Home
>
Computers & Technology
>
Networking & Cloud Computing
>
Internet, Groupware, & Telecommunications
Internet, Groupware, & Telecommunications
epub, pdf |eng | 2015-02-25 | Author:Donabel Santos [Santos, Donabel]
Listing databases and tables Let's start out by listing the current databases. The SMO Server class has access to all the databases in that instance, so a server variable will ...
( Category:
Enterprise Applications
March 4,2015 )
mobi |eng | 2013-10-06 | Author:Gregg, Brendan [Gregg, Brendan]
Table 8.5 File System Benchmark Expectations Some file system benchmark tools are not clear about what they are testing and may imply a disk benchmark but use a small total ...
( Category:
LAN
March 3,2015 )
azw3 |eng | 2009-03-01 | Author:Donahoo, Michael J. & Calvert, Kenneth L. [Donahoo, Michael J.]
The method GetNextMsg() reads data from the given stream and places it in the given buffer until it runs out of room or determines that it has received a complete ...
( Category:
TCP-IP
February 13,2015 )
azw3 |eng | 2013-09-02 | Author:Pahlavan, Kaveh & Krishnamurthy, Prashant [Pahlavan, Kaveh]
Secret-key algorithms such as AES are based on two principles: confusion and diffusion. The former introduces a layer of scrambling that creates confusion as to what exactly might be the ...
( Category:
Mobile & Wireless
February 13,2015 )
azw3 |eng | 2012-12-14 | Author:
It is ironic that Cass would not include the liminality of gays among her themes, particularly since her best known work arguably is her refinement of the stepped model for ...
( Category:
Networks
February 13,2015 )
mobi, epub, pdf |eng | 2011-09-04 | Author:Massimo Banzi
( Category:
Robotics & Automation
February 12,2015 )
epub, mobi, azw3 |eng | 2012-08-31 | Author:Janice (ginny) Redish [Redish, Janice]
Thinking about headings also helps authors Headings form an outline of what you are going to write. Planning the headings is a way of analyzing the information you have, grouping ...
( Category:
User Experience & Usability
February 5,2015 )
epub, mobi |eng | 2009-09-18 | Author:Tom Standage
crYPTOGRAPHY—tinkering with codes and ciphers—was a common hobby among Victorian gentlemen. Wheatstone and his friend Charles Bab-bage, who is best known for his failed attempts to build a mechanical computer, ...
( Category:
History of Technology
January 28,2015 )
epub |eng | 2014-01-25 | Author:Jason Beaird, James George [Beaird, Jason]
Figure 3.12. Speed Kids It may not be apparent at first, but the shapes in this page’s illustration are the key elements that define the layout. One way to determine ...
( Category:
Web Design
January 26,2015 )
epub, pdf |eng | 2012-06-26 | Author:Janice (Ginny) Redish
Thinking about headings also helps authors Headings form an outline of what you are going to write. Planning the headings is a way of analyzing the information you have, grouping ...
( Category:
User Experience & Usability
January 26,2015 )
epub |eng | | Author:Scott F. Andrews [Scott F. Andrews]
Why Lead Raids? At this point, you may be wondering if it's all worthwhile. Raid leading is by far the most difficult job that an officer can undertake. You have ...
( Category:
Internet, Groupware, & Telecommunications
January 25,2015 )
azw3, epub |eng | 2015-01-26 | Author:Norris, Donald [Norris, Donald]
Using Python with the Raspberry Pi Camera I will use a clever Python library named python-picamera, created by Dave Jones (Github), which will permit the Pi Camera to both be ...
( Category:
Electronics
January 19,2015 )
mobi, pdf |eng | 2010-08-18 | Author:Jim Boyce
ChAPTER 20 Scheduling Meetings and Resources Sending a Meeting Request . . . . . . . . . . . . . . . . . . . . ...
( Category:
Email Administration
January 19,2015 )
epub |eng | 2015-01-06 | Author:Mehmet Toy [Toy, Mehmet]
Figure 4.32. Migration to FTTH with EPoC technology. At some point in the future, perhaps when competitive pressures dictate 1 Gbps residential service offerings, cable operators can install fiber media ...
( Category:
Telecommunications & Sensors
January 14,2015 )
epub, azw3, mobi, pdf |eng | 2015-01-06 | Author:Andrew Keen [Keen, Andrew]
CHAPTER SIX THE ONE PERCENT ECONOMY An Abundance of Stupidity My own epiphany about the Internet’s disastrous impact on culture is well documented. In the fall of 2005, I was ...
( Category:
E-Commerce
January 12,2015 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9807)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7805)
Grails in Action by Glen Smith Peter Ledbrook(7718)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6782)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6778)
Running Windows Containers on AWS by Marcio Morales(6295)
Kotlin in Action by Dmitry Jemerov(5088)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5035)
Combating Crime on the Dark Web by Nearchos Nearchou(4612)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4553)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4437)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4299)
The Age of Surveillance Capitalism by Shoshana Zuboff(3972)
Python for Security and Networking - Third Edition by José Manuel Ortega(3862)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3520)
Learn Wireshark by Lisa Bock(3470)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3352)
Blockchain Basics by Daniel Drescher(3321)
