Home
>
Computers & Technology
>
Networking & Cloud Computing
>
Internet, Groupware, & Telecommunications
Internet, Groupware, & Telecommunications
epub, pdf |eng | 2009-04-17 | Author:Andy Oram
Breakers usually represent the glass as half empty, and are often so pessimistic that you wonder, when listening to some of them, why the Internet hasn’t totally collapsed already and ...
( Category:
Networks
May 12,2019 )
epub |eng | 2019-04-23 | Author:Ken Withee & Ken Withee
Discovering SharePoint Views A number of apps ship with SharePoint, and you can also create custom apps (as we discuss in Chapter 11). SharePoint also lets you create additional pages, ...
( Category:
LAN
May 11,2019 )
epub |eng | 2015-02-08 | Author:Swan, Melanie [Swan, Melanie]
Blockchain Genomics 2.0: Industrialized All-Human-Scale Sequencing Solution At one level, there could be blockchain-enabled services where genomic data is sequenced and made available to individuals by private key outside the ...
( Category:
Cryptography
May 10,2019 )
epub |eng | 2015-05-09 | Author:Wright, Joshua
* * * A sample packet capture of a Fitbit One device that can be displayed using the SmartRF Packet Sniffer software (without the CC2540 USB hardware) is available on ...
( Category:
Cryptography
May 9,2019 )
epub |eng | 2019-03-25 | Author:J. David Eisenberg [J. David Eisenberg]
( Category:
Internet, Groupware, & Telecommunications
May 8,2019 )
epub, pdf |eng | 2019-05-03 | Author:Kalle Rosenbaum [Kalle Rosenbaum]
( Category:
Cryptography
May 7,2019 )
epub |eng | 2018-12-17 | Author:Stanley Siegel & Chris Williams & Scott Donaldson [Stanley Siegel]
Guarding Against Counterfeit E-Mails and Secure E-Mail Because e-mail protocols are inherently insecure, it may be possible for attackers to generate and send counterfeit e-mails. Counterfeit e-mails may appear to ...
( Category:
Hacking
May 6,2019 )
epub |eng | 2013-04-29 | Author:Mark Baker
-- “Why On-Site Searching Stinks” You still have to provide appetizing content at the end of your links, of course. Each link should point to a good Every Page is ...
( Category:
Content Management
April 29,2019 )
epub |eng | 2012-06-26 | Author:Kelby Carr
Figure 2-3: You can add contributors to a board. Some people don’t like to be added to boards without being asked first, especially because the boards then appear on their ...
( Category:
Internet, Groupware, & Telecommunications
April 25,2019 )
epub |eng | 2018-10-01 | Author:Lagorio-Chafkin, Christine;
Breaking and entering would be the cleanest of the charges piled on Swartz over the following year, all stemming from the late 2010 and early 2011 download of more than ...
( Category:
Internet, Groupware, & Telecommunications
April 23,2019 )
epub |eng | 2018-08-28 | Author:Simone Cirani,Gianluigi Ferrari,Marco Picone,Luca Veltri
4.4.2 Efficient Multiple Unicast Forwarding While the described algorithm implements an optimized flooding mechanism by avoiding loops through the introduction of Bloom filters, broadcasting with the ContikiMAC radio duty‐cycling protocol ...
( Category:
Mobile & Wireless
April 13,2019 )
epub |eng | 2017-04-05 | Author:Elizabeth Cobbs
“First very important message through & I had to relay it,” Berthe Hunt recorded cryptically at Neufchateau on May 27, the day the army’s First Infantry Division moved into position ...
( Category:
Women in History
April 13,2019 )
epub, mobi |eng | | Author:David Kushner
CHAPTER 8 RANCHO Not just anyone could get a home in Rancho Santa Fe, the posh enclave of five thousand residents thirty miles north of San Diego. Dubbed “the richest ...
( Category:
Scientists
April 10,2019 )
epub |eng | 2014-04-08 | Author:Richard G. Lyons,D. Lee Fugal & D. Lee Fugal
Figure 5-20 Hypothetical analog music signal: (a) original music signal spectrum; (b) digital signal spectrum showing overlapped spectral replications; (c) contaminated spectrum of the analog playback signal from a CD. ...
( Category:
Signal Processing
April 9,2019 )
mobi |eng | 2019-03-20 | Author:Novelli, Stefano & Silvestri, Marco [Novelli, Stefano]
Figure 23: results of a conventional Opera browser on Panopticlick 6.10.2 Defending yourself from Browser Fingerprinting If you accurately followed each single recommendation from the previous topics, your browser is ...
( Category:
Hacking
April 7,2019 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9794)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7796)
Grails in Action by Glen Smith Peter Ledbrook(7706)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6704)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6701)
Running Windows Containers on AWS by Marcio Morales(6220)
Kotlin in Action by Dmitry Jemerov(5077)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4989)
Combating Crime on the Dark Web by Nearchos Nearchou(4576)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4481)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4428)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4246)
The Age of Surveillance Capitalism by Shoshana Zuboff(3966)
Python for Security and Networking - Third Edition by José Manuel Ortega(3818)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3517)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3484)
Learn Wireshark by Lisa Bock(3396)
Mastering Python for Networking and Security by José Manuel Ortega(3364)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3339)
Blockchain Basics by Daniel Drescher(3309)
