Search alternatives:
user » use, uber

1
by Halpert, Ben
Published 2011
John Wiley & Sons
Table of Contents: ... in the Cloud 37 Abuse and Nefarious Use of Cloud Computing 38 Insecure Application Programming Interfaces 39...

2
by Pollock, Jeffrey T.
Published 2004
Wiley-Interscience
Table of Contents: .... Adoption strategies -- 12. Tomorrow's adaptive and dynamic systems -- App. A. Vendor profiles, tools...

3
by Schmutz, Guido
Published 2012
Packt Enterprise
Table of Contents: ...Creating proxy service with a WSDL based interfaceUsing a routing action to statically route...

4
by Gilge, Megan
Published 2015
IBM Corporation, International Technical Support Organization
Subjects: ...Business enterprises / Computer networks / Management / fast...

5
by Datt, Samir
Published 2016
Packt Publishing
Table of Contents: ... or system; Rule 3: document everything; Collecting network traffic using tcpdump; Installing tcpdump...

6
by Allen, Paul R.
Published 2014
McGraw-Hill Education
Table of Contents: ... Platforms, the Principles for Designing a User Interface, and the Benefits of Applying Client Tier Patterns...

7
by Wun-Young, Leslie
Published 2009
Syngress Pub.
Table of Contents: ... Security; Profile Generator; Interfaces and Conversions; Systems Monitoring and Management; System Profiles...

8
by Moeller, Morten
Published 2003
IBM, International Technical Support Organization
Table of Contents: .... Additional material -- Locating the Web material -- Using the Web material -- System requirements...