Networking & Cloud Computing
epub |eng | 1995-10-15 | Author:Bill Gates [Gates, Bill]
The greatest improvement in productivity, and the greatest change in work habits, will be brought about because of networking. The original use for the PC was to make it easier ...
( Category:
History
May 12,2016 )
epub |eng | 2013-04-09 | Author:Gorbis, Marina [Gorbis, Marina]
A New Ecology of Science: From Small to Big Science and Back In his famous lecture and later book titled The Two Cultures, the British scientist and novelist C. P. ...
( Category:
Social Media
May 11,2016 )
epub |eng | 2013-10-24 | Author:Nitesh Dhanjani [Nitesh Dhanjani and Justin Clarke]
Scanner Design Now that we have defined the basic requirements for our scanner, we can start to develop an overview of the scanner’s overall structure. Based on our requirements, two ...
( Category:
LAN
May 11,2016 )
epub, pdf |eng | 2011-05-05 | Author:Gordon McComb
CONSTRUCTING THE X-Y JOINT Refer to Figure 27-22 as you follow these steps to construct an X-Y joint. You will need two servos: one that mounts from the body (or ...
( Category:
Robotics & Automation
May 6,2016 )
epub, pdf |eng | | Author:Abhinav Singh
Once the scan setting pop up appears, click on OK to proceed. After few moments, the attack will be launched and any successful crack will be reported by Fern. Bluetooth ...
( Category:
Encryption
April 23,2016 )
epub |eng | | Author:James Beidler
Arguably the most important part of the site, Datenbanken connects users to the site’s collections of records and is made up of these headings: GEDBAS (a clipped form of “Gedcom ...
( Category:
Internet & Social Media
April 23,2016 )
epub |eng | 2011-10-18 | Author:Guobin Yang
Source: CND, March 1992, 1993, 1994, 1995, 1997, 1999. *This number is based on my estimate. According to CND, it had 47,600 subscribers among an estimated total readership of 150,000 ...
( Category:
Asian
April 21,2016 )
epub |eng | 2011-10-26 | Author:Bill Dyszel
Figure 2-4: You can enter more than one e-mail address for each person in your Contacts list. The New Contact form has four phone-number blocks. You can use any of ...
( Category:
Email Administration
April 20,2016 )
epub |eng | 2016-03-13 | Author:Giordano Scalzo [Scalzo, Giordano]
Note The code for the forecast can be found at http://openweathermap.org/weather-conditions. Then, we change the viewWillAppear function in PrettyWeatherViewController again. We do this to raise three calls to get the ...
( Category:
Swift
April 13,2016 )
mobi, azw3, epub |eng | 2013-09-25 | Author:Joseph Muniz
Chapter 5 Select View Cookie Information, and you will see stored cookies. You can click on Edit Cookie to bring up the cookie editor and replace the current cookie with ...
( Category:
Testing
April 11,2016 )
epub |eng | 2016-04-05 | Author:Betsy Beyer, Chris Jones, Jennifer Petoff & Niall Richard Murphy
1 For example, see Doorman, which provides a cooperative distributed client-side throttling system. Chapter 22. Addressing Cascading Failures Written by Mike Ulrich If at first you don’t succeed, back off ...
( Category:
Testing
April 8,2016 )
epub |eng | | Author:Mike O’Leary
Persistence Another important use of malware by attackers is for persistence. Persistence scripts allow an attacker the ability to return to a compromised system without the necessity of exploiting it ...
( Category:
Networks
April 8,2016 )
epub, pdf |eng | | Author:Song Y. Yan
(b) (c) 3.Use Silver–Pohlig–Hellman algorithm to solve the discrete logarithms k: (a) (b) (c) . 4.Use Pollard’s ρ method to find the discrete logarithms k such that (a) (b) . ...
( Category:
Internet & Networking
April 8,2016 )
mobi |eng | 2016-01-28 | Author:Bhanu Birani & Mayank Birani
Now, go to Xcode and navigate to Product | Archive to archive the build for distribution. Since we have installed our desktop app of HockeyApp, we will receive a popup ...
( Category:
Network Security
March 31,2016 )
epub, azw3, mobi |eng | 2016-01-28 | Author:Bhaskarjyoti Roy [Roy, Bhaskarjyoti]
Before moving on the next step, we need to set up our Nagios administrator user and password to access the web interface: $ sudo htpasswd -c /usr/local/nagios/etc/htpasswd.users nagiosadmin Then, we ...
( Category:
Networking & System Administration
March 31,2016 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6841)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6840)
Running Windows Containers on AWS by Marcio Morales(6369)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5070)
Combating Crime on the Dark Web by Nearchos Nearchou(4648)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4618)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4335)
The Age of Surveillance Capitalism by Shoshana Zuboff(3980)
Python for Security and Networking - Third Edition by José Manuel Ortega(3895)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3556)
Learn Wireshark by Lisa Bock(3533)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3356)
Blockchain Basics by Daniel Drescher(3326)
