-07-23 | Author:Jeff Stibel [Stibel, Jeff]
Nine Pheromones | Language | Mirrors Despite their minimal brainpower and inability to speak, ants are remarkably good at communicating, which they do automatically through scent. Their bodies are covered ...
( Category:
Skills
September 6,2018 )
epub |eng | 2018-06-21 | Author:Shyam Seshadri
ng g service services/stock This will generate two files, a skeleton stock-service.ts and a dummy test for it in stock-service.spec.ts. We will ignore the latter for now but will return ...
( Category:
Web Development & Design
September 4,2018 )
azw3 |eng | 2012-10-18 | Author:Richard Newbold [Newbold, Richard]
( Category:
Networking & Cloud Computing
September 4,2018 )
epub |eng | | Author:Susan McLean
Last year I moved to high school, and from only having eighteen people in my year to nearly one hundred, it was a change I wasn’t prepared for. Many things ...
( Category:
Security & Encryption
August 31,2018 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(11877)Grails in Action by Glen Smith Peter Ledbrook(9165)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(8808)
Azure Containers Explained by Wesley Haakman & Richard Hooper(7445)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(7437)
Kotlin in Action by Dmitry Jemerov(7263)
Running Windows Containers on AWS by Marcio Morales(6988)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5402)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(5213)
Combating Crime on the Dark Web by Nearchos Nearchou(4982)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4671)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4527)
Python for Security and Networking - Third Edition by José Manuel Ortega(4234)
The Age of Surveillance Capitalism by Shoshana Zuboff(4210)
Learn Wireshark by Lisa Bock(4123)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3888)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3681)
DevSecOps in Practice with VMware Tanzu by Parth Pandit & Robert Hardt(3569)
Windows Ransomware Detection and Protection by Marius Sandbu(3543)
Blockchain Basics by Daniel Drescher(3507)