Home
>
Computers & Technology
>
Networking & Cloud Computing
>
Internet, Groupware, & Telecommunications
Internet, Groupware, & Telecommunications
epub |eng | 2015-03-15 | Author:Joshua Wright & Johnny Cache [Wright, Joshua]
* * * * * * Figure 9-8 SmartRF Packet Sniffer data A sample packet capture of a Fitbit One device that can be displayed using the SmartRF Packet Sniffer ...
( Category:
Internet, Groupware, & Telecommunications
April 22,2015 )
epub, pdf |eng | 2015-03-21 | Author:Ambily K K [K K, Ambily]
Figure 9: Adding an entity data model based on the Course and Status tables After we define the data model, we can generate the Web API controller that corresponds to ...
( Category:
C & C++ Windows Programming
April 9,2015 )
mobi, epub |eng | 2007-06-19 | Author:Jeanine Basinger
Durbin posed in her own home with her real-life parents for their Christmas card. Deanna Durbin was quickly put into two new films to be made and released in 1938: ...
( Category:
State & Local
April 5,2015 )
mobi, epub |eng | 2011-01-10 | Author:Turkle, Sherry [Turkle, Sherry]
PRESENTATION ANXIETY What are the truth claims in a Facebook profile? How much can you lie? And what is at stake if you do? Nancy, an eighteen-year-old senior at Roosevelt, ...
( Category:
Interpersonal Relations
March 24,2015 )
epub |eng | 2010-11-01 | Author:Tim Wu [Wu, Tim]
As Friendly, Smith, and the others championed cable, its true white knight lurked unsuspected in the Nixon White House in the person of Clay Whitehead. At the age of thirty-two, ...
( Category:
Communications
March 23,2015 )
epub, mobi, pdf |eng | 2008-12-16 | Author:Douglas Crockford [Douglas Crockford]
Regexp Group There are four kinds of groups: Capturing A capturing group is a regexp choice wrapped in parentheses. The characters that match the group will be captured. Every capture ...
( Category:
Software Development
March 23,2015 )
epub |rus | 2009-03-31 | Author:George Reese [Reese, George]
* * * As with other components in your web application architecture, putting your database in a replication architecture gives it the ability to rapidly recover from a node failure ...
( Category:
Intranets & Extranets
March 22,2015 )
azw3 |eng | 2015-04-02 | Author:Matthews, Marty & Matthews, Carole [Matthews, Marty]
NOTE It takes a while before Calendar will see a new mail calendar. Delete a Calendar As in adding calendars, you can delete them either from mail accounts or from ...
( Category:
iPhone
March 15,2015 )
mobi, epub, pdf |eng | 2008-07-13 | Author:Paul Graham
where w is the token whose probability we're calculating, good and bad are the hash tables I created in the first step, and G and B are the number of ...
( Category:
Internet, Groupware, & Telecommunications
March 12,2015 )
epub, mobi, pdf |eng | 2012-03-09 | Author:Rachel Andrew [Andrew, Rachel]
The new styles can be seen in Figure 6.5. Figure 6.5. The form, now with added style Discussion I’ve used CSS to add a border to the input elements in ...
( Category:
Hacking
March 10,2015 )
mobi |eng | 2015-02-11 | Author:Mohammad Tanvir Hossain
CHAPTER 6 Who Is A HACKER? A hacker is someone who finds out the weakness in the computer system or network. The activity of a hacker can be motivated by ...
( Category:
Internet, Groupware, & Telecommunications
March 5,2015 )
epub |eng | 2014-07-24 | Author:Michael Gurnow [Gurnow, Michael]
Chapter 7 Black Rain “The immoral cannot be made moral through the use of secret law.” –Edward Snowden, public statement made during the G9 meeting, July 12, 20131 The fallout ...
( Category:
National
March 4,2015 )
epub, pdf |eng | 2011-03-03 | Author:Danny Dover & Erik Dafforn
Is Company XYZ a Google Killer? I always answer this question the same way. I have no idea what a Google Killer will look like, but I would imagine that ...
( Category:
E-Commerce
March 4,2015 )
mobi |eng | 2011-01-11 | Author:Kurose, James F. & Keith W. Ross [Kurose, James F.]
b. Suppose a central node determines paths and VC numbers at connection setup. Suppose the same VC number is used on each link along the VC’s path. Describe how the ...
( Category:
Networks
March 4,2015 )
epub, pdf |eng | 2014-12-03 | Author:Lara Callender Hogan
<link href="http://fonts.googleapis.com/css?family=Philosopher &subset=cyrillic" rel="stylesheet" /> If you want to load only certain characters from a Google hosted font, you can specify those as well. For example, we can load the ...
( Category:
Testing
March 4,2015 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9807)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7805)
Grails in Action by Glen Smith Peter Ledbrook(7718)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6782)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6778)
Running Windows Containers on AWS by Marcio Morales(6295)
Kotlin in Action by Dmitry Jemerov(5088)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5035)
Combating Crime on the Dark Web by Nearchos Nearchou(4612)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4553)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4437)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4299)
The Age of Surveillance Capitalism by Shoshana Zuboff(3972)
Python for Security and Networking - Third Edition by José Manuel Ortega(3862)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3520)
Learn Wireshark by Lisa Bock(3470)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3352)
Blockchain Basics by Daniel Drescher(3321)
