Home
>
Computers & Technology
>
Networking & Cloud Computing
>
Internet, Groupware, & Telecommunications
Internet, Groupware, & Telecommunications
epub, pdf |eng | 2006-04-10 | Author:Stan Gibilisco
CHAPTER 10 Geometry in Space Solid geometry involves points, lines, and planes. The difference between two-dimensional (2D) geometry and three-dimensional (3D) geometry is the fact that, well, there’s an extra ...
( Category:
Study & Teaching
April 11,2020 )
epub |eng | 2019-04-30 | Author:Lorn Potter [Lorn Potter]
Bluetooth QML There are Bluetooth QML components you can use as a client to scan and connect to Bluetooth devices as well. They are simple but functional. The source code ...
( Category:
Tools
April 5,2020 )
epub, mobi, pdf |eng | 2019-12-03 | Author:Zach Codings [Codings, Zach]
( Category:
Hacking
April 5,2020 )
epub |eng | | Author:Kanclirz, Jan , Jr.
If the server you're scanning is running HTTPS, or secure HTTP, Netcat cannot directly communicate with this port. You will need a TLS wrapper, such as stunnel, to take the ...
( Category:
Network Security
April 3,2020 )
epub, mobi |eng | 2020-03-30 | Author:Antonio Melé
RabbitMQ is running and ready to receive messages. Adding Celery to your project You have to provide a configuration for the Celery instance. Create a new file next to the ...
( Category:
Software Development
April 2,2020 )
epub |eng | 2018-07-18 | Author:Stephen Fleming
Future of Microservices Over the years, software application development has evolved from Service-Oriented Architecture (SOA) to monolith architecture and now microservices architecture, which is the most preferred software application technique. ...
( Category:
Tools
April 2,2020 )
epub, pdf |eng | 2018-08-29 | Author:Andrew Lock [Andrew Lock]
( Category:
Software Development
April 1,2020 )
epub |eng | | Author:Rushikesh Kamalapurkar, Patrick Walters, Joel Rosenfeld & Warren Dixon
(4.36) The saturated least-squares update law in (4.34) ensures that there exist positive constants such that Using the bounds on and and the fact that , the candidate Lyapunov function ...
( Category:
Calculus
March 31,2020 )
epub |eng | | Author:Thomas G. Robertazzi
2.ODU (Optical Data Unit): ODU overhead includes optical path level monitoring, claim indication, protection switching bytes, and embedded communication channels. The ODU is the payload that is groomed and switched ...
( Category:
Networks
March 28,2020 )
epub |eng | 2019-09-20 | Author:Xun (Brian) Wu [Xun (Brian) Wu]
We were able to create the art token and list the art in the art market. Next, we will implement the buyer functions. Implementing the buyArt() function The users can ...
( Category:
Software Development
March 28,2020 )
epub |eng | 2015-12-09 | Author:Paul Huang [Huang, Paul]
An elaborate description on how verification is done presented in Chapter Script. For now, it is sufficient to say that EvalScript() verifies that the newly created transaction wtxNew contains the ...
( Category:
Internet, Groupware, & Telecommunications
March 27,2020 )
epub |eng | 2015-05-23 | Author:Erl, Thomas & Cope, Robert & Naserpour, Amin
Mechanisms • Cloud Storage Device – The cloud storage device provides the storage space that is needed to host and provision IT resources, in addition to application baseline information, templates, ...
( Category:
Client-Server Systems
March 27,2020 )
mobi, epub |eng | 2016-07-13 | Author:Manuel Bernhardt
Dealing with unhandled messages You can log any unhandled messages in an actor by overriding the unhandled method, like so: class SomeActor extends Actor with ActorLogging { override def unhandled(message: ...
( Category:
Testing
March 27,2020 )
epub |eng | | Author:Martin Tomlinson, Cen Jung Tjhai, Marcel A. Ambroze, Mohammed Ahmed & Mubarak Jibril
i 1 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, 10 Weight Distributions of Quadratic Double-Circulant Codes and their Modulo Congruence Primes 3 Modulo 8 Prime 11 We ...
( Category:
Internet & Networking
March 27,2020 )
epub |eng | | Author:Ben Rady
Joe asks: But You Promised?! Given my preference for web standards, you might be wondering why we’re not using a Promise/A+ compatible object to manage our identity information. Since Promises ...
( Category:
Software Development
March 26,2020 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9786)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7789)
Grails in Action by Glen Smith Peter Ledbrook(7705)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6635)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6621)
Running Windows Containers on AWS by Marcio Morales(6149)
Kotlin in Action by Dmitry Jemerov(5073)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4953)
Combating Crime on the Dark Web by Nearchos Nearchou(4537)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4422)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4404)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4206)
The Age of Surveillance Capitalism by Shoshana Zuboff(3964)
Python for Security and Networking - Third Edition by José Manuel Ortega(3776)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3515)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3442)
Mastering Python for Networking and Security by José Manuel Ortega(3358)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Learn Wireshark by Lisa Bock(3329)
Blockchain Basics by Daniel Drescher(3306)
