Networking & Cloud Computing
epub, mobi, pdf |eng | | Author:Norman Maurer Marvin Allen Wolfthal
You may find it useful to review the previous chapters on ChannelHandler and codecs, as these will provide the material for our examples. 9.1. Overview of EmbeddedChannel You already know ...
( Category:
Software Development
March 1,2020 )
The InfoSec Handbook: An Introduction to Information Security by Rao Umesh Hodeghatta & Nayak Umesha
epub |eng | 2014-09-01 | Author:Rao, Umesh Hodeghatta & Nayak, Umesha [Rao, Umesh Hodeghatta]
Figure 8-4. Symmetric Key Distribution Center Asymmetric Key Cryptography There are two problems with symmetric key cryptography: Distribution of key – Secret key sharing among senders and receivers. If there ...
( Category:
Internet, Groupware, & Telecommunications
March 1,2020 )
epub, pdf |eng | 2016-08-03 | Author:Peter McGowan
Using Alternative Placement Methods To use the RedHat domain placement methods (or any others that we choose to write), we copy the ManageIQ/Infrastructure/VM/Provisioning/Placement/default instance into our own domain and edit ...
( Category:
Email Administration
March 1,2020 )
epub |eng | 2017-02-27 | Author:Song, Lingyang & Wichman, Risto & Li, Yonghui & Han, Zhu
Figure 5.3 Average sum-rate versus BS transmit power with different SI attenuations (τ) under a small cell scenario ([300] Reproduced with permission from John Wiley and Sons.) Based on the ...
( Category:
Networking & Cloud Computing
March 1,2020 )
mobi, epub |eng | 1998-09-01 | Author:Claude E Shannon & Warren Weaver
where is the duration of the sth symbol leading from state i to state j and the Bi satisfy then H is maximized and equal to C. By proper assignment ...
( Category:
Number Theory
March 1,2020 )
mobi, epub |eng | 2016-02-29 | Author:Scott N. Schober
____________________ QUICK TIP: Look in the mirror and make sure the hat you’re wearing is the right color or you might end up behind bars. CHAPTER 14 THE INSIDER THREAT ...
( Category:
Hacking
March 1,2020 )
mobi |eng | 2016-10-24 | Author:John Paul Mueller
( Category:
Cloud Computing
March 1,2020 )
mobi |eng | 2014-12-23 | Author:Lucien Avramov & Maurizio Portolani
Endpoint Discovery ACI uses three methods to discover the presence of virtual endpoints. The first method of learning is control plane learning, which is achieved through an out-of-band handshake. vCenter ...
( Category:
Networks
March 1,2020 )
azw3 |eng | 2017-01-30 | Author:Vikram Murugesan [Murugesan, Vikram]
Now that you know your pod and container are up and running, let's send a couple of geolocations to the POST API. Use the following two curl commands to create ...
( Category:
Cloud Computing
March 1,2020 )
azw3 |eng | 2017-01-22 | Author:Greg Moss [Moss, Greg]
Remember that, if you are an administrator making these changes for another user, changing these settings will require that user to log out of the system so their session is ...
( Category:
Enterprise Applications
March 1,2020 )
azw3 |eng | 2015-03-05 | Author:Joe Darlak & Bjarne Berg & Rob Frye [Darlak, Joe]
6.1.2 Configuring the SAP Host Agent After SUM has been unpacked, log in to the installation environment with user <SID>adm. From the command prompt, use the following command to configure ...
( Category:
Storage & Retrieval
March 1,2020 )
azw3 |eng | 2017-07-11 | Author:Yufeng Wang & Athanasios V. Vasilakos & Qun Jin & Hongbo Zhu [Wang, Yufeng]
6.5.2 Quality of Smartphone Sensors It remains doubtful whether the qualities of built-in smartphone sensors are adequate to produce fall detection and prevention systems with acceptable performance. For example, the ...
( Category:
Networking & Cloud Computing
March 1,2020 )
azw3 |eng | 2016-03-21 | Author:Tony Campbell [Campbell, Tony]
The permission error Suppose that, when you attempt to start the nova-api process manually, you receive an error like the one shown here: An error like the preceding one points ...
( Category:
Storage & Retrieval
March 1,2020 )
azw3 |eng | 2016-10-05 | Author:Timothy Boronczyk [Boronczyk, Timothy]
Getting ready This recipe demonstrates how to configure MySQL replication using two systems. The first system is the master MySQL server, which we'll assume has the IP address 192.168.56.100. The ...
( Category:
Linux & UNIX Administration
March 1,2020 )
azw3, pdf |eng | 2016-03-27 | Author:James D Miller [Miller, James D]
Step 3: Performing the analysis A good amount of time can be required for the previous step; at some point, you'll want to move on though and load the data ...
( Category:
Client-Server Systems
March 1,2020 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9814)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7811)
Grails in Action by Glen Smith Peter Ledbrook(7722)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6875)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6871)
Running Windows Containers on AWS by Marcio Morales(6403)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5089)
Combating Crime on the Dark Web by Nearchos Nearchou(4664)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4655)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4355)
The Age of Surveillance Capitalism by Shoshana Zuboff(3989)
Python for Security and Networking - Third Edition by José Manuel Ortega(3907)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3573)
Learn Wireshark by Lisa Bock(3567)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3378)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3359)
Blockchain Basics by Daniel Drescher(3330)
