Networking & Cloud Computing
epub |eng | 2007-01-15 | Author:Jerri Ledford & Mary E. Tyler [Ledford, Jerri & Tyler, Mary E.]
17_053852 ch11.qxp 8/10/06 9:53 PM Page 153 The Webmaster Dashboard 153 Figure 11-8: Change the content view on the Content by Titles report. In this report, you’ll also have double ...
( Category:
Internet, Groupware, & Telecommunications
June 13,2015 )
epub, mobi |eng | 2003-06-11 | Author:Kenneth Silverman [Silverman, Kenneth]
For the first six months after his agreement with Kendall, Morse became little more than a bystander to the development of his invention. Kendall rapidly set to work forming or ...
( Category:
Patents & Inventions
June 12,2015 )
epub, mobi, azw3 |eng | 2011-01-14 | Author:Goldstein, Emmanuel [Emmanuel, Goldstein,]
Dear 2600: Ive recently read that Despair, Inc. has registered the frowny emoticon :-(, copyrighted it, and is planning to sue anyone and everyone who uses the so-called frowny emoticon, ...
( Category:
Hacking
June 12,2015 )
epub |eng | 2011-01-20 | Author:McGonigal, Jane [McGonigal, Jane]
CRUEL 2 B KIND, like many happiness hacks, isn’t a product. There’s no software to download, no license to buy, no fee to pay. It’s meant to be a solution ...
( Category:
Cognitive Psychology
June 12,2015 )
epub, mobi |eng | 2010-01-12 | Author:Lanier, Jaron [Lanier, Jaron]
CHAPTER 6 The Lords of the Clouds Renounce Free Will in Order to Become Infinitely Lucky OUT-OF-CONTROL financial instruments are linked to the fates of musicians and the fallacies of ...
( Category:
Internet, Groupware, & Telecommunications
June 12,2015 )
epub, pdf |eng | 2010-04-16 | Author:Charles Babcock [Babcock, Charles]
M A N A G E M E N T S T R A T E G I E S F O R T H E C L O U ...
( Category:
Strategic Planning
June 12,2015 )
epub |eng | 2015-05-31 | Author:Karayiannis, Christos
The virtual server rules define the condition on which the server will act and also how the request will be handled. You can set the rules in the Behavior tab ...
( Category:
Servers
June 12,2015 )
mobi, epub, pdf |eng | 2010-01-05 | Author:Jaron Lanier
CHAPTER 6 The Lords of the Clouds Renounce Free Will in Order to Become Infinitely Lucky OUT-OF-CONTROL financial instruments are linked to the fates of musicians and the fallacies of ...
( Category:
Internet, Groupware, & Telecommunications
June 11,2015 )
mobi, epub |eng | 2007-11-28 | Author:Microsoft
Brian would respond to the meeting request for this new meeting just as he would one that didn't have a recurrence. He would create the appropriate meeting registration response object ...
( Category:
Email Administration
June 11,2015 )
mobi, pdf |eng | 2009-06-01 | Author:Steve Souders
* * * [33] http://www.fettig.net/weblog/2005/11/30/xmlhttprequest-subdomain-update/ [34] http://www.whatwg.org/specs/web-apps/current-work/#crossDocumentMessages [35] http://ajaxian.com/archives/jsonp-json-with-padding [36] This is primarily an issue for Internet Explorer 6 and 7. Browser connection limits are explained in Chapter 11. Effects ...
( Category:
Software Development
June 11,2015 )
mobi |eng | 2005-06-30 | Author:David Litchfield; Chris Anley; John Heasman
Trojanning Sybase The options for inserting backdoors into a database system of Sybase's complexity are numerous. Following are a few ideas; there are plenty of variations on these themes. Grant ...
( Category:
Hacking
June 11,2015 )
mobi, azw3, epub, pdf |eng | 2011-01-14 | Author:Chris Sanders
Figure 6-31. The first ping packet, packet 1 Common sense tells us that if a computer sends an echo request, it should receive an echo reply, and that's just what ...
( Category:
Networks
June 11,2015 )
mobi, pdf |eng | 2007-01-15 | Author:Michael Rash
[ext_scanner]# nmap -sF -P0 -p 80 -n 71.157.X.X Starting Nmap 4.01 ( http://www.insecure.org/nmap/ ) at 2007-03-05 20:50 EST Interesting ports on 71.157.X.X: PORT STATE SERVICE 80/tcp open|filtered http Nmap finished: ...
( Category:
Networking & System Administration
June 11,2015 )
mobi |eng | 2007-01-15 | Author:W. Curtis Preston
Making the CD or DVD image bootable... Copying the remainder of the backup to the CD or DVD file system... Creating Rock Ridge format image: /mkcd/cd_images/cd_image_295108.vol2 Running mkisofs ... . ...
( Category:
Disaster & Recovery
June 11,2015 )
mobi |eng | 2010-06-20 | Author:Emmanuel Goldstein
Dear 2600: Ive recently read that Despair, Inc. has registered the frowny emoticon :-(, copyrighted it, and is planning to sue anyone and everyone who uses the so-called frowny emoticon, ...
( Category:
Hacking
June 11,2015 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9810)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7808)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6805)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6801)
Running Windows Containers on AWS by Marcio Morales(6321)
Kotlin in Action by Dmitry Jemerov(5089)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5048)
Combating Crime on the Dark Web by Nearchos Nearchou(4622)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4573)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4437)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4313)
The Age of Surveillance Capitalism by Shoshana Zuboff(3977)
Python for Security and Networking - Third Edition by José Manuel Ortega(3875)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3533)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
Learn Wireshark by Lisa Bock(3491)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3353)
Blockchain Basics by Daniel Drescher(3322)
