Networks, Protocols & APIs
epub |eng | 2019-03-30 | Author:Nipun Jaswal [Nipun Jaswal]
We can see the first-byte word is 1200, which implies 00 12(18) being divided by 10, which means that we have the LokiBot version 1.8. Have a look at the ...
( Category:
Networks
October 6,2022 )
mobi, epub |eng | 2018-01-29 | Author:Agus Kurniawan
Now you can open the Terminal and run the publisher program as follows: python basicDiscovery.py -e host_aws_greengrass_core -r root-CA.pem -c iotdevice1-certificate.pem.crt -k iotdevice1-private.pem.key -n iotdevice1-name -m publish -t 'sensor/hello' -M ...
( Category:
LAN
October 2,2022 )
epub |eng | 2020-08-09 | Author:Srilatha Vemula & Jason Gooley & Roddie Hasan [Srilatha Vemula]
( Category:
LAN
August 7,2020 )
epub |eng | 2012-02-03 | Author:Yochai Benkler [Benkler, Yochai]
464 The networked public sphere is not only more resistant to control by money, but it is also less susceptible to the lowest-common-denominator orientation that the pursuit of money often ...
( Category:
Networks
August 6,2020 )
epub |eng | 2020-04-14 | Author:Michael Goldberg [Goldberg, Michael]
It's a We Thing, Not a Me Thing Networking is like a light sparring match – jab, jab, hook. It's about the give and take, back and forth, learning and ...
( Category:
Financial
August 6,2020 )
epub |eng | 2020-07-30 | Author:Cisco Networking Academy [Cisco Networking Academy]
( Category:
Networks, Protocols & APIs
August 5,2020 )
epub |eng | 2011-08-14 | Author:Jason Andress & Steve Winterfeld
How the Military Approaches Social Engineering The military has been in the spy–counterspy business from the beginning; they are also experts at interrogation. Spying is the long con, whereas interrogation ...
( Category:
Network Security
August 2,2020 )
epub, pdf |eng | 2020-09-02 | Author:Derek DeJonghe [Derek DeJonghe]
4.2 Applying Configuration Problem You need to alter the NGINX Unit configuration through the control interface. Solution For this section, it’s important to understand that the Unit configuration is represented ...
( Category:
Networks, Protocols & APIs
July 31,2020 )
epub, pdf |eng | 2020-03-26 | Author:Doug Lowe
It’s a RAID! I mention in Chapter 10 that individual disk drives are usually combined in groups using a technique called RAID, which stands for redundant array of inexpensive disks. ...
( Category:
Networks
July 29,2020 )
epub |eng | 2018-07-26 | Author:David das Neves [David das Neves]
How the Constrained Language Mode is enforced Underneath, PowerShell will create psm1 and ps1 files in AppData and prove if an AWL (application whitelisting) solution is running. It is going ...
( Category:
Windows Administration
July 25,2020 )
epub |eng | | Author:Pethuru Raj & Anupama Raman
Pretty Good Privacy (PGP) Pretty Good Privacy (PGP) is a strong data encryption and decryption program which is widely used by federal government for protecting all types of government data ...
( Category:
Software Development
July 24,2020 )
epub, pdf |fra | 0101-01-01 | Author:James Boney [Boney, James]
aaa authentication ppp global aaa authentication ppp {default | listname} method ... method no aaa authentication ppp Configures AAA authentication method for PPP Default local Description This command defines a ...
( Category:
LAN
July 23,2020 )
epub, pdf |fra | 1999-11-12 | Author:O'Reilly [O'Reilly]
Description (Error Object) Notes The CursorType property of the Recordset object is read-only if the recordset is already open but read/write otherwise. If you attempt to set the CursorType property ...
( Category:
PCs
July 23,2020 )
epub |eng | | Author:Maxat Kassen
3.5 The Policy Review of the Open Data Movement in Estonia: Understanding Implementation Policies The policy review of the open data movement is based on the analysis of implementation strategies ...
( Category:
Networks, Protocols & APIs
July 22,2020 )
epub |eng | | Author:John Cowley
Method Description INVITE Request that a session be created ACK Acknowledge that a session has been created BYE Request that a session be terminated CANCEL Cancel a request that is ...
( Category:
Networks
July 21,2020 )
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9321)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7411)
Grails in Action by Glen Smith Peter Ledbrook(7305)
Kotlin in Action by Dmitry Jemerov(4653)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4136)
The Age of Surveillance Capitalism by Shoshana Zuboff(3432)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3252)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3034)
Mastering Python for Networking and Security by José Manuel Ortega(2964)
Blockchain Basics by Daniel Drescher(2896)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(2695)
TCP IP by Todd Lammle(2646)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(2523)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2487)
Hands-On Azure for Developers by Kamil Mrzyglod(2430)
Azure Containers Explained by Wesley Haakman & Richard Hooper(2409)
React Native - Building Mobile Apps with JavaScript by Novick Vladimir(2344)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(2316)
The Social Psychology of Inequality by Unknown(2316)
The Art Of Deception by Kevin Mitnick(2305)