Networking & Cloud Computing
azw3, epub |eng | 2017-09-21 | Author:Thomas Lee [Lee, Thomas]
( Category:
Networking & Cloud Computing
January 21,2018 )
azw3 |eng | 2017-10-26 | Author:Mike Julian [Julian, Mike]
Instrumenting Your Apps with Metrics One of the most powerful things you can do in monitoring is also one of the most overlooked things: instrumenting your own applications. Why would ...
( Category:
Hardware & DIY
January 21,2018 )
azw3, mobi, epub |eng | 2017-07-21 | Author:Jonathan McAllister [McAllister, Jonathan]
The do until iterator The Do...Until iterator has been around for a long time in many programming languages. It is probably one of the most widely implemented iterators that exist. ...
( Category:
Networking & Cloud Computing
January 21,2018 )
azw3 |eng | 2010-01-02 | Author:Laura Chappell & Gerald Combs
( Category:
Networking & Cloud Computing
January 21,2018 )
azw3 |eng | 2017-03-21 | Author:William Stanek [Stanek, William]
$Session = New-PSSession -ConfigurationName Windows.PowerShell -ConnectionUri http://Server24.imaginedlands.com/PowerShell/ -AllowRedirection -Authentication Kerberos -Credential $Cred Here, when PowerShell executes Get-Credential, you are prompted for a user name and password. This credential is then ...
( Category:
Operating Systems
January 20,2018 )
epub |eng | 2011-05-23 | Author:Matthew Baxter-Reynolds
Synchronization 1: Downloading Bookmarks OData is a very new protocol, and I wanted to use it in the book because I felt it would become an important protocol over the ...
( Category:
Internet & Social Media
January 20,2018 )
azw3 |eng | 2017-03-24 | Author:Ritesh Modi [Modi, Ritesh]
Git init Git init initializes an empty Git repository with an empty history. The command can be executed using Git for Windows and is shown next: Git init It initializes ...
( Category:
Operating Systems
January 20,2018 )
azw3 |eng | 2016-06-27 | Author:Alessandro Franceschi & Jaime Soriano Pastor [Franceschi, Alessandro]
Examining potential scenarios and approaches Puppet is a tool that offers a world of order, control, and automation; we have learnt it, we know at least the basics of how ...
( Category:
Programming Languages
January 20,2018 )
epub, azw3 |eng | 2015-11-25 | Author:Jason McDonald Ph.d. [McDonald, Jason Ph.d.]
» Use Keyword Heavy URLs over Parameter URLs URLs or web addresses are what you see in the URL or address bar at the top of the browser. Google pays ...
( Category:
Internet & Social Media
January 20,2018 )
azw3 |eng | 2017-07-22 | Author:Petersen, Richard [Petersen, Richard]
( Category:
Operating Systems
January 20,2018 )
azw3 |eng | 2017-10-11 | Author:Bharadwaj, Raghu [Bharadwaj, Raghu]
VFS defines two sets of functions: first, a set of generic filesystem-independent routines that serve as common entry functions for all file access and manipulation operations, and second, a set ...
( Category:
Operating Systems
January 20,2018 )
azw3 |eng | 2016-06-30 | Author:Saito, Hideto & Lee, Hui-Chuan Chloe & Hsu, Ke-Jou Carol [Saito, Hideto]
As you can see, three pods are created to solve this job. Also, since the selector part is removed, the selector is copied from the labels. Pod as a daemon ...
( Category:
Operating Systems
January 20,2018 )
azw3 |eng | 2016-12-12 | Author:Valentin Hamburger [Hamburger, Valentin]
Probably vRO is used for third-party integration to a fair extent. But also to create new services and make them orderable through vRealize Automation, vRO can be used quite easily ...
( Category:
Operating Systems
January 19,2018 )
epub |eng | 2017-12-13 | Author:Akash Mahajan
The reporting also can be customized as per the requirements using the available options: The preceding options are very important while scanning critical infrastructure. These options are to ensure we ...
( Category:
Networking & Cloud Computing
January 19,2018 )
epub, pdf |eng | 2005-01-18 | Author:Brian Carrier
Table 10.8 ASCII values for the characters in our example LFN. For clarity, we will do this whole thing in binary instead of constantly translating. The first step is to ...
( Category:
Security & Encryption
January 18,2018 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9813)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7810)
Grails in Action by Glen Smith Peter Ledbrook(7719)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6860)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6859)
Running Windows Containers on AWS by Marcio Morales(6386)
Kotlin in Action by Dmitry Jemerov(5092)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(5080)
Combating Crime on the Dark Web by Nearchos Nearchou(4656)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4639)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4438)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4344)
The Age of Surveillance Capitalism by Shoshana Zuboff(3983)
Python for Security and Networking - Third Edition by José Manuel Ortega(3902)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3566)
Learn Wireshark by Lisa Bock(3550)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3530)
Mastering Python for Networking and Security by José Manuel Ortega(3376)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3358)
Blockchain Basics by Daniel Drescher(3329)
