Networking & Cloud Computing
epub |eng | 2012-01-14 | Author:Shotts, William E. [William E. Shotts Jr.]
Quantifiers Extended regular expressions support several ways to specify the number of times an element is matched. ?—Match an Element Zero Times or One Time This quantifier means, in effect, ...
( Category:
Linux & UNIX Administration
March 26,2014 )
epub, pdf |eng | 2011-10-23 | Author:Mitch Garnaat [Mitch Garnaat]
This will return a list of all of the available CloudWatch metrics. Each will be represented by a Metric object. The contents of this list will vary for each user, ...
( Category:
Cloud Computing
March 26,2014 )
mobi |eng | 2011-10-21 | Author:Michael Nielsen
Figure 7.3. Two merging spiral galaxies (known jointly as UGC 8335). Credit: NASA, ESA, the Hubble Heritage (STScl/AURA)-ESA/Hubble Collaboration, and A. Evans (University of Virginia, Charlottesville/NRAO/Stony Brook University). [In my ...
( Category:
Reference
March 25,2014 )
mobi, epub |eng | 2012-01-30 | Author:MacKinnon, Rebecca [MacKinnon, Rebecca]
CHAPTER 10 Facebookistan and Googledom In May 2010, Hong Kong–based university professor and communications scholar Lokman Tsui decided to delete his Facebook account. In a blog post explaining his decision, ...
( Category:
Social Aspects
March 25,2014 )
mobi, epub |eng | 2012-01-15 | Author:Rebecca MacKinnon
CHAPTER 10 Facebookistan and Googledom In May 2010, Hong Kong–based university professor and communications scholar Lokman Tsui decided to delete his Facebook account. In a blog post explaining his decision, ...
( Category:
Social Aspects
March 25,2014 )
mobi |eng | 2012-07-12 | Author:Johnson, Shelby [Johnson, Shelby]
Searching by Email Address Contacts If you skipped this step in the beginning, you will be given the opportunity to find Friends through this process now. Return to your profile ...
( Category:
Social Media
March 25,2014 )
mobi |eng | 2012-06-13 | Author:Gibson, Darril & Chapple, Mike & Stewart, James M. [Gibson, Darril]
Even though TLS has been in existence for more than a decade, many people still mistakenly call it SSL. For this reason, TLS has gained the nickname SSL 3.1. Steganography ...
( Category:
Network Security
March 25,2014 )
mobi, epub, pdf |eng | 2010-09-15 | Author:Robert B. Parker
Chapter35 ACCORDING TO his police folder, Goran Pappas had graduated in the top quarter of his Richdale High School class and gone on to Wickton College on a basketball scholarship. ...
( Category:
Murder
March 25,2014 )
mobi, epub, pdf | | 2005-11-14 | Author:P. G. Wodehouse
By Jove, you know, till I started to tramp the place with this infernal kid, I never had a notion it would have been so deuced difficult to restore a ...
( Category:
Humorous
March 25,2014 )
mobi | | | Author:Unknown
Back - New Search linear array Another name for one-dimensional array, i.e. for a vector. See also array. Back - New Search linear-bounded automaton (LBA) A Turing machine M such ...
( Category:
Networking & Cloud Computing
March 25,2014 )
mobi, epub, pdf |eng | 2010-10-31 | Author:chromatic
The negated form of the binding operator (!~) evaluates to a false value if the match succeeds. The qr// Operator and Regex Combinations Regexes are first-class entities in modern Perl ...
( Category:
Software Development
March 25,2014 )
mobi, pdf |eng | 2010-05-11 | Author:Glen Smith, Peter Ledbrook
static searchable = true ... } class Post { static searchable = true ... } When a domain class is marked searchable, the plugin indexes its primitive fields (strings, dates, ...
( Category:
Software Development
March 25,2014 )
mobi, epub, pdf | | 2009-06-03 | Author:Steve Souders
XHR Streaming The cleanest API for communication with the server is through an XMLHttpRequest, since it provides direct access to the response text and headers, and this is normally the ...
( Category:
Performance Optimization
March 25,2014 )
mobi |eng | 2012-01-12 | Author:Jr., William [Jr., William]
[:lower:] The lowercase letters [:punct:] The punctuation characters; in ASCII, equivalent to [-!"#$%&'()*+,./:;<=>?@[\\\]_`{|}˜] [:print:] The printable characters; all the characters in [:graph:] plus the space character [:space:] The whitespace characters ...
( Category:
Linux & UNIX Administration
March 25,2014 )
mobi, epub, pdf | | 2009-05-13 | Author:David N. Blank-Edelman
To find anyone with the last name Finkelstein or Hodgkin: (|(sn=Finkelstein)(sn=Hodgkin)) To find all of the Finkelsteins who do not work in Boston: (&(sn=Finkelstein)(!(l=Boston))) To find all the Finkelsteins or ...
( Category:
LDAP
March 25,2014 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9787)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7792)
Grails in Action by Glen Smith Peter Ledbrook(7705)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6659)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6651)
Running Windows Containers on AWS by Marcio Morales(6173)
Kotlin in Action by Dmitry Jemerov(5074)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4964)
Combating Crime on the Dark Web by Nearchos Nearchou(4556)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4435)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4425)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4219)
The Age of Surveillance Capitalism by Shoshana Zuboff(3964)
Python for Security and Networking - Third Edition by José Manuel Ortega(3790)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3515)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3457)
Mastering Python for Networking and Security by José Manuel Ortega(3359)
Learn Wireshark by Lisa Bock(3355)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3308)
