Networking & Cloud Computing
epub, azw3 |eng | 2016-10-17 | Author:Raymond Phillips [Phillips, Raymond]
As a result of this invasion of privacy, many users are starting to look for open-source privacy tools to help them stay anonymous online. These tools are transparent and independently ...
( Category:
Civil Law
April 16,2017 )
epub |eng | | Author:Tony Campbell
Edward Snowden Edward Snowden was employed by the National Security Agency (NSA) as a computer systems consultant, with administrator-level privileges to the NSA’s internal network. For whatever reason, and there ...
( Category:
Maintenance, Repair & Upgrading
April 7,2017 )
epub |eng | | Author:Bogdan Ciubotaru & Gabriel-Miro Muntean
( Category:
Expert Systems
March 30,2017 )
epub |eng | 2015-06-21 | Author:Butler, A.
Maze Game's tapLeft() Method tapLeft() activates when the player taps the colored strip which displays along the left side of the maze. tapLeft() finds the index within the maze array, ...
( Category:
Internet, Groupware, & Telecommunications
March 23,2017 )
mobi, azw3, pdf |eng | 2016-11-05 | Author:Antonio Martel
Too small to fail Kaizen, or continuous improvement, is a well-known term in business or industrial organization. It’s now spreading widely in every sector of the economy, but it also ...
( Category:
Agile
March 22,2017 )
epub |eng | 2016-11-04 | Author:Martel, Antonio
Too small to fail Kaizen, or continuous improvement, is a well-known term in business or industrial organization. It’s now spreading widely in every sector of the economy, but it also ...
( Category:
Agile
March 22,2017 )
epub |eng | | Author:Sanjib Sinha
Understanding Classes and Objects You cannot understand theory unless you implement that concept into the real world. Let us see what we have learned. 1. Classes are when you create ...
( Category:
Hacking
March 21,2017 )
mobi |eng | 2016-08-08 | Author:Steve Pease
● Test your internet connection by typing in a valid website or click on a web link you have bookmarked. ● Open a Web browser and type http://10.0.0.1 in the ...
( Category:
Wireless Networks
March 12,2017 )
epub, pdf |eng | 2015-03-10 | Author:Tung-Hui Hu [Hu, Tung-Hui]
Figure 3.2 At the Swiss Fort Knox in Saanen, Switzerland. Photograph: Information & Software Engineering Group, Technische Universität Wien. Courtesy of Andreas Rauber. Addressed to the data archeologist of the ...
( Category:
Cloud Computing
March 11,2017 )
epub |eng | | Author:Carlo Batini & Monica Scannapieco
9.7 Object Identification Techniques for Maps and Images Geospatial dataset object identification (term seldom used for geospatial datasets; terms more used are linkage, fusion, matching, integration, and conflation ; in ...
( Category:
Storage & Retrieval
March 5,2017 )
epub, pdf |eng | | Author:Joseph Migga Kizza
Other configurations of firewalls depend on the structure of the network. For example, in a set up with multiple networks, several firewalls may be used, one per network. Security in ...
( Category:
Networks
March 4,2017 )
epub, pdf |eng | | Author:Dan Clark
where expression is an expression that returns a scalar value. dates is the date table’s key column. filter is an optional filter expression, and year_end_date is also optional—you can use ...
( Category:
Enterprise Applications
March 3,2017 )
epub, pdf |eng | | Author:Pradeeka Seneviratne
The ArduiBox, Standard Version does include components (Figure 5-2) for building the on-board power supply and voltage regulator circuit. Figure 5-2.Components for the power supply and voltage regulator . Image ...
( Category:
Cloud Computing
February 25,2017 )
mobi, epub, pdf |eng | 2016-12-20 | Author:Bill Havanki
To allow SSH access to an instance, an inbound rule should permit access for TCP port 22. It’s best to restrict this rule to your own IP address, or those ...
( Category:
Cloud Computing
February 25,2017 )
mobi, azw3, pdf |eng | 2017-01-01 | Author:Giulio D'Agostino
If you see any error at this stage move to the bottom of the page for troubleshooting tips. The -wep makes it clear to wifite that you want to hack ...
( Category:
Networking & System Administration
February 25,2017 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6848)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6848)
Running Windows Containers on AWS by Marcio Morales(6374)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5074)
Combating Crime on the Dark Web by Nearchos Nearchou(4650)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4624)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4339)
The Age of Surveillance Capitalism by Shoshana Zuboff(3981)
Python for Security and Networking - Third Edition by José Manuel Ortega(3899)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3559)
Learn Wireshark by Lisa Bock(3538)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3356)
Blockchain Basics by Daniel Drescher(3326)
