Networking & Cloud Computing
epub |eng | 2015-04-24 | Author:Ragonha, Paulo
The important part in the preceding code is the $.getJSON call, an AJAX request expecting a JSON response containing an updated share price, such as: { "sharePrice": 20.18 } By ...
( Category:
Internet & Social Media
September 3,2017 )
azw3 |eng | 2015-04-24 | Author:Ragonha, Paulo [Ragonha, Paulo]
The important part in the preceding code is the $.getJSON call, an AJAX request expecting a JSON response containing an updated share price, such as: { "sharePrice": 20.18 } By ...
( Category:
Internet & Social Media
September 3,2017 )
epub, azw3, mobi |eng | 2017-04-06 | Author:Unknown
* * * They wouldn’t let us leave without overloading us with food for our journey. “Fattening us up to appease their god,” Collier muttered. “That is hateful, ethnocentric nonsense,” ...
( Category:
Databases & Big Data
September 3,2017 )
epub |eng | 2013-07-22 | Author:Shannon Bray, Miguel Wood & Patrick Curran
Search Admin database User Profile Service databases: Profile database Social database Sync database The Social database and the Sync database are optional. If you do not upgrade these databases, new ...
( Category:
Software
September 3,2017 )
epub, mobi |eng | 2015-10-26 | Author:William Stallings [Stallings, William]
Discard policy: A discard policy determines which packets to drop when a buffer is full and new packets arrive. A discard policy can be an important element in managing congestion ...
( Category:
Networking & Cloud Computing
September 2,2017 )
azw3, epub |eng | 2017-03-05 | Author:Solberg, Michael & Silverman, Ben [Solberg, Michael]
Now let's add these modules to our Puppet master. To do this, clone a clean copy of the repository onto a location on the server as the root user: # ...
( Category:
Networking & Cloud Computing
September 2,2017 )
epub |eng | 2016-12-06 | Author:Serdula, Donna [Serdula, Donna]
Or: I am on LinkedIn to forge strong professional relationships. Whether you know me directly or not, please feel free to send me a connection request. Assisting other professionals and ...
( Category:
Internet & Social Media
September 2,2017 )
mobi, epub |eng | | Author:2015
All of this is handled by the Cached case class and its companion object. The case class is defined as follows: case class Cached(key: RequestHeader => String, caching: PartialFunction[ResponseHeader, Duration]) ...
( Category:
Web Development & Design
September 2,2017 )
epub, mobi |eng | | Author:2015
WPA cracking with Aircrack-ng In the previous section, we have mentioned that to crack a WPA key, we must first capture the four frames related to a WPA handshake between ...
( Category:
Networking & Cloud Computing
September 2,2017 )
epub |eng | 2017-02-27 | Author:Ravi Kant Soni & Amuthan Ganeshan & Rajesh RV [Soni, Ravi Kant]
( Category:
Programming Languages
September 1,2017 )
azw3 |eng | 2017-02-28 | Author:Soni, Ravi Kant & Ganeshan, Amuthan & RV, Rajesh [Soni, Ravi Kant]
Create an interface named OrderService under the com.packt.webstore.service package in the src/main/java source folder and add the following method declarations to it as follows: package com.packt.webstore.service; import com.packt.webstore.domain.Order; public interface ...
( Category:
Programming Languages
September 1,2017 )
epub |eng | 2013-08-01 | Author:Olga M. Londer & Penelope Coventry
Set Up Open a SharePoint site where you can access your user profile in the profile store. This exercise will use the http://wideworldmporters site, but you can use whatever SharePoint ...
( Category:
Software
September 1,2017 )
epub, mobi |eng | | Author:2014
Network layer protocols Network layer protocols, also known as Internet layer protocols in the DARPA reference model, provide basic network connectivity and internetwork communications services. In this layer, you will ...
( Category:
Networking & Cloud Computing
September 1,2017 )
epub |eng | 2015-03-14 | Author:Jennifer Golbeck
Figure 14.3 Malcom's Tumblr blog. Hashtags Hashtags are used very frequently within Tumblr. Figure 14.3 shows a couple on the photo Malcom has posted. Since photos are a very common ...
( Category:
Internet & Social Media
September 1,2017 )
epub |eng | 2013-10-03 | Author:Joe Kissell [Joe Kissell]
Software Licenses Many apps require a license key or serial number, and 1Password makes a great storage place for all those licenses (Figure 18). Even though they may not be ...
( Category:
Security & Encryption
September 1,2017 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6855)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6853)
Running Windows Containers on AWS by Marcio Morales(6379)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5077)
Combating Crime on the Dark Web by Nearchos Nearchou(4652)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4632)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4341)
The Age of Surveillance Capitalism by Shoshana Zuboff(3983)
Python for Security and Networking - Third Edition by José Manuel Ortega(3901)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3562)
Learn Wireshark by Lisa Bock(3544)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3356)
Blockchain Basics by Daniel Drescher(3327)
