Network Administration
epub |eng | 2018-02-01 | Author:Jason Edelman
You may want to automate the turning on of the API. Even if you’re automating a device with an API: It’s good to have a backup plan Not all operations ...
( Category:
Networks
June 26,2019 )
epub |eng | 2015-06-24 | Author:Karl Matthias
$ docker stats e64a279663aa CONTAINER CPU % MEM USAGE/LIMIT MEM % NET I/O e64a279663aa 0.00% 7.227 MiB/987.9 MiB 0.73% 936 B/468 B Here we can see the container ID (but ...
( Category:
Device Drivers
June 26,2019 )
epub |eng | 2017-09-10 | Author:Richard Diver & Manuel Singer & Jeff Stokes [Richard Diver]
( Category:
Windows Administration
June 9,2019 )
epub |eng | 2017-11-16 | Author:Don Jones & Jeffery Hicks [Don Jones and Jeffery Hicks]
( Category:
Windows Administration
June 8,2019 )
mobi |eng | 2009-05-18 | Author:Mark Richards, Richard Monson-Haefel, and David A Chappell
Simplified Callback Methods Because EJB3 session beans do not implement specific EJB framework components (e.g., javax.ejb.SessionBean), you are no longer required to override the annoying and rarely used callback methods ...
( Category:
Software Development
May 20,2019 )
epub |eng | 2009-05-18 | Author:Mark Richards, Richard Monson-Haefel & David A Chappell
Enterprise JavaBeans 3.0 (EJB3) Overview The release of the EJB3 (JSR-220) specification in 2006 marked a significant turning point for EJB and Java EE in general. The primary theme of ...
( Category:
Software Development
May 20,2019 )
epub |eng | 2018-04-12 | Author:Walter Bentley
What this book covers Chapter 1, Introduction to OpenStack, provides the high-level overview of OpenStack and the projects that make up this cloud platform. This introduction will set the level ...
( Category:
Cloud Computing
May 20,2019 )
epub |eng | 2016-04-08 | Author:Jonathan LeBlanc & Tim Messerschmidt
// development error handler // will print stacktrace if (app.get('env') === 'development') { app.use(function(err, req, res) { console.log('error'); res.status(err.status || 500); res.render('error', { message: err.message, error: err }); }); } ...
( Category:
Cybernetics
May 17,2019 )
epub |eng | 2019-02-27 | Author:Vladimir Stefanovic & Sasha Kranjac [Vladimir Stefanovic]
( Category:
Linux & UNIX Administration
May 12,2019 )
epub |eng | 2019-04-21 | Author:Carl Albing & Paul Troncone [Carl Albing]
( Category:
Testing
May 9,2019 )
epub |eng | 2010-07-14 | Author:Nemeth, Evi & Snyder, Garth & Hein, Trent R. & Whaley, Ben [Nemeth, Evi]
generate for example.com a 1,024-bit ZSK pair that uses the RSA and SHA-1 algorithms and a corresponding 2,048-bit KSK pair.30 The outstanding issue of UDP packet size limits suggests that ...
( Category:
Linux & UNIX Administration
May 7,2019 )
epub |eng | 2019-03-26 | Author:Gabriel N. Schenker
//run docker pull to download CentOS docker image $ docker pull centos Using default tag: latest latest: Pulling from library/centos d9aaf4d82f24: Pull complete Digest: sha256:4565fe2dd7f4770e825d4bd9c761a81b26e49cc9e3c9631c58cfc3188be9505a Status: Downloaded newer image for ...
( Category:
Software Development
May 6,2019 )
epub |eng | 2019-03-22 | Author:James Freeman
tasks: - name: create a directory file: path: /srv/whiskey/alpha state: directory - name: create another directory file: path: /srv/whiskey/beta state: directory When we run this, as expected, our two directories ...
( Category:
Linux & UNIX Administration
May 2,2019 )
epub |eng | | Author:Sander Vugt
The user is owner of the directory where the file exists. Notice that this means that sticky bit cannot be used to prevent users to remove files from their home ...
( Category:
Software Development
April 25,2019 )
epub |eng | 2019-02-28 | Author:Angela Crocker & Vicki Mcleod [Angela Crocker]
5. Your Legacy Is Lost If your digital footprint is hidden behind avatars and passwords, there is a risk that your legacy will be lost. If your digital steward doesn’t ...
( Category:
Network Administration
April 15,2019 )
Categories
Disaster & Recovery | Email Administration |
Linux & UNIX Administration | Storage & Retrieval |
Windows Administration |
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9361)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7451)
Grails in Action by Glen Smith Peter Ledbrook(7341)
Kotlin in Action by Dmitry Jemerov(4695)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4169)
The Age of Surveillance Capitalism by Shoshana Zuboff(3482)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3285)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3063)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(3031)
Mastering Python for Networking and Security by José Manuel Ortega(3019)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(2973)
Blockchain Basics by Daniel Drescher(2938)
Azure Containers Explained by Wesley Haakman & Richard Hooper(2919)
TCP IP by Todd Lammle(2682)
Combating Crime on the Dark Web by Nearchos Nearchou(2542)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2521)
Hands-On Azure for Developers by Kamil Mrzyglod(2473)
Running Windows Containers on AWS by Marcio Morales(2453)
React Native - Building Mobile Apps with JavaScript by Novick Vladimir(2367)
The Social Psychology of Inequality by Unknown(2356)
![](/ebook/space.gif)