Networking & Cloud Computing
epub |eng | 2018-05-29 | Author:Glenn Fleishman
Reserved Addresses Reservation allows a given device on a network to obtain the same IP address, whether public or private, each time it joins the network. This works whether or ...
( Category:
Network Security
May 29,2020 )
epub |eng | 2020-04-17 | Author:Karim Okasha [Karim Okasha]
( Category:
Tools
May 29,2020 )
epub |eng | 2018-08-27 | Author:Iffat Zafar [Leonardo Araujo]
Fast R-CNN In 2015, Fast R-CNN was proposed to remedy the speed problems of R-CNN. In this method, the main change is where we get proposal regions in the pipeline. ...
( Category:
Networks
May 29,2020 )
epub, azw3 |eng | 2020-05-08 | Author:Bernstein, James [Bernstein, James]
Zoom Outlook Plugin I had previously discussed the Zoom Google Chrome web browser extension back in Chapter 3 but now I would like to discuss the Microsoft Outlook plugin for ...
( Category:
Enterprise Applications
May 28,2020 )
epub |eng | 2020-03-15 | Author:Jonathan Rasmusson [Rasmusson, Jonathan]
Copyright © 2020, The Pragmatic Bookshelf. Chapter 6 Working At a Tech Lead Company Working at a tech company feels different. And no small part of that is due to ...
( Category:
Testing
May 27,2020 )
epub, mobi |eng | 2020-05-01 | Author:Richard Bejtlich [Bejtlich, Richard]
Calculating Security ROI Is a Waste of Time Sunday, April 18, 2004 I was pleased to read Infosec Economics by Lawrence Gordon and Robert Richardson in the 1 Apr 04 ...
( Category:
Network Security
May 25,2020 )
azw3 |eng | 2018-01-22 | Author:Norman, Alan T. [Norman, Alan T.]
Figure 28 - Tor Settings Dialog If you have your own list of bridge relays that you prefer to connect, choose the “Enter custom bridges” radio button and paste the ...
( Category:
Hacking
May 25,2020 )
epub |eng | | Author:Dmitri Korotkevitch
begin tran while @id < 100000 begin update Delivery.Orders set OrderStatusId = 1 where OrderId between @id and @id + 4998; select @id += 4999; end select count(*) as [Lock ...
( Category:
Storage & Retrieval
May 24,2020 )
epub, pdf |eng | 2020-02-24 | Author:Carmine Zaccagnino [Carmine Zaccagnino]
( Category:
Software Development
May 24,2020 )
epub |eng | | Author:Roger Cornejo
when upper(metric_name) like 'DB TIME' then 'cpu' when upper(metric_name) like '%CPU%' then 'cpu' -- ... when upper(metric_name) like '%SQL*NET%' then 'network' when upper(metric_name) like '%NETWORK%' then 'network' -- ... when ...
( Category:
Storage & Retrieval
May 24,2020 )
epub |eng | | Author:Brian Peasland
Tip Read the Oracle documentation. It is a must for advancing your skillset. I have worked with some products where the documentation was a 20- or 40-page PDF file. It ...
( Category:
Storage & Retrieval
May 24,2020 )
epub |eng | | Author:Sten Vesterli
This action chain is automatically triggered when you load the main-start page. You can click the Call REST Endpoint action and investigate its properties. There is an Endpoint property pointing ...
( Category:
Programming & App Development
May 24,2020 )
epub |eng | | Author:Peter A. Carter
Full and Transaction Log Backups If your database is in FULL recovery model, then you are able to take transaction log backups, as well as the full backups. This means ...
( Category:
Storage & Retrieval
May 24,2020 )
epub |eng | 2018-12-26 | Author:Sion Retzkin [Sion Retzkin]
But, even with all its security, privacy, and anonymity options, Tails has weaknesses. For example (according to the Tails website documentation), note the following: Tails does not protect against compromised ...
( Category:
Networking & Cloud Computing
May 23,2020 )
epub |eng | 2018-11-30 | Author:Jordan Krause [Jordan Krause]
But I'm an IT guy, right? Don't you think I could find some way of circumnavigating this setting, even though my account only has regular user permissions? Nope, not that ...
( Category:
Windows Administration
May 23,2020 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6855)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6853)
Running Windows Containers on AWS by Marcio Morales(6379)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5077)
Combating Crime on the Dark Web by Nearchos Nearchou(4652)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4632)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4341)
The Age of Surveillance Capitalism by Shoshana Zuboff(3983)
Python for Security and Networking - Third Edition by José Manuel Ortega(3901)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3562)
Learn Wireshark by Lisa Bock(3544)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3356)
Blockchain Basics by Daniel Drescher(3327)
