Networking & Cloud Computing
epub |eng | | Author:Gerard O'Regan
13.5 The Iridium Satellite System Iridium was a global satellite phone company that was backed by Motorola. In many ways it was an engineering triumph over common sense, and over ...
( Category:
Networks
April 3,2020 )
epub |eng | | Author:Unknown
2.3 Community Instability Community instability is the major concern in the area of dynamic community detection. There can be multiple decompositions in complex network communities. This generates the ambiguity in ...
( Category:
Networking & Cloud Computing
April 3,2020 )
epub |eng | 2020-03-30 | Author:Ahmed, Fawzan [Ahmed, Fawzan]
So these facts indicate the strong desire of the criminal to persist in these email phishing scams as potentially there is money to be made. It requires very little technical ...
( Category:
Networking & Cloud Computing
April 3,2020 )
epub |eng | | Author:Vlad Catrinescu & Trevor Seward
To create the Service Application by PowerShell, we need to use the New-SPBusinessDataConnectivityServiceApplication PowerShell cmdlet from an elevated SharePoint Management Shell. We need to specify the name of the Service ...
( Category:
NET
April 3,2020 )
epub |eng | 2020-03-19 | Author:Fiordelis, Stephen [Fiordelis, Stephen]
Phases of Ethical Hacking Ethical hacking is divided into five phases. Not every hacker needs to use this step sequentially. Depending on the targets, these phases can be utilized accordingly. ...
( Category:
Software Development
April 3,2020 )
epub |eng | 2020-03-22 | Author:Morgan, Kevin [Morgan, Kevin]
Quick Notes: · Hubs and switches are employed to build networks · Routers are designed to affix networks What is the difference between a modem and a router? Others may ...
( Category:
Networks
April 3,2020 )
epub, mobi |eng | 2020-03-30 | Author:Antonio Melé
RabbitMQ is running and ready to receive messages. Adding Celery to your project You have to provide a configuration for the Celery instance. Create a new file next to the ...
( Category:
Software Development
April 2,2020 )
epub |eng | 2020-03-27 | Author:Anjali Khatri [Anjali Khatri]
Allow developers to focus only on business logic and leave security implementation to the application infrastructure team. Next, we will enable simple TLS for the bookinfo application. Enabling bookinfo for ...
( Category:
Cloud Computing
April 2,2020 )
epub |eng | 2020-03-30 | Author:Johann Rehberger
Figure 6.27: Loading CSV files into the graph database Here we see the successful load of a CSV file so that it can be processed by Neo4j. However, at this ...
( Category:
Networking & Cloud Computing
April 2,2020 )
epub |eng | 2018-07-18 | Author:Stephen Fleming
Future of Microservices Over the years, software application development has evolved from Service-Oriented Architecture (SOA) to monolith architecture and now microservices architecture, which is the most preferred software application technique. ...
( Category:
Tools
April 2,2020 )
epub, pdf |eng | 2018-08-29 | Author:Andrew Lock [Andrew Lock]
( Category:
Software Development
April 1,2020 )
epub |eng | 2020-03-30 | Author:Allan Johnson [Allan Johnson]
( Category:
Networks, Protocols & APIs
March 31,2020 )
epub, pdf |eng | 2020-03-30 | Author:Omar Santos [Omar Santos]
Port Security How many MAC addresses should legitimately show up inbound on an access port? Port security controls how many MAC addresses can be learned on a single switch port. ...
( Category:
Networks, Protocols & APIs
March 31,2020 )
epub |eng | | Author:Michael Schwartz & Maciej Machulak
Easy JavaScript Client This JavaScript client is one of the easiest ways to test OpenID Connect, although it’s not the most secure (remember Figure 5-1). The client we will use ...
( Category:
LDAP
March 31,2020 )
epub |eng | 2019-08-14 | Author:James D. Miller [James D. Miller]
( Category:
Enterprise Applications
March 31,2020 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9814)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7811)
Grails in Action by Glen Smith Peter Ledbrook(7722)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6875)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6871)
Running Windows Containers on AWS by Marcio Morales(6403)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5089)
Combating Crime on the Dark Web by Nearchos Nearchou(4664)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4655)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4355)
The Age of Surveillance Capitalism by Shoshana Zuboff(3989)
Python for Security and Networking - Third Edition by José Manuel Ortega(3907)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3573)
Learn Wireshark by Lisa Bock(3567)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3378)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3359)
Blockchain Basics by Daniel Drescher(3330)
