In this article by Bernardo Iraci, author of the book Blender Cycles: Lighting and Rendering Cookbook, we are going to create all the material for an iceberg. Our target is to have snow on the flat surfaces and ice on the slopes, where it is too steep for the snow to stay. Let's get started!Read Creating the ice and snow materials in full
This article written by Usama Dar, the author of Nginx Module Extension, is a reference to the standard and optional HTTP modules, their synopsis, directives as well as practical configuration examples.
Read Acting as a proxy (HttpProxyModule) in full
This article, created by Farhan Ahmed Nadeem and Prasenjit Sarkar, the authors of Implementing Cisco UCS Solutions, introduces identity and resource pools which include UUID, MAC addresses, WWN, and server pools.
The list of topics that will be covered in the article is as follows:
- Understanding identity and resource pools
- Learning to create a UUID pool
- Learning to create a MAC pool
- Learning to create a WWNN pool
- Learning to create a WWPN pool
- Understanding the server pool
- Learning to create server pool membership and qualification policies
This article, written by Rahul Singh Patel, author of the book Kali Linux Social Engineering, introduces social engineering and attacks that currently the industry is facing in the form of e-mail, Advance Persistent Threats (APT).
Social refers to our day-to-day lives, which include both personal and professional aspects; while engineering means a defined way of performing a task by following certain steps to achieving the target. Social engineering is a term that describes a nontechnical intrusion that relies heavily on human interaction and often involves tricking other people to break normal security procedures.Read Social Engineering Attacks in full