Networks, Protocols & APIs
epub, pdf |eng | 2017-09-24 | Author:Gavin M. Roy [Gavin M. Roy]
6.3. Selectively routing messages with the topic exchange Like direct exchanges, topic exchanges will route messages to any queue bound with a matching routing key. But by using a period-delimited ...
( Category:
Networks
June 29,2020 )
azw3 |eng | 2020-04-12 | Author:Learn Computer Hacking In Deep [Hacking In Deep, Learn Computer]
Chapter 6: Programming Linux Programming on Linux is used for creating interfaces, applications, software and programs. Linux code is often used for the desktop, embedded systems as well as for ...
( Category:
Networks
June 29,2020 )
azw3 |eng | 2019-08-12 | Author:Florian Dedov [Dedov, Florian]
6 – S&P 500 Index When we talk about how the markets are doing, we are usually looking at indices. One of the most important indices is the so-called S&P ...
( Category:
Intelligence & Semantics
June 29,2020 )
azw3 |eng | 2019-11-05 | Author:Mike Blackbot [Blackbot, Mike]
Network ID Subnet Mask Host ID Range No. of Usable Hosts Broadcast ID 125.23.200.64 /28 125.23.200.65 - 125.23.200.78 14 125.23.200.79 125.23.200.80 /28 125.23.200.81 - 125.23.200.94 14 125.23.200.95 125.23.200.96 /28 125.23.200.97 ...
( Category:
Client-Server Systems
June 29,2020 )
azw3 |eng | 2020-05-25 | Author:Elizabeth Hope [Hope, Elizabeth]
➢ Select your meeting options. ➢ Subject: Choose a subject/name for your meeting. ➢ Get started: Select a date and time for your meeting. ➢ Duration: Choose the approximate length ...
( Category:
Networks, Protocols & APIs
June 29,2020 )
epub |eng | 2018-08-03 | Author:Richard Petersen [Petersen, Richard]
dlm_tool Distributed Lock Manager, implemented as a kernel module. fsck.gfs2 The GFS 2 file system checker gfs2_grow Grows a GFS 2 file system gfs2_jadd Adds a journal to a GFS ...
( Category:
Linux & UNIX Administration
June 28,2020 )
epub, pdf |eng | | Author:Unknown
3.2 Segment Splitting Starting with the segmentation induced by labelling the connected components in C, the segment splitting procedure is applied to wide segments as follows. For each selected segment ...
( Category:
Computer Vision & Pattern Recognition
June 28,2020 )
azw3, epub |eng | 2020-06-05 | Author:IP Specialist [Specialist, IP]
Just because a path to a destination contains fewer network hops than another does not make it the best The upper path may contain a slower link, such as 56Kb ...
( Category:
Networks, Protocols & APIs
June 27,2020 )
azw3 |eng | 2020-06-02 | Author:Larry B. Stevenson [Stevenson, Larry B.]
Create an Assignment (Part 2) Many teachers using Google Classroom are likely to want to add an assignment from their Drive because that is potentially where many of the teacher's ...
( Category:
Software Development
June 27,2020 )
epub |eng | 2019-11-23 | Author:Morgan, Kevin [Morgan, Kevin]
Free Wi-Fi networks The hunting grounds preferred by crackers are free Wi-Fi networks, i.e. not for a fee. Free Wi-Fi networks are easy to access and there is no risk ...
( Category:
Networks
June 27,2020 )
epub |eng | 2018-06-15 | Author:Russ White,Ethan Banks & Ethan Banks
The Routing Information Protocol The Routing Information Protocol (RIP) was originally specified in RFC1058, Routing Information Protocol, published in 1998.2 The protocol was updated in a series of more recent ...
( Category:
Networks
June 9,2020 )
mobi, pdf |eng | 2004-04-20 | Author:Wendell Odom [Odom, Wendell]
For the rest of this chapter, you'll read about routing and ignore anything after the IP header. However, keep in mind that the whole goal is to deliver application data, ...
( Category:
Networks
June 9,2020 )
epub, pdf |eng | 2020-06-29 | Author:Cisco Networking Academy [Cisco Networking Academy]
( Category:
Networks
May 30,2020 )
epub |eng | 2018-05-29 | Author:Glenn Fleishman
Reserved Addresses Reservation allows a given device on a network to obtain the same IP address, whether public or private, each time it joins the network. This works whether or ...
( Category:
Network Security
May 29,2020 )
epub |eng | 2018-08-27 | Author:Iffat Zafar [Leonardo Araujo]
Fast R-CNN In 2015, Fast R-CNN was proposed to remedy the speed problems of R-CNN. In this method, the main change is where we get proposal regions in the pipeline. ...
( Category:
Networks
May 29,2020 )
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9787)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7791)
Grails in Action by Glen Smith Peter Ledbrook(7705)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6653)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6645)
Running Windows Containers on AWS by Marcio Morales(6167)
Kotlin in Action by Dmitry Jemerov(5074)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4963)
Combating Crime on the Dark Web by Nearchos Nearchou(4550)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4428)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4424)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4214)
The Age of Surveillance Capitalism by Shoshana Zuboff(3964)
Python for Security and Networking - Third Edition by José Manuel Ortega(3787)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3515)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3454)
Mastering Python for Networking and Security by José Manuel Ortega(3359)
Learn Wireshark by Lisa Bock(3348)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3337)
Blockchain Basics by Daniel Drescher(3308)
