Networking & Cloud Computing
mobi, epub, azw3 |eng | 2015-01-09 | Author:Sean Murphy
NOTE Depending on the type of exploit or attack, the incident response team will tailor its actions. If the incident is entirely internal (a lost removable media), certain actions are ...
( Category:
Hardware & DIY
January 14,2018 )
epub |eng | 2017-09-27 | Author:Bruno Joseph D'mello
AccountModel.find({ age: { $gt: 18, $lt: 30 } }, function(err, accounts) { console.log(accounts.length); // => 2 console.log(accounts[0].username); // => randomUser1 mongoose.connection.close(); }); Here, we use the standard MongoDB commands $gt ...
( Category:
Web Development & Design
January 14,2018 )
epub |eng | 2018-01-15 | Author:Dr. Eric Cole [Dr. Eric Cole]
Password Complexity and Perplexity Just about everyone uses at least one password; some people have upwards of ten. Password diligence and best practices deteriorate as people view them as a ...
( Category:
Security & Encryption
January 12,2018 )
azw3 |eng | 2016-03-28 | Author:Douglas Reynolds [Reynolds, Douglas]
In sample_project, there are some additional fields added during our Angular Seed project creation, which include private, description, repository, and licence: Private: This instructs npm to never publish your project ...
( Category:
Programming Languages
January 11,2018 )
azw3 |eng | 2017-07-31 | Author:David Mark Clements & Matthias Buus & Matteo Collina & Peter Elger [Clements, David Mark]
There's more... Let's explore more Koa functionality. Creating middleware Let's copy the app folder from our main recipe to the custom-middleware-app and create a middleware folder with an answer.js file: ...
( Category:
Web Development & Design
January 11,2018 )
epub, azw3, mobi, pdf |eng | 2017-04-21 | Author:Richard Grimes
Defining classes A class is defined in a statement, and it will define its members in a block with multiple statements enclosed by braces {}. As it's a statement, you ...
( Category:
Programming Languages
January 11,2018 )
epub, azw3, mobi, pdf |eng | 2016-02-28 | Author:Javier Fernandez Gonzalez [Gonzalez, Javier Fernandez]
The concurrent version To implement the concurrent version of the algorithm, we have used the Fork/Join framework. We have implemented two different tasks based on the RecursiveAction class. As we ...
( Category:
Programming
January 9,2018 )
epub, mobi, azw3 |eng | 2017-05-07 | Author:Rob Fletcher [Fletcher, Rob]
( Category:
Programming Languages
January 7,2018 )
epub |eng | 2016-05-25 | Author:Troy McMillan
Certification Authority The certification authority (CA) is the entity that creates and signs digital certificates, generates the key pairs, maintains the certificates, and revokes them when necessary. To participate in ...
( Category:
Networking & Cloud Computing
January 7,2018 )
epub |eng | 2017-12-06 | Author:James M. Stewart
Protocol/service Port(s) Notes FTP TCP ports 20 (data) and 21 (control) SSH TCP port 22 All protocols encrypted by SSH also use TCP port 22, such as SFTP, SHTTP, SCP, ...
( Category:
Certification
January 6,2018 )
epub |eng | 2017-09-11 | Author:Martin Alfke
Creating utilities for derived manifests You have now created several classes that compartmentalize the basic installation and configuration work for your module. Classes lend themselves very well to implementing global ...
( Category:
Networking & Cloud Computing
January 5,2018 )
epub, pdf |eng | 2017-12-12 | Author:David R. Heffelfinger
Summary In this chapter, we provided an introduction to Contexts and Dependency Injection (CDI). We covered how JSF pages can access CDI named beans as if they were JSF managed ...
( Category:
Programming
January 5,2018 )
epub, mobi, azw3, pdf |eng | 2014-01-05 | Author:Ian F. Darwin
( Category:
Programming Languages
January 5,2018 )
epub |eng | 2012-08-17 | Author:Christopher Elisan
LINGO UAC, as defined by Microsoft, is a security component that allows an administrator to enter credentials during a nonadministrator user session to perform occasional administrative tasks. Fake AV also ...
( Category:
Networking & Cloud Computing
January 3,2018 )
epub |eng | 2015-07-13 | Author:Leclair, Jane
Conclusion and Future Trends in the Critical Manufacturing Sector It is very important to remember that maintaining a state of compliance with the regulations and laws that govern a sector ...
( Category:
Security & Encryption
January 3,2018 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6862)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6861)
Running Windows Containers on AWS by Marcio Morales(6388)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5081)
Combating Crime on the Dark Web by Nearchos Nearchou(4657)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4642)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4346)
The Age of Surveillance Capitalism by Shoshana Zuboff(3983)
Python for Security and Networking - Third Edition by José Manuel Ortega(3903)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3568)
Learn Wireshark by Lisa Bock(3551)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3358)
Blockchain Basics by Daniel Drescher(3329)
