Networking & Cloud Computing
epub, pdf |eng | 2010-12-14 | Author:Robert Faludi [Robert Faludi]
Chapter 6. Sleeping, Then Changing the World Whew! At this point, the book has covered a lot of ground and you have come a long way in a very short ...
( Category:
Networks
January 25,2015 )
epub |eng | 2013-09-14 | Author:Todd Lammle
We’ll cover these types of access lists in more depth later in the chapter. Once you create an access list, it’s not really going to do anything until you apply ...
( Category:
Networks, Protocols & APIs
January 24,2015 )
epub, pdf |eng | 2015-01-01 | Author:Srikanth Ramesh [Ramesh, Srikanth]
Figure 8. 17 Next, to load the dumped password hashes, click on "Load" button, select "PWDUMP file" option and load the hash.txt file obtained by running the PWDUMP tool on ...
( Category:
Hacking
January 20,2015 )
azw3, epub |eng | 2015-01-26 | Author:Norris, Donald [Norris, Donald]
Using Python with the Raspberry Pi Camera I will use a clever Python library named python-picamera, created by Dave Jones (Github), which will permit the Pi Camera to both be ...
( Category:
Electronics
January 19,2015 )
mobi, pdf |eng | 2010-08-18 | Author:Jim Boyce
ChAPTER 20 Scheduling Meetings and Resources Sending a Meeting Request . . . . . . . . . . . . . . . . . . . . ...
( Category:
Email Administration
January 19,2015 )
epub |eng | 2015-01-06 | Author:Mehmet Toy [Toy, Mehmet]
Figure 4.32. Migration to FTTH with EPoC technology. At some point in the future, perhaps when competitive pressures dictate 1 Gbps residential service offerings, cable operators can install fiber media ...
( Category:
Telecommunications & Sensors
January 14,2015 )
epub, azw3, mobi, pdf |eng | 2015-01-06 | Author:Andrew Keen [Keen, Andrew]
CHAPTER SIX THE ONE PERCENT ECONOMY An Abundance of Stupidity My own epiphany about the Internet’s disastrous impact on culture is well documented. In the fall of 2005, I was ...
( Category:
E-Commerce
January 12,2015 )
epub |eng | 2015-01-07 | Author:Mischa Taylor
Figure 9-14. Node detail In order to run vagrant halt to perform a graceful shutdown of your virtual machines, you’ll need to make sure the Vagrantfile directory that is used ...
( Category:
Network Administration
January 8,2015 )
mobi, epub |eng | 2011-01-19 | Author:McGonigal, Jane [McGonigal, Jane]
CRUEL 2 B KIND, like many happiness hacks, isn’t a product. There’s no software to download, no license to buy, no fee to pay. It’s meant to be a solution ...
( Category:
Cognitive Psychology
January 6,2015 )
mobi | | | Author:Christopher Hadnagy
( Category:
Hacking
January 6,2015 )
mobi |eng | 2011-07-01 | Author:Kevin Mitnick
I did a directory listing to find out what files were on the computer, looking for the LocK-11 program and associated files and stumbled on something I found shocking: a ...
( Category:
Human-Computer Interaction
January 6,2015 )
mobi | | | Author:Nitesh Dhanjani
( Category:
Software Development
January 6,2015 )
epub |eng | 2011-03-22 | Author:Christopher Negus & Francois Caen
When you set out to create your ISO image, consider where you will ultimately need to access the files you back up using mkisofs (Linux, Windows, or Macs). Once the ...
( Category:
Linux Programming
January 6,2015 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6838)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6837)
Running Windows Containers on AWS by Marcio Morales(6364)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5069)
Combating Crime on the Dark Web by Nearchos Nearchou(4647)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4613)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4437)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4335)
The Age of Surveillance Capitalism by Shoshana Zuboff(3979)
Python for Security and Networking - Third Edition by José Manuel Ortega(3895)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3554)
Learn Wireshark by Lisa Bock(3529)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3355)
Blockchain Basics by Daniel Drescher(3325)
