Network Administration
epub |eng | | Author:Y V Ravikumar, K M Krishnakumar & Nassyam Basha
channel ORA_DISK_1: starting datafile backup set restore channel ORA_DISK_1: specifying datafile(s) to restore from backup set channel ORA_DISK_1: restoring all foreign files in backup piece channel ORA_DISK_1: reading from backup ...
( Category:
Storage & Retrieval
July 4,2020 )
epub |eng | 2019-08-27 | Author:David Furlonger [Furlonger, David; Uzureau, Christophe]
THE FATE OF CENTRALIZED SOLUTIONS As the technology matures to enable blockchain-complete solutions and as organizations experiment with decentralized decision making, processes, and business models, the value proposition of blockchain-inspired ...
( Category:
Storage & Retrieval
July 4,2020 )
epub |eng | | Author:Wei Emma Zhang & Quan Z. Sheng
4.1 Overview of Clustering with Non-negative Matrix Factorization Given a matrix, Non-negative Matrix Factorization (NMF) aims to find two non-negative factor matrices whose product approximates that matrix. This enhances the ...
( Category:
Performance Optimization
July 4,2020 )
epub |eng | 2019-03-15 | Author:Jordan Krause [Jordan Krause]
Domain-joined As we have already established, when you're interested in using the AOVPN Device Tunnel, your client computers must be domain-joined. However, if you are okay with only running the ...
( Category:
Disaster & Recovery
July 3,2020 )
epub, mobi, pdf |eng | 2018-08-26 | Author:David Clinton [David Clinton]
( Category:
Linux & UNIX Administration
July 2,2020 )
epub |eng | 2019-03-28 | Author:Peter von Oven [Peter von Oven]
( Category:
Linux
July 2,2020 )
epub |eng | 2020-04-27 | Author:Green, Yair & Mansoor, Eli [Green, Yair]
Figure 36 Amazon S3 supported transitions (source: https://docs.aws.amazon.com/AmazonS3/latest/dev/lifecycle-transition-general-considerations.html ) The storage class that is most appropriate for your objects depends on various factors such as your application needs, the expected ...
( Category:
Infrastructure
July 2,2020 )
epub |eng | 2019-08-24 | Author:Zack Butcher & Lee Calcote [Zack Butcher]
mutual, which establishes a mutual TLS connection to the destination endpoint Istio mutual, which is mutual TLS using Istio-provisioned certificates Enabling mTLS across the mesh via Istio’s mesh configuration is ...
( Category:
Tools
July 2,2020 )
epub |eng | 2019-08-02 | Author:Joost Evertse [Joost Evertse]
Preparing to migrate In this section, we will demonstrate how to migrate a TFVC project located on Azure DevOps. First, we will locate our project on Azure DevOps. You can ...
( Category:
Software Development
July 1,2020 )
epub |eng | | Author:John F. Dooley
The prisoner has to depend upon the keenness of the person who receives his letter to find out that he has written a message by using the first and last ...
( Category:
Storage & Retrieval
July 1,2020 )
epub |eng | 2020-05-11 | Author:Neil Smyth [Neil Smyth]
( Category:
Linux & UNIX Administration
July 1,2020 )
epub |eng | 2018-11-02 | Author:Michael Jang, Harry Foxwell
( Category:
MySQL
June 30,2020 )
azw3 |eng | 2020-04-12 | Author:Learn Computer Hacking In Deep [Hacking In Deep, Learn Computer]
Chapter 6: Programming Linux Programming on Linux is used for creating interfaces, applications, software and programs. Linux code is often used for the desktop, embedded systems as well as for ...
( Category:
Networks
June 29,2020 )
epub |eng | 2020-03-13 | Author:Murat Karslioglu [Murat Karslioglu]
( Category:
Tools
June 29,2020 )
epub |eng | | Author:Daniel Curtis
Listing 7-1 API/mocks/tickets/replies/10001/GET.mock HTTP/1.1 200 OK Content-Type: application/json; charset=utf-8 Access-Control-Allow-Origin: * { "notes": [ { "id": 1, "author": "Imogen Gifford", "timestamp": "2018-06-11T18:24:29+00:00", "note": "Hey! I'm Imogen and I will be ...
( Category:
Storage & Retrieval
June 29,2020 )
Categories
Disaster & Recovery | Email Administration |
Linux & UNIX Administration | Storage & Retrieval |
Windows Administration |
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9321)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7412)
Grails in Action by Glen Smith Peter Ledbrook(7306)
Kotlin in Action by Dmitry Jemerov(4654)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4138)
The Age of Surveillance Capitalism by Shoshana Zuboff(3434)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3253)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3035)
Mastering Python for Networking and Security by José Manuel Ortega(2967)
Blockchain Basics by Daniel Drescher(2899)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(2714)
TCP IP by Todd Lammle(2648)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(2552)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2488)
Azure Containers Explained by Wesley Haakman & Richard Hooper(2438)
Hands-On Azure for Developers by Kamil Mrzyglod(2431)
React Native - Building Mobile Apps with JavaScript by Novick Vladimir(2345)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(2318)
The Social Psychology of Inequality by Unknown(2318)
The Art Of Deception by Kevin Mitnick(2305)