Network Administration
epub |eng | | Author:Dmitri Korotkevitch
begin tran while @id < 100000 begin update Delivery.Orders set OrderStatusId = 1 where OrderId between @id and @id + 4998; select @id += 4999; end select count(*) as [Lock ...
( Category:
Storage & Retrieval
May 24,2020 )
epub |eng | | Author:Roger Cornejo
when upper(metric_name) like 'DB TIME' then 'cpu' when upper(metric_name) like '%CPU%' then 'cpu' -- ... when upper(metric_name) like '%SQL*NET%' then 'network' when upper(metric_name) like '%NETWORK%' then 'network' -- ... when ...
( Category:
Storage & Retrieval
May 24,2020 )
epub |eng | | Author:Brian Peasland
Tip Read the Oracle documentation. It is a must for advancing your skillset. I have worked with some products where the documentation was a 20- or 40-page PDF file. It ...
( Category:
Storage & Retrieval
May 24,2020 )
epub |eng | | Author:Peter A. Carter
Full and Transaction Log Backups If your database is in FULL recovery model, then you are able to take transaction log backups, as well as the full backups. This means ...
( Category:
Storage & Retrieval
May 24,2020 )
epub |eng | 2018-11-30 | Author:Jordan Krause [Jordan Krause]
But I'm an IT guy, right? Don't you think I could find some way of circumnavigating this setting, even though my account only has regular user permissions? Nope, not that ...
( Category:
Windows Administration
May 23,2020 )
epub |eng | 2018-11-30 | Author:Prashanth Jayaram [Prashanth Jayaram]
This is what we did: We listed out the files to delete: we subtracted the LastWriteTime from today, and performed a Floor() operation on it since we were not allowed ...
( Category:
Linux & UNIX Administration
May 23,2020 )
epub |eng | 2018-12-31 | Author:Sebastiaan Tammer [Sebastiaan Tammer]
Summary This chapter explained regular expressions, and two common tools that use them under Linux: grep and sed. We began by explaining that regular expressions are search patterns, used in ...
( Category:
Linux & UNIX Administration
May 23,2020 )
epub |eng | 2020-03-13 | Author:Foster, Matt [Foster, Matt]
Security Concerns The insight and spy administrations of the United States and different countries consider the TOR organize as a danger to national security, accepting such an unknown system empowers ...
( Category:
Operating Systems Theory
May 3,2020 )
azw3 |eng | 2020-04-07 | Author:Tony Chan [Chan, Tony]
The class statement In Python, due to class statement, you may execute a square of code and appends its nearby namespace to a class, so that you may use it ...
( Category:
Linux & UNIX Administration
May 3,2020 )
epub, pdf |eng | | Author:Miroslav Kubat
How are the individual classifiers induced in the bagging approach? What is meant by bootstrapping? 9.2 Schapire’s Boosting Although the bagging approach often achieves impressive results, it suffers from a ...
( Category:
Intelligence & Semantics
April 24,2020 )
epub |eng | 2018-04-23 | Author:Jordan Krause [Jordan Krause]
In this recipe, we requested a new SSL certificate from our favorite public Certification Authority. In order to receive a certificate from them, we had to issue a CSR from ...
( Category:
Windows Administration
April 16,2020 )
epub, pdf |eng | | Author:Ameet V Joshi
12.4.2.1 Forget Gate At forget gate the input is combined with the previous output to generate a fraction between 0 and 1, that determines how much of the previous state ...
( Category:
Intelligence & Semantics
April 16,2020 )
epub |eng | | Author:Bin Shi & S. S. Iyengar
7.2 Notations and Preliminaries For the sake of completeness, we present necessary notations and review important definitions some of which defined earlier in Chap. 5 and will be used later ...
( Category:
Intelligence & Semantics
April 16,2020 )
epub |eng | 2020-01-31 | Author:Growth, Darwin [Growth, Darwin]
Penetration testing Hackers are only getting smarter with their hacking. Organizations have to try and outsmart these hackers in an attempt to keep their private information, like trade secrets, private ...
( Category:
Linux & UNIX Administration
April 14,2020 )
mobi, epub |eng | 2017-10-26 | Author:Albert Anthony
Data Security in AWS Data security in the AWS platform can be classified into two broad categories: Protecting data at rest Protecting data in transit Furthermore, data security has the ...
( Category:
Disaster & Recovery
April 13,2020 )
Categories
Disaster & Recovery | Email Administration |
Linux & UNIX Administration | Storage & Retrieval |
Windows Administration |
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9779)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7782)
Grails in Action by Glen Smith Peter Ledbrook(7697)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6573)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6563)
Running Windows Containers on AWS by Marcio Morales(6094)
Kotlin in Action by Dmitry Jemerov(5066)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4921)
Combating Crime on the Dark Web by Nearchos Nearchou(4502)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4414)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4346)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4177)
The Age of Surveillance Capitalism by Shoshana Zuboff(3956)
Python for Security and Networking - Third Edition by José Manuel Ortega(3744)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3509)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3411)
Mastering Python for Networking and Security by José Manuel Ortega(3345)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3332)
Blockchain Basics by Daniel Drescher(3295)
Learn Wireshark by Lisa Bock(3267)
