Networking & Cloud Computing
epub |eng | 2015-11-24 | Author:Jason McDonald [McDonald, Jason]
» Use Keyword Heavy URLs over Parameter URLs URLs or web addresses are what you see in the URL or address bar at the top of the browser. Google pays ...
( Category:
Internet & Social Media
November 26,2017 )
epub |eng | 2010-01-02 | Author:Anthony Velte [Velte, Anthony]
How HTML Works HTML is a series of short codes typed into a text file by the author or created by web page design software. These short codes are called ...
( Category:
Networking & Cloud Computing
November 25,2017 )
epub |eng | | Author:2015
How to do it... An example snippet of the installation of a preinstallation script in a recipe is as follows: pkg_preinst_${PN} () { # Shell commands } All installation scripts ...
( Category:
Networking & Cloud Computing
November 25,2017 )
epub |eng | 2013-12-25 | Author:Alper Dincer & Balkan Uraz [Dincer, Alper & Uraz, Balkan]
Then, we will set a prototype of the ContextMenu class to an object created from the google.maps.OverlayView class: ContextMenuClass.prototype = new google.maps.OverlayView(); The google.maps.OverlayView class has three methods to be ...
( Category:
Web Development & Design
November 24,2017 )
epub |eng | | Author:Samee U. Khan & Albert Y. Zomaya
( Category:
Networking & Cloud Computing
November 22,2017 )
epub |eng | 2013-07-23 | Author:Stibel, Jeff [Stibel, Jeff]
Nine Pheromones | Language | Mirrors Despite their minimal brainpower and inability to speak, ants are remarkably good at communicating, which they do automatically through scent. Their bodies are covered ...
( Category:
Skills
November 20,2017 )
azw3, epub |eng | 2017-08-24 | Author:Novick, Vladimir [Novick, Vladimir]
( Category:
Web Development & Design
November 20,2017 )
azw3 |eng | 2013-02-08 | Author:Lindley, Cody [Lindley, Cody]
7.4 Creating and Injecting Text Nodes Text nodes are created automatically for us when a browser interprets an HTML document, and a corresponding DOM is built based on the contents ...
( Category:
Web Development & Design
November 20,2017 )
epub |eng | 2016-07-05 | Author:Chris Binnie
Summary If you experiment with Nping over time, you should come to appreciate that the reporting it offers is truly extensive. I'd encourage you to reach for Nmap whenever you ...
( Category:
Internet & Social Media
November 18,2017 )
epub |eng | | Author:Deepak Vohra
CheckNodeDiskPressure Pods cannot be scheduled on nodes with a disk pressure condition. After the unsuitable nodes have been filtered out, the remaining nodes are ranked using priority functions. Some of ...
( Category:
Operating Systems
November 18,2017 )
epub, azw3 |eng | 2015-12-22 | Author:Kunal Dabir & Abhinandan, [Dabir, Kunal]
Another look at applying plugins Now that we have learned about basic Groovy, let's put it to use in the context of the Gradle build script. In earlier chapters, we ...
( Category:
Programming Languages
November 18,2017 )
epub |eng | | Author:George Tillmann
Summary Many a well-designed system is brought to its knees during maintenance. The reasons are many but particularly problematic is poor documentation. Correctly and efficiently modifying an application is difficult ...
( Category:
Databases & Big Data
November 18,2017 )
epub |eng | 2017-05-24 | Author:Stephen Ludin
Successfully negotiated h2 As per spec, sent a SETTINGS frame right away Set the window size to 16 KB as requested in the command line Note the use of stream_id ...
( Category:
Networking & Cloud Computing
November 17,2017 )
azw3 |eng | 2017-05-15 | Author:Stephen Ludin & Javier Garza [Ludin, Stephen]
Ngttpd received the server’s SETTINGS frame. Sent and received acknowledgment of the SETTINGS frames. [ 0.278] recv (stream_id=1, sensitive) :status: 200 [ 0.279] recv (stream_id=1, sensitive) last-modified: Wed, 01 Jun ...
( Category:
Internet & Social Media
November 17,2017 )
azw3, pdf |eng | 2017-10-06 | Author:Tony Gaitatzis [Gaitatzis, Tony]
Range 100 m (330 ft) Data Rate 1M bit/s Application Throughput 0.27 Mbit/s Security 128-bit AES with Counter Mode CBC-MAC and application layer user defined (BEWARE: this encryption has vulnerabilities) ...
( Category:
Engineering
November 17,2017 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6856)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6853)
Running Windows Containers on AWS by Marcio Morales(6379)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5077)
Combating Crime on the Dark Web by Nearchos Nearchou(4652)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4632)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4341)
The Age of Surveillance Capitalism by Shoshana Zuboff(3983)
Python for Security and Networking - Third Edition by José Manuel Ortega(3901)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3562)
Learn Wireshark by Lisa Bock(3544)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3356)
Blockchain Basics by Daniel Drescher(3327)
