Networking & Cloud Computing
epub |eng | 2012-06-13 | Author:Marc Wolenik & Damian Sinay & Rajya Bhaiya
* * * Outgoing (SMTP) profiles support Windows Authentication, Exchange online, Clear Text, and Anonymous authentication types. * * * Tip Anonymous SMTP is only valid for internal, non-Internet-facing SMTP ...
( Category:
Programming
June 14,2017 )
epub, mobi |eng | 2013-05-22 | Author:Schulzrinne, Henning, Tschofenig, Hannes & Henning Schulzrinne
When any of the capabilities required for an IMS emergency call are missing, then the CS domain must be used instead. When both domains are possible based on the registration ...
( Category:
Engineering
June 14,2017 )
epub |eng | 2011-06-30 | Author:J.C. Mackin [J.C. Mackin]
Manually modify the web server’s ApplicationHost.config file and add the website and web application settings. Restore the IIS configuration by using the AppCmd utility. Copy an earlier version of the ...
( Category:
Operating Systems
June 14,2017 )
mobi, epub |eng | 2013-05-13 | Author:Deibert, Ronald J. [Deibert, Ronald J.]
10. Fanning the Flames of Cyber Warfare Eugene Kaspersky is the CEO of the Russian-based malware and cyber-security research laboratory that bears his name, Kaspersky Lab. An outspoken, controversial, and ...
( Category:
Social Sciences
June 14,2017 )
mobi, epub, pdf |eng | 0101-01-01 | Author:Wynn Netherland, Nathan Weizenbaum, Chris Eppstein, Brandon Mathis
.add-button { @include icons-sprite(box-add); } This will only output the CSS necessary to style this element. Listing 6.8. Generated single-sprite CSS .icons-sprite, .add-button { background: url('/images/icons-s0cad3f8f97.png') no-repeat; } .add-button { ...
( Category:
Programming Languages
June 14,2017 )
mobi |eng | 2009-03-16 | Author:Angwin, Julia [Angwin, Julia]
To get advertisers on board, Levinsohn had to clean up MySpace's image. It was a difficult technical task, made trickier by the fact that MySpace didn't want to scare its ...
( Category:
Business Culture
June 14,2017 )
epub, pdf |eng | 2012-12-09 | Author:Lee Holmes [Lee Holmes]
/ Represents the root of the XML tree. For example: PS > $xml | Select-Xml "/" | Select -Expand Node AddressBook ----------- AddressBook /Node Navigates to the node named Node ...
( Category:
Programming
June 14,2017 )
epub, azw3, mobi |eng | 2013-09-10 | Author:Ilya Grigorik
History and Relationship to SPDY SPDY is an experimental protocol, developed at Google and announced in mid-2009, whose primary goal was to try to reduce the load latency of web ...
( Category:
Networking & Cloud Computing
June 14,2017 )
mobi |eng | 2008-02-03 | Author:Pepelnjak, Ivan [Pepelnjak, Ivan]
Figure 10-3. BGP-4 Address Assignment Between PE- and CE-routers Given the address assignments within Figure 10-3, the PE-router configuration, similar to the one in Example 10-1, can be used to ...
( Category:
Networking & Cloud Computing
June 14,2017 )
epub |eng | 2011-03-29 | Author:Leif Madsen & Russell Bryant [Leif Madsen]
The timestamp on a call file is important. If you set the timestamp to be in the future, Asterisk will not process the file until that time is reached. See ...
( Category:
Networking & Cloud Computing
June 14,2017 )
epub |eng | 2011-03-23 | Author:Cricket Liu [Cricket Liu]
See Also Recipes Section 6.4 and Section 6.5, for delegating reverse mapping for networks with network or subnet masks that don’t break on an octet boundary. Delegating Reverse-Mapping for Networks ...
( Category:
Networking & Cloud Computing
June 14,2017 )
epub, pdf |eng | 2008-12-16 | Author:Tim Patrick [Tim Patrick]
− Binary The subtraction operator, although if you can figure out how to subtract one bumblebee from another, you're a better programmer than I am. * Binary The multiplication operator. ...
( Category:
Programming
June 14,2017 )
epub |rus | 0101-01-01 | Author:By Michael Gregg [Gregg, By Michael]
Eavesdropping Eavesdropping is one of these basic problems. If the attacker is within range, he can simply intercept radio signals and decode the data being transmitted. Nothing more than a ...
( Category:
Internet & Social Media
June 14,2017 )
epub |eng | 2011-08-29 | Author:Jacek Artymiak
Figure 7-8. Sample result of the SMALL function You can set the k argument to any integer value you like, but it must not be zero or larger than the ...
( Category:
Software
June 14,2017 )
epub, pdf |eng | 2003-03-14 | Author:Andrew S. Tanenbaum [Tanenbaum, Andrew S.]
Figure 5-50. (a) Transparent fragmentation. (b) Nontransparent fragmentation. Transparent fragmentation is straightforward but has some problems. For one thing, the exit gateway must know when it has received all the ...
( Category:
Networking & Cloud Computing
June 14,2017 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6848)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6848)
Running Windows Containers on AWS by Marcio Morales(6374)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5074)
Combating Crime on the Dark Web by Nearchos Nearchou(4650)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4624)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4339)
The Age of Surveillance Capitalism by Shoshana Zuboff(3981)
Python for Security and Networking - Third Edition by José Manuel Ortega(3899)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3559)
Learn Wireshark by Lisa Bock(3538)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3356)
Blockchain Basics by Daniel Drescher(3326)
