Networking & Cloud Computing
epub |eng | | Author:Andy Kirk
Twitter provided us with the continuation tokens that we could pass back to Twitter to request the next page of data. Stack Overflow takes a different approach and assigns page ...
( Category:
Mathematics
March 14,2018 )
epub |eng | | Author:Erik Cambria, Dipankar Das, Sivaji Bandyopadhyay & Antonio Feraco
5.4.3 Popular Sentiment-Annotated Datasets We now discuss some popular sentiment-annotated datasets. We divide them into two categories: sentence-level annotation, discourse-level annotation. The latter points to text longer than a sentence. ...
( Category:
Web Development & Design
March 14,2018 )
epub |eng | | Author:Xingquan Zhu, Haicheng Tao, Zhiang Wu, Jie Cao, Kristopher Kalish & Jeremy Kayne
4.1.1 Stuffing or Stacking Stuffing (either keyword stuffing or pixel stuffing) is a way of displaying content incapable of being viewed by naked eyes. It is commonly used for both ...
( Category:
Internet & Social Media
March 14,2018 )
azw3 |eng | 2017-10-20 | Author:Ritesh Modi [Modi, Ritesh]
Presentation Analytics help in identifying answers, patterns, and insights based on data available from the past. These insights also need to be available to all stakeholders in different forms and ...
( Category:
Networking & Cloud Computing
March 14,2018 )
azw3 |eng | 2017-08-28 | Author:Markus Klein & Susan Roesner [Klein, Markus]
( Category:
Networking & Cloud Computing
March 14,2018 )
epub |eng | 2011-03-14 | Author:Christensen, Jerome;
Figure 3.13 As Walling decries the decline of the Tredway Corporation to his colleagues before the final ballot, he laments that when Bullard lost faith in the future his prideful ...
( Category:
Movies
March 14,2018 )
azw3 |eng | 2017-11-21 | Author:Nazmul Rajib [Rajib, Nazmul]
Switch# show running-config | include monitor monitor session 1 source interface Gi0/1 - 2 monitor session 1 destination interface Gi0/8 Switch# Switch# show monitor session 1 Session 1 --------- Type ...
( Category:
Networking & Cloud Computing
March 14,2018 )
azw3 |eng | 2017-06-09 | Author:Andre Spencer & Readers' Choice Club [Spencer, Andre]
If the NSA can find a way to monitor every man, woman and child, they will! And to the highest degree. If we were able to see everything the NSA ...
( Category:
Security & Encryption
March 14,2018 )
azw3 |eng | 0101-01-01 | Author:Getting Started & WebRTC
You easily extend this user interface to add different colors to the names that prefix each message, add timestamps, allow users to set their nickname, and so on. But these ...
( Category:
Web Development & Design
March 14,2018 )
azw3 |eng | 2014-10-06 | Author:Ronald Nutter [Nutter, Ronald]
I look at VDP backups as something that is regularly scheduled as a part of the nightly backup process. Snapshots are something like a one-off situation that you may only ...
( Category:
Networking & Cloud Computing
March 14,2018 )
azw3, pdf |eng | 2017-09-11 | Author:Agus Kurniawan [Kurniawan, Agus]
Follow the assembly instructions for the display from the datasheet document, which included in the box. You can use this assembly file from Adafruit: https://cdn-shop.adafruit.com/product-files/2718/2718build.jpg. After constructing the display, you ...
( Category:
Hardware & DIY
March 14,2018 )
azw3 |eng | 2017-09-18 | Author:Jacek Doktor & Pawel Jarosz [Doktor, Jacek]
( Category:
Networking & Cloud Computing
March 14,2018 )
azw3, epub |eng | 2015-11-27 | Author:Rajesh Gunasundaram [Gunasundaram, Rajesh]
Chapter 5. Enabling Basic Authentication using Authentication Filter in Web API This chapter will show how to set an authentication scheme for individual controllers or actions using an Authentication filter ...
( Category:
Networking & Cloud Computing
March 14,2018 )
azw3, mobi, epub |eng | 2017-07-21 | Author:Sagar Rahalkar [Rahalkar, Sagar]
ssh_login: This auxiliary module performs a brute-force attack on the target SSH server. Its auxiliary module name is auxiliary/scanner/ssh/ssh_login, and you will have to configure the following parameters: RHOSTS: IP ...
( Category:
Security & Encryption
March 14,2018 )
azw3 |eng | 2017-04-06 | Author:Rakesh Gupta [Gupta, Rakesh]
Creating a new case Before creating a new case, first understand the various channels you can offer to your customer to reach out to support if they have any issue ...
( Category:
Software
March 14,2018 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7721)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6871)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6866)
Running Windows Containers on AWS by Marcio Morales(6398)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5086)
Combating Crime on the Dark Web by Nearchos Nearchou(4661)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4646)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4351)
The Age of Surveillance Capitalism by Shoshana Zuboff(3988)
Python for Security and Networking - Third Edition by José Manuel Ortega(3905)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3571)
Learn Wireshark by Lisa Bock(3562)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3378)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3359)
Blockchain Basics by Daniel Drescher(3330)
