Networking & Cloud Computing
epub |eng | 2015-10-23 | Author:Chin, Stephen & Weaver, James [Chin, Stephen]
FIGURE 5-16. Line runner in action (photo credit Bruno Borges) Obstacle Detection The last trick for our line runner is to teach it how to stop and wait for obstacles ...
( Category:
Engineering
August 29,2017 )
epub |eng | 2013-01-13 | Author:Jon Agar
Chapter 19 Cars, phones and crime New technologies of mobility create new crimes, new criminal modus operandi and new ways to catch criminals. Take, for example, the automobile. From the ...
( Category:
Technology
August 28,2017 )
epub, pdf |eng | 2014-08-28 | Author:Steve Suehring
* * * This objective covers how to: Plan for and configure Virtual Machine Manager logical networks Plan for and configure IP address and MAC address settings across multiple Hyper-V ...
( Category:
Databases & Big Data
August 28,2017 )
Building Virtual Pentesting Labs for Advanced Penetration Testing - Second Edition by Cardwell Kevin
azw3 |eng | 2016-08-30 | Author:Cardwell, Kevin [Cardwell, Kevin]
As the previous image shows, we are going to configure the Network Security Toolkit on the VMnet6 switch; this is to monitor the segment that we set up with the ...
( Category:
Networking & Cloud Computing
August 27,2017 )
mobi, pdf |eng | 2016-05-30 | Author:Jeff Stokes & Manuel Singer
Microsoft Office Word 2003, 2007, 2010, 2013 Opera Software Opera 9.5 Microsoft Outlook Express Only mailbox file Microsoft Project 2003, 2007, 2010, 2013 Microsoft Office Visio 2003, 2007, 2010, 2013 ...
( Category:
Networking & Cloud Computing
August 27,2017 )
azw3, epub |eng | 2016-05-31 | Author:Stokes, Jeff & Singer, Manuel [Stokes, Jeff]
What USMT will migrate and won't migrate There is a complete list of settings, restrictions, applications, and file types in the What does USMT migrate? section of the USMT User's ...
( Category:
Networking & Cloud Computing
August 27,2017 )
epub | | 2009-12-13 | Author:Sterling, Bruce [Sterling, Bruce]
Chicago, siempre en la delantera, tuvo su propia confiscación, llevada a cabo por Timothy Foley y Barbara Golden, agentes del Servicio Secreto. Muchas de estas acciones no tuvieron lugar en ...
( Category:
Internet & Social Media
August 27,2017 )
mobi, epub |eng | | Author:2013
Finally, we need to implement onCanceled to clean up any data that might be loaded in the background after a cancellation has been issued: @Override public void onCanceled(Bitmap data) { ...
( Category:
Mobile Phones, Tablets & E-Readers
August 26,2017 )
epub |eng | 1989-03-07 | Author:Dewdney, A. K [Dewdney, A. K]
THE TURING OMNIBUS (Xi + X3 + X4){xi + X2 + X4)(x2 + a:3)(ji:, + X2 + X4) (X3 + X4){X2 + X3) X2 = 0 /^ \v X. = ...
( Category:
Computer Science
August 26,2017 )
epub |eng | 2012-05-25 | Author:Joe Waters
Figure 5-3: This QR Code shows and tells. Think about placement. Large QR Codes on billboards get people thinking, “Where will it take me if I scan it?” But if ...
( Category:
Networking & Cloud Computing
August 26,2017 )
epub, mobi |eng | | Author:2016
These ini_setting resources will create five lines within the [domain/PROD] section of the configuration file. We need to add PROD to the list of domains; for this, we'll use ini_subsetting ...
( Category:
Computer Science
August 26,2017 )
epub |eng | 2015-03-17 | Author:John Chapman & Aman Dhally [Chapman, John]
Close the database connection: PS C:\> $connection.Close() For more information about the cmdlet and .NET classes used in this section, refer to the following resources: The New-Object cmdlet (http://technet.microsoft.com/en-us/library/hh849885.aspx) The ...
( Category:
Software
August 25,2017 )
azw3 |eng | 2015-03-18 | Author:Chapman, John & Dhally, Aman [Chapman, John]
Close the database connection: PS C:\> $connection.Close() For more information about the cmdlet and .NET classes used in this section, refer to the following resources: The New-Object cmdlet (http://technet.microsoft.com/en-us/library/hh849885.aspx) The ...
( Category:
Software
August 25,2017 )
epub, mobi |eng | | Author:Nathan Marz & James Warren
The next step is to select a single user identifier for each person. This is the most sophisticated portion of the workflow, as it involves a fully distributed iterative graph ...
( Category:
Software
August 25,2017 )
mobi |eng | | Author:2014
Prerequisites Before you start this exercise, you will require the following prerequisites: Access to a Microsoft SQL Server 2012 Reporting Services report server installed in the Native mode with the ...
( Category:
Programming
August 25,2017 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6855)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6853)
Running Windows Containers on AWS by Marcio Morales(6379)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5077)
Combating Crime on the Dark Web by Nearchos Nearchou(4652)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4632)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4341)
The Age of Surveillance Capitalism by Shoshana Zuboff(3983)
Python for Security and Networking - Third Edition by José Manuel Ortega(3901)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3562)
Learn Wireshark by Lisa Bock(3544)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3356)
Blockchain Basics by Daniel Drescher(3327)
