Networking & Cloud Computing
azw3, pdf |eng | 2017-10-17 | Author:Abhishek Mishra [Mishra, Abhishek]
In Chapter 12 you modified the AWSChat application to allow logged-in users to create a list of friends. In this lesson you modify the AWSChat app to allow friends to ...
( Category:
Programming
April 1,2018 )
azw3 |eng | 2017-10-10 | Author:Jason R. Rich [Rich, Jason R.]
* * * Note-Taking in Evernote Evernote is designed to be a note-taking and information-gathering tool. Regardless of which version of Evernote you’re using, you can compose or collect content ...
( Category:
Networking & Cloud Computing
April 1,2018 )
azw3 |eng | 2017-03-22 | Author:Lawrence Harte [Harte, Lawrence]
Figure 1.28., CDMA Product Types CDMA Network The CDMA system includes a Base Stations (BS), various data processing functions, and a data distribution network. The CDMA network is also called ...
( Category:
Engineering
April 1,2018 )
azw3 |eng | 2017-04-18 | Author:Gary McLean Hall [McLean Hall, Gary]
What you are aiming to achieve is to make it easier to add a new account type while improving the readability of the code. For this, you will take advantage ...
( Category:
Networking & Cloud Computing
April 1,2018 )
epub |eng | 2017-05-23 | Author:Ramón Egido García & Antonio Martín Sierra [Egido García, Ramón]
( Category:
Programming Languages
April 1,2018 )
epub |eng | 2012-11-27 | Author:Itzik Ben-Gan, Dejan Sarka & Ron Talmage [Itzik Ben-Gan, Dejan Sarka, and Ron Talmage]
( Category:
Databases & Big Data
April 1,2018 )
azw3, epub |eng | 2017-10-13 | Author:Anthony D'Atri & Vaibhav Bhembre & Karan Singh [D'Atri, Anthony]
By slicing and dicing Ceph log files and emitting CSV files ready for importing into a spreadsheet, these scripts help collate thousands of messages across hours or days so that ...
( Category:
Hardware & DIY
April 1,2018 )
azw3 |eng | 2016-05-27 | Author:Wasim Ahmed [Ahmed, Wasim]
broadcast or Mode 3 Broadcast Transmission takes place on all participating bonded network interfaces. This provides fault tolerance only. 802.3ad or Mode 4 Dynamic link aggregation All participating network interfaces ...
( Category:
Hardware & DIY
April 1,2018 )
azw3, pdf |eng | 2017-08-29 | Author:Laurie Wolk [Wolk, Laurie]
Collaborative Approach Life is all about relationships, and that requires being able to get along with people from all walks of life. The role of a leader is not to ...
( Category:
Parenting
April 1,2018 )
azw3 |eng | 2016-11-25 | Author:Carrie Ewin & Chris Ewin & Cheryl Ewin [Ewin, Carrie]
If the post has a photo, you can see it at full size by clicking the photo once. Click the X in the top-right corner of the photo to close ...
( Category:
Internet & Social Media
April 1,2018 )
epub |eng | 2013-04-01 | Author:Wendell Odom
J-K jitter, 128 just-left octet, 551 keyboard shortcuts, command help, 183 knowledge gaps, discovering through question review, 826-828 L L3PDUs, 38, 95 L4PDUs, 122 labs Config Museum labs, 830 practicing ...
( Category:
Certification
April 1,2018 )
epub |eng | 2013-11-21 | Author:Ertem Osmanoglu
Authentication Implementation Approaches Authentication infrastructure is made complex by the need to cover multiple locations; a variety of customer and employee devices; network, email, database, application, and Web components; and ...
( Category:
Networking & Cloud Computing
April 1,2018 )
epub, mobi |eng | 2013-08-22 | Author:Laura P. Taylor
A Functional Baseline describes the architecture and functions of the system according to orignal specifications. The Functional Baselines contains all of the documentation that describes the systems features, performance, design, ...
( Category:
Constitutional Law
April 1,2018 )
azw3, pdf, epub |eng | 2016-06-29 | Author:Rejah Rehim [Rehim, Rejah]
Cross-site scripting (XSS) Cross-site scripting is also a type of injection attack, which occurs when attackers inject malicious attack vectors in the form of a browser-side script. This occurs when ...
( Category:
Networking & Cloud Computing
April 1,2018 )
epub |eng | 2013-11-15 | Author:Tony Northrup [Tony Northrup]
( Category:
Operating Systems
March 31,2018 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9814)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7811)
Grails in Action by Glen Smith Peter Ledbrook(7722)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6875)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6871)
Running Windows Containers on AWS by Marcio Morales(6403)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5089)
Combating Crime on the Dark Web by Nearchos Nearchou(4664)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4655)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4355)
The Age of Surveillance Capitalism by Shoshana Zuboff(3989)
Python for Security and Networking - Third Edition by José Manuel Ortega(3907)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3573)
Learn Wireshark by Lisa Bock(3567)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3378)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3359)
Blockchain Basics by Daniel Drescher(3330)
