Network Administration
epub |eng | 2014-09-19 | Author:Ronald E. Day [Day, Ronald E.]
5 The Document as the Subject: Androids “Homo documentator” must prepare himself to take command—with all his senses awake—over the robots of tomorrow. The value of the machine will be ...
( Category:
General
March 22,2020 )
epub |eng | 2016-04-28 | Author:Looney, Jonathan...
This regular expression is used to parse the IP address. We really don’t need to make a variable to hold this. The main reason we did that was just to ...
( Category:
Linux & UNIX Administration
March 22,2020 )
epub |eng | | Author:Michał Tomasz Jakóbczyk
Are you curious about the content of the report? Sure, you are. Return to your local command line closing the SSH connection to the compute instance. Use the oci os ...
( Category:
Storage & Retrieval
March 21,2020 )
epub |eng | 2019-04-25 | Author:Roland Huß & Bilgin Ibryam [Roland Huß]
( Category:
Software Development
March 21,2020 )
epub |eng | | Author:Enrico van de Laar
Listing 7-5Restore AdventureWorks database If we were to look at the sys.dm_os_waiting_tasks DMV while the backup is running, we would see the waits occurring as shown in Figure 7-8, which ...
( Category:
Performance Optimization
March 21,2020 )
azw3 |eng | 2015-09-21 | Author:Deepak Vohra [Vohra, Deepak]
}); The findAllDocuments.js script is listed: Server = require('mongodb').Server; Db = require('mongodb').Db; Collection = require('mongodb').Collection; var db = new Db('local', new Server('localhost', 27017)); db.open(function(error, db) { if (error) console.log(error); else{ ...
( Category:
Software Development
March 21,2020 )
epub |eng | 2016-03-07 | Author:William Stanek [Stanek, William]
( Category:
Email Administration
March 20,2020 )
epub |eng | 2020-02-27 | Author:Lee Atchison
Triggered plan A triggered plan is a plan for what you are going to do if the risk actually occurs. This can be something as simple as “fix the bug,” ...
( Category:
Disaster & Recovery
March 20,2020 )
epub |eng | 2016-11-10 | Author:Langenhan, Daniel
( Category:
Enterprise Applications
March 20,2020 )
mobi, epub |eng | 2017-11-23 | Author:Nikit Swaraj
Now, its time to set up ECR and push a Docker image in ECR. Getting ready To play around with ECR, make sure you should take care of these things: ...
( Category:
Tools
March 17,2020 )
epub |eng | 2019-11-04 | Author:Jan Novotny & Paul A. Bilokon & Aris Galiotos & Frédéric Délèze
( Category:
Storage & Retrieval
March 17,2020 )
epub |eng | 2020-06-24 | Author:Liz Rice [Liz Rice]
Image deployment security The main security concern at deployment time is ensuring that the correct image gets pulled and run, although there are additional checks you might want to make ...
( Category:
Cloud Computing
March 17,2020 )
epub, pdf |eng | | Author:Max Bramer
13.4 Evaluating the Effectiveness of a Distributed System: PMCRI A distributed data mining system such as PMCRI can be evaluated in terms of three kinds of performance: its scale-up, its ...
( Category:
Intelligence & Semantics
March 16,2020 )
epub |eng | 2018-08-28 | Author:Jean-Marcel Belmont
( Category:
Linux & UNIX Administration
March 15,2020 )
azw3, epub |eng | 2017-06-12 | Author:Sujata Biswas
But, as you nothing has changed. The reason is the placement of the $, it should be after First as shown in the following example: $ sed ‘s/First$/ST/’ matching.txt First ...
( Category:
Linux & UNIX Administration
March 14,2020 )
Categories
Disaster & Recovery | Email Administration |
Linux & UNIX Administration | Storage & Retrieval |
Windows Administration |
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9438)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7517)
Grails in Action by Glen Smith Peter Ledbrook(7410)
Kotlin in Action by Dmitry Jemerov(4764)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4221)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(4029)
Azure Containers Explained by Wesley Haakman & Richard Hooper(3916)
The Age of Surveillance Capitalism by Shoshana Zuboff(3564)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(3499)
Running Windows Containers on AWS by Marcio Morales(3448)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3320)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3103)
Combating Crime on the Dark Web by Nearchos Nearchou(3093)
Mastering Python for Networking and Security by José Manuel Ortega(3090)
Blockchain Basics by Daniel Drescher(3002)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(2750)
TCP IP by Todd Lammle(2739)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(2564)
Hands-On Azure for Developers by Kamil Mrzyglod(2524)
Cloud-Native Observability with OpenTelemetry by Alex Boten(2519)