Home
>
Computers & Technology
>
Networking & Cloud Computing
>
Internet, Groupware, & Telecommunications
Internet, Groupware, & Telecommunications
mobi |eng | 2006-05-25 | Author:Cricket Liu & Paul Albitz [Liu, Cricket]
( Category:
LAN
June 20,2014 )
mobi, epub |eng | 2008-01-28 | Author:Jon Erickson
Example Internet Datagram Header Each element in the structure corresponds to the fields shown in the RFC header diagram. Since the first two fields, Version and IHL (Internet Header Length) ...
( Category:
Privacy & Online Safety
May 26,2014 )
Silence on the Wire: A Field Guide to Passive Reconnaissance and Indirect Attacks by Zalewski Michal
azw3 |eng | 2005-04-14 | Author:Zalewski, Michal [Zalewski, Michal]
Customer Profiling and Privacy Invasion Many companies go to great lengths to gather and sell valuable information about people’s habits, preferences, and behavior. Although this information is usually used for ...
( Category:
LAN
May 26,2014 )
epub, pdf |eng | 2008-05-08 | Author:Douglas Crockford [Crockford, Douglas]
Regexp Escape The backslash character indicates escapement in regexp factors as well as in strings, but in regexp factors, it works a little differently. As in strings, \f is the ...
( Category:
Software Development
May 16,2014 )
epub |eng | 2014-02-10 | Author:Thord Daniel Hedengren
PART III: USING PLUGINS WITH WORDPRESS Chapter 7: Making the Most of WordPress Plugins Chapter 8: Plugins or functions.php? Chapter 7: Making the Most of WordPress Plugins IT GOES WITHOUT ...
( Category:
Content Management
April 29,2014 )
epub, pdf |eng | 2011-04-08 | Author:Richard G. Lyons
For computational efficiency reasons, to avoid unnecessary arithmetic using the imaginary parts of the complex C values, we might decide to compute Q as Show the validity (the correctness) of ...
( Category:
Signal Processing
April 9,2014 )
epub, mobi |eng | 2009-12-14 | Author:Schmitt, Christopher [Christopher Schmitt]
( Category:
CSS Programming
April 6,2014 )
epub |eng | 2009-02-08 | Author:Company, Sonatype [Sonatype Company]
The includes section uses a list of include elements, which contain path patterns. These patterns may contain wildcards, such as **, which matches one or more directories, or *, which ...
( Category:
Software Development
April 6,2014 )
epub |eng | 2010-02-21 | Author:Allamaraju, Subbu [Subbu Allamaraju]
Tip Since a cache can be both an HTTP client and a server, in caching-related discussions, the term origin server is used to differentiate between caching servers and the servers ...
( Category:
Client-Server Systems
April 5,2014 )
epub, pdf |eng | 2012-02-26 | Author:Michael Sikorski & Andrew Honig [Michael Sikorski]
Using Hashed Exported Names The algorithm just discussed has a weakness: It performs a strcmp against each export name until it finds the correct one. This requires that the full ...
( Category:
Hacking
April 5,2014 )
mobi, epub |eng | 2012-11-06 | Author:Robin Heydon
wait <until end of working day> connect to lights: send "off" to control point disconnect It is this combination of multiple services in the client that is one of the ...
( Category:
Software Development
April 2,2014 )
epub |eng | 2009-02-08 | Author:Jesse Liberty [Jesse Liberty]
Note Example 11-2 uses an array, which is a collection of objects, all of the same type. You create an array by indicating the type of objects to hold and ...
( Category:
Microsoft OS Guides
March 31,2014 )
epub |eng | 2000-01-02 | Author:Chuck Musciano & Bill Kennedy [Musciano, Chuck & Kennedy, Bill]
9.2.2.1. The application/x-www-form-urlencoded encoding The standard encodingapplication/x-www-form-urlencodedconverts any spaces in the form values into a plus sign (+), nonalphanumeric characters into a percent sign (%) followed by two hexadecimal digits ...
( Category:
Web Design
March 31,2014 )
epub |eng | 2008-11-18 | Author:Lastufka, Alan, Dean, Michael W. & Michael W. Dean [Alan Lastufka]
Be willing to reciprocate. Don't get someone to collab on your video and then say you don't have time when they ask you later to collab on their video. Make ...
( Category:
Internet, Groupware, & Telecommunications
March 31,2014 )
epub |eng | 2000-01-02 | Author:Clinton Wong [Wong, Clinton]
* * * The Pragma header specifies directives for proxy and gateway systems. Since many proxy systems may exist between a client and server, Pragma headers must pass through each ...
( Category:
Web Design
March 31,2014 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9798)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7798)
Grails in Action by Glen Smith Peter Ledbrook(7711)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6725)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6724)
Running Windows Containers on AWS by Marcio Morales(6238)
Kotlin in Action by Dmitry Jemerov(5080)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4998)
Combating Crime on the Dark Web by Nearchos Nearchou(4584)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4500)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4430)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4257)
The Age of Surveillance Capitalism by Shoshana Zuboff(3968)
Python for Security and Networking - Third Edition by José Manuel Ortega(3826)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3521)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3496)
Learn Wireshark by Lisa Bock(3412)
Mastering Python for Networking and Security by José Manuel Ortega(3366)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3341)
Blockchain Basics by Daniel Drescher(3312)
