Networking & Cloud Computing
epub |eng | 2017-05-05 | Author:Pavel Yosifovich & Alex Ionescu & David A. Solomon [Yosifovich, Pavel]

Prototype PTEs If a page can be shared between two processes, the memory manager uses a software structure called prototype page table entries (prototype PTEs) to map these potentially shared ...
( Category: Networking & Cloud Computing January 21,2018 )
azw3 |eng | 2017-09-21 | Author:Thomas Lee [Lee, Thomas]

( Category: Networking & Cloud Computing January 21,2018 )
azw3 |eng | 2017-10-26 | Author:Mike Julian [Julian, Mike]

Instrumenting Your Apps with Metrics One of the most powerful things you can do in monitoring is also one of the most overlooked things: instrumenting your own applications. Why would ...
( Category: Hardware & DIY January 21,2018 )
azw3 |eng | 2017-07-21 | Author:Jonathan McAllister [McAllister, Jonathan]

The do until iterator The Do...Until iterator has been around for a long time in many programming languages. It is probably one of the most widely implemented iterators that exist. ...
( Category: Networking & Cloud Computing January 21,2018 )
azw3 |eng | 2017-03-21 | Author:William Stanek [Stanek, William]

$Session = New-PSSession -ConfigurationName Windows.PowerShell -ConnectionUri -AllowRedirection -Authentication Kerberos -Credential $Cred Here, when PowerShell executes Get-Credential, you are prompted for a user name and password. This credential is then ...
( Category: Operating Systems January 20,2018 )
epub |eng | 2011-05-23 | Author:Matthew Baxter-Reynolds

Synchronization 1: Downloading Bookmarks OData is a very new protocol, and I wanted to use it in the book because I felt it would become an important protocol over the ...
( Category: Internet & Social Media January 20,2018 )
azw3 |eng | 2017-03-24 | Author:Ritesh Modi [Modi, Ritesh]

Git init Git init initializes an empty Git repository with an empty history. The command can be executed using Git for Windows and is shown next: Git init It initializes ...
( Category: Operating Systems January 20,2018 )
azw3 |eng | 2016-06-27 | Author:Alessandro Franceschi & Jaime Soriano Pastor [Franceschi, Alessandro]

Examining potential scenarios and approaches Puppet is a tool that offers a world of order, control, and automation; we have learnt it, we know at least the basics of how ...
( Category: Programming Languages January 20,2018 )
epub |eng | 2015-11-25 | Author:Jason McDonald Ph.d. [McDonald, Jason Ph.d.]

» Use Keyword Heavy URLs over Parameter URLs URLs or web addresses are what you see in the URL or address bar at the top of the browser. Google pays ...
( Category: Internet & Social Media January 20,2018 )
azw3 |eng | 2017-07-22 | Author:Petersen, Richard [Petersen, Richard]

( Category: Operating Systems January 20,2018 )
azw3 |eng | 2017-10-11 | Author:Bharadwaj, Raghu [Bharadwaj, Raghu]

VFS defines two sets of functions: first, a set of generic filesystem-independent routines that serve as common entry functions for all file access and manipulation operations, and second, a set ...
( Category: Operating Systems January 20,2018 )
azw3 |eng | 2016-06-30 | Author:Saito, Hideto & Lee, Hui-Chuan Chloe & Hsu, Ke-Jou Carol [Saito, Hideto]

As you can see, three pods are created to solve this job. Also, since the selector part is removed, the selector is copied from the labels. Pod as a daemon ...
( Category: Operating Systems January 20,2018 )
azw3 |eng | 2016-12-12 | Author:Valentin Hamburger [Hamburger, Valentin]

Probably vRO is used for third-party integration to a fair extent. But also to create new services and make them orderable through vRealize Automation, vRO can be used quite easily ...
( Category: Operating Systems January 19,2018 )
epub |eng | 2017-12-13 | Author:Akash Mahajan

The reporting also can be customized as per the requirements using the available options: The preceding options are very important while scanning critical infrastructure. These options are to ensure we ...
( Category: Networking & Cloud Computing January 19,2018 )

Popular ebooks
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(1006)
From CIA to APT: An Introduction to Cyber Security by Edward G. Amoroso & Matthew E. Amoroso(138)
React Native - Building Mobile Apps with JavaScript by Novick Vladimir(133)
Blockchain: Ultimate Step By Step Guide To Understanding Blockchain Technology, Bitcoin Creation, and the future of Money (Novice to Expert) by Keizer Söze(132)
Owning Bitcoin: The Illustrated Guide to Security, Privacy, and Potential by Apodaca Richard(110)
The Internet of Things by Mercedes Bunz & Graham Meikle(110)
Applied Network Security by Arthur Salmon & Michael McLafferty & Warun Levesque(103)
Learning HTTP/2: A Practical Guide for Beginners by Stephen Ludin & Javier Garza(85)
Database Reliability Engineering: Designing and Operating Resilient Database Systems by Campbell Laine & Majors Charity(78)
Serious Cryptography: A Practical Introduction to Modern Encryption by Aumasson Jean-Philippe(73)
Isomorphic JavaScript Web Development: Universal JavaScript with React and Node by Konstantin Tarkus(70)
A Girl's Life Online by Katherine Tarbox(56)
The Internet of Things (The MIT Press Essential Knowledge series) by Greengard Samuel(54)
Data Smart by John W. Foreman(54)
Java EE 8 Application Development by David R. Heffelfinger(54)
CCNA Routing and Switching Portable Command Guide by Scott Empson(50)
Mobile Forensics: Advanced Investigative Strategies by Oleg Afonin & Vladimir Katalov(50)
Gradle Essentials by Kunal Dabir & Abhinandan(48)
Spring: Developing Java Applications for the Enterprise by Ravi Kant Soni & Amuthan Ganeshan & Rajesh RV(47)
Docker on Windows by Stoneman Elton(47)