Networking & Cloud Computing
epub |eng | 2009-03-16 | Author:Hewitt, Eben [Eben Hewitt]
Note There is a bit of a gray area with respect to proper header usage. Many public services, such as some posted by the United States Post Office, use what ...
( Category:
Client-Server Systems
April 5,2014 )
epub |eng | 2010-02-21 | Author:Allamaraju, Subbu [Subbu Allamaraju]
Tip Since a cache can be both an HTTP client and a server, in caching-related discussions, the term origin server is used to differentiate between caching servers and the servers ...
( Category:
Client-Server Systems
April 5,2014 )
epub, pdf |eng | 2012-02-26 | Author:Michael Sikorski & Andrew Honig [Michael Sikorski]
Using Hashed Exported Names The algorithm just discussed has a weakness: It performs a strcmp against each export name until it finds the correct one. This requires that the full ...
( Category:
Hacking
April 5,2014 )
epub |eng | 2010-08-24 | Author:Dwivedi, Himanshu [Himanshu Dwivedi]
User supplies the challenge, which in this case is 214484840. User supplies the MD5 hash that was sniffed over the network. From Figure 5-5 we see that the hash is ...
( Category:
Hacking
April 5,2014 )
mobi |eng | 2013-09-12 | Author:Hallberg, Bruce [Hallberg, Bruce]
Acquiring Backup Media and Technologies Once you have some idea of your backup needs, you can then proceed to acquire the necessary hardware and software to create and manage your ...
( Category:
LAN
April 3,2014 )
mobi, epub |eng | 2012-11-06 | Author:Robin Heydon
wait <until end of working day> connect to lights: send "off" to control point disconnect It is this combination of multiple services in the client that is one of the ...
( Category:
Software Development
April 2,2014 )
epub, mobi, azw3 |eng | 2012-09-04 | Author:John Keegan [Keegan, John]
It is, however, towards China, not India, that the Mongols first set their course, since they were borderers of that empire. From the time of the earliest unification under the ...
( Category:
Military Technology
April 2,2014 )
epub |eng | 2010-04-18 | Author:Jones, Allen, Freeman, Adam & Adam Freeman [Allen Jones]
To protect a static method or variable, the use of this is not available, but it’s possible to use the return from typeof(MyClass). Waiting and Notifying In Java, the Object ...
( Category:
Object-Oriented Design
April 1,2014 )
epub |eng | 2009-02-08 | Author:Jesse Liberty [Jesse Liberty]
Note Example 11-2 uses an array, which is a collection of objects, all of the same type. You create an array by indicating the type of objects to hold and ...
( Category:
Microsoft OS Guides
March 31,2014 )
epub |eng | 2010-10-14 | Author:Fitzgerald, Michael [Michael Fitzgerald]
See Also For a more thorough introduction to SOAP, read the SOAP v1.2 primer (Part 0): http://www.w3.org/TR/soap12-part0/ SOAP v1.2 messaging framework (Part 1), including information on the SOAP processing model ...
( Category:
Client-Server Systems
March 31,2014 )
epub |eng | 2000-01-02 | Author:Chuck Musciano & Bill Kennedy [Musciano, Chuck & Kennedy, Bill]
9.2.2.1. The application/x-www-form-urlencoded encoding The standard encodingapplication/x-www-form-urlencodedconverts any spaces in the form values into a plus sign (+), nonalphanumeric characters into a percent sign (%) followed by two hexadecimal digits ...
( Category:
Web Design
March 31,2014 )
epub |eng | 2008-11-18 | Author:Lastufka, Alan, Dean, Michael W. & Michael W. Dean [Alan Lastufka]
Be willing to reciprocate. Don't get someone to collab on your video and then say you don't have time when they ask you later to collab on their video. Make ...
( Category:
Internet, Groupware, & Telecommunications
March 31,2014 )
epub |eng | 2000-01-02 | Author:Clinton Wong [Wong, Clinton]
* * * The Pragma header specifies directives for proxy and gateway systems. Since many proxy systems may exist between a client and server, Pragma headers must pass through each ...
( Category:
Web Design
March 31,2014 )
epub |eng | 2010-07-07 | Author:Lucas, Michael W. [Michael W. Lucas]
The xheader option tells flow-report to provide extra header information. Not all report types have extra header information. In some reports, the extra header information is identical to the regular ...
( Category:
Network Security
March 31,2014 )
epub |eng | | Author:Ross, John [John Ross]
Performing a Site Survey Understanding general networking principles is fine, but you're installing a wireless network in a real location with real walls and real furniture (and most likely, real ...
( Category:
LAN
March 31,2014 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6847)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6847)
Running Windows Containers on AWS by Marcio Morales(6373)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5074)
Combating Crime on the Dark Web by Nearchos Nearchou(4649)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4623)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4339)
The Age of Surveillance Capitalism by Shoshana Zuboff(3980)
Python for Security and Networking - Third Edition by José Manuel Ortega(3899)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3558)
Learn Wireshark by Lisa Bock(3537)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3528)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3356)
Blockchain Basics by Daniel Drescher(3326)
