Networking & Cloud Computing
epub |eng | 2019-12-26 | Author:Kelly Kordes Anton & Tina DeJarld [Kelly Kordes Anton]

( Category: Adobe InDesign Guides December 12,2019 )
epub |eng | 2018-10-10 | Author:Raoul-Gabriel Urma

Let’s look at some more examples. This is also a good opportunity to introduce two recent features in Java, which we explore in order: Local variable type inference Switch expressions ...
( Category: Networking & Cloud Computing December 12,2019 )
epub |eng | 2019-12-10 | Author:Brian Wood [Brian Wood]

( Category: Adobe Illustrator Guides December 12,2019 )
epub |eng | 2019-12-08 | Author:Mukund Chaudhary & Abhishek Chopra [Mukund Chaudhary]

( Category: Storage & Retrieval December 12,2019 )
mobi |eng | | Author:The Definitive Guide

( Category: Enterprise Applications December 11,2019 )
mobi, epub |eng | 2019-01-31 | Author:Danilo Poccia

Exercise Add a name field to the Sign Up page and have the name stored on the DynamoDB table and in the validation email. * * * Tip In Amazon ...
( Category: JavaScript December 11,2019 )
epub |eng | | Author:System Administration Best Practices

Configuration utilities So, what are some of the utilities provided for Debian administration? We've already mentioned a couple of specialized ones for GRUB and sendmail. There are many others that ...
( Category: Networking & Cloud Computing December 10,2019 )
epub |eng | 2019-11-15 | Author:Kali, Kevin [Kali, Kevin]

Chapter 7 Preventing Cyber Attacks In September 2014, Home Depot announced that it was hacked, probably during the spring of that year; this hack led to the theft of the ...
( Category: Networking & Cloud Computing December 10,2019 )
epub |eng | 2019-12-08 | Author:Richard Warburton & Raoul-Gabriel Urma [Richard Warburton]

( Category: Networking & Cloud Computing December 9,2019 )
epub |eng | 2019-12-26 | Author:Andrew Faulkner & Conrad Chavez [Andrew Faulkner]

( Category: Adobe Photoshop December 8,2019 )
mobi |eng | 2018-01-22 | Author:Perry Lea

Public Data Network (PDN): This is the external interface, and for the most part, the internet. It can include other services, data centers, private services, and so on. In a ...
( Category: Computer Design December 7,2019 )
mobi |eng | 2017-01-24 | Author:Abdelfattah Benammi

6.4. Working with Providers: Set-Itemproperty In order to know how the Cmdlet Set-ItemProperty works, we need to check the help documentation: “help set- ItemProperty -ShowWindow”. Figure 26: Help documentation of: ...
( Category: Client-Server Systems December 3,2019 )
epub, mobi |eng | 2018-11-29 | Author:Joshua Saxe & Hillary Sanders

Figure 7-2: Suspiciousness scores output by the hypothetical MalDetect system for individual software binaries Suspiciousness scores are informative, but in order to calculate MalDetect’s true positive rate and false positive ...
( Category: Testing November 30,2019 )
epub, mobi |eng | 2019-11-29 | Author:Dennis Andriesse

Running the Gadget Finder The command line interface for the gadget finder is the same as for the disassembly tools. Listing 8-12 shows what the output should look like. Listing ...
( Category: Testing November 30,2019 )

Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(6459)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(5427)
Grails in Action by Glen Smith Peter Ledbrook(5058)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(2679)
Kotlin in Action by Dmitry Jemerov(2139)
Learn Windows PowerShell in a Month of Lunches by Don Jones(1571)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(1428)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(1313)
Blockchain Basics by Daniel Drescher(1219)
React Native - Building Mobile Apps with JavaScript by Novick Vladimir(1129)
Applied Network Security by Arthur Salmon & Michael McLafferty & Warun Levesque(1039)
TCP IP by Todd Lammle(1026)
Owning Bitcoin: The Illustrated Guide to Security, Privacy, and Potential by Apodaca Richard(981)
Serious Cryptography: A Practical Introduction to Modern Encryption by Aumasson Jean-Philippe(928)
The Art Of Deception by Kevin Mitnick(893)
Wireless Hacking 101 by Karina Astudillo(890)
Blockchain: Ultimate Step By Step Guide To Understanding Blockchain Technology, Bitcoin Creation, and the future of Money (Novice to Expert) by Keizer Söze(880)
Networking A Beginner's Guide by Bruce Hallberg(879)
The Age of Surveillance Capitalism by Shoshana Zuboff(871)
31 Days Before Your CompTIA A+ Exams (Shanette Luellen's Library) by Benjamin Patrick Conry(832)