Networking & Cloud Computing
azw3 |eng | 2016-10-10 | Author:Joan Lambert [Lambert, Joan]
Modify cell alignment, text wrapping, and indentation Structural formatting can be applied to a cell, a row, a column, or the entire worksheet. However, some kinds of formatting can detract ...
( Category:
Software
April 19,2018 )
azw3 |eng | 2017-04-18 | Author:Blerton Abazi [Abazi, Blerton]
After that, we will have to assign phone number to our IP phone by applying following commands. Continued… Now, we can see that in GUI mode of Phone, we have ...
( Category:
Networking & Cloud Computing
April 19,2018 )
azw3 |eng | 2015-10-15 | Author:Tyson Cadenhead [Cadenhead, Tyson]
Now, let's create our userModel. This will be a MongoDB model that we can interact with to add and retrieve users, as shown in the following code:var mongoose = require('mongoose'); ...
( Category:
Web Development & Design
April 19,2018 )
mobi, epub |eng | 2016-02-21 | Author:Philip Herron
We have to make sure that it is needed and compiled first. Remember that if we create public declarations, Cython generates a header for us. We will simply add our ...
( Category:
Programming Languages
April 18,2018 )
azw3, pdf |eng | 2017-05-31 | Author:Fuyun Ling [Ling, Fuyun]
4.6.2.2 Mobile/Wireless Device Transmitter Frequency Synthesis In wireless communication systems, the carrier frequencies generated by the BTS are usually very accurate. This is because BTSs can afford to use high-precision ...
( Category:
Engineering
April 18,2018 )
mobi, epub |eng | 2013-12-26 | Author:Vinay Trivedi
From the accelerating explosion in the number of APIs—from a mere handful in 2005 to more than 10,000 in September 2013—you may safely infer that MyAppoly will need an API ...
( Category:
Processes & Infrastructure
April 18,2018 )
epub, pdf |eng | 2013-11-07 | Author:Neil Middleton & Richard Schneeman
Transactional DDL If you’ve ever made a change to your database and have had something fail mid-way, either due to a constraint or some other means, you understand what pain ...
( Category:
Programming
April 18,2018 )
azw3 |eng | 2017-08-26 | Author:Jeffry Houser & Jeffry Houser [Houser, Jeffry]
Populating a Select with Angular Two select lists are required; one for completed tasks, and one for categories. Completed tasks will use a hard-coded data source, and the category drop-down ...
( Category:
Programming Languages
April 18,2018 )
azw3 |eng | 2017-03-10 | Author:Belinda Allen & Mark Polino [Allen, Belinda]
Now, that we have begun the layout of our balance sheet using Excel, let's start adding some Jet functionality. You'll notice that we began adding information several rows down and ...
( Category:
Software
April 18,2018 )
azw3 |eng | 2015-11-23 | Author:Riccardo Becker [Becker, Riccardo]
Uniform interface An important aspect of REST is the uniform interface that simplifies and decouples the REST architecture. This allows systems to change and evolve independently. Using the GET verb ...
( Category:
Programming Languages
April 18,2018 )
azw3 |eng | 2016-07-29 | Author:Dimitri Aivaliotis [Aivaliotis, Dimitri]
Note More details about the uWSGI server, including installation instructions, example configurations, and other supported languages, can be found at http://projects.unbit.it/uwsgi/ and https://github.com/unbit/uwsgi-docs. The uwsgi module of NGINX can be ...
( Category:
Internet & Social Media
April 18,2018 )
azw3, epub |eng | 2017-04-24 | Author:Muhammad Usama bin Aftab [Aftab, Muhammad Usama bin]
Heart Rate characteristic 0x2A37, 0x2A38 and 0x2A39 are matching the central output of UUIDs The characteristic UUID xxxx2a37-xxxx-xxxx-xxxx-xxxxxxxxxxxx matches the peripheral characteristic Heart Rate Measurement with the UUID of 0x2A37. ...
( Category:
Hardware & DIY
April 18,2018 )
epub |eng | | Author:Ben Smith
Chapter 10 Problems Staying Straight DAYS 239–249: Milton Keynes Marathon in the can, I make my way up through Corby, visiting 19 schools in and around Grantham, in conjunction with ...
( Category:
Fantasy
April 18,2018 )
azw3, epub, pdf |eng | 2016-07-05 | Author:Mike Chapple & David Seidl [Chapple, Mike]
Chapter 2: Asset Security (Domain 2) C. Encryption is often used to protect traffic like bank transactions from sniffing. While packet injection and man-in-the-middle attacks are possible, they are far ...
( Category:
Certification
April 18,2018 )
azw3 |eng | 2016-05-31 | Author:Preston Miller & Chapin Bryce [Miller, Preston]
Implementing rolling hashes – hashing_example.py To generate rolling hashes, we must first open the file whose content we wish to hash and define the chunk size we want to hash. ...
( Category:
Programming
April 18,2018 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9870)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7837)
Grails in Action by Glen Smith Peter Ledbrook(7771)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6919)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6912)
Running Windows Containers on AWS by Marcio Morales(6446)
Kotlin in Action by Dmitry Jemerov(5156)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5113)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4698)
Combating Crime on the Dark Web by Nearchos Nearchou(4685)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4440)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4376)
The Age of Surveillance Capitalism by Shoshana Zuboff(3999)
Python for Security and Networking - Third Edition by José Manuel Ortega(3930)
Learn Wireshark by Lisa Bock(3609)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3596)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3536)
Mastering Python for Networking and Security by José Manuel Ortega(3381)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3370)
Blockchain Basics by Daniel Drescher(3339)
