Home
>
Computers & Technology
>
Networking & Cloud Computing
>
Internet, Groupware, & Telecommunications
Internet, Groupware, & Telecommunications
epub |eng | 2011-01-20 | Author:McGonigal, Jane [McGonigal, Jane]
CRUEL 2 B KIND, like many happiness hacks, isn’t a product. There’s no software to download, no license to buy, no fee to pay. It’s meant to be a solution ...
( Category:
Cognitive Psychology
June 12,2015 )
epub, mobi |eng | 2010-01-12 | Author:Lanier, Jaron [Lanier, Jaron]
CHAPTER 6 The Lords of the Clouds Renounce Free Will in Order to Become Infinitely Lucky OUT-OF-CONTROL financial instruments are linked to the fates of musicians and the fallacies of ...
( Category:
Internet, Groupware, & Telecommunications
June 12,2015 )
epub, pdf |eng | 2010-04-16 | Author:Charles Babcock [Babcock, Charles]
M A N A G E M E N T S T R A T E G I E S F O R T H E C L O U ...
( Category:
Strategic Planning
June 12,2015 )
mobi, epub, pdf |eng | 2010-01-05 | Author:Jaron Lanier
CHAPTER 6 The Lords of the Clouds Renounce Free Will in Order to Become Infinitely Lucky OUT-OF-CONTROL financial instruments are linked to the fates of musicians and the fallacies of ...
( Category:
Internet, Groupware, & Telecommunications
June 11,2015 )
mobi, epub |eng | 2007-11-28 | Author:Microsoft
Brian would respond to the meeting request for this new meeting just as he would one that didn't have a recurrence. He would create the appropriate meeting registration response object ...
( Category:
Email Administration
June 11,2015 )
mobi, pdf |eng | 2009-06-01 | Author:Steve Souders
* * * [33] http://www.fettig.net/weblog/2005/11/30/xmlhttprequest-subdomain-update/ [34] http://www.whatwg.org/specs/web-apps/current-work/#crossDocumentMessages [35] http://ajaxian.com/archives/jsonp-json-with-padding [36] This is primarily an issue for Internet Explorer 6 and 7. Browser connection limits are explained in Chapter 11. Effects ...
( Category:
Software Development
June 11,2015 )
mobi, pdf |eng | 2007-01-15 | Author:Michael Rash
[ext_scanner]# nmap -sF -P0 -p 80 -n 71.157.X.X Starting Nmap 4.01 ( http://www.insecure.org/nmap/ ) at 2007-03-05 20:50 EST Interesting ports on 71.157.X.X: PORT STATE SERVICE 80/tcp open|filtered http Nmap finished: ...
( Category:
Networking & System Administration
June 11,2015 )
mobi, pdf |eng | 2011-01-20 | Author:Fehily, Chris [Fehily, Chris]
Metasearch Sites A metasearch site doesn’t compile its own index but searches other sites and aggregates the results. A Torrentz search, for example, returns a list of links to other ...
( Category:
Internet, Groupware, & Telecommunications
June 11,2015 )
mobi, epub |eng | 2007-11-28 | Author:Rice, David [Rice, David]
To put this problem in context, when concrete is used for a roadway, it increases the speed cars are permitted to drive. When crumple zones are added to vehicles it ...
( Category:
Quality Control
June 11,2015 )
mobi, epub |eng | 2015-03-23 | Author:Abby Stokes
( Category:
Internet, Groupware, & Telecommunications
June 10,2015 )
epub |eng | 2014-05-15 | Author:Richard G. Lyons & D. Lee Fugal [Lyons, Richard G.]
Figure 5-20 Hypothetical analog music signal: (a) original music signal spectrum; (b) digital signal spectrum showing overlapped spectral replications; (c) contaminated spectrum of the analog playback signal from a CD. ...
( Category:
Signal Processing
June 9,2015 )
epub |eng | 2012-04-01 | Author:Nick Dossis [Dossis, Nick]
How to Build and Test the Board * * * NOTE Please refer to Chapter 1 for soldering tips and techniques and for generic stripboard building guidelines. * * * ...
( Category:
Digital Design
June 8,2015 )
epub |eng | 2015-04-08 | Author:Hans, Manoj
We are done with the desired capabilities part; now, we have to initiate the Android Driver to connect with the Appium server, but first we need to import the following ...
( Category:
Software Development
June 6,2015 )
epub |eng | 2014-04-05 | Author:Nancy C. Muir
Just remember, with good password-cracking software — available for free from the web, of course —it takes only about a minute for a hacker to crack your password and potentially ...
( Category:
Privacy & Online Safety
June 6,2015 )
mobi |eng | 2014-03-12 | Author:Maniktala, Sanjaya [Maniktala, Sanjaya]
TABLE 9.1 Specifications of Choke to Be Evaluated for Application • For core-loss equations it is conventional to use half the peak-to-peak flux swing. So, as do most vendors, the ...
( Category:
Microelectronics
June 5,2015 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9796)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7796)
Grails in Action by Glen Smith Peter Ledbrook(7707)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6708)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6707)
Running Windows Containers on AWS by Marcio Morales(6224)
Kotlin in Action by Dmitry Jemerov(5077)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4990)
Combating Crime on the Dark Web by Nearchos Nearchou(4578)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4485)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4429)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4249)
The Age of Surveillance Capitalism by Shoshana Zuboff(3966)
Python for Security and Networking - Third Edition by José Manuel Ortega(3818)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3517)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3486)
Learn Wireshark by Lisa Bock(3400)
Mastering Python for Networking and Security by José Manuel Ortega(3364)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3339)
Blockchain Basics by Daniel Drescher(3309)
