Networking & Cloud Computing
epub |eng | 2015-08-07 | Author:Bruce Schneier [Schneier, Bruce]

16 Social Norms and the Big Data Trade-off In the preceding three chapters, I outlined a lot of changes that need to happen: changes in government, corporate, and individual behavior. ...
( Category: Politics & Government August 8,2018 )
epub |eng | 2017-04-13 | Author:Jeffrey Aven [Jeffrey Aven]

Figure 13.5 Loading an RDD From a Text File in a Distributed Filesystem. RDDs can also be loaded from other data sources such as relational databases using a JDBC interface, ...
( Category: Databases & Big Data August 8,2018 )
epub, pdf |eng | 2016-07-12 | Author:Siraj Raval

'ipfs init' This will take a few seconds; it’s adding bootstrapped (hardcoded) peers to your configuration and giving your node an identity key-pair to identify as a peer to the ...
( Category: Security & Encryption August 7,2018 )
azw3, mobi, epub |eng | 2017-04-12 | Author:Tiana Laurence [Laurence, Tiana]

Developing mobile apps Skip this section if you aren’t part of the app development space. Iroha is built for the web and mobile app developers so they can access the ...
( Category: Databases & Big Data August 7,2018 )
mobi |eng | 2016-01-29 | Author:Tarun Arora

Download the StampBuildNumber.ps1 script provided in the course material. Check-in the StampBuildNumber.ps1 script into the script folder as illustrated in this screenshot: Permissions: You'll need to edit build definition permissions ...
( Category: Software August 6,2018 )
epub |eng | | Author:Robert Jones [Jones, Robert]

Additional Information: The term "club drugs" is often used to loosely categorize recreationally abused drugs associated with their places of use rather than by their pharmaceutical properties. Typical of such ...
( Category: Internet & Social Media August 3,2018 )
epub |eng | 2015-12-23 | Author:Steve Martinelli, Henry Nash, Brad Topol

GET /v3/users/d19cac8f7ef3e6de36a47b85f306f137 How will Keystone know which domain/LDAP server to talk to in order to find this user? For performance reasons, searching them all is not a viable option. This ...
( Category: Programming July 31,2018 )
epub, pdf |eng | 2015-07-19 | Author:Edward Bailey [Bailey, Edward]

In the end, there are some tips that are popular among graphic designers: e.g. to make it seem like a certain object is in flames or exploding text light effect. ...
( Category: Graphics & Design July 29,2018 )
epub, azw3, mobi |eng | 2014-11-21 | Author:Roger Barga & Valentine Fontama & Wee Hyong Tok [Barga, Roger]

Decision Trees Decision tree algorithms are hierarchical techniques that work by splitting the dataset iteratively based on certain statistical criteria. The goal of decision trees is to maximize the variance ...
( Category: Software July 29,2018 )
epub, pdf |eng | 2013-10-30 | Author:Balaji Varanasi [Varanasi, Balaji]

LDAP INJECTION LDAP injection is a technique where an attacker alters an LDAP query to run arbitrary LDAP statements against the directory server. LDAP injection can result in unauthorized data ...
( Category: Programming July 29,2018 )
epub |eng | 2014-01-09 | Author:Collier, Marsha [Collier, Marsha]

Selecting a category Many eBay sellers will tell you that selecting the exact category isn't crucial to achieving the highest price for your item — and they're right. The bulk ...
( Category: Internet & Social Media July 29,2018 )
epub, pdf |eng | 2011-07-10 | Author:Marsha Collier

Figure 10-1: Let eBay do some of the work in finding the proper category for your item. You can also browse the categories by clicking (surprise!) the Browse Categories tab ...
( Category: Internet & Social Media July 29,2018 )
epub |eng | 2018-07-20 | Author:Harinder Kohli [Kohli, Harinder]

( Category: Certification July 27,2018 )
epub |eng | 2018-07-19 | Author:Omar Santos [Santos, Omar]

NIST SP 800-46, R2 “Guide to Enterprise Telework, Remote Access and Bring Your Own Device Security,” provides information on security considerations for several types of remote access solutions, and it ...
( Category: Networking & Cloud Computing July 27,2018 )
epub |eng | 2018-07-19 | Author:William Stallings [Stallings, William]

Compliance: IM use at [Company Name] will comply with, all [Company Name] policies, all [Company Name] contracts and all applicable laws. Privacy: IM conversations and messages created on the corporate ...
( Category: Networking & Cloud Computing July 27,2018 )