Home
>
Computers & Technology
>
Networking & Cloud Computing
>
Network Administration
>
Linux & UNIX Administration
Linux & UNIX Administration
epub |eng | 2020-02-26 | Author:Noah Gift & Alfredo Deza [Noah Gift]
Why and when to monkeypatch? Most of the code that a developer will interact with is already written. There is not that much chance to create large codebases from scratch. ...
( Category:
Linux & UNIX Administration
June 18,2020 )
epub |eng | 2020-04-17 | Author:Karim Okasha [Karim Okasha]
( Category:
Tools
May 29,2020 )
epub |eng | 2018-11-30 | Author:Prashanth Jayaram [Prashanth Jayaram]
This is what we did: We listed out the files to delete: we subtracted the LastWriteTime from today, and performed a Floor() operation on it since we were not allowed ...
( Category:
Linux & UNIX Administration
May 23,2020 )
epub |eng | 2018-12-31 | Author:Sebastiaan Tammer [Sebastiaan Tammer]
Summary This chapter explained regular expressions, and two common tools that use them under Linux: grep and sed. We began by explaining that regular expressions are search patterns, used in ...
( Category:
Linux & UNIX Administration
May 23,2020 )
epub |eng | 2020-03-13 | Author:Foster, Matt [Foster, Matt]
Security Concerns The insight and spy administrations of the United States and different countries consider the TOR organize as a danger to national security, accepting such an unknown system empowers ...
( Category:
Operating Systems Theory
May 3,2020 )
azw3 |eng | 2020-04-07 | Author:Tony Chan [Chan, Tony]
The class statement In Python, due to class statement, you may execute a square of code and appends its nearby namespace to a class, so that you may use it ...
( Category:
Linux & UNIX Administration
May 3,2020 )
epub |eng | 2020-01-31 | Author:Growth, Darwin [Growth, Darwin]
Penetration testing Hackers are only getting smarter with their hacking. Organizations have to try and outsmart these hackers in an attempt to keep their private information, like trade secrets, private ...
( Category:
Linux & UNIX Administration
April 14,2020 )
epub |eng | 2019-04-30 | Author:Sasha Kranjac [Sasha Kranjac]
The preceding screenshot shows the primary zone stored on the DC computer and the successfully replicated secondary zone on the SRV1 computer. This is after allowing zone transfers from the ...
( Category:
Linux & UNIX Administration
April 6,2020 )
epub |eng | 2019-08-30 | Author:Viktor Farcic
Kubernetes – the solution to all of our problems? Viktor Farcic: My understanding is that you mostly work with Kubernetes, which means you're into the latest and greatest. Is that ...
( Category:
Software Development
March 25,2020 )
epub |eng | 2019-11-28 | Author:Viktor Farcic [Viktor Farcic]
Figure 3-43: Prometheus' graph screen with container memory usage limited to prometheus-server and grouped by the pod label extracted from pod_name Now we can combine the two metrics and find ...
( Category:
Tools
March 22,2020 )
epub, pdf |eng | 2015-12-23 | Author:Adrian Mouat
If using the syslog driver, we can use syslog functionality to automatically forward the logs, as shown in “Forwarding Logs with rsyslog”. We can just directly access the log files ...
( Category:
Linux & UNIX Administration
March 22,2020 )
epub |eng | 2016-04-28 | Author:Looney, Jonathan...
This regular expression is used to parse the IP address. We really don’t need to make a variable to hold this. The main reason we did that was just to ...
( Category:
Linux & UNIX Administration
March 22,2020 )
epub |eng | 2018-08-28 | Author:Jean-Marcel Belmont
( Category:
Linux & UNIX Administration
March 15,2020 )
azw3, epub |eng | 2017-06-12 | Author:Sujata Biswas
But, as you nothing has changed. The reason is the placement of the $, it should be after First as shown in the following example: $ sed ‘s/First$/ST/’ matching.txt First ...
( Category:
Linux & UNIX Administration
March 14,2020 )
epub |eng | 2018-10-22 | Author:Mustafa Toroman [Mustafa Toroman]
( Category:
Linux & UNIX Administration
March 7,2020 )
Categories
Popular ebooks
The Mikado Method by Ola Ellnestam Daniel Brolund(9777)Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7778)
Grails in Action by Glen Smith Peter Ledbrook(7696)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6534)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6521)
Running Windows Containers on AWS by Marcio Morales(6047)
Kotlin in Action by Dmitry Jemerov(5062)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4895)
Combating Crime on the Dark Web by Nearchos Nearchou(4478)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4414)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4305)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4153)
The Age of Surveillance Capitalism by Shoshana Zuboff(3946)
Python for Security and Networking - Third Edition by José Manuel Ortega(3714)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3503)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3389)
Mastering Python for Networking and Security by José Manuel Ortega(3344)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3327)
Blockchain Basics by Daniel Drescher(3292)
Learn Wireshark by Lisa Bock(3227)
