La Tormenta BluRay MicroHD
Jacques BluRay MicroHD
Networking & Cloud Computing
epub |eng | | Author:Rick Boyer

See also See the next recipe, Pinch-to-zoom with multi-touch gestures, for multi-touch gestures Pinch-to-zoom with multi-touch gestures The previous recipe used the SimpleOnGestureListener to provide detection of simple, one-finger, gestures. ...
( Category: Networking & Cloud Computing February 23,2018 )
mobi |eng | 2013-07-25 | Author:Prasenjit Sarkar

Click on Show Advanced Options. Here do not select the I/O Metric Inclusion. Accept all of the default settings, and click on Next. Select the cluster to which you want ...
( Category: Operating Systems February 16,2018 )
epub |eng | 2017-12-28 | Author:Kamesh Balasubramanian

products := r.GetProducts() productsMap := r.GenerateProductsMap(products) result := make(models.Products, 0) for _, v := range cart.Items { product := &models.Product{} product = productsMap[v.ProductSKU] product.Quantity = v.Quantity result = append(result, product) ...
( Category: Programming Languages February 12,2018 )
epub |eng | | Author:Andrew J Wagner

Determining value type or reference type A value type is any type that is defined as either a structure or an enumeration, while all classes are reference types. This is ...
( Category: Programming February 11,2018 )
mobi |eng | 2017-12-22 | Author:Eric Chou

We gather network data for the purpose of gaining insight into our network. One of the best ways to know what the data means is to visualize them with graphs. ...
( Category: Networking & Cloud Computing February 8,2018 )
epub |eng | 2015-02-07 | Author:Daniel Regalado

Congratulations, we now have a shell with the effective uid (euid) of root. Using “return to libc” (ret2libc), we have the ability to direct application flow to other parts of ...
( Category: Internet & Social Media February 7,2018 )
epub |eng | 2015-02-07 | Author:Tyler Wrightson

Active Wireless Recon Before we know which wireless attack will be the most lucrative, we need to identify if there are any access points to target. We will perform active ...
( Category: Internet & Social Media February 7,2018 )
epub |eng | 2012-02-07 | Author:kevin mitnick [mitnick, kevin]

( Category: Specific Groups February 7,2018 )
azw3 |eng | 2017-03-29 | Author:Sanchez, Carlos Perez & Vilarino, Pablo Solar [Sanchez, Carlos Perez]

Tip The key is defined by you, so a good practice is generating a key that you can remember in order to regenerate in the future. In our example, we ...
( Category: Programming Languages February 6,2018 )
azw3 |eng | 2017-08-17 | Author:Sasha Rosenbaum [Rosenbaum, Sasha]

( Category: Programming February 6,2018 )
epub |eng | 2012-11-21 | Author:Taylor, Simon

If you build and run this, you will see both LEDs light up—one green and one blue. Then after 1 second, the timer fires, changes the color of both LEDs, ...
( Category: Engineering February 6,2018 )
azw3 |eng | 2017-05-04 | Author:McKendrick, Russ [McKendrick, Russ]

If you go to the resource group within the Azure Portal you should see your virtual machine is launched and ready: Like the Mac and Linux versions of Docker Machine ...
( Category: Operating Systems February 5,2018 )
azw3 |eng | 2018-01-04 | Author:Saito, Hideto & Lee, Hui-Chuan Chloe & Wu, Cheng-Yang [Saito, Hideto]

Summary In this chapter, we have learned how containers communicate with each other as it is essential, and we introduced how pod-to-pod communication works. Service is an abstraction to route ...
( Category: Networking & Cloud Computing February 5,2018 )
epub |eng | 2017-12-06 | Author:Aric Renzo

Containers at Scale with Kubernetes Kubernetes is by far one of the most popular open source projects to take the IT world by storm. It seems like almost everywhere you ...
( Category: Networking & Cloud Computing February 5,2018 )
epub |eng | 2017-11-21 | Author:Srdjan Grubor

Node-local storage This type of storage that is external to the container is specifically geared toward keeping data separate from your container instances, as we would expect, but is limited ...
( Category: Operating Systems February 5,2018 )

Popular ebooks
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(1109)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(244)
React Native - Building Mobile Apps with JavaScript by Novick Vladimir(231)
Blockchain: Ultimate Step By Step Guide To Understanding Blockchain Technology, Bitcoin Creation, and the future of Money (Novice to Expert) by Keizer Söze(188)
Owning Bitcoin: The Illustrated Guide to Security, Privacy, and Potential by Apodaca Richard(185)
Applied Network Security by Arthur Salmon & Michael McLafferty & Warun Levesque(174)
The Internet of Things by Mercedes Bunz & Graham Meikle(159)
Serious Cryptography: A Practical Introduction to Modern Encryption by Aumasson Jean-Philippe(145)
Database Reliability Engineering: Designing and Operating Resilient Database Systems by Campbell Laine & Majors Charity(131)
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(130)
Learning HTTP/2: A Practical Guide for Beginners by Stephen Ludin & Javier Garza(130)
Isomorphic JavaScript Web Development: Universal JavaScript with React and Node by Konstantin Tarkus(116)
TCP IP by Todd Lammle(116)
31 Days Before Your CompTIA A+ Exams (Shanette Luellen's Library) by Benjamin Patrick Conry(112)
CCNA Routing and Switching Portable Command Guide by Scott Empson(104)
RHCSA & RHCE Red Hat Enterprise Linux 7: Training and Exam Preparation Guide (EX200 and EX300), Third Edition by Asghar Ghori(104)
MCSA Windows Server 2016 Study Guide: Exam 70-741 by William Panek(103)
The Internet of Things (The MIT Press Essential Knowledge series) by Greengard Samuel(98)
A Girl's Life Online by Katherine Tarbox(95)
Blockchain Basics by Daniel Drescher(94)