Operating Systems
epub |eng | 2009-02-08 | Author:Pawan K. Bhardwaj [Pawan K. Bhardwaj]

Topology The physical setup of a Token Ring network is a star, while the logical setup is in a ring topology. A central device known as Multi-Station Access Unit (MSAU ...
( Category: Networking & Cloud Computing July 15,2018 )
epub |eng | 2016-07-12 | Author:Ben Curry & Brian Laws

Nowadays, there’s the expectation that users should be able to get their work done at any time, from anywhere, and from nearly any device. This work can include email, working ...
( Category: Operating Systems July 13,2018 )
epub |eng | 2018-01-16 | Author:Arek Dreyer & Adam Karneboge [Dreyer, Arek]

Reference 18.3 Install Apps Using Software Packages and Drag-and-Drop In addition to using the App Store, you can install software using drag-and-drop installations or installation packages. If a software developer ...
( Category: Certification July 11,2018 )
epub |eng | 2018-01-22 | Author:Michael Miller [Miller, Michael]

* * * Avoiding Online Fraud Recognizing a scam email is just one way to reduce your risk of getting conned online. Here are some more tips you can employ: ...
( Category: Operating Systems July 11,2018 )
epub |eng | 2018-06-03 | Author:Haishi Bai & Dan Stolts & Santiago Fernandez Munoz [Bai, Haishi]

IP Addresses You’ve learned how to perform basic virtual network management tasks, so let’s dig deeper into how the Azure Virtual Network works, beginning with IP addresses. You can assign ...
( Category: Programming July 11,2018 )
epub |eng | 2018-03-16 | Author:Nancy Muir Boysen & Michael Miller [Muir Boysen, Nancy]

Creating a new message Though you’ll spend much of your time reading and replying to emails, you’ll also spend time creating your own messages. You can send emails to a ...
( Category: Operating Systems July 11,2018 )
epub |eng | 2018-06-03 | Author:Yuri Diogenes & Tom Shinder [Diogenes, Yuri]

FIGURE 5-5 Details of a security alert. Security incidents Some attacks may happen in a completely isolated way. Others will be coordinated—that is, part of the same attack campaign. Security ...
( Category: Networking & Cloud Computing July 11,2018 )
epub |eng | 2018-01-23 | Author:Michael Washam & Rick Rainey & Dan Patrick & Steve Ross [Washam, Michael]

VNet peering allows you to connect two Azure Resource Manager (ARM), VNets located in the same region together without complex integration. The peered VNets must have non-overlapping IP address spaces. ...
( Category: Certification July 11,2018 )
epub |eng | 2018-01-18 | Author:Zoiner Tejada & Michele Leroux Bustamante & Ike Ellis [Tejada, Zoiner]

FIGURE 3-14 The Application Secrets section of the registered application From Platforms section, select Add Platform and select Web. Provide the web application sign in URL and for single sign-out ...
( Category: Certification July 8,2018 )
epub |eng | 2018-07-05 | Author:Matthew Helmke [Helmke, Matthew]

( Category: Operating Systems July 7,2018 )
epub |eng | 2018-06-20 | Author:David Nahmani [Nahmani, David]

Clicking the grid with the Pencil tool inserts a note on the closest grid line to the left. For example, clicking at 1 1 1 181 inserts a note at ...
( Category: Web Development & Design July 3,2018 )
epub |eng | 2018-06-26 | Author:Kevin Beaver [Beaver, Kevin]

( Category: Internet & Social Media July 3,2018 )
epub |eng | 2018-04-19 | Author:Andrew Mallett & Mokhtar Ebrahim [Andrew Mallett]

( Category: Operating Systems July 2,2018 )
epub |eng | | Author:Dennis Matotek, James Turnbull & Peter Lieverdink

( Category: Programming July 2,2018 )

Popular ebooks
Hello! Python by Anthony Briggs(2152)
Hadoop in Practice by Alex Holmes(793)
Learn Windows PowerShell in a Month of Lunches by Don Jones(545)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(446)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(387)
The Old New Thing by Raymond Chen(296)
Database Reliability Engineering: Designing and Operating Resilient Database Systems by Campbell Laine & Majors Charity(274)
MCSA Windows Server 2016 Study Guide: Exam 70-741 by William Panek(266)
Computers For Seniors For Dummies by Nancy C. Muir(248)
Linux Phrasebook (Developer's Library) by Granneman Scott(244)
RHCSA & RHCE Red Hat Enterprise Linux 7: Training and Exam Preparation Guide (EX200 and EX300), Third Edition by Asghar Ghori(238)
Raspberry Pi Beginners Guide: Ultimate Guide For Rasberry Pi, User guide To Get The Most Out Of Your Investment, Hacking, Programming, Python, Best Hardware, Beginners Guide To Rasberry Pi by Steven Giles(232)
The Complete Windows 10 Privacy Guide: Windows 10 Fall Creators Update version by Martin Brinkmann(221)
Mastering Docker - Second Edition by McKendrick Russ & Gallagher Scott(214)
Java Cookbook by Ian F. Darwin(181)
Continuous Delivery with Docker and Jenkins by Leszko Rafal(179)
| by admin(177)
Hacking: Computer Hacking Beginners Guide How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack by Alan T. Norman(176)
Bash Cookbook: Solutions and Examples for Bash Users by Carl Albing & Jp Vossen(175)
Docker on Windows by Stoneman Elton(170)
Web Analytics