Network Administration
epub |eng | | Author:Y V Ravikumar, K M Krishnakumar & Nassyam Basha
channel ORA_DISK_1: starting datafile backup set restore channel ORA_DISK_1: specifying datafile(s) to restore from backup set channel ORA_DISK_1: restoring all foreign files in backup piece channel ORA_DISK_1: reading from backup ...
( Category:
Storage & Retrieval
July 4,2020 )
epub |eng | 2019-08-27 | Author:David Furlonger [Furlonger, David; Uzureau, Christophe]
THE FATE OF CENTRALIZED SOLUTIONS As the technology matures to enable blockchain-complete solutions and as organizations experiment with decentralized decision making, processes, and business models, the value proposition of blockchain-inspired ...
( Category:
Storage & Retrieval
July 4,2020 )
epub |eng | | Author:Wei Emma Zhang & Quan Z. Sheng
4.1 Overview of Clustering with Non-negative Matrix Factorization Given a matrix, Non-negative Matrix Factorization (NMF) aims to find two non-negative factor matrices whose product approximates that matrix. This enhances the ...
( Category:
Performance Optimization
July 4,2020 )
epub |eng | 2019-03-15 | Author:Jordan Krause [Jordan Krause]
Domain-joined As we have already established, when you're interested in using the AOVPN Device Tunnel, your client computers must be domain-joined. However, if you are okay with only running the ...
( Category:
Disaster & Recovery
July 3,2020 )
epub, mobi, pdf |eng | 2018-08-26 | Author:David Clinton [David Clinton]
( Category:
Linux & UNIX Administration
July 2,2020 )
epub |eng | 2019-03-28 | Author:Peter von Oven [Peter von Oven]
( Category:
Linux
July 2,2020 )
epub |eng | 2020-04-27 | Author:Green, Yair & Mansoor, Eli [Green, Yair]
Figure 36 Amazon S3 supported transitions (source: https://docs.aws.amazon.com/AmazonS3/latest/dev/lifecycle-transition-general-considerations.html ) The storage class that is most appropriate for your objects depends on various factors such as your application needs, the expected ...
( Category:
Infrastructure
July 2,2020 )
epub |eng | 2019-08-24 | Author:Zack Butcher & Lee Calcote [Zack Butcher]
mutual, which establishes a mutual TLS connection to the destination endpoint Istio mutual, which is mutual TLS using Istio-provisioned certificates Enabling mTLS across the mesh via Istio’s mesh configuration is ...
( Category:
Tools
July 2,2020 )
epub |eng | 2019-08-02 | Author:Joost Evertse [Joost Evertse]
Preparing to migrate In this section, we will demonstrate how to migrate a TFVC project located on Azure DevOps. First, we will locate our project on Azure DevOps. You can ...
( Category:
Software Development
July 1,2020 )
epub |eng | | Author:John F. Dooley
The prisoner has to depend upon the keenness of the person who receives his letter to find out that he has written a message by using the first and last ...
( Category:
Storage & Retrieval
July 1,2020 )
epub |eng | 2020-05-11 | Author:Neil Smyth [Neil Smyth]
( Category:
Linux & UNIX Administration
July 1,2020 )
epub |eng | 2018-11-02 | Author:Michael Jang, Harry Foxwell
( Category:
MySQL
June 30,2020 )
azw3 |eng | 2020-04-12 | Author:Learn Computer Hacking In Deep [Hacking In Deep, Learn Computer]
Chapter 6: Programming Linux Programming on Linux is used for creating interfaces, applications, software and programs. Linux code is often used for the desktop, embedded systems as well as for ...
( Category:
Networks
June 29,2020 )
epub |eng | 2020-03-13 | Author:Murat Karslioglu [Murat Karslioglu]
( Category:
Tools
June 29,2020 )
epub |eng | | Author:Daniel Curtis
Listing 7-1 API/mocks/tickets/replies/10001/GET.mock HTTP/1.1 200 OK Content-Type: application/json; charset=utf-8 Access-Control-Allow-Origin: * { "notes": [ { "id": 1, "author": "Imogen Gifford", "timestamp": "2018-06-11T18:24:29+00:00", "note": "Hey! I'm Imogen and I will be ...
( Category:
Storage & Retrieval
June 29,2020 )
Categories
Disaster & Recovery | Email Administration |
Linux & UNIX Administration | Storage & Retrieval |
Windows Administration |
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9779)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7782)
Grails in Action by Glen Smith Peter Ledbrook(7697)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6573)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6563)
Running Windows Containers on AWS by Marcio Morales(6094)
Kotlin in Action by Dmitry Jemerov(5066)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4921)
Combating Crime on the Dark Web by Nearchos Nearchou(4502)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4414)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4346)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4177)
The Age of Surveillance Capitalism by Shoshana Zuboff(3956)
Python for Security and Networking - Third Edition by José Manuel Ortega(3744)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3509)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3411)
Mastering Python for Networking and Security by José Manuel Ortega(3344)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3331)
Blockchain Basics by Daniel Drescher(3295)
Learn Wireshark by Lisa Bock(3267)
