Networking & Cloud Computing
epub |eng | 2012-01-23 | Author:Jason Bloomberg
Chapter 7 The Democratization of Enterprise IT We expect this book to have a broader audience than your average techie book: business people as well as techies, architects and implementers, ...
( Category:
Processes & Infrastructure
August 22,2017 )
epub |eng | 2013-11-19 | Author:Ronald J. Deibert [Deibert, Ronald J.]
10. Fanning the Flames of Cyber Warfare Eugene Kaspersky is the CEO of the Russian-based malware and cyber-security research laboratory that bears his name, Kaspersky Lab. An outspoken, controversial, and ...
( Category:
Social Sciences
August 22,2017 )
epub |eng | | Author:2015
--Phil Karlton In this section, we'll look at two strategies to cache your application content. First, we'll look at using Redis as an in-memory key-value cache for regularly used JSON ...
( Category:
Web Development & Design
August 22,2017 )
mobi, epub |eng | 2013-11-29 | Author:Adam Nathan
( Category:
Mobile Phones, Tablets & E-Readers
August 22,2017 )
epub |eng | | Author:Sergi Mansilla
y: HERO_Y }); Notice that I used startWith(). This sets the first value in the Observable, and I set it to a position in the middle of the ...
( Category:
Web Development & Design
August 22,2017 )
azw3, epub |eng | 2017-05-04 | Author:Arthur Salmon & Michael McLafferty & Warun Levesque [Salmon, Arthur]
( Category:
Networking & Cloud Computing
August 22,2017 )
mobi |eng | | Author:2014
Performing data operations with collections You can use AJAX requests to save and fetch data to and from the server. The result then needs to be applied on the collection. ...
( Category:
Programming Languages
August 22,2017 )
mobi, pdf |eng | 2012-03-01 | Author:Laura Chappell & Gerald Combs
Filter on ICMP and ICMPv6 Traffic The capture filter syntax for ICMP and ICMPv6 traffic is simply icmp or icmp6, respectively. The display filter syntax is simply icmp or icmpv6. ...
( Category:
Networking & Cloud Computing
August 21,2017 )
epub |eng | 2015-10-28 | Author:Russell P [P, Russell]
Note: instead of using 1=1 you can also use simply 1 or any other character Getting Passwords with SQL map: Open cmd Run, sqlmap.py -u “http://localhost/DVWA-1.0.8/vulnerabilities/sqli/?id=1&Submit=Submit#” –-dbs And sqlmap will ...
( Category:
Security & Encryption
August 21,2017 )
mobi, epub |eng | | Author:2016
The screens the user can navigate to. In our simple screen map, the detailed recipe screen looks like it's the final screen in the app, but in reality, you rarely ...
( Category:
Mobile Phones, Tablets & E-Readers
August 21,2017 )
epub |eng | 2017-08-09 | Author:Pradeeban Kathiravelu
How it works... In this recipe, we used a few of Fabric's built-in functions to transfer files between local and remote machines. The local() function does an action on the ...
( Category:
Networking & Cloud Computing
August 21,2017 )
mobi |eng | | Author:2016
You can see that the attacker and the victim are both connected to the same wireless network and in this scenario, the default gateway is also acting as the wireless ...
( Category:
Operating Systems
August 21,2017 )
epub |eng | 2014-08-20 | Author:Glen E. Clarke & Daniel Lachance
CERTIFICATION OBJECTIVE 15.02 Types of Risk Analysis When performing a risk assessment, it is important to understand the two popular types of risk analysis—qualitative and quantitative. Qualitative is assigning a ...
( Category:
Networking & Cloud Computing
August 20,2017 )
epub, azw3, pdf |eng | 2015-04-13 | Author:Joel Grus [Grus, Joel]
( Category:
Databases & Big Data
August 20,2017 )
epub |eng | 2008-12-17 | Author:Jason Brittain & Ian F. Darwin [Jason Brittain]
escapeAngleBrackets Determines whether this Valve will escape any angle brackets that are part of the request's parameters, before the request is performed. Defaults to false. escapeJavaScript Determines whether this Valve ...
( Category:
Web Development & Design
August 20,2017 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6850)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6848)
Running Windows Containers on AWS by Marcio Morales(6375)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5075)
Combating Crime on the Dark Web by Nearchos Nearchou(4650)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4626)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4339)
The Age of Surveillance Capitalism by Shoshana Zuboff(3981)
Python for Security and Networking - Third Edition by José Manuel Ortega(3900)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3560)
Learn Wireshark by Lisa Bock(3539)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3356)
Blockchain Basics by Daniel Drescher(3327)
