Networking & Cloud Computing
mobi, pdf |eng | 2011-01-20 | Author:Fehily, Chris [Fehily, Chris]
Metasearch Sites A metasearch site doesn’t compile its own index but searches other sites and aggregates the results. A Torrentz search, for example, returns a list of links to other ...
( Category:
Internet, Groupware, & Telecommunications
June 11,2015 )
mobi, epub |eng | 2007-11-28 | Author:Rice, David [Rice, David]
To put this problem in context, when concrete is used for a roadway, it increases the speed cars are permitted to drive. When crumple zones are added to vehicles it ...
( Category:
Quality Control
June 11,2015 )
mobi |eng | 2009-09-01 | Author:Nitesh Dhanjani; Billy Rios; Brett Hardin
Your Employees Are on My Network When your employees join a Wi-Fi network at their favorite coffee shop, airport, hotel, or any place that offers a Wi-Fi hotspot, they are ...
( Category:
Hacking
June 11,2015 )
mobi, epub |eng | 2015-03-23 | Author:Abby Stokes
( Category:
Internet, Groupware, & Telecommunications
June 10,2015 )
epub |eng | 2014-05-15 | Author:Richard G. Lyons & D. Lee Fugal [Lyons, Richard G.]
Figure 5-20 Hypothetical analog music signal: (a) original music signal spectrum; (b) digital signal spectrum showing overlapped spectral replications; (c) contaminated spectrum of the analog playback signal from a CD. ...
( Category:
Signal Processing
June 9,2015 )
epub |eng | 2014-06-08 | Author:Paul Ferrill & Tim Ferrill
FIGURE 3-25 The Windows Security Health Validator is the only SHV provided by default Creating a remediation network With NAP and NPS, you can provide limited network connectivity to noncompliant ...
( Category:
Windows Administration
June 9,2015 )
epub |eng | 2012-04-01 | Author:Nick Dossis [Dossis, Nick]
How to Build and Test the Board * * * NOTE Please refer to Chapter 1 for soldering tips and techniques and for generic stripboard building guidelines. * * * ...
( Category:
Digital Design
June 8,2015 )
epub |eng | 2015-05-18 | Author:Froom, Richard & Frahim, Erum
* * * Note Some devices, usually running Linux, do not send client identifiers with DHCP messages. In these cases, you can bind an IP address to a device using ...
( Category:
Networks
June 7,2015 )
epub |eng | 2015-04-08 | Author:Hans, Manoj
We are done with the desired capabilities part; now, we have to initiate the Android Driver to connect with the Appium server, but first we need to import the following ...
( Category:
Software Development
June 6,2015 )
epub |eng | 2014-04-05 | Author:Nancy C. Muir
Just remember, with good password-cracking software — available for free from the web, of course —it takes only about a minute for a hacker to crack your password and potentially ...
( Category:
Privacy & Online Safety
June 6,2015 )
azw3 |eng | 2015-04-29 | Author:Rivas, Al [Rivas, Al]
Port 69. UDP pitches up to TFTP. This is what we call the de-encapsulation process. Basically as each Layer gets the data, it strips its information from it and passes ...
( Category:
Networks, Protocols & APIs
June 5,2015 )
epub |eng | 2015-04-29 | Author:Rivas, Al
Port 69. UDP pitches up to TFTP. This is what we call the de-encapsulation process. Basically as each Layer gets the data, it strips its information from it and passes ...
( Category:
Networks, Protocols & APIs
June 5,2015 )
mobi |eng | 2014-03-12 | Author:Maniktala, Sanjaya [Maniktala, Sanjaya]
TABLE 9.1 Specifications of Choke to Be Evaluated for Application • For core-loss equations it is conventional to use half the peak-to-peak flux swing. So, as do most vendors, the ...
( Category:
Microelectronics
June 5,2015 )
epub |eng | 2015-05-04 | Author:Gilchrist, Alasdair
C – Malicious.pcap 1. What was the complete URI of the original web request that led to the client being compromised? The first thing we have to do is get ...
( Category:
Network Security
June 5,2015 )
epub |eng | 2015-05-28 | Author:Holgate, Colin & Gerdeen, Joel
Lastly, if all of these checks fail, we will return an empty string, so that this strange structured link URL doesn't go on to confuse us later: return "" end ...
( Category:
Object-Oriented Design
June 3,2015 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9810)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7808)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6807)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6803)
Running Windows Containers on AWS by Marcio Morales(6323)
Kotlin in Action by Dmitry Jemerov(5089)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5051)
Combating Crime on the Dark Web by Nearchos Nearchou(4623)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4575)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4437)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4314)
The Age of Surveillance Capitalism by Shoshana Zuboff(3977)
Python for Security and Networking - Third Edition by José Manuel Ortega(3875)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3534)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
Learn Wireshark by Lisa Bock(3491)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3353)
Blockchain Basics by Daniel Drescher(3322)
