Networking & Cloud Computing
epub |eng | 2018-12-04 | Author:OccupyTheWeb

Summary Linux has a number of commands to enable you to combine and compress your files for easier transfer. For combining files, tar is the command of choice, and you ...
( Category: Internet & Social Media December 18,2018 )
mobi |eng | 2015-07-14 | Author:Aaron Cordova, Billie Rinaldi, and Michael Wall

Secondary Indexing Applications that use a single table and employ a simple access pattern are among the most scalable, consistent, and fast. This type of design can serve in a ...
( Category: Security & Encryption December 18,2018 )
epub |eng | | Author:Lawrence Lessig

PRIVACY IN PUBLIC: DATA The story I’ve told so far is about limits on government: What power should the government have to surveil our activities, at least when those activities ...
( Category: Skills December 15,2018 )
epub |eng | 2017-04-27 | Author:Arthur Salmon

( Category: Networking & Cloud Computing December 15,2018 )
epub |eng | 2018-12-11 | Author:Ray Rothrock

CREATING DIGITAL RESILIENCE ONE NODE AT A TIME In its early evolution from the ARPANET and NSFNet, the Internet incorporated in its architecture and protocols the rudiments of resilience (Chapter ...
( Category: Security & Encryption December 12,2018 )
epub |eng | 2018-02-01 | Author:Gabriel Campisi

Donald Kushner A: The chances of seeing smaller movies in theaters is getting more difficult. The market for smaller movies is now on Video-On-Demand and Netflix, or even on YouTube. ...
( Category: Movies December 12,2018 )
epub |eng | 2018-07-30 | Author:IP Specialist [Specialist, IP]

Chapter 5: Data Management Disaster Recovery Disaster recovery (DR) is about preparing for and recovering from a disaster. A disaster is an event that has a negative impact on a ...
( Category: Networking & Cloud Computing December 11,2018 )
epub |eng | 2018-07-29 | Author:Tony Hsu [Hsu, Tony]

Security-testing plan templates The testing plan defines the security baselines to achieve the business objective, testing approach, tools, and risk analysis. Depending on the business of the application, it's also ...
( Category: Software December 11,2018 )
epub |eng | 2016-12-30 | Author:Desjardins, Patrick

Release Date: 19-Jun-13 Url: In some scenarios you will want to update a specific property but not others. This can be for security reasons or for performance reasons. In ...
( Category: Programming December 11,2018 )
epub |eng | 2018-07-28 | Author:Shabda Raaj [Raaj, Shabda]

Created a mapping of tenants to schemas Set the tenant specific schema in middleware In this chapter, we will Use request header to find the tenant Create a mapping of ...
( Category: Programming Languages December 11,2018 )
epub |eng | 2016-04-12 | Author:Coll, Eric

Figure 103. OFDM In the simplest implementation, illustrated in Figure 103, the incoming bits are used to turn subcarriers on or off, splitting the incoming bit stream at a rate ...
( Category: Engineering December 11,2018 )
epub |eng | | Author:Nancy Hendrickson

“The Gentleman’s Magazine Library, 1731–1868” collection contains this description of Uffington, an ancient site in Britain. The Periodicals & Magazines category includes published genealogies that may include information about your ...
( Category: Genealogy December 11,2018 )
epub |eng | 2018-07-24 | Author:Ganapathi Pulipaka [Pulipaka, Ganapathi]

Facebook artificial intelligence group also developed a special open source library as part of Torch deep learning toolkit dubbed torch-rnnlib. This open source library allows developing newer recurrent network models ...
( Category: Programming Languages December 11,2018 )
epub |eng | 2016-12-10 | Author:Alasdair Gilchrist

However, upgrades are very risky; –Loss of power – Should the device, especially an IoT device lose power half why through a Firmware upgrade it could result in bricking the ...
( Category: Internet & Social Media December 11,2018 )
epub |eng | 2018-07-24 | Author:Richard Luckett, William Lefkovics, Bharat Suneja

( Category: Networking & Cloud Computing December 11,2018 )

Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(4137)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(3677)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(1826)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(785)
React Native - Building Mobile Apps with JavaScript by Novick Vladimir(693)
Applied Network Security by Arthur Salmon & Michael McLafferty & Warun Levesque(647)
Blockchain Basics by Daniel Drescher(565)
Owning Bitcoin: The Illustrated Guide to Security, Privacy, and Potential by Apodaca Richard(542)
Kotlin in Action by Dmitry Jemerov(537)
Blockchain: Ultimate Step By Step Guide To Understanding Blockchain Technology, Bitcoin Creation, and the future of Money (Novice to Expert) by Keizer Söze(513)
31 Days Before Your CompTIA A+ Exams (Shanette Luellen's Library) by Benjamin Patrick Conry(511)
Serious Cryptography: A Practical Introduction to Modern Encryption by Aumasson Jean-Philippe(501)
Spring: Developing Java Applications for the Enterprise by Ravi Kant Soni & Amuthan Ganeshan & Rajesh RV(490)
TCP IP by Todd Lammle(482)
Wireless Hacking 101 by Karina Astudillo(440)
Networking A Beginner's Guide by Bruce Hallberg(432)
MCSA Windows Server 2016 Study Guide: Exam 70-741 by William Panek(402)
Open-Source ESBs in Action: Example Implementations in Mule and ServiceMix by Tijs Rademakers Jos Dirksen(398)
Learning HTTP/2: A Practical Guide for Beginners by Stephen Ludin & Javier Garza(385)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(376)
Web Analytics