Networking & Cloud Computing
epub, pdf |eng | 2012-09-25 | Author:Eric Sammer [Eric Sammer]
Example: 0700 See Example 6-5 for a sample hdfs-site.xml file configured for security. Example 6-5. Updating hdfs-site.xml to enable Hadoop security <?xml version="1.0"?> <configuration> <property> <name>dfs.block.access.token.enable</name> <value>true</value> </property> <!-- NameNode ...
( Category:
Java
March 3,2015 )
mobi |eng | 2012-10-20 | Author:The Economist
* * * This article was downloaded by calibre from http://www.economist.com/news/europe/21564902-yet-another-austerity-budget-raises-concerns-about-future-growth/print | Section Menu | Main Menu | | Next | Section Menu | Main Menu | Previous | * ...
( Category:
Macroeconomics
March 3,2015 )
epub |eng | 2011-03-08 | Author:Todd Lammle [Lammle, Todd]
A. Any available route B. RIP route C. Static route D. EIGRP route E. They will all load-balance. 17. You have the following routing table. Which of the following networks ...
( Category:
Networks
March 3,2015 )
epub |eng | 2013-05-16 | Author:Erl, Thomas & Puttini, Ricardo & Mahmood, Zaigham [Erl, Thomas]
* * * Case Study Example DTGOV has been offering its cloud consumers a user-friendly remote administration system for some time, and recently determined that upgrades are required in order ...
( Category:
Networking & Cloud Computing
February 15,2015 )
azw3, mobi |eng | 2009-02-08 | Author:Corbet, Jonathan & Rubini, Alessandro & Kroah-Hartman, Greg [Corbet, Jonathan]
Hardware Abstractions We complete the discussion of PCI by taking a quick look at how the system handles the plethora of PCI controllers available on the marketplace. This is just ...
( Category:
Device Drivers
February 13,2015 )
azw3 |eng | 2009-03-01 | Author:Donahoo, Michael J. & Calvert, Kenneth L. [Donahoo, Michael J.]
The method GetNextMsg() reads data from the given stream and places it in the given buffer until it runs out of room or determines that it has received a complete ...
( Category:
TCP-IP
February 13,2015 )
azw3 |eng | 2013-09-02 | Author:Pahlavan, Kaveh & Krishnamurthy, Prashant [Pahlavan, Kaveh]
Secret-key algorithms such as AES are based on two principles: confusion and diffusion. The former introduces a layer of scrambling that creates confusion as to what exactly might be the ...
( Category:
Mobile & Wireless
February 13,2015 )
azw3 |eng | 2012-12-14 | Author:
It is ironic that Cass would not include the liminality of gays among her themes, particularly since her best known work arguably is her refinement of the stepped model for ...
( Category:
Networks
February 13,2015 )
mobi, epub, pdf |eng | 2009-02-08 | Author:Greg Kroah-Hartman
Synopsis ihash_entries= n Override the default number of hash buckets for the kernel's inode cache. Recommended only for kernel experts. Name max_addr — Ignore memory. Synopsis max_addr= n Cause the ...
( Category:
Unix
February 13,2015 )
mobi, epub, pdf |eng | 2011-09-04 | Author:Massimo Banzi
( Category:
Robotics & Automation
February 12,2015 )
epub, mobi, azw3 |eng | 2012-08-31 | Author:Janice (ginny) Redish [Redish, Janice]
Thinking about headings also helps authors Headings form an outline of what you are going to write. Planning the headings is a way of analyzing the information you have, grouping ...
( Category:
User Experience & Usability
February 5,2015 )
epub, mobi |eng | 2009-09-18 | Author:Tom Standage
crYPTOGRAPHY—tinkering with codes and ciphers—was a common hobby among Victorian gentlemen. Wheatstone and his friend Charles Bab-bage, who is best known for his failed attempts to build a mechanical computer, ...
( Category:
History of Technology
January 28,2015 )
epub |eng | 2014-01-25 | Author:Jason Beaird, James George [Beaird, Jason]
Figure 3.12. Speed Kids It may not be apparent at first, but the shapes in this page’s illustration are the key elements that define the layout. One way to determine ...
( Category:
Web Design
January 26,2015 )
epub, pdf |eng | 2012-06-26 | Author:Janice (Ginny) Redish
Thinking about headings also helps authors Headings form an outline of what you are going to write. Planning the headings is a way of analyzing the information you have, grouping ...
( Category:
User Experience & Usability
January 26,2015 )
epub |eng | | Author:Scott F. Andrews [Scott F. Andrews]
Why Lead Raids? At this point, you may be wondering if it's all worthwhile. Raid leading is by far the most difficult job that an officer can undertake. You have ...
( Category:
Internet, Groupware, & Telecommunications
January 25,2015 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9799)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7799)
Grails in Action by Glen Smith Peter Ledbrook(7712)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6734)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6734)
Running Windows Containers on AWS by Marcio Morales(6246)
Kotlin in Action by Dmitry Jemerov(5080)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5002)
Combating Crime on the Dark Web by Nearchos Nearchou(4588)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4510)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4431)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4261)
The Age of Surveillance Capitalism by Shoshana Zuboff(3968)
Python for Security and Networking - Third Edition by José Manuel Ortega(3832)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3521)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3500)
Learn Wireshark by Lisa Bock(3419)
Mastering Python for Networking and Security by José Manuel Ortega(3366)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3342)
Blockchain Basics by Daniel Drescher(3314)
