Networking & Cloud Computing
epub |eng | 2014-04-07 | Author:Sun, Zhili
Figure 4.21 Satellite and MANET network: resource management—automatic access point activation to increase throughput Applications can be significant differences in terms of services required which imply diverse impacts on the ...
( Category:
Engineering
April 16,2018 )
azw3, pdf |eng | 2016-02-23 | Author:David L. Cannon [Cannon, David L.]
Figure 4.43 Comparison of some of the different telephone circuits Packet-Switched Circuits Packet switching evolved to eliminate the need for everyone to set up expensive dedicated lines. The Internet is ...
( Category:
Security & Encryption
April 16,2018 )
azw3 |eng | 2017-03-11 | Author:Lawrence Harte [Harte, Lawrence]
Figure 6.5, DTMF Dial Operation Flash Request A system special service request feature that is used to indicate that a subscriber has a desire to recall a service function or ...
( Category:
Engineering
April 16,2018 )
azw3 |eng | 2016-09-14 | Author:Marc Wolenik [Wolenik, Marc]
Creating the Incoming Profile To create a profile for the incoming email, open the Email Router configuration manager and click the New button on the right side of the screen. ...
( Category:
Networking & Cloud Computing
April 16,2018 )
azw3 |eng | 2016-09-15 | Author:Alex Lewis & Pat Richard & Phil Sharp & Rui Young Maximo [Lewis, Alex]
* * * When configuring a PIN policy, administrators have the following options: Minimum PIN Length—The minimum number of digits a user may use for a PIN. Only a minimum ...
( Category:
Networking & Cloud Computing
April 16,2018 )
azw3, epub, pdf |eng | 2017-10-20 | Author:John Madieu [Madieu, John]
Virtual Memory Area (VMA) The kernel uses virtual memory areas to keep track of the processes memory mappings, for example, a process having one VMA for its code, one VMA ...
( Category:
Programming
April 15,2018 )
Psychology for Designers: How to apply psychology to web design and the design process. by Joe Leech
mobi |eng | 2017-04-09 | Author:Joe Leech [Leech, Joe]
Chapter 5 ADVOCATING DESIGN USING PSYCHOLOGY The poet Keats famously complained of Isaac Newton’s experiments with light: “[Newton] has destroyed all the poetry of the rainbow, by reducing it to ...
( Category:
Networking & Cloud Computing
April 15,2018 )
epub |eng | 0101-01-01 | Author:Karimi, Hassan A. [Karimi, Hassan A.]
142 Big Data: Techniques and Technologies in Geoinformatics 7.3.1.1 Windowing in Raster Data Raster data in a geospatial context are a tessellation of the plane P often 2D into a ...
( Category:
Engineering
April 15,2018 )
azw3 |eng | 2017-08-26 | Author:Jeffry Houser & Jeffry Houser [Houser, Jeffry]
Adding a DateChooser You probably know that a DateChooser is not a native HTML control. We are going to use the Bootstrap DatePicker from the ng-bootstrap library. Earlier, we set ...
( Category:
Web Development & Design
April 15,2018 )
epub |eng | | Author:William Stanek [Stanek, William]
Cloning Virtualized Domain Controllers Windows Server 2016 includes enhancements that ensure that virtualized domain controllers work properly. After you virtualize the first domain controller in a domain, you can clone ...
( Category:
Operating Systems
April 15,2018 )
azw3 |eng | 2016-12-27 | Author:Andrew Warren [Warren, Andrew]
FIGURE 4-3 Configuring the NAT role 4. On the NAT Internet Connection page, select the appropriate network interface and then click Next. This interface must be able to communicate with ...
( Category:
Certification
April 15,2018 )
azw3 |eng | 2016-06-06 | Author:Jonathan LeBlanc & Tim Messerschmidt [LeBlanc, Jonathan]
sub Required Subject Identifier — must not exceed 255 ASCII characters aud Required The ID Token’s audience — must contain the OAuth client_id exp Required Expiration time iat Required Time ...
( Category:
Computer Science
April 15,2018 )
azw3 |eng | 2017-06-27 | Author:Ashraf Khan [Khan, Ashraf]
( Category:
Networking & Cloud Computing
April 15,2018 )
azw3 |eng | 2016-07-29 | Author:Amuthan Ganeshan [Ganeshan, Amuthan]
Now run our application and enter http://localhost:8080/webstore/market/product?id=P1000. You will see an error page showing There is no product found with the Product id P1000 as follows: Product detail page showing ...
( Category:
Programming
April 15,2018 )
azw3, mobi, epub, pdf |eng | 2017-06-28 | Author:Michael McPhee [McPhee, Michael]
Sample phishing lure, used to test employees. Every link in here is potentially tainted. Hyperlinks, graphics, anything interactive in the page or the e-mail can be a useful lure, and ...
( Category:
Security & Encryption
April 15,2018 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9868)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7836)
Grails in Action by Glen Smith Peter Ledbrook(7770)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6909)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6904)
Running Windows Containers on AWS by Marcio Morales(6438)
Kotlin in Action by Dmitry Jemerov(5151)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5108)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4691)
Combating Crime on the Dark Web by Nearchos Nearchou(4679)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4440)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4371)
The Age of Surveillance Capitalism by Shoshana Zuboff(3991)
Python for Security and Networking - Third Edition by José Manuel Ortega(3923)
Learn Wireshark by Lisa Bock(3601)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3593)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3534)
Mastering Python for Networking and Security by José Manuel Ortega(3378)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3366)
Blockchain Basics by Daniel Drescher(3332)
