Networking & Cloud Computing
epub, pdf |eng | 2018-06-21 | Author:Mike Meyers [Meyers, Mike]
( Category:
Networking & Cloud Computing
June 30,2018 )
epub |eng | 2016-06-24 | Author:Shon Harris
802.11e This standard has provided QoS and support of multimedia traffic in wireless transmissions. Multimedia and other types of time-sensitive applications have a lower tolerance for delays in data transmission. ...
( Category:
Certification
June 24,2018 )
epub |eng | 2018-05-31 | Author:Patrick Acheampong [Acheampong, Patrick]
Data collection, protection and privacy The vision for the IoT is to make our everyday lives easier and boost the efficiency and productivity of businesses and employees. The data collected ...
( Category:
Security & Encryption
June 22,2018 )
epub |eng | 2018-06-16 | Author:Cisco Networking Academy [Academy, Cisco Networking]
Cross-Site Scripting Not all attacks are initiated from the server side. Cross-site scripting (XSS) is where web pages that are executed on the client side, within their own web browser, ...
( Category:
Networking & Cloud Computing
June 22,2018 )
azw3 |eng | 2018-02-13 | Author:Don Simmons [Simmons, Don]
Sec 2.2.7 Faulty receiving radio\antenna chain– Rare but does happen. An indication of this is a successfully connected client located right next to the client that fails to connect or ...
( Category:
Networking & Cloud Computing
June 20,2018 )
azw3 |eng | 2018-02-24 | Author:Shah, Vimal & Aloosy, Yasser [Shah, Vimal]
Budget for software and hardware is not to exceed $40,000,000 Hardware cost $25,000,000 Software cost $10,000,000 Maintenance and labor $5,000,000 Budget for wireless network connection and marketing is ...
( Category:
Networking & Cloud Computing
June 20,2018 )
azw3 |eng | 2018-02-12 | Author:Steven Mann [Mann, Steven]
Usage and Health Data Collection Database Since the Usage and Health Data Collection database is very active, it should be put on a separate drive/disk/spindle. The only way to scale ...
( Category:
Networking & Cloud Computing
June 20,2018 )
azw3 |eng | 2018-02-12 | Author:Shiv Kumar Goyal [Goyal, Shiv Kumar]
Where Next question is where you want to keep backup. There two part of this question first part is device on which you want to take backup. It can be ...
( Category:
Operating Systems
June 20,2018 )
azw3, pdf |eng | 2018-02-22 | Author:Bladen, Brian [Bladen, Brian]
DuckDuckGo It may be the Tor’s default search engine but it is worth mentioning what it does. DuckDuckGo will allow you to search the web without being spied on, taking ...
( Category:
Internet & Social Media
June 19,2018 )
epub, pdf |eng | | Author:Butch Quinto
Attribute Description age Age sex Sex cp Chest pain type trestbps Resting blood pressure chol Serum cholesterol in mg/dl fbs Fasting blood sugar > 120 mg/dl restecg Resting electrocardiographic results ...
( Category:
Databases & Big Data
June 18,2018 )
epub |eng | 2012-06-18 | Author:Caroline Wong
* * * Tip There will always be events that are highly improbable and, therefore, likely to end up at the bottom of the list of priorities. These are sometimes ...
( Category:
Networking & Cloud Computing
June 18,2018 )
epub, mobi, pdf |eng | 2018-05-31 | Author:Antonio Mele [Antonio Mele]
( Category:
Programming Languages
June 16,2018 )
epub |eng | 2018-05-31 | Author:Andrew Crouthamel [Andrew Crouthamel]
( Category:
Networking & Cloud Computing
June 16,2018 )
mobi, epub |eng | | Author:2014
Based on the type of application being tested, these values should be changed. An active scan can be triggered automatically. Take a look at the following screenshot: Sometimes, we need ...
( Category:
Networking & Cloud Computing
June 16,2018 )
epub |eng | | Author:Ben Marx
Supervisors Most new Elixir developers tend to think of supervisors in terms of fault tolerance because they provide the restart strategies that are the essential part of building reliable systems. ...
( Category:
Programming
June 13,2018 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9868)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7836)
Grails in Action by Glen Smith Peter Ledbrook(7770)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6909)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6904)
Running Windows Containers on AWS by Marcio Morales(6438)
Kotlin in Action by Dmitry Jemerov(5151)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5108)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4691)
Combating Crime on the Dark Web by Nearchos Nearchou(4679)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4440)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4371)
The Age of Surveillance Capitalism by Shoshana Zuboff(3991)
Python for Security and Networking - Third Edition by José Manuel Ortega(3923)
Learn Wireshark by Lisa Bock(3601)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3593)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3535)
Mastering Python for Networking and Security by José Manuel Ortega(3378)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3366)
Blockchain Basics by Daniel Drescher(3332)
