Networking & Cloud Computing
azw3 |eng | 2015-08-16 | Author:Taylor, Peter J. & Derudder, Ben [Taylor, Peter J.]
Measuring hinterworlds To compute a city’s hinterworld it is necessary to specify its external relations with all other cities. For this exercise we deal with our operational roster of 152 ...
( Category:
Networks
January 5,2016 )
epub |eng | 2015-08-16 | Author:Taylor, Peter J. & Derudder, Ben
Measuring hinterworlds To compute a city’s hinterworld it is necessary to specify its external relations with all other cities. For this exercise we deal with our operational roster of 152 ...
( Category:
Networks
January 5,2016 )
azw3, epub |eng | 2015-12-12 | Author:Witt, Ron [Witt, Ron]
A good description of these features is provided by Microsoft’s https://technet.microsoft.com/en-us/ link below. https://technet.microsoft.com/en-us/library/dn986865%28v=vs.85%29.aspx To Learn more about Windows 10 and your online services Using your device Communicating with people ...
( Category:
Windows Desktop
January 4,2016 )
azw3 |eng | 2015-11-16 | Author:Mosco, Vincent [Mosco, Vincent]
Privacy and Security Privacy and security concerns are coming together to form another question mark over the IT industry, including cloud computing and big data. In order to properly assess ...
( Category:
Communication Policy
January 3,2016 )
epub |eng | 2003-07-02 | Author:John Steele Gordon [Gordon, John Steele]
8. Lightning Through Deep Waters ONCE THE AGAMEMNON RETURNED to Queenstown, Field, Thomson, and Bright left immediately for London to meet with the board of directors of the Atlantic Telegraph ...
( Category:
History
January 2,2016 )
epub |eng | 2015-08-12 | Author:Kumar, Krishna
Figure 5.18 Primary Datacenter Virtual Directory Configuration Configure the primary datacenter Exchange server CAS ‘PRIEXCH01’ virtual directories URL using the below cmdlets. To configure other servers (PRIEXCH02 and PRIEXCH03) in ...
( Category:
Email Administration
December 31,2015 )
azw3 |eng | 2015-08-12 | Author:Kumar, Krishna [Kumar, Krishna]
Figure 5.18 Primary Datacenter Virtual Directory Configuration Configure the primary datacenter Exchange server CAS ‘PRIEXCH01’ virtual directories URL using the below cmdlets. To configure other servers (PRIEXCH02 and PRIEXCH03) in ...
( Category:
Email Administration
December 31,2015 )
epub |eng | 2015-07-26 | Author:Baesens, Bart & Van Vlasselaer, Veronique & Verbeke, Wouter
Figure 4.37 Calculating Predictions Using a Cut-Off A confusion matrix can now be calculated as shown in Table 4.5. Table 4.5 Confusion Matrix Actual Status Positive (Fraud) Negative (No Fraud) ...
( Category:
Data Mining
December 31,2015 )
azw3 |eng | 2015-07-26 | Author:Baesens, Bart & Van Vlasselaer, Veronique & Verbeke, Wouter [Baesens, Bart]
Figure 4.37 Calculating Predictions Using a Cut-Off A confusion matrix can now be calculated as shown in Table 4.5. Table 4.5 Confusion Matrix Actual Status Positive (Fraud) Negative (No Fraud) ...
( Category:
Data Mining
December 31,2015 )
mobi, azw3, epub |eng | 2015-11-16 | Author:Scott Adkins & John Belamaric & Vincent Giersch & Denys Makogon & Jason E. Robinson
Build: Simple, right? Make a distribution of your source code, and it doesn’t matter what it will be: DEB, RPM, Python EGG, GitHub Tag, or whatever. Staging: Often takes a ...
( Category:
Cloud Computing
December 16,2015 )
epub |eng | 2015-02-11 | Author:Navaid Shamsee & David Klebanov & Hesham Fayed & Ahmed Afrose & Ozden Karakok [Shamsee, Navaid]
Multiple technologies, which lay the foundation for inter-data center Unified Fabric extension, are in use today. Layer 3 networks allow extending storage connectivity between disparate data center environments by leveraging ...
( Category:
Storage & Retrieval
December 15,2015 )
mobi |eng | 2015-12-13 | Author:Bill English
Chapter 6. Configuring search Relevance, precision, and recall Analytics processing Managing the search schema Search Navigation web parts Changing the display name or the URL of a search vertical Search ...
( Category:
Client-Server Systems
December 14,2015 )
mobi |eng | 2015-09-29 | Author:Redmond, Tony & Cunningham, Paul & Van Horenbeeck, Michael [Redmond, Tony]
( Category:
Enterprise Applications
December 14,2015 )
epub |eng | 2015-09-29 | Author:Redmond, Tony & Cunningham, Paul & Van Horenbeeck, Michael
( Category:
Email Administration
December 14,2015 )
epub |eng | 2015-06-28 | Author:Johnson, Dale
Notify User: Notify your user if a message or file is found with a threat. You can use the same variables we listed under the administrator notification. Web Reputation Rules: ...
( Category:
Windows Desktop
December 14,2015 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9810)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7808)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6815)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6813)
Running Windows Containers on AWS by Marcio Morales(6330)
Kotlin in Action by Dmitry Jemerov(5089)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5054)
Combating Crime on the Dark Web by Nearchos Nearchou(4629)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4583)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4437)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4318)
The Age of Surveillance Capitalism by Shoshana Zuboff(3977)
Python for Security and Networking - Third Edition by José Manuel Ortega(3880)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3538)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
Learn Wireshark by Lisa Bock(3499)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3355)
Blockchain Basics by Daniel Drescher(3322)
