Networking & Cloud Computing
epub |eng | 2015-02-24 | Author:Matthew Monte
Attempting to combine and simplify two military systems was a complete failure. Starting from scratch is not necessarily much better either. Witness the Virtual Case File, a program designed to ...
( Category:
Internet & Social Media
February 14,2019 )
epub |eng | 2018-07-25 | Author:Betsy Beyer, Niall Richard Murphy, David K. Rensin, Kent Kawahara & Stephen Thorne
What Is NALSD? This chapter presents a NALSD approach: we begin with the problem statement, gather requirements, and iterate through designs that become increasingly sophisticated until we reach a viable ...
( Category:
Technology
February 14,2019 )
epub |eng | 2018-08-15 | Author:Mike Ryan & Federico Lucifredi
Example 5-7. Nginx Puppet module class myblog::mynginx { class { "nginx": } nginx::resource::upstream { "myblog_app": ensure => present, members => [ 'localhost:8000', ] } nginx::resource::vhost { "blog.example.com": ensure => enable, ...
( Category:
Networking & Cloud Computing
February 14,2019 )
epub |eng | | Author:Scott Chacon & Ben Straub
Merge Log Another useful tool when resolving merge conflicts is git log. This can help you get context on what may have contributed to the conflicts. Reviewing a little bit ...
( Category:
Operating Systems
February 14,2019 )
epub, pdf |eng | | Author:Sander van Vugt
node1:∼ # sbd -d /dev/sdc1 list 0 node2 clear 1 node1 clear 7.Now, it’s time for a first test. Use the following command to effectuate a STONITH operation from the ...
( Category:
Programming
February 14,2019 )
mobi, epub |eng | 2017-09-12 | Author:Kelsey Hightower, Brendan Burns, and Joe Beda
$ kubectl apply -f fluentd.yaml daemonset "fluentd" created Once the fluentd DaemonSet has been successfully submitted to the Kubernetes API, you can query its current state using the kubectl describe ...
( Category:
Software
February 14,2019 )
mobi |eng | 2018-07-25 | Author:Betsy Beyer, Niall Richard Murphy, David K. Rensin, Kent Kawahara, and Stephen Thorne
Calculations We need to calculate how many resources we need to parse all these logs. To determine our scaling limits, we need to make some assumptions, starting with the size ...
( Category:
Technology
February 14,2019 )
mobi, epub |eng | 2018-07-24 | Author:Brian Brazil
Finally, the custom collector object is instantiated and registered with the default registry, in the same way you would one of the direct instrumentation metrics: c := ConsulCollector{} prometheus.MustRegister(c) Exposition ...
( Category:
Networking & Cloud Computing
February 14,2019 )
mobi, pdf |eng | 2018-08-15 | Author:Mike Ryan and Federico Lucifredi
This class contains everything specifically related to running an application server. It imports the myblog::nginx class to configure the web server. It also declares a supervisor::service resource, which will create ...
( Category:
Networking & Cloud Computing
February 14,2019 )
mobi, epub |eng | 2017-11-10 | Author:Justin Garrison and Kris Nova
This new pattern makes testing infrastructure very quick, and usually inexpensive. An engineer can begin to develop a large arsenal of happy and sad tests for even the most bizarre ...
( Category:
Programming
February 14,2019 )
mobi, epub, pdf |eng | 2018-05-08 | Author:Graham Dumpleton
Chapter 11. Webhooks and Build Automation The support in OpenShift for the Docker and Source build strategies simplifies the build and deployment process, as OpenShift worries about the details of ...
( Category:
Programming
February 14,2019 )
mobi, epub, pdf |eng | 2017-05-29 | Author:Duncan C. E. Winn
In Diego, the Garden API is currently implemented by the following: Garden-runC (Garden backed by runC), which provides a Linux-specific implementation of a Garden interface. Garden-Windows, which provides a Windows-specific ...
( Category:
Networking & Cloud Computing
February 14,2019 )
epub, mobi |eng | 2018-02-09 | Author:Sarhan M. Musa
7.4.1 Main Components Determination of Keys Encryption Algorithm Decryption Algorithm 7.4.1.1 Determination of Keys A User (Say User “A”) computes its private key and public key as follows: Choose two ...
( Category:
Security & Encryption
February 9,2019 )
mobi, pdf |eng | 2010-05-11 | Author:Peter Ledbrook Glen Smith [Glen Smith, Peter Ledbrook]
static searchable = true ... } class Post { static searchable = true ... } When a domain class is marked searchable, the plugin indexes its primitive fields (strings, dates, ...
( Category:
Programming
February 7,2019 )
mobi, epub, pdf |eng | 2015-11-17 | Author:Sébastien Goasguen
Warning For testing and learning purposes, you might decide to start the API server with the option --insecure-bind-address=0.0.0.0, which will bind the so-called localhost port to all your network interfaces, ...
( Category:
Operating Systems
February 6,2019 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9814)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7811)
Grails in Action by Glen Smith Peter Ledbrook(7722)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6878)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6873)
Running Windows Containers on AWS by Marcio Morales(6405)
Kotlin in Action by Dmitry Jemerov(5094)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5093)
Combating Crime on the Dark Web by Nearchos Nearchou(4666)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4661)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4357)
The Age of Surveillance Capitalism by Shoshana Zuboff(3989)
Python for Security and Networking - Third Edition by José Manuel Ortega(3909)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3575)
Learn Wireshark by Lisa Bock(3571)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3378)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3359)
Blockchain Basics by Daniel Drescher(3330)
