Networking & Cloud Computing
epub |eng | 2015-08-07 | Author:Bruce Schneier [Schneier, Bruce]
16 Social Norms and the Big Data Trade-off In the preceding three chapters, I outlined a lot of changes that need to happen: changes in government, corporate, and individual behavior. ...
( Category:
Politics & Government
August 8,2018 )
epub |eng | 2017-04-13 | Author:Jeffrey Aven [Jeffrey Aven]
Figure 13.5 Loading an RDD From a Text File in a Distributed Filesystem. RDDs can also be loaded from other data sources such as relational databases using a JDBC interface, ...
( Category:
Databases & Big Data
August 8,2018 )
epub, pdf |eng | 2016-07-12 | Author:Siraj Raval
'ipfs init' This will take a few seconds; it’s adding bootstrapped (hardcoded) peers to your configuration and giving your node an identity key-pair to identify as a peer to the ...
( Category:
Security & Encryption
August 7,2018 )
azw3, mobi, epub |eng | 2017-04-12 | Author:Tiana Laurence [Laurence, Tiana]
Developing mobile apps Skip this section if you aren’t part of the app development space. Iroha is built for the web and mobile app developers so they can access the ...
( Category:
Databases & Big Data
August 7,2018 )
mobi |eng | 2016-01-29 | Author:Tarun Arora
Download the StampBuildNumber.ps1 script provided in the course material. Check-in the StampBuildNumber.ps1 script into the script folder as illustrated in this screenshot: Permissions: You'll need to edit build definition permissions ...
( Category:
Software
August 6,2018 )
epub |eng | | Author:Robert Jones [Jones, Robert]
Additional Information: The term "club drugs" is often used to loosely categorize recreationally abused drugs associated with their places of use rather than by their pharmaceutical properties. Typical of such ...
( Category:
Internet & Social Media
August 3,2018 )
epub |eng | 2015-12-23 | Author:Steve Martinelli, Henry Nash, Brad Topol
GET /v3/users/d19cac8f7ef3e6de36a47b85f306f137 How will Keystone know which domain/LDAP server to talk to in order to find this user? For performance reasons, searching them all is not a viable option. This ...
( Category:
Programming
July 31,2018 )
epub, pdf |eng | 2015-07-19 | Author:Edward Bailey [Bailey, Edward]
In the end, there are some tips that are popular among graphic designers: e.g. to make it seem like a certain object is in flames or exploding text light effect. ...
( Category:
Graphics & Design
July 29,2018 )
epub, azw3, mobi |eng | 2014-11-21 | Author:Roger Barga & Valentine Fontama & Wee Hyong Tok [Barga, Roger]
Decision Trees Decision tree algorithms are hierarchical techniques that work by splitting the dataset iteratively based on certain statistical criteria. The goal of decision trees is to maximize the variance ...
( Category:
Software
July 29,2018 )
epub, pdf |eng | 2013-10-30 | Author:Balaji Varanasi [Varanasi, Balaji]
LDAP INJECTION LDAP injection is a technique where an attacker alters an LDAP query to run arbitrary LDAP statements against the directory server. LDAP injection can result in unauthorized data ...
( Category:
Programming
July 29,2018 )
epub |eng | 2014-01-09 | Author:Collier, Marsha [Collier, Marsha]
Selecting a category Many eBay sellers will tell you that selecting the exact category isn't crucial to achieving the highest price for your item — and they're right. The bulk ...
( Category:
Internet & Social Media
July 29,2018 )
epub, pdf |eng | 2011-07-10 | Author:Marsha Collier
Figure 10-1: Let eBay do some of the work in finding the proper category for your item. You can also browse the categories by clicking (surprise!) the Browse Categories tab ...
( Category:
Internet & Social Media
July 29,2018 )
epub |eng | 2018-07-20 | Author:Harinder Kohli [Kohli, Harinder]
( Category:
Certification
July 27,2018 )
epub |eng | 2018-07-19 | Author:Omar Santos [Santos, Omar]
NIST SP 800-46, R2 “Guide to Enterprise Telework, Remote Access and Bring Your Own Device Security,” provides information on security considerations for several types of remote access solutions, and it ...
( Category:
Networking & Cloud Computing
July 27,2018 )
epub |eng | 2018-07-19 | Author:William Stallings [Stallings, William]
Compliance: IM use at [Company Name] will comply with, all [Company Name] policies, all [Company Name] contracts and all applicable laws. Privacy: IM conversations and messages created on the corporate ...
( Category:
Networking & Cloud Computing
July 27,2018 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(11877)Grails in Action by Glen Smith Peter Ledbrook(9163)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(8808)
Azure Containers Explained by Wesley Haakman & Richard Hooper(7444)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(7434)
Kotlin in Action by Dmitry Jemerov(7263)
Running Windows Containers on AWS by Marcio Morales(6986)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5402)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(5213)
Combating Crime on the Dark Web by Nearchos Nearchou(4982)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4671)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4527)
Python for Security and Networking - Third Edition by José Manuel Ortega(4233)
The Age of Surveillance Capitalism by Shoshana Zuboff(4210)
Learn Wireshark by Lisa Bock(4123)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3888)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3681)
DevSecOps in Practice with VMware Tanzu by Parth Pandit & Robert Hardt(3568)
Windows Ransomware Detection and Protection by Marius Sandbu(3543)
Blockchain Basics by Daniel Drescher(3507)