Networking & Cloud Computing
epub, pdf |eng | 2010-12-14 | Author:Robert Faludi [Robert Faludi]

Chapter 6. Sleeping, Then Changing the World Whew! At this point, the book has covered a lot of ground and you have come a long way in a very short ...
( Category: Networks January 25,2015 )
epub |eng | 2013-09-14 | Author:Todd Lammle

We’ll cover these types of access lists in more depth later in the chapter. Once you create an access list, it’s not really going to do anything until you apply ...
( Category: Networks, Protocols & APIs January 24,2015 )
epub, pdf |eng | 2015-01-01 | Author:Srikanth Ramesh [Ramesh, Srikanth]

Figure 8. 17 Next, to load the dumped password hashes, click on "Load" button, select "PWDUMP file" option and load the hash.txt file obtained by running the PWDUMP tool on ...
( Category: Hacking January 20,2015 )
azw3, epub |eng | 2015-01-26 | Author:Norris, Donald [Norris, Donald]

Using Python with the Raspberry Pi Camera I will use a clever Python library named python-picamera, created by Dave Jones (Github), which will permit the Pi Camera to both be ...
( Category: Electronics January 19,2015 )
mobi, pdf |eng | 2010-08-18 | Author:Jim Boyce

ChAPTER 20 Scheduling Meetings and Resources Sending a Meeting Request . . . . . . . . . . . . . . . . . . . . ...
( Category: Email Administration January 19,2015 )
epub |eng | 2015-01-06 | Author:Mehmet Toy [Toy, Mehmet]

Figure 4.32. Migration to FTTH with EPoC technology. At some point in the future, perhaps when competitive pressures dictate 1 Gbps residential service offerings, cable operators can install fiber media ...
( Category: Telecommunications & Sensors January 14,2015 )
epub, azw3, mobi, pdf |eng | 2015-01-06 | Author:Andrew Keen [Keen, Andrew]

CHAPTER SIX THE ONE PERCENT ECONOMY An Abundance of Stupidity My own epiphany about the Internet’s disastrous impact on culture is well documented. In the fall of 2005, I was ...
( Category: E-Commerce January 12,2015 )
epub |eng | 2015-01-07 | Author:Mischa Taylor

Figure 9-14. Node detail In order to run vagrant halt to perform a graceful shutdown of your virtual machines, you’ll need to make sure the Vagrantfile directory that is used ...
( Category: Network Administration January 8,2015 )
mobi, epub |eng | 2011-01-19 | Author:McGonigal, Jane [McGonigal, Jane]

CRUEL 2 B KIND, like many happiness hacks, isn’t a product. There’s no software to download, no license to buy, no fee to pay. It’s meant to be a solution ...
( Category: Cognitive Psychology January 6,2015 )
mobi | | | Author:Chey Cobb

( Category: Encryption January 6,2015 )
mobi | | | Author:Christopher Hadnagy

( Category: Hacking January 6,2015 )
mobi |eng | 2011-07-01 | Author:Kevin Mitnick

I did a directory listing to find out what files were on the computer, looking for the LocK-11 program and associated files and stumbled on something I found shocking: a ...
( Category: Human-Computer Interaction January 6,2015 )
mobi | | | Author:Mara Friedman

( Category: Consumer Guides January 6,2015 )
mobi | | | Author:Nitesh Dhanjani

( Category: Software Development January 6,2015 )
epub |eng | 2011-03-22 | Author:Christopher Negus & Francois Caen

When you set out to create your ISO image, consider where you will ultimately need to access the files you back up using mkisofs (Linux, Windows, or Macs). Once the ...
( Category: Linux Programming January 6,2015 )