Networking & Cloud Computing
epub |eng | | Author:Sam Ruby, Dave Thomas, David Heinemeier Hansson
If the user successfully logs in, we store the ID of the user record in the session data. We’ll use the presence of that value in the session as a ...
( Category:
Programming Languages
September 5,2017 )
epub |eng | 2014-09-05 | Author:Michael W. Graves
Platform as a Service PaaS puts the entire computing environment onto the Web. With SaaS, you are running an application over an Internet connection. How the application is configured is ...
( Category:
Security & Encryption
September 5,2017 )
mobi |eng | | Author:2014
With the help of the layout and the regions, we can create a logical segmentation of the screen that will allow us to render views on each region. Using meaningful ...
( Category:
Programming Languages
September 5,2017 )
mobi, pdf |eng | 2015-06-01 | Author:Christos Karayiannis [Karayiannis, Christos]
The virtual server rules define the condition on which the server will act and also how the request will be handled. You can set the rules in the Behavior tab ...
( Category:
Operating Systems
September 4,2017 )
mobi |eng | 2012-02-24 | Author:Michael Sikorski and Andrew Honig
( Category:
Security & Encryption
September 4,2017 )
epub |eng | 2011-07-28 | Author:Kevin D. Mitnick
Chapter 11 Combining Technology and Social Engineering A social engineer lives by his ability to manipulate people into doing things that help him achieve his goal, but success often also ...
( Category:
Networking & Cloud Computing
September 4,2017 )
epub, mobi |eng | 2014-11-03 | Author:Niels Ferguson & Bruce Schneier & Tadayoshi Kohno
The lemma is a statement of fact. The proof argues why the lemma is true. The little square box signals the end of the proof. Mathematicians love to use lots ...
( Category:
Security & Encryption
September 4,2017 )
epub |eng | 2014-07-01 | Author:Michael Hale Ligh & Andrew Case & Jamie Levy & AAron Walters
Figure 14-4: WinLister on a live machine shows the IE window properties The next image in Figure 14-5 shows a similar situation, but this time the IE process is in ...
( Category:
Security & Encryption
September 4,2017 )
epub |eng | 2008-01-02 | Author:Stefan Wintermeyer & Stephen Bosch [Wintermeyer, Stefan & Bosch, Stephen]
( Category:
Operating Systems
September 3,2017 )
mobi, epub |eng | | Author:2014
How to do it… Perform the following steps to install the Twitter4J library as a module: Create the OpenShift application created in the Creating and deploying Java EE 6 applications ...
( Category:
Programming
September 3,2017 )
epub |eng | | Author:2013
Now run the grid/aR, grid/array, and grid/sql actions and try using the grids. How it works... The view is pretty simple and stays the same for all data providers. We ...
( Category:
Programming
September 3,2017 )
epub |eng | | Author:2015
Let's parse the received message. The first byte is 0x1, which is the start of the message. 0x9 is the length of the rest. The Node ID is the sixth ...
( Category:
Networking & Cloud Computing
September 3,2017 )
mobi, epub |eng | | Author:2013
Importing data to Hive Before we begin the walkthrough, see Appendix A, Big Data Sets, to complete the Hive nyse_stocks data preparation and follow these steps: Launch Spoon if you ...
( Category:
Programming
September 3,2017 )
epub |eng | 2015-04-14 | Author:Grus, Joel
For example, if 50% of spam messages have the word viagra, but only 1% of nonspam messages do, then the probability that any given viagra-containing email is spam is: A ...
( Category:
Databases & Big Data
September 3,2017 )
epub |eng | 2015-06-17 | Author:Dawn Griffiths & David Griffiths
When the Create Order action item is clicked, it will create an intent that starts OrderActivity. We’ll show you the full MainActivity.java code on the next page. The full MainActivity.java ...
( Category:
Programming Languages
September 3,2017 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6851)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6849)
Running Windows Containers on AWS by Marcio Morales(6377)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5076)
Combating Crime on the Dark Web by Nearchos Nearchou(4651)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4629)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4339)
The Age of Surveillance Capitalism by Shoshana Zuboff(3981)
Python for Security and Networking - Third Edition by José Manuel Ortega(3900)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3560)
Learn Wireshark by Lisa Bock(3542)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3356)
Blockchain Basics by Daniel Drescher(3327)
