Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Red Hat Certified Engineer (RHCE) Study Guide: Ansible Automation for the Red Hat Enterprise Linux 8 Exam (EX294)
Red Hat Certified Engineer (RHCE) Study Guide: Ansible Automation for the Red Hat Enterprise Linux 8 Exam (EX294)
For many years the RHCE from Red Hat has been based on managing services on a single Red Hat host. The big question is: how many RHCEs manage just a single host? With that in mind, Red Hat has updated the exam and training to support Ansible, allowing you to learn to manage many hosts.

Ansible is a configuration
...
Credibility Assessment: Scientific Research and Applications
Credibility Assessment: Scientific Research and Applications

In 2001, the late Murray Kleiner and an array of experts contributed to the Handbook of Polygraph Testing, published by Elsevier, which examined the fundamental principles behind polygraph tests and reviewed the key tests and methods used at that time. In the intervening thirteen years, the field has moved beyond traditional polygraph...

Introducing Dart Sass: A Practical Introduction to the Replacement for Sass, Built on Dart
Introducing Dart Sass: A Practical Introduction to the Replacement for Sass, Built on Dart

Leverage the power of Dart Sass to quickly create valid CSS styles for use within websites. This short project-oriented book simplifies the process of creating and manipulating Sass code in the browser, for websites, or online applications, using little more than a text editor or free software. 

Designed to be much...

Leo Laporte's PC Help Desk
Leo Laporte's PC Help Desk

Nurse your PC back to health with a little help from Leo Laporte. Leo Laporte's PC Help Desk in a Book uses a unique, medical dictionary approach, complete with symptoms, diagnosis, and treatment for all of your common and not-so-common PC maladies. Flow-charts will help you correctly diagnose and...

Bulletproofing TCP/IP Based Windows NT/2000 Networks
Bulletproofing TCP/IP Based Windows NT/2000 Networks
Find out about TCP/IP-based network attack methods and threats to Windows NT/2000 computers and the preventive measures you can use to protect your infrastructure. Bulletproofing TCP/IP-based Windows NT/2000 Networks details the use of router access lists, firewalls, virus scanners and encryption. It includes examples of the configuration of...
VBScript Programmer's Reference (Programmer to Programmer)
VBScript Programmer's Reference (Programmer to Programmer)

The VBScript standard has changed over time, and several new things have been introduced since this book first published in 1999. The current standard for VBScript is 5.6. The script debugger, script control, and script encoder have all changed and the Windows Script Component Wizard, regular expressions, and remote scripting have been...

Defense and Detection Strategies against Internet Worms
Defense and Detection Strategies against Internet Worms
This is the first book focused exclusively on Internet worms, offering you solid worm detection and mitigation strategies for your work in the field. This ground-breaking volume enables you to put rising worm trends into perspective with practical information in detection and defense techniques utilizing data from live networks, real IP addresses,...
The Traveling Salesman: Computational Solutions for TSP Applications (Lecture Notes in Computer Science)
The Traveling Salesman: Computational Solutions for TSP Applications (Lecture Notes in Computer Science)

More than fifteen years ago, I was faced with the following problem in an assignment for a class in computer science. A brewery had to deliver beer to five stores, and the task was to write a computer program for determining the shortest route for the truck driver to visit all stores and return to the brewery. All my attemps to find a...

Pro PowerShell for Amazon Web Services: DevOps for the AWS Cloud
Pro PowerShell for Amazon Web Services: DevOps for the AWS Cloud

Pro PowerShell for Amazon Web Services is written specifically for Windows professionals who already know PowerShell and want to learn to host Windows workloads in the Amazon Elastic Cloud Compute (EC2) cloud service. The cloud offers information technology workers significant cost savings and agility unimaginable even just a few...

Mast Cells: Methods and Protocols (Methods in Molecular Biology)
Mast Cells: Methods and Protocols (Methods in Molecular Biology)

A cutting-edge collection of readily reproducible techniques for the isolation, culture, and study of activation and signaling in human mast cells. These methods take advantage of the latest advances in molecular biology, technology, and information science. They include methods for the identification of mast cells, the development of mast...

Outstanding!: 47 Ways to Make Your Organization Exceptional
Outstanding!: 47 Ways to Make Your Organization Exceptional
"Outstanding! hits the nail on the head in every way: Practical content, terrific stories, and an easy read. Miller has provided a road map for organizations to become exceptional--just follow the path laid out. Definitely a must read!"
--Dave Ramsey, author of Total Money Makeover and host
...
Securing Windows Server 2003
Securing Windows Server 2003

As the title implies, this book is about security in the Windows Server 2003 operating system and how to put it to work on behalf of your organization and your users.

Windows Server 2003 has quite a number of uses. It can serve in a network support role, supplying services such as DHCP and DNS. It can...

unlimited object storage image
Result Page: 41 40 39 38 37 36 35 34 33 32 31 30 29 28 27 26 25 24 23 
©2021 LearnIT (support@pdfchm.net) - Privacy Policy