Home
>
Computers & Technology
>
Networking & Cloud Computing
>
Internet, Groupware, & Telecommunications
Internet, Groupware, & Telecommunications
mobi, epub |eng | 2016-02-29 | Author:Scott N. Schober
____________________ QUICK TIP: Look in the mirror and make sure the hat you’re wearing is the right color or you might end up behind bars. CHAPTER 14 THE INSIDER THREAT ...
( Category:
Hacking
March 1,2020 )
azw3 |eng | 2017-01-22 | Author:Greg Moss [Moss, Greg]
Remember that, if you are an administrator making these changes for another user, changing these settings will require that user to log out of the system so their session is ...
( Category:
Enterprise Applications
March 1,2020 )
epub | | | Author:Elizabeth Harrin
Communicate, Communicate, Communicate Any change to the way in which people do their jobs should be communicated effectively. Good communication will mean that people know what is coming and how ...
( Category:
Enterprise Applications
March 1,2020 )
epub |eng | 2019-11-21 | Author:Melody Karle
Search and Browse To search in Instagram, you can click on the icon that looks like a magnifying glass. The Magnifying Glass menu option helps users explore posts and news ...
( Category:
Social Media
February 29,2020 )
epub |eng | | Author:Dafydd Stuttard, Marcus Pinto
Chapter 11 Attacking Application Logic 427 The vulnerability arose from the same kind of mistake as in the error message example described previously: the application was using static storage to ...
( Category:
Privacy & Online Safety
February 29,2020 )
azw3 |eng | 2017-01-18 | Author:Alexander Drogin [Drogin, Alexander]
Understanding static classes and methods All DotNet variables used in the previous recipe had to be instantiated before they could be used, which means that methods called on such variables ...
( Category:
C & C++ Windows Programming
February 29,2020 )
epub, pdf |eng | 2017-07-06 | Author:John Carnell [Douglas Crockford]
Figure 6.11 shows how the pre-, post, and route filters fit together in terms of processing a service client’s request. Figure 6.11. The pre-, route, and post filters form a ...
( Category:
Java
February 29,2020 )
epub |eng | 2020-01-06 | Author:Todd Miller & Ryan Ripley [Todd Miller]
( Category:
Enterprise Applications
February 29,2020 )
epub |eng | 2018-11-29 | Author:Lim Mei Ying [Lim Mei Ying]
( Category:
Enterprise Applications
February 28,2020 )
epub |eng | 2019-07-07 | Author:Neal Davis [Davis, Neal]
There is no need to make any changes as all environment variables are encrypted by default with AWS Lambda Use encryption helpers that leverage AWS Key Management Service to store ...
( Category:
Client-Server Systems
February 28,2020 )
epub |eng | 2012-11-02 | Author:Dobkin, Daniel M.
We can use the tools introduced in section (2) above to understand in a semi-quantitative way what antenna configurations make sense. For example, in the portal configuration of Figure 6.21, ...
( Category:
Circuits
February 28,2020 )
epub |eng | | Author:Sébastien Ziegler
The initial UPRAAM model developed in Privacy Flag was including about 150 checks and controls, defined to assess the compliance with most applicable data protection obligations. However, this initial theoretical ...
( Category:
Electronics
February 28,2020 )
epub |eng | 2016-01-26 | Author:Scott Malcomson [Malcomson, Scott]
[T]he Administration will support removal, over time, under appropriate conditions, of judicial and legislative restrictions on all types of telecommunications companies: cable, telephone, utilities, television and satellite . … Our ...
( Category:
Internet, Groupware, & Telecommunications
February 28,2020 )
epub |eng | | Author:Sweeney, Patrick J.
Choosing a Hand-held, Mobile, or Fixed-location Reader You can choose from three types of readers for your RFID network: hand-held, mobile, or fixed-location. Many criteria enter into this decision, including ...
( Category:
Manufacturing
February 28,2020 )
epub |eng | 2011-02-26 | Author:Hay, Deltina [Hay, Deltina]
Image Sharing Sites Image sharing sites are a way for you to get some serious mileage out of your photos and other images. With the right strategy, you can maximize ...
( Category:
Web Design
February 27,2020 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9787)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7790)
Grails in Action by Glen Smith Peter Ledbrook(7705)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6648)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6637)
Running Windows Containers on AWS by Marcio Morales(6162)
Kotlin in Action by Dmitry Jemerov(5074)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4960)
Combating Crime on the Dark Web by Nearchos Nearchou(4547)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4424)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4422)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4212)
The Age of Surveillance Capitalism by Shoshana Zuboff(3964)
Python for Security and Networking - Third Edition by José Manuel Ortega(3784)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3515)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3451)
Mastering Python for Networking and Security by José Manuel Ortega(3359)
Learn Wireshark by Lisa Bock(3344)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3308)
