Networking & Cloud Computing
epub, mobi |eng | 2011-05-16 | Author:Pfister, Cuno [Cuno Pfister]
Chapter 11. Handling Sensor Requests Chapter 10 is an example of an HTTP server, but it doesn’t use any sensors or actuators. In this chapter, I’ll show how you can ...
( Category:
Single Board Computers
March 31,2014 )
epub |eng | 2011-09-15 | Author:Craig, Terence, Ludloff, Mary E. [Terence Craig and Mary E. Ludloff]
The Consumer Financial Protection Bureau, “Know Before You Owe” The Library of Congress, “Wall Street Reform and Consumer Protection Act of 2009” U.S. Department of the Treasury, “Bureau of Consumer ...
( Category:
Electronic Data Interchange (EDI)
March 31,2014 )
epub |eng | 2014-02-23 | Author:Alcorn, Wade, Frichot, Christian, Orru, Michele & Christian Frichot & Michele Orru
Using BeEF with Metasploit Integrating BeEF and Metasploit allows you to control a browser, fingerprint it, and get as much information as you can before you try to exploit it. ...
( Category:
Hacking
March 30,2014 )
epub |eng | 2014-03-27 | Author:Michael Manoochehri
What Is a Data Pipeline? At my local corner store, there is usually only one person working at any given time. This person runs the register, stocks items, and helps ...
( Category:
Storage & Retrieval
March 28,2014 )
epub |eng | | Author:LED Bulbs
( Category:
Activities, Crafts & Games
March 27,2014 )
epub, mobi |eng | 2011-06-15 | Author:P. G. Wodehouse [Wodehouse, Pelham Grenville]
( Category:
Humorous
March 26,2014 )
epub | | 2013-07-07 | Author:The Celestial Omnibus
II Other Kingdom Copse is just like any other beech copse, and I am therefore spared the fatigue of describing it. And the stream in front of it, like many ...
( Category:
Short Stories
March 26,2014 )
epub |eng | 2012-03-25 | Author:Mike Shea & F. Alton Everest
( Category:
Networking & Cloud Computing
March 26,2014 )
epub, pdf |eng | 2013-04-24 | Author:Stoyan Stefanov
var a = []; var array_like = { length: 1, 0: 1 }; If you test with: if ('length' in array_like) {} or if (array_like.hasOwnProperty('0')) {} or a similar “duck ...
( Category:
Object-Oriented Design
March 26,2014 )
epub |eng | 2012-09-11 | Author:Jon Galloway
MVC Areas Areas, introduced in ASP.NET MVC 2, allow you to divide your models, views, and controllers into separate functional sections. This means you can separate larger or more complex ...
( Category:
Software Development
March 26,2014 )
epub |eng | 2010-07-06 | Author:Joe Kraynak & Mikal E. Belicove [Kraynak, Joe & Belicove, Mikal E.]
Chatting with the Group Few things in life are more invigorating than chatting with a group, and now Facebook has made that possible. With Group Chat, everyone in the group ...
( Category:
Social Media
March 26,2014 )
epub, pdf |eng | 2012-12-18 | Author:Cody Lindley [Cody Lindley]
Using the this Keyword Inside a User-Defined Constructor Function When a function is invoked with the new keyword, the value of this—as it’s stated in the constructor—refers to the instance ...
( Category:
Internet, Groupware, & Telecommunications
March 26,2014 )
epub |eng | 2013-08-04 | Author:Smith, Jennifer [Smith, Jennifer]
Figure 4-13: Cloning in perspective. Chapter 5: Using the Photoshop Pen Tool In This Chapter Selecting the Pen tool for the task Using a path as a selection Creating curved ...
( Category:
Adobe
March 26,2014 )
epub |eng | 2012-08-27 | Author:Robert J. Bartz
Frames Used for Active Scanning During the active scanning process, two frames are exchanged between the device and the access point. 1. The wireless LAN device sends a broadcast probe ...
( Category:
LAN
March 26,2014 )
epub, pdf |eng | 2013-08-07 | Author:Thomas D. Nadeau & Ken Gray
Billing system interface after provisioning operations are executed Workflow automation Adding and removing virtual machines to and from tenants Specifying the bandwidth, quality of service, and security attributes of a ...
( Category:
Networks
March 26,2014 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9798)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7799)
Grails in Action by Glen Smith Peter Ledbrook(7711)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6725)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6724)
Running Windows Containers on AWS by Marcio Morales(6238)
Kotlin in Action by Dmitry Jemerov(5080)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4998)
Combating Crime on the Dark Web by Nearchos Nearchou(4584)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4500)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4430)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4257)
The Age of Surveillance Capitalism by Shoshana Zuboff(3968)
Python for Security and Networking - Third Edition by José Manuel Ortega(3826)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3521)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3496)
Learn Wireshark by Lisa Bock(3412)
Mastering Python for Networking and Security by José Manuel Ortega(3366)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3341)
Blockchain Basics by Daniel Drescher(3312)
