Networking & Cloud Computing
azw3 |eng | 2017-06-21 | Author:U.S. Department of Defense
Table 4-2. Big Data Characteristics in Relation to Security and Privacy in Smart Cities.92 DISCUSSION AND IMPLICATIONS Some of the emerging and alarming trends discussed above indicate that cyberattacks on ...
( Category:
Security & Encryption
March 13,2018 )
azw3 |eng | 2016-04-27 | Author:Adam Gordon & Steven Hernandez [Gordon, Adam]
High Assurance Internet Protocol Encryptor (HAIPE) Based on IPSec, High Assurance Internet Protocol Encryptor (HAIPE) possesses additional restrictions and enhancements, for instance, the ability to encrypt multicast data using high-assurance ...
( Category:
Networking & Cloud Computing
March 13,2018 )
azw3 |eng | 2017-06-21 | Author:Brian Sovryn [Sovryn, Brian]
From the following screen, tap Verify Safety Numbers. You will now be brought to a screen which displays a QR code and a list of “safety numbers”. This code will ...
( Category:
Engineering
March 13,2018 )
azw3 |eng | 2017-09-13 | Author:Martin Alfke & Felix Frank [Alfke, Martin]
Creating utilities for derived manifests You have now created several classes that compartmentalize the basic installation and configuration work for your module. Classes lend themselves very well to implementing global ...
( Category:
Networking & Cloud Computing
March 13,2018 )
azw3, epub |eng | 2016-06-28 | Author:Wolf Halton & Bo Weaver [Halton, Wolf]
Once sniffing has started, we need to scan for hosts. Go to Hosts | Scan for hosts in the menu bar. This will scan the local network for available hosts. ...
( Category:
Operating Systems
March 13,2018 )
azw3, epub |eng | 2017-09-12 | Author:Corey P. Schultz & Bob Perciaccante [Schultz, Corey P.]
( Category:
Operating Systems
March 13,2018 )
azw3 |eng | 2016-11-09 | Author:Brad Miser [Miser, Brad]
21. Set the Character Count switch to on (green) to display the number of characters you’ve written compared to the number allowed (such as 59/160). When it is off, you ...
( Category:
Graphics & Design
March 13,2018 )
mobi |pt | 2011-05-16 | Author:The Definitive Guide
The communication between Squid and an NTLM authenticator is much more complicated than for Basic and Digest. One reason is that each helper process actually creates its own challenge. Thus, ...
( Category:
Networking & Cloud Computing
March 13,2018 )
epub |eng | 2016-10-12 | Author:978-1-4919-3282-7
30 Rule, J. et al. 1983. Documentary Identification and Mass Surveillance in the United States. Social Problems 31(2):222-234. Available at https://www.jstor.org/stable/800214; Wood, D. and Ball, K. (eds.) 2006. A Report ...
( Category:
Security & Encryption
March 13,2018 )
azw3 |eng | 2017-03-27 | Author:Paul Booth [Booth, Paul]
Reconstruction through Branched Narratives A second way scholars can use an interreal analysis is by examining the reconstruction of extant media objects on MySpace. Fans identify more readily with characters ...
( Category:
Engineering
March 13,2018 )
epub |eng | 2018-02-15 | Author:Angela Crocker [Angela Crocker]
Be vigilant about data you want to keep, especially older archival footage. Storage devices evolve and data can erode one byte at a time. This is known as bit rot. ...
( Category:
Databases & Big Data
March 13,2018 )
epub |eng | 2018-03-13 | Author:Mike Meyers
Host Availability and Elasticity Virtual environments offer organizations real flexibility in the use of their infrastructure for both availability and elasticity. Virtualization supports availability in that you can almost instantly ...
( Category:
Certification
March 13,2018 )
azw3, epub |eng | 2018-01-16 | Author:Niall Ferguson [Ferguson, Niall]
46 Into the Valley Why did hierarchical power structures plunge into crisis in the 1970s? It might be assumed that, as Brzezinski believed, the answer to this question is technological. ...
( Category:
Politics & Government
March 13,2018 )
epub |eng | 2015-05-13 | Author:Susan Prosser [Susan Prosser and Stuart Gripman]
( Category:
Software
March 13,2018 )
epub |eng | | Author:Sang C. Suh & Thomas Anthony
3 Statistical Similarity Based Data Compression Conventional lossy coding schemes in general quantize or threshold data to adjust quality and reduce data size [51]. Their goal is to compress data ...
( Category:
Mathematics
March 13,2018 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6860)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6859)
Running Windows Containers on AWS by Marcio Morales(6386)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5080)
Combating Crime on the Dark Web by Nearchos Nearchou(4656)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4639)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4344)
The Age of Surveillance Capitalism by Shoshana Zuboff(3983)
Python for Security and Networking - Third Edition by José Manuel Ortega(3902)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3566)
Learn Wireshark by Lisa Bock(3550)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3358)
Blockchain Basics by Daniel Drescher(3329)
