Networking & Cloud Computing
epub |eng | 2010-12-20 | Author:Chris Leeds [Chris Leeds]

( Category: Web Development & Design February 21,2019 )
mobi |eng | 2019-02-09 | Author:Mark L. Murphy

( Category: Programming February 19,2019 )
epub |eng | 2015-07-06 | Author:Luca Massaron & John Paul Mueller [Luca Massaron]

Stretching Python’s Capabilities In This Chapter Understanding how Scikit-learn works with classes Using sparse matrices and the hashing trick Testing performances and memory consumption Saving time with multicore algorithms If ...
( Category: Programming Languages February 17,2019 )
epub |eng | 2014-05-13 | Author:Carl Laufer [Laufer, Carl]

While scanning the fast scanner will also create a table of active signals that it has found in the plugin window. It shows the time that they have been active ...
( Category: Networking & Cloud Computing February 16,2019 )
epub |eng | 2013-12-27 | Author:Shoemaker, Daniel Paul & Conklin, Wm. Arthur [Shoemaker, Daniel Paul]

Handling Configuration Parameters Configuration parameters can change the behavior of an application. Securing configuration parameters is an important issue when configuration can change programmatic behaviors. Managing the security of configuration ...
( Category: Programming February 16,2019 )
azw3 |eng | 2013-04-29 | Author:Perahia, Eldad & Stacey, Robert [Perahia, Eldad]

8.5.2 EIFS Another mechanism used to protect against hidden nodes is the extended inter-frame space (EIFS). A station uses EIFS instead of DIFS to defer if a frame is detected ...
( Category: Engineering February 15,2019 )
epub |eng | 2015-02-14 | Author:Violet Blue [Blue, Violet]

SOCIAL MEDIA CHECKLIST Our relationship with social sharing—photos, videos, status updates, location check-ins, and more—changes as our lives evolve. The way we feel about sharing something one day may be ...
( Category: Safety & First Aid February 14,2019 )
epub |eng | 2015-04-13 | Author:Christopher Hadnagy & Michele Fincher

My Mobile Is Secure I have actually overheard someone telling another person, “If you think it's a malicious e-mail, just open it up on your <iPad/iPhone/Android device/Windows mobile device/insert other ...
( Category: Internet & Social Media February 14,2019 )
epub |eng | 2014-02-21 | Author:Nigel Poulton

SMB/CIFS can be used to share and access devices other than files and folders. It can also share printers and be used for inter-process communication (IPC) between servers. SMB/CIFS originally ...
( Category: Networking & Cloud Computing February 14,2019 )
epub |eng | 2015-02-24 | Author:Matthew Monte

Attempting to combine and simplify two military systems was a complete failure. Starting from scratch is not necessarily much better either. Witness the Virtual Case File, a program designed to ...
( Category: Internet & Social Media February 14,2019 )
epub |eng | 2018-07-25 | Author:Betsy Beyer, Niall Richard Murphy, David K. Rensin, Kent Kawahara & Stephen Thorne

What Is NALSD? This chapter presents a NALSD approach: we begin with the problem statement, gather requirements, and iterate through designs that become increasingly sophisticated until we reach a viable ...
( Category: Technology February 14,2019 )
epub |eng | 2018-08-15 | Author:Mike Ryan & Federico Lucifredi

Example 5-7. Nginx Puppet module class myblog::mynginx { class { "nginx": } nginx::resource::upstream { "myblog_app": ensure => present, members => [ 'localhost:8000', ] } nginx::resource::vhost { "": ensure => enable, ...
( Category: Networking & Cloud Computing February 14,2019 )
epub |eng | | Author:Scott Chacon & Ben Straub

Merge Log Another useful tool when resolving merge conflicts is git log. This can help you get context on what may have contributed to the conflicts. Reviewing a little bit ...
( Category: Operating Systems February 14,2019 )
epub |eng | | Author:Sander van Vugt

node1:∼ # sbd -d /dev/sdc1 list 0 node2 clear 1 node1 clear 7.Now, it’s time for a first test. Use the following command to effectuate a STONITH operation from the ...
( Category: Programming February 14,2019 )
mobi |eng | 2017-09-12 | Author:Kelsey Hightower, Brendan Burns, and Joe Beda

$ kubectl apply -f fluentd.yaml daemonset "fluentd" created Once the fluentd DaemonSet has been successfully submitted to the Kubernetes API, you can query its current state using the kubectl describe ...
( Category: Software February 14,2019 )

Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(5144)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(4431)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(1970)
Kotlin in Action by Dmitry Jemerov(1037)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(876)
React Native - Building Mobile Apps with JavaScript by Novick Vladimir(753)
Applied Network Security by Arthur Salmon & Michael McLafferty & Warun Levesque(706)
Blockchain Basics by Daniel Drescher(671)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(614)
Owning Bitcoin: The Illustrated Guide to Security, Privacy, and Potential by Apodaca Richard(603)
Serious Cryptography: A Practical Introduction to Modern Encryption by Aumasson Jean-Philippe(578)
TCP IP by Todd Lammle(576)
Blockchain: Ultimate Step By Step Guide To Understanding Blockchain Technology, Bitcoin Creation, and the future of Money (Novice to Expert) by Keizer Söze(567)
31 Days Before Your CompTIA A+ Exams (Shanette Luellen's Library) by Benjamin Patrick Conry(552)
Spring: Developing Java Applications for the Enterprise by Ravi Kant Soni & Amuthan Ganeshan & Rajesh RV(526)
Wireless Hacking 101 by Karina Astudillo(518)
Networking A Beginner's Guide by Bruce Hallberg(499)
Open-Source ESBs in Action: Example Implementations in Mule and ServiceMix by Tijs Rademakers Jos Dirksen(491)
MCSA Windows Server 2016 Study Guide: Exam 70-741 by William Panek(463)
Open-Source ESBs in Action: Example Implementations in Mule and ServiceMix by Jos Dirksen Tijs Rademakers(454)