Network Administration
epub, pdf |eng | 2011-05-14 | Author:Don Jones [Jones, Don]
The WMI way: invoking WMI methods 149 __DERIVATION : {} __SERVER : __NAMESPACE : __PATH : ReturnValue : 0 __GENUS : 2 __CLASS : __PARAMETERS __SUPERCLASS : __DYNASTY : __PARAMETERS ...
( Category:
C & C++ Windows Programming
March 26,2014 )
epub |eng | 2012-01-14 | Author:Shotts, William E. [William E. Shotts Jr.]
Quantifiers Extended regular expressions support several ways to specify the number of times an element is matched. ?—Match an Element Zero Times or One Time This quantifier means, in effect, ...
( Category:
Linux & UNIX Administration
March 26,2014 )
mobi, epub, pdf |eng | 2010-10-31 | Author:chromatic
The negated form of the binding operator (!~) evaluates to a false value if the match succeeds. The qr// Operator and Regex Combinations Regexes are first-class entities in modern Perl ...
( Category:
Software Development
March 25,2014 )
mobi |eng | 2012-01-12 | Author:Jr., William [Jr., William]
[:lower:] The lowercase letters [:punct:] The punctuation characters; in ASCII, equivalent to [-!"#$%&'()*+,./:;<=>?@[\\\]_`{|}˜] [:print:] The printable characters; all the characters in [:graph:] plus the space character [:space:] The whitespace characters ...
( Category:
Linux & UNIX Administration
March 25,2014 )
mobi, epub, pdf | | 2009-05-13 | Author:David N. Blank-Edelman
To find anyone with the last name Finkelstein or Hodgkin: (|(sn=Finkelstein)(sn=Hodgkin)) To find all of the Finkelsteins who do not work in Boston: (&(sn=Finkelstein)(!(l=Boston))) To find all the Finkelsteins or ...
( Category:
LDAP
March 25,2014 )
mobi, epub, pdf |eng | 2011-06-09 | Author:James Loope
file { '/etc/ntp.conf': mode => '640', owner => root, group => root, source => "puppet:///modules/apps/ntp/ntp.conf", require => Package[ntp], } service { "ntp": ensure => running, enable => true, pattern => ...
( Category:
Windows Administration
March 25,2014 )
mobi |eng | 2012-09-17 | Author:Sivakumar Harinath & Ronald Pihlgren & Denny Guang-Yeu Lee & John Sirmon & Robert M. Bruckner
( Category:
SQL Server
March 25,2014 )
mobi, epub, pdf |eng | 0101-01-01 | Author:Holmes, Lee [Holmes, Lee]
Figure 19-1. Windows PowerShell Integrated Scripting Environment Scripting pane The scripting pane is the top pane of the ISE, and it is geared toward multiline script editing and creation. It ...
( Category:
Windows Administration
March 25,2014 )
mobi, epub |eng | 2011-05-23 | Author:Joshua D. Drake;John C. Worsley
Dropping an operator An operator can be dropped with the DROP OPERATOR command. An operator may only be dropped by the user who created it, or by a PostgreSQL superuser. ...
( Category:
Networks
March 25,2014 )
mobi, epub, pdf |eng | 2009-08-19 | Author:Chris Sanders; Chris Sanders
In this capture file you will see an example of a client computer (192.168.0.2) connecting to a telnet server (192.168.0.1). As you begin to step through the data being transmitted, ...
( Category:
Networks
March 25,2014 )
mobi, epub, pdf |eng | 2011-07-29 | Author:Stephan Spencer
Chapter 4. Understanding the Breadth and Depth of Google, Inc. Google Tools and Services Google is all about search, but there is more to search than just websites. Google’s various ...
( Category:
Storage & Retrieval
March 25,2014 )
mobi |eng | 2010-01-27 | Author:Schiesser, Rich [Schiesser, Rich]
Summary This chapter began in the usual manner with a formal definition of problem management, followed by a discussion of the differences between problem management, change management, and request management. ...
( Category:
Industrial Technology
March 25,2014 )
epub, mobi |eng | 2013-11-22 | Author:Peteris Krumins
3883737189170238912377 However, this line wouldn’t be printed because it also contains some characters: 8388338 foo bar random data 999 You can also invert the ^\d$ regular expression and use \D: ...
( Category:
Perl
March 25,2014 )
epub, pdf | | | Author:Steven Goodwin
To make a direct copy of one set of files from one directory to another, you can probably use cp at the end of each day. However, this will wastefully ...
( Category:
Robotics & Automation
March 25,2014 )
epub |eng | 2011-11-17 | Author:Nathan Winters & Neil Johnson & Nicolas Blank
Protecting against Unauthorized Network Access It will soon be common for email users to access their corporate email solution mainly from a device that is not connected to their corporate ...
( Category:
Client-Server Systems
March 25,2014 )
Categories
Disaster & Recovery | Email Administration |
Linux & UNIX Administration | Storage & Retrieval |
Windows Administration |
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9782)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7787)
Grails in Action by Glen Smith Peter Ledbrook(7700)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6600)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6590)
Running Windows Containers on AWS by Marcio Morales(6118)
Kotlin in Action by Dmitry Jemerov(5070)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4935)
Combating Crime on the Dark Web by Nearchos Nearchou(4514)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4418)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4370)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4186)
The Age of Surveillance Capitalism by Shoshana Zuboff(3960)
Python for Security and Networking - Third Edition by José Manuel Ortega(3757)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3510)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3422)
Mastering Python for Networking and Security by José Manuel Ortega(3346)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3335)
Blockchain Basics by Daniel Drescher(3303)
Learn Wireshark by Lisa Bock(3294)
