Networking & Cloud Computing
mobi, epub |eng | 2011-09-08 | Author:Tom Igoe
Next, add some code to add a time stamp. First, add a global variable to set the text line height. int lineHeight = 14; // a variable to set the ...
( Category:
Hardware & DIY
October 12,2017 )
epub, mobi, pdf |eng | 2014-10-18 | Author:Peter N.M. Hansteen
[32] From a longer-term perspective, it’s fairly normal for entire networks and larger ranges of IP addresses to be reassigned to new owners in response to events in the physical, ...
( Category:
Operating Systems
October 11,2017 )
epub |eng | 2011-07-19 | Author:David Kennedy & Jim O'Gorman & Devon Kearns & Mati Aharoni [David Kennedy]
Figure 10-6. Multi-attack security warning We have a backup attack, however. The target clicks Run on the malicious Java applet, a Meterpreter shell begins, and the target is redirected back ...
( Category:
Security & Encryption
October 11,2017 )
epub, mobi |eng | 2015-10-11 | Author:Wendell Odom & Chad Hintz
Chapter 13. Perspectives on IPv4 Subnetting This chapter covers the following exam topics: 1.1 Describe the purpose and functions of various network devices 1.1.a Interpret a network diagram 1.3 Use ...
( Category:
Certification
October 11,2017 )
epub |eng | 2000-02-01 | Author:Sean Griffin [Griffin, Sean]
The first in this string of films was Dead Poets Society (1989), the first Touchstone picture ever to be nominated for the Best Picture Academy Award and a surprise summer ...
( Category:
LGBT
October 8,2017 )
epub |eng | 2013-01-11 | Author:Hennessy, John L., Patterson, David A. & David A. Patterson
a. [15] <5.3> Following the convention of Figure 5.11, let us divide the execution time into instruction execution, cache access, memory access, and other stalls. How would you expect each ...
( Category:
Hardware & DIY
October 8,2017 )
epub |eng | 2013-10-15 | Author:Anita Elberse [Elberse, Anita]
Recorded Music Sales in 2011: Digital Tracks In the recorded-music industry in 2011, more than 8 million unique digital-track titles together sold 1.271 billion copies. The figure shows how sales ...
( Category:
Marketing & Sales
October 4,2017 )
epub |eng | | Author:Daniel Drescher
Changing a Reference in the Merkle Tree Figure 15-6 illustrates what happens if one not only changes details of a transaction but also changes the hash reference that points to ...
( Category:
Economics
October 4,2017 )
mobi, pdf |eng | 2009-10-01 | Author:Gavin Bell
Providing for Site Navigation You will need to provide navigation to other sections of your site, too. You can’t rely only on context-led page navigation. Typically, social applications have a ...
( Category:
Programming
October 3,2017 )
epub, pdf |eng | 2013-09-02 | Author:John R. Vacca
Chapter Review Questions/Exercises True/False 1. True or False? Network firewalls are a vital component for maintaining a secure environment and are often the first line of defense against attack. 2. ...
( Category:
Security & Encryption
October 3,2017 )
epub |eng | 2010-06-20 | Author:Emmanuel Goldstein [Goldstein, Emmanuel]
Dear 2600: Ive recently read that Despair, Inc. has registered the frowny emoticon :-(, copyrighted it, and is planning to sue anyone and everyone who uses the so-called frowny emoticon, ...
( Category:
Internet & Social Media
September 30,2017 )
mobi, azw3, epub |eng | 2014-07-24 | Author:Natalie MacLees
Now that we've got that container, we just need to access the data that's attached to it. To do that, we'll use jQuery's data() method, and we'll use cycle.API that ...
( Category:
Web Development & Design
September 29,2017 )
epub |eng | 2013-04-09 | Author:Brad Green & Shyam Seshadri
With that harness in place, let’s take a look at the unit tests for the List Controller: describe('ListCtrl', function() { var mockBackend, recipe; // _$httpBackend_ is the same as $httpBackend. ...
( Category:
Web Development & Design
September 28,2017 )
epub |eng | 2010-09-14 | Author:Ross J. Anderson
16.6.3.1.2 How to hack a smartcard [2] As smartcards use an external power supply, and store security state such as crypto keys and value counters in EEPROM, an attacker could ...
( Category:
Programming
September 28,2017 )
epub |eng | 2011-09-27 | Author:Bob Servant
_________________________ 42 William Topaz McGonagall, 1825–1902, much maligned Dundonian poet who suffered years of public humiliation in the bars of Dundee. Mercilessly lampooned by Spike Milligan through his McGoonagall character. ...
( Category:
Humor
September 27,2017 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6854)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6853)
Running Windows Containers on AWS by Marcio Morales(6379)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5077)
Combating Crime on the Dark Web by Nearchos Nearchou(4652)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4632)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4341)
The Age of Surveillance Capitalism by Shoshana Zuboff(3983)
Python for Security and Networking - Third Edition by José Manuel Ortega(3901)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3562)
Learn Wireshark by Lisa Bock(3543)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3356)
Blockchain Basics by Daniel Drescher(3327)
