Networking & Cloud Computing
azw3, epub, pdf |eng | 2015-05-26 | Author:Balbaert, Ivo [Balbaert, Ivo]
It again shows Rust's commitment to be on the safe side; if it's Ok, it will give back a value of the T type, if there is a problem, then ...
( Category:
Software Development
June 2,2015 )
epub |eng | 2013-10-17 | Author:Julian Soh, Anthony Puca & Marshall Copeland [Julian Soh, Anthony Puca, and Marshall Copeland]
Copy the text value from Notepad that is associated to the domain and paste it into the Text box, as shown in Figure 11-62. Leave the Record name box blank. ...
( Category:
Windows Desktop
June 2,2015 )
epub |eng | 2015-06-01 | Author:Shon Harris
A. Security parameter index B. Security ability C. Security association D. Security assistant C. Each IPSec VPN device will have at least one security association (SA) for each secure connection ...
( Category:
Encryption
June 2,2015 )
epub, mobi |eng | 2015-05-15 | Author:Richard Petersen [Petersen, Richard]
%S Name of the current service %P Root directory of the current service %u Username of the current service %H Home directory of the user %h Internet hostname on which ...
( Category:
Intranets & Extranets
June 2,2015 )
epub |eng | 2015-05-28 | Author:Marschall, Matthias
There's more... The execute resource offers a way to pass environment variables to the command it executes. Change the my_cookbook default recipe: mma@laptop:~/chef-repo $ subl cookbooks/my_cookbook/recipes/default.rb execute 'print value of ...
( Category:
Client-Server Systems
June 1,2015 )
epub |eng | 2015-05-14 | Author:Tour Guide, PaaS
Chapter 6: Advantages and Disadvantages of PaaS If you’ve made it this far, thank you for sticking with it. I’m not going to bore you anymore with introductory sentences, so ...
( Category:
Internet, Groupware, & Telecommunications
June 1,2015 )
mobi |eng | 2015-05-16 | Author:Memes
That’s the end, thanks for reading!
( Category:
Computers & Internet
June 1,2015 )
epub |eng | 2015-05-26 | Author:Morgillo, Ivan
Like sample(), timeout() uses the TimeUnit object to specify the time interval. The next figure shows how the Observable will trigger onError() the moment the Observable violates the timeout constraint: ...
( Category:
Java
June 1,2015 )
epub |eng | 2015-05-22 | Author:Mark, Bailil
Now, the part I’m interested in is highlighted above. Note that the “Received” is from kara.org at an IP that appears to be an xo.net DSL line, which does not ...
( Category:
Internet, Groupware, & Telecommunications
May 28,2015 )
epub |eng | 2015-01-28 | Author:John R. Levine
Do you want to include the content of the message to which you’re replying? Most mail programs include the content of the message to which you’re replying, usually formatted to ...
( Category:
Networking & Cloud Computing
May 25,2015 )
epub, pdf |eng | 2015-05-14 | Author:Henderson, Lance
3.) You can "sign" any message you want over Tor or anywhere else (Freenet, for example, the highest security setting of which demands absolute trust of your friend's darknet connection) ...
( Category:
Internet, Groupware, & Telecommunications
May 25,2015 )
epub |eng | 2015-03-18 | Author:Terence Lawfield & Blogging Wordpress [Lawfield, Terence & Wordpress, Blogging]
Link Juice Links are another thing that search engines look at, when deciding how good a website is. If lots of other websites link to the pages in your domain, ...
( Category:
Internet, Groupware, & Telecommunications
May 25,2015 )
epub |eng | 2015-05-24 | Author:Philip N. Howard [Howard, Philip N.]
Third Consequence: From a Clash of Civilizations to a Competition Between Device Networks Information activism is already a global ideological movement, and competition among device networks will replace a clash ...
( Category:
Communication & Media Studies
May 25,2015 )
mobi |eng | 2004-01-08 | Author:Duncan J. Watts
NETWORKS, VIRUSES, AND MICROSOFT THIS RESULT WAS A PROMISING START AND DEMONSTRATED THAT for some problems at least, epidemics can be better understood by using a percolation approach than with ...
( Category:
System Theory
May 10,2015 )
epub |eng | 2014-10-14 | Author:Camille McCue
From the menu bar, choose File⇒New Project Size⇒Web Player. Paint the Background The background features the character thinking of the secret number. This character also communicates to the player how ...
( Category:
Programming
May 8,2015 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9810)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7808)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6804)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6801)
Running Windows Containers on AWS by Marcio Morales(6321)
Kotlin in Action by Dmitry Jemerov(5089)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5048)
Combating Crime on the Dark Web by Nearchos Nearchou(4621)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4573)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4437)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4312)
The Age of Surveillance Capitalism by Shoshana Zuboff(3977)
Python for Security and Networking - Third Edition by José Manuel Ortega(3875)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3533)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
Learn Wireshark by Lisa Bock(3491)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3353)
Blockchain Basics by Daniel Drescher(3322)
