Computers & Technology
azw |eng | 2015-01-01 | Author:Sirius, R.U. & Cornell, Jay [Sirius, R.U.]
By the time mind uploading is generally available, perhaps people will have forgotten a time when a singular self was “normal.” They will be used to multiple viewpoints, their brains ...
( Category:
History & Philosophy
January 4,2018 )
epub |eng | 2015-01-04 | Author:Helen Sun
Demand Forecast Demand forecast is another area where retailers are trying to better understand customers through the smart use of new data sources. As we discussed earlier in this chapter, ...
( Category:
Software
January 4,2018 )
epub |eng | | Author:Dunn, Nick;
STEP BY STEP CNC MILLING This domestic garden shelter, designed by John Bridge, illustrates the design and fabrication process undertaken, with emphasis on CNC milling as an integral part of ...
( Category:
Architecture
January 4,2018 )
epub |eng | 2014-02-20 | Author:J. F. DiMarzio
The Canvas JavaFX provides another API for drawing to the screen. The Canvas API, another subclass of Node, can be used in a scene graph to write to the screen ...
( Category:
Computers & Technology
January 4,2018 )
epub |eng | 2015-01-04 | Author:Jim Manico
Securing Data in Transit The standard way to protect against the network-based threats mentioned earlier is to use the cryptographic protocol Secure Sockets Layer (SSL) or its modern incarnation, Transport ...
( Category:
Web Development & Design
January 4,2018 )
epub, pdf |eng | | Author:François Chollet
( Category:
Web Development & Design
January 4,2018 )
epub, pdf |eng | 2013-02-25 | Author:Vyacheslav Fadyushin [Fadyushin, Vyacheslav]
Instant Penetration Testing: Setting Up a Test Lab How-to sudo route add default gateway 192.168.1.1 7. Now, execute the route command without any arguments and try ping www.google.com: 8. Let ...
( Category:
Computers & Technology
January 3,2018 )
epub |eng | 2012-08-17 | Author:Christopher Elisan
LINGO UAC, as defined by Microsoft, is a security component that allows an administrator to enter credentials during a nonadministrator user session to perform occasional administrative tasks. Fake AV also ...
( Category:
Networking & Cloud Computing
January 3,2018 )
epub |eng | 2015-07-13 | Author:Leclair, Jane
Conclusion and Future Trends in the Critical Manufacturing Sector It is very important to remember that maintaining a state of compliance with the regulations and laws that govern a sector ...
( Category:
Security & Encryption
January 3,2018 )
epub, azw3, mobi, pdf |eng | 2016-07-22 | Author:Don Silver [Silver, Don]
It’s best to do regular backups after doing antivirus and antispyware scans first to get rid of any malware on the device. If your device later gets hacked, you’ll be ...
( Category:
Security & Encryption
January 3,2018 )
epub |eng | 2015-08-27 | Author:Lucas, Edward
7 The Spy in Your Pocket The mobile phone enables probably the most sophisticated and pervasive attacks on privacy and anonymity yet invented. The benefit is greatest for governments. If ...
( Category:
Security & Encryption
January 3,2018 )
epub |eng | 2016-03-30 | Author:Ken Baker [Baker, Ken]
*** Recommendation: Use 1. LastPass. 2. Dashlane or 3. 1 Password. The Work: Install the password manager on PC and other devices. Spend some time learning how to use it. ...
( Category:
Computers & Technology
January 3,2018 )
epub |eng | 2015-09-24 | Author:Dove, P.B.
FIGURE 59 SIMPLIFIED GOVERNANCE - GEAR SHIFT MODEL If a country creates a Dominion Cloud then they act as an IXP (Internet Exchange Point) and in theory they do no ...
( Category:
Computers & Technology
January 3,2018 )
epub |eng | 2012-06-21 | Author:Sean Bodmer
Deception Is Essential The computer security business in both the public and private sectors is led by an important and influential group of people who know so little about so ...
( Category:
Networking & Cloud Computing
January 3,2018 )
epub |eng | 2015-01-03 | Author:Henry Dalziel
Chapter 8 Access Management Access management deals with what resources people can get to, those resources they need in order to do their jobs. Keywords Active Directory; OpenLDAP Access management ...
( Category:
Business & Money
January 3,2018 )
Categories
Popular ebooks
Deep Learning with Python by François Chollet(28003)The Mikado Method by Ola Ellnestam Daniel Brolund(25294)
Hello! Python by Anthony Briggs(24339)
Secrets of the JavaScript Ninja by John Resig Bear Bibeault(23434)
Kotlin in Action by Dmitry Jemerov(22512)
The Well-Grounded Java Developer by Benjamin J. Evans Martijn Verburg(21976)
Dependency Injection in .NET by Mark Seemann(21849)
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(20715)
Algorithms of the Intelligent Web by Haralambos Marmanis;Dmitry Babenko(19523)
Grails in Action by Glen Smith Peter Ledbrook(18609)
Adobe Camera Raw For Digital Photographers Only by Rob Sheppard(17034)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(15843)
Secrets of the JavaScript Ninja by John Resig & Bear Bibeault(13696)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(11857)
Jquery UI in Action : Master the concepts Of Jquery UI: A Step By Step Approach by ANMOL GOYAL(11151)
A Developer's Guide to Building Resilient Cloud Applications with Azure by Hamida Rebai Trabelsi(10627)
Hit Refresh by Satya Nadella(9202)
The Kubernetes Operator Framework Book by Michael Dame(8570)
Exploring Deepfakes by Bryan Lyon and Matt Tora(8414)
Robo-Advisor with Python by Aki Ranin(8361)