Network Administration
epub |eng | 2010-07-14 | Author:Nemeth, Evi & Snyder, Garth & Hein, Trent R. & Whaley, Ben [Nemeth, Evi]
generate for example.com a 1,024-bit ZSK pair that uses the RSA and SHA-1 algorithms and a corresponding 2,048-bit KSK pair.30 The outstanding issue of UDP packet size limits suggests that ...
( Category:
Linux & UNIX Administration
May 7,2019 )
epub |eng | 2019-03-26 | Author:Gabriel N. Schenker
//run docker pull to download CentOS docker image $ docker pull centos Using default tag: latest latest: Pulling from library/centos d9aaf4d82f24: Pull complete Digest: sha256:4565fe2dd7f4770e825d4bd9c761a81b26e49cc9e3c9631c58cfc3188be9505a Status: Downloaded newer image for ...
( Category:
Software Development
May 6,2019 )
epub |eng | 2019-03-22 | Author:James Freeman
tasks: - name: create a directory file: path: /srv/whiskey/alpha state: directory - name: create another directory file: path: /srv/whiskey/beta state: directory When we run this, as expected, our two directories ...
( Category:
Linux & UNIX Administration
May 2,2019 )
epub |eng | | Author:Sander Vugt
The user is owner of the directory where the file exists. Notice that this means that sticky bit cannot be used to prevent users to remove files from their home ...
( Category:
Software Development
April 25,2019 )
epub |eng | 2019-02-28 | Author:Angela Crocker & Vicki Mcleod [Angela Crocker]
5. Your Legacy Is Lost If your digital footprint is hidden behind avatars and passwords, there is a risk that your legacy will be lost. If your digital steward doesn’t ...
( Category:
Network Administration
April 15,2019 )
azw3 |eng | 2018-08-20 | Author:Blank-Edelman, David N. [Blank-Edelman, David N.]
Deep learning Machine learning Developer: Google Adversary: Fan Hui But the first game that gripped the world’s attention in AI was checkers, with the pioneer Arthur Samuel, who coined the ...
( Category:
Testing
April 6,2019 )
epub |eng | 2015-12-23 | Author:Andrew Mallett [Mallett, Andrew]
We have provided two functions within the script. The first, is_file, simply tests to ensure that the filename we have entered is a regular file. Then we declare the clean_file ...
( Category:
Linux & UNIX Administration
April 4,2019 )
epub, pdf |eng | 2015-12-21 | Author:Jonathan Baier [Baier, Jonathan]
Listing 3-13: http-pd-controller.yaml Let's also create an external service, so we can see it from outside the cluster: apiVersion: v1 kind: Service metadata: name: http-pd labels: name: http-pd spec: type: ...
( Category:
Tools
April 4,2019 )
epub |eng | 2016-10-24 | Author:Jordan Krause [Krause, Jordan]
Network Location Server This major component in a DirectAccess infrastructure is something that does not even exist on the DA server itself, or at least it shouldn't if you are ...
( Category:
Network Administration
April 4,2019 )
epub |eng | 2014-10-09 | Author:Alexandre Borges [Borges, Alexandre]
Getting ready This recipe requires three virtual machines (VirtualBox or VMware) running Oracle Solaris 11 with 4 GB RAM. It is recommended that all machines be on an isolated network ...
( Category:
Linux & UNIX Administration
April 4,2019 )
epub |eng | 2015-06-28 | Author:Raj, Pethuru & Chelladhurai, Jeeva S. & Singh, Vinod
Alternatively, you can apply the format option to the docker inspect subcommand in order to narrow down the output to very specific information. In this case, the ExposedPorts field of ...
( Category:
Linux & UNIX Administration
April 4,2019 )
epub |eng | 2018-07-24 | Author:Mark Van Rijmenam,Philippa Ryan & Philippa Ryan
5.12 Conclusion Corruption corrodes public trust, undermines the rule of law, and ultimately delegitimises the state [182]. Rules and regulations are circumvented by bribes, public budget control is undermined by ...
( Category:
Network Administration
April 1,2019 )
epub, pdf |eng | 2014-01-13 | Author:Ed Wilson [Ed Wilson]
Note Keep in mind that you want to convert the contents of the passwordHash.txt file to a secure string and not the path to the passwordHash.txt file. The first time ...
( Category:
Enterprise Applications
April 1,2019 )
epub |eng | 2013-05-28 | Author:Brian Svidergol & Robbie Allen
Using a command-line interface The following command creates an AD integrated reverse zone: > dnscmd <DNSServerName> /zoneadd <ZoneName> /DsPrimary Using PowerShell The following PowerShell command will create an Active Directory−integrated ...
( Category:
Networks
April 1,2019 )
epub, azw3 |eng | 2015-06-14 | Author:Craig Sebenik & Thomas Hatch
[vagrant@master ~]$ cat /srv/salt/file/base/jinja/simple_var.sls {% set simple_var = 'a simple variable' %} jinja_var: cmd.run: - name: echo "Simple var is {{ simple_var }}" Then we can run that and see ...
( Category:
Linux & UNIX Administration
April 1,2019 )
Categories
Disaster & Recovery | Email Administration |
Linux & UNIX Administration | Storage & Retrieval |
Windows Administration |
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9780)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7783)
Grails in Action by Glen Smith Peter Ledbrook(7698)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6576)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6565)
Running Windows Containers on AWS by Marcio Morales(6096)
Kotlin in Action by Dmitry Jemerov(5067)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4922)
Combating Crime on the Dark Web by Nearchos Nearchou(4503)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4416)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4348)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4177)
The Age of Surveillance Capitalism by Shoshana Zuboff(3959)
Python for Security and Networking - Third Edition by José Manuel Ortega(3745)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3509)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3412)
Mastering Python for Networking and Security by José Manuel Ortega(3346)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3334)
Blockchain Basics by Daniel Drescher(3298)
Learn Wireshark by Lisa Bock(3269)
