Network Administration
epub |eng | | Author:Abhishek Chopra & Mukund Chaudhary
Where labeling is not required Evidence that can be prepared: Information classification policy and information classification guideline. Who prepares it: The information security team is responsible for preparing the information ...
( Category:
Storage & Retrieval
January 2,2020 )
epub |eng | | Author:Harvinder Atwal
Concept Drift Machine learning and deep learning models learn rules from historical input and output data to make predictions from new input data. The relationship between new input and output ...
( Category:
Storage & Retrieval
January 2,2020 )
epub |eng | 2019-12-08 | Author:Mukund Chaudhary & Abhishek Chopra [Mukund Chaudhary]
( Category:
Storage & Retrieval
December 12,2019 )
mobi |eng | | Author:The Definitive Guide
( Category:
Enterprise Applications
December 11,2019 )
mobi, epub |eng | 2019-01-31 | Author:Danilo Poccia
Exercise Add a name field to the Sign Up page and have the name stored on the DynamoDB table and in the validation email. * * * Tip In Amazon ...
( Category:
JavaScript
December 11,2019 )
mobi |eng | 2018-01-22 | Author:Perry Lea
Public Data Network (PDN): This is the external interface, and for the most part, the internet. It can include other services, data centers, private services, and so on. In a ...
( Category:
Computer Design
December 7,2019 )
azw3, epub |eng | 2019-09-06 | Author:Daniel M. Russell
Try This Yourself This chapter has been all about how to get to the bottom of a controversial topic, searching out and assessing different perspectives on it. It’s often difficult ...
( Category:
Storage & Retrieval
November 26,2019 )
epub |eng | 2019-07-11 | Author:Brendan Burns
Kubenet Best Practices Kubenet allows for a simplistic network stack and does not consume precious IP addresses on already crowded networks. This is especially true of cloud networks that are ...
( Category:
Software Development
November 25,2019 )
epub |eng | 2018-08-22 | Author:Julien Vehent [Julien Vehent]
( Category:
Windows Administration
October 21,2019 )
epub |eng | 2019-06-26 | Author:Erdal Ozkaya
EC-Council, Computer Hacking Forensic Investigator (CHFI) EC-Council also offers another certification for individuals who wish to take up a career in the digital forensics space: Computer Hacking Forensic Investigator, commonly ...
( Category:
Linux & UNIX Administration
October 15,2019 )
epub |eng | 2018-12-24 | Author:Mohamed Wali
App Service plans When you create an App Service, such as a Web App for example, you will be asked to specify the App Service plan. An App Service plan ...
( Category:
LAN
October 14,2019 )
epub |eng | 2019-08-24 | Author:Lee Calcote
Example 8-14 is a specific example of how you can conscientiously approach clarifying lines of responsibility and thoroughly decoupling service teams within your service mesh configuration at L5. Finally, VirtualServices ...
( Category:
Tools
October 12,2019 )
epub |eng | 2019-09-19 | Author:Michael Born
( Category:
Linux & UNIX Administration
October 12,2019 )
epub |eng | 2018-08-27 | Author:Miller, Jason [Miller, Jason]
Track your family Ensure that family members have ‘Share My Location’ activated in Settings>Privacy and then you will be able to tap on the ‘i’ icon in a message thread ...
( Category:
Network Administration
October 7,2019 )
epub |eng | 2019-08-27 | Author:Boris Scholl
When to Run Which Types of Tests Depending on the CI/CD stage your code is in, you should run different types of tests. The first tests that are usually executed ...
( Category:
Software Development
September 28,2019 )
Categories
Disaster & Recovery | Email Administration |
Linux & UNIX Administration | Storage & Retrieval |
Windows Administration |
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9361)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7451)
Grails in Action by Glen Smith Peter Ledbrook(7341)
Kotlin in Action by Dmitry Jemerov(4695)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4169)
The Age of Surveillance Capitalism by Shoshana Zuboff(3482)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3285)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3063)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(3031)
Mastering Python for Networking and Security by José Manuel Ortega(3019)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(2973)
Blockchain Basics by Daniel Drescher(2937)
Azure Containers Explained by Wesley Haakman & Richard Hooper(2919)
TCP IP by Todd Lammle(2682)
Combating Crime on the Dark Web by Nearchos Nearchou(2542)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2520)
Hands-On Azure for Developers by Kamil Mrzyglod(2473)
Running Windows Containers on AWS by Marcio Morales(2453)
React Native - Building Mobile Apps with JavaScript by Novick Vladimir(2367)
The Social Psychology of Inequality by Unknown(2356)