Networking & Communications
pdf | | 2013-06-20 | Author:Oracle Corporation

( Category: Client-Server Systems December 4,2022 )
epub |eng | 2022-05-13 | Author:Goyal, Shiv Kumar

Example vgcreate vg01 /dev/sdb /dev/sdc Logical Volume Logical Volume is logical partitioning of the volume group. Logical volume can be used for file system creation. In some cases, you can ...
( Category: Linux & UNIX Administration October 6,2022 )
pdf |en | | Author: Shiv Kumar Goyal

( Category: Linux & UNIX Administration October 6,2022 )
pdf | | 2016-08-27 | Author:Unknown

( Category: Storage & Retrieval September 30,2022 )
epub |eng | 2022-04-04 | Author:Jean Nestor M. Dahj; [Dahj;, Jean Nestor M.]

These storage requirements are essential for reproducing and consuming intelligence within and outside the organization. When selecting feeds, the CTI team must evaluate the complexity of storing the data. Intelligence ...
( Category: Networks, Protocols & APIs September 19,2022 )
epub |eng | | Author:Miguel Figueiredo

Types of Calculation Views In SAP HANA Cloud, the calculation view is the primary modeling object. There are three types of calculation views:Dimension Cube without star schema Cube with star ...
( Category: Cloud Computing September 19,2022 )
pdf | | 2022-06-15 | Author:Srivastava, Anurag; [Srivastava, Anurag]

( Category: Distributed Systems & Computing September 11,2022 )
epub |eng | 2021-01-05 | Author:Zen, Vittore [Zen, Vittore]

{Some examples of filter rule} Before giving some examples of filtering rules it is useful to re-read some ports used by the most common services in the table table:common-ports . ...
( Category: Networks, Protocols & APIs September 1,2022 )
epub |eng | 2022-08-15 | Author:Anurag Srivastava [Srivastava, Anurag]

Blockchain-based pharmaceutical supply chain workflow Figure 5.5 depicts the general workflow of a Blockchain-based pharmaceutical supply chain: Figure 5.5: Blockchain-based pharmaceutical SCM workflow Let's see how different players in the ...
( Category: Distributed Systems & Computing August 29,2022 )
epub |eng | 2020-08-15 | Author:Pascal Ackerman [Ackerman, Pascal]

Likelihood is the chance vulnerability gets exploited. A threat source is where the attack or threat originates from, also referred to as a threat actor. A threat event is the ...
( Category: Windows Administration August 28,2022 )
epub |eng | 2022-08-15 | Author:Rituraj Patil [Patil, Rituraj]

Figure 8.6: User Story Mapping process The Story Map always needs to evolve with the Scrum Team’s overall understanding of user personas and the product features getting delivered for them. ...
( Category: Windows Administration August 25,2022 )
epub |eng | 2020-08-15 | Author:Edward van Biljon [Biljon, Edward van]

Figure 4.22: Bindings On the right-hand side, you will see a link that says Bindings…. click this. A new window like Figure 4.23 shown below will open: Figure 4.23: Configure ...
( Category: Email Administration August 25,2022 )
epub |eng | 2022-08-15 | Author:Srivastava, Vizeet; [Srivastava, Vizeet]

Malware Malware is a malicious program that intends to steal information or damage the computer or network. Malware could be used to steal information by spyware or trojan. Malware can ...
( Category: Networks, Protocols & APIs August 22,2022 )
epub |eng | 2020-08-15 | Author:Shayank Jain [Jain, Shayank]

from __future__ import unicode_literals from django.db import models class food_order(models.Model): category = models.CharField(max_length=50) item = models.CharField(max_length=100) price = models.CharField(max_length=20) def __str__(self): return '%s %s %s' % (self.category, self.iteam, self.price) In ...
( Category: Client-Server Systems August 16,2022 )

Popular ebooks
Kubernetes in Production Best Practices by Aly Saleh & Murat Karslioglu(6780)
Optimizing Microsoft Azure Workloads by Rithin Skaria(6318)
Kubernetes in Production Best Practices by Aly Saleh and Murat Karslioglu(6050)
Cloud Computing Demystified for Aspiring Professionals by David Santana(5157)
Zed Attack Proxy Cookbook by Ryan Soper & Nestor N Torres & Ahmed Almoailu(4589)
Google Cloud for Developers: Write, migrate, and extend your code by leveraging Google Cloud by Hector Parra Martinez(3572)
Mastering Cyber Intelligence by Jean Nestor M. Dahj;(3281)
AWS Observability Handbook by Phani Kumar Lingamallu & Fabio Braga de Oliveira(3192)
The Road to Azure Cost Governance by Paola E. Annis Giuliano Caglio(2811)
Microsoft 365 Fundamentals Guide by Gustavo Moraes and Douglas Romão(2256)
Agile Security Operations: Engineering for Agility in Cyber Defense, Detection, and Response by Hinne Hettema(1786)
Cloud Identity Patterns and Strategies: Design enterprise cloud identity models with OAuth 2.0 and Azure Active Directory by Giuseppe Di Federico Fabrizio Barcaroli(1772)
Bootstrapping Service Mesh Implementations with Istio by Anand Rai(1670)
The Road to Azure Cost Governance: Techniques to tame your monthly Azure bill with a continuous optimization journey for your apps by Paola E. Annis Giuliano Caglio(1267)
Agile Security Operations: Engineering for agility in cyber defense, detection, and response by Hinne Hettema(1199)
Zed Attack Proxy Cookbook: Hacking tactics, techniques, and procedures for testing web applications and APIs by Ryan Soper Nestor N Torres Ahmed Almoailu(1196)
Linux Administration Best Practices: Practical Solutions to Approaching the Design and Management of Linux Systems by Scott Alan Miller(1136)
DevSecOps in Practice with VMware Tanzu: Build, run, and manage secure multi-cloud apps at scale on Kubernetes with the Tanzu portfolio by Parth Pandit Robert Hardt(1085)
Terraform for Google Cloud Essential Guide by Bernd Nordhausen(893)
Becoming KCNA Certified by Dmitry Galkin(875)