Networking & Cloud Computing
epub |eng | 2020-06-01 | Author:Daniel Kirsch & Judith Hurwitz

( Category: Enterprise Applications July 14,2020 )
epub |eng | 2019-09-24 | Author:Kathleen M. Moriarty

5.2.2 Automating Certificate and Key Management Managing certificates for encrypted transport has been challenging with examples like certificates expiring, causing servers to be unreachable without operators knowing the cause at ...
( Category: Networking & Cloud Computing July 14,2020 )
epub, mobi |eng | 2017-11-29 | Author:Houssem Yahiaoui

Now, to upload your newly created function simply head to your console and execute the following command: ~> firebase deploy --only functions How it works... Let's digest the preceding code. ...
( Category: Cloud Computing July 13,2020 )
epub |eng | 2016-12-28 | Author:Martinez, Santos & Daalmans, Peter & Bennett, Brett

Click Next. Review the settings and click Next; the updates will be downloaded. When the wizard is done, the software updates will show up under Overview ➢ Software Updates ➢ ...
( Category: Networks July 12,2020 )
azw |eng | 2017-04-17 | Author:Dan E. Moldea [Moldea, Dan E.]

CHAPTER TWENTY-FOUR When Ronald Reagan regained his memory, he would eventually recall the events of that afternoon on February 5, 1962. Three years later—in his 1965 autobiography, Where’s the Rest ...
( Category: Industry July 10,2020 )
epub |eng | 2020-07-15 | Author:Tom Steele & Chris Patten & Dan Kottmann

Implementing a MySQL Database Miner To make your MySQL implementation work, you’ll inspect the information_schema.columns table. This table maintains metadata about all the databases and their structures, including table and ...
( Category: Testing July 10,2020 )
epub |eng | 2020-05-07 | Author:Karen Tovmasyan

Figure 5.12 – CloudFormation StackSet console This is because the core stack doesn't exist. Checking by TAG doesn't show enough information, as we can see here (try to find out ...
( Category: Tools July 10,2020 )
epub |eng | 2019-12-17 | Author:Gordon Davies [Gordon Davies]

Figure 7.10: Choosing a route based on distance Surely, it would be better to go the faster route? We'll now look at link state protocols, which actually consider more factors ...
( Category: Client-Server Systems July 10,2020 )
epub |eng | 2019-07-02 | Author:Gojko Adzic

SAM can configure environment variables for a function using the Environment property. It must have a Variables sub-property, which can then contain a map of keys and values. We can ...
( Category: Client-Server Systems July 10,2020 )
epub |eng | | Author:Jianjun Yu & Nan Chi

9.3 Single-Carrier 400 G PM-256QAM Signal Transmission Experiment Figure 9.4 illustrates the 34 Gbaud PM-256QAM signal wavelength division multiplexing (WDM) experiment. Each wavelength can transmit 4 user channels, each channel ...
( Category: Networking & Cloud Computing July 10,2020 )
epub |eng | 2018-05-07 | Author:Jamie Duncan & John Osborne [Jamie Duncan and John Osborne]

( Category: Linux & UNIX Administration July 10,2020 )
epub |eng | 2017-02-06 | Author:Darius F. Peterson II [II, Darius F. Peterson]

( Category: Client-Server Systems July 10,2020 )
epub |eng | | Author:Zhi-Hong Guan & Bin Hu & Xuemin (Sherman) Shen

Fig. 5.4Chaotic behaviors and synchronization of four-dimensional NNs (5.27): Example 5.2, τ a = 0.12. (a) Chaotic trajectories of single NN: x i1 and x i2. (b) Chaotic trajectories of ...
( Category: Mobile & Wireless July 10,2020 )
azw3 |eng | 2015-07-15 | Author:

IPTV With an audience that is shifting from linear to tailored viewership, the TV viewing experience itself is changing rapidly. In various countries around the region, telecommunication operators are providing ...
( Category: Networking & Cloud Computing July 10,2020 )
azw3 |eng | 2015-09-29 | Author:Charlie Pownall [Pownall, Charlie]

chapter 10 The Committed Activist The fortunes of big pressure groups such as Greenpeace, Friends of the Earth and Amnesty International have been transformed by the internet and by social ...
( Category: Networks July 10,2020 )

Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(6802)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(5688)
Grails in Action by Glen Smith Peter Ledbrook(5349)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(3068)
Kotlin in Action by Dmitry Jemerov(2419)
Learn Windows PowerShell in a Month of Lunches by Don Jones(1824)
The Age of Surveillance Capitalism by Shoshana Zuboff(1711)
Blockchain Basics by Daniel Drescher(1639)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(1629)
TCP IP by Todd Lammle(1591)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(1553)
React Native - Building Mobile Apps with JavaScript by Novick Vladimir(1414)
The Art Of Deception by Kevin Mitnick(1263)
Applied Network Security by Arthur Salmon & Michael McLafferty & Warun Levesque(1211)
Owning Bitcoin: The Illustrated Guide to Security, Privacy, and Potential by Apodaca Richard(1192)
Serious Cryptography: A Practical Introduction to Modern Encryption by Aumasson Jean-Philippe(1132)
Blockchain: Ultimate Step By Step Guide To Understanding Blockchain Technology, Bitcoin Creation, and the future of Money (Novice to Expert) by Keizer Söze(1125)
Networking A Beginner's Guide by Bruce Hallberg(1119)
Wireless Hacking 101 by Karina Astudillo(1114)
31 Days Before Your CompTIA A+ Exams (Shanette Luellen's Library) by Benjamin Patrick Conry(1107)