Network Administration
epub |eng | 2013-03-15 | Author:Ophir Frieder, Gideon Frieder, and David Grossman
Example: Find the Max—Hash Example 6-10. Find the max—hash 1 scores = Hash.new 2 3 scores["Geraldo"] = [98, 95, 93, 96] 4 scores["Brittany"] = [74, 90, 84, 92] 5 scores["Michael"] ...
( Category:
Storage & Retrieval
March 23,2020 )
mobi, epub |eng | 2013-09-09 | Author:David Watson & Andrew Jones
• “Audit Trail between ‘<Start Date>’ and ‘<End Date>’”—top left-hand side; • logo—top right-hand side. Report Sub-Header • Case number. Report Contents • Date; • Time; • User—print name not ...
( Category:
Storage & Retrieval
March 23,2020 )
epub |eng | 2014-09-02 | Author:Robert J. Glushko
7.1.5.2. Institutional Semantics Systems of institutional semantics offer precisely defined abstractions or information components (§3.3.3, “Identity and Information Components”) needed to ensure that information can be efficiently exchanged and used. ...
( Category:
General
March 23,2020 )
epub |eng | 2020-04-06 | Author:Nora Jones & Casey Rosenthal [Nora Jones]
( Category:
Testing
March 23,2020 )
epub |eng | 2019-11-28 | Author:Viktor Farcic [Viktor Farcic]
Figure 3-43: Prometheus' graph screen with container memory usage limited to prometheus-server and grouped by the pod label extracted from pod_name Now we can combine the two metrics and find ...
( Category:
Tools
March 22,2020 )
epub, pdf |eng | 2015-12-23 | Author:Adrian Mouat
If using the syslog driver, we can use syslog functionality to automatically forward the logs, as shown in “Forwarding Logs with rsyslog”. We can just directly access the log files ...
( Category:
Linux & UNIX Administration
March 22,2020 )
epub |eng | 2014-09-19 | Author:Ronald E. Day [Day, Ronald E.]
5 The Document as the Subject: Androids “Homo documentator” must prepare himself to take command—with all his senses awake—over the robots of tomorrow. The value of the machine will be ...
( Category:
General
March 22,2020 )
epub |eng | 2016-04-28 | Author:Looney, Jonathan...
This regular expression is used to parse the IP address. We really don’t need to make a variable to hold this. The main reason we did that was just to ...
( Category:
Linux & UNIX Administration
March 22,2020 )
epub |eng | | Author:Michał Tomasz Jakóbczyk
Are you curious about the content of the report? Sure, you are. Return to your local command line closing the SSH connection to the compute instance. Use the oci os ...
( Category:
Storage & Retrieval
March 21,2020 )
epub |eng | 2019-04-25 | Author:Roland Huß & Bilgin Ibryam [Roland Huß]
( Category:
Software Development
March 21,2020 )
epub |eng | | Author:Enrico van de Laar
Listing 7-5Restore AdventureWorks database If we were to look at the sys.dm_os_waiting_tasks DMV while the backup is running, we would see the waits occurring as shown in Figure 7-8, which ...
( Category:
Performance Optimization
March 21,2020 )
azw3 |eng | 2015-09-21 | Author:Deepak Vohra [Vohra, Deepak]
}); The findAllDocuments.js script is listed: Server = require('mongodb').Server; Db = require('mongodb').Db; Collection = require('mongodb').Collection; var db = new Db('local', new Server('localhost', 27017)); db.open(function(error, db) { if (error) console.log(error); else{ ...
( Category:
Software Development
March 21,2020 )
epub |eng | 2016-03-07 | Author:William Stanek [Stanek, William]
( Category:
Email Administration
March 20,2020 )
epub |eng | 2020-02-27 | Author:Lee Atchison
Triggered plan A triggered plan is a plan for what you are going to do if the risk actually occurs. This can be something as simple as “fix the bug,” ...
( Category:
Disaster & Recovery
March 20,2020 )
epub |eng | 2016-11-10 | Author:Langenhan, Daniel
( Category:
Enterprise Applications
March 20,2020 )
Categories
Disaster & Recovery | Email Administration |
Linux & UNIX Administration | Storage & Retrieval |
Windows Administration |
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9780)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7785)
Grails in Action by Glen Smith Peter Ledbrook(7699)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6585)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6573)
Running Windows Containers on AWS by Marcio Morales(6104)
Kotlin in Action by Dmitry Jemerov(5068)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4925)
Combating Crime on the Dark Web by Nearchos Nearchou(4507)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4416)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4355)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4180)
The Age of Surveillance Capitalism by Shoshana Zuboff(3959)
Python for Security and Networking - Third Edition by José Manuel Ortega(3751)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3510)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3414)
Mastering Python for Networking and Security by José Manuel Ortega(3346)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3335)
Blockchain Basics by Daniel Drescher(3301)
Learn Wireshark by Lisa Bock(3279)
