Networking & Cloud Computing
epub |eng | 2019-11-28 | Author:Viktor Farcic [Viktor Farcic]
Figure 3-43: Prometheus' graph screen with container memory usage limited to prometheus-server and grouped by the pod label extracted from pod_name Now we can combine the two metrics and find ...
( Category:
Tools
March 22,2020 )
epub |eng | 2020-02-26 | Author:Steve Anson [Anson, Steve]
Object Access Whether you’re dealing with an insider threat or a remote attacker who has gained access to your systems, determining what data was accessed by an adversary is frequently ...
( Category:
Network Security
March 22,2020 )
epub, pdf |eng | 2015-12-23 | Author:Adrian Mouat
If using the syslog driver, we can use syslog functionality to automatically forward the logs, as shown in “Forwarding Logs with rsyslog”. We can just directly access the log files ...
( Category:
Linux & UNIX Administration
March 22,2020 )
epub |eng | 2014-09-19 | Author:Ronald E. Day [Day, Ronald E.]
5 The Document as the Subject: Androids “Homo documentator” must prepare himself to take command—with all his senses awake—over the robots of tomorrow. The value of the machine will be ...
( Category:
General
March 22,2020 )
epub |eng | 2019-09-25 | Author:John Savill
DNS is used for the Azure Storage namespace, which is why when talking about Azure Storage accounts and services, you will see the following format: http(s)://<account>.<service>.core.windows.net/<partition>/object Using Storage Accounts and ...
( Category:
Cloud Computing
March 22,2020 )
epub |eng | | Author:Soumia El Hani & Mohamad Essaaidi
2 A-Distance and the Importance Index 2.1 Workspace Location Problem In this project, we are interested in the determination of a workspace location. The problem consists of finding the optimal ...
( Category:
Networking & Cloud Computing
March 22,2020 )
epub |eng | 2015-10-05 | Author:GAVI, HAPPYSON
PCM measures air densities and temperature then stores them. As you drive it uses that stored information / data to decide fuel trim. This implies that during winter or rapid ...
( Category:
Networks
March 22,2020 )
epub, azw3 |eng | 2015-09-24 | Author:Hayden, Lance
* * * Behavioral Models for Security Culture Transformation Information security today is undergoing a series of experiments in behavioral engineering and cultural transformation, although we do not tend to ...
( Category:
Information Theory
March 22,2020 )
epub |eng | 2004-01-15 | Author:Milton Mueller [Mueller, Milton]
who was not privy to the behind-the-scenes negotiations that created it. It took the form of a nonbinding “statement of policy” rather than a rulemaking document, and it abandoned direct ...
( Category:
E-Commerce
March 22,2020 )
epub, pdf |eng | 2020-04-16 | Author:Maxim Jago [Maxim Jago]
( Category:
Adobe Premiere
March 22,2020 )
epub, pdf |eng | | Author:Nancy W. Gleason
Appendix A: General Education Models In most Chinese universities, each student enters the university with a major (which they selected when they took their college entrance examination) and their courses ...
( Category:
General
March 22,2020 )
epub |eng | 2018-07-19 | Author:Dustin Metzgar [Dustin Metzgar]
Alongside ASP.NET Core, Microsoft is building Entity Framework (EF) Core. EF Core is a .NET Core version of Entity Framework, which is a full ORM built by Microsoft for the ...
( Category:
Software Development
March 22,2020 )
epub, pdf |eng | | Author:Bernard Scott
5.2 Recent Views of the Cerebral Process Recent neuroimaging-based studies in the past decade have begun to reveal a considerably more nuanced picture of the cortical language process. For one, ...
( Category:
Networks
March 22,2020 )
epub |eng | | Author:Stephen Chin & Johan Vos & James Weaver
public class GameOfLifePublisherConsumer extends GraphicApp { final int WIDTH = 2500; final int HEIGHT = 2500; final int CELL_SIZE = 2; boolean currentGeneration[][]; int columns = WIDTH / CELL_SIZE; int ...
( Category:
Cross-platform Development
March 22,2020 )
epub |eng | 2016-04-28 | Author:Looney, Jonathan...
This regular expression is used to parse the IP address. We really don’t need to make a variable to hold this. The main reason we did that was just to ...
( Category:
Linux & UNIX Administration
March 22,2020 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6857)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6857)
Running Windows Containers on AWS by Marcio Morales(6381)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5078)
Combating Crime on the Dark Web by Nearchos Nearchou(4654)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4635)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4342)
The Age of Surveillance Capitalism by Shoshana Zuboff(3983)
Python for Security and Networking - Third Edition by José Manuel Ortega(3901)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3564)
Learn Wireshark by Lisa Bock(3546)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3356)
Blockchain Basics by Daniel Drescher(3329)
