Operating Systems
azw3 |eng | 2015-08-31 | Author:Bresnahan, Christine & Blum, Richard [Bresnahan, Christine]

Using Regular Expressions Many Linux programs employ regular expressions, which are tools for expressing patterns in text. Regular expressions are similar in principle to the wildcards that can be used ...
( Category: Operating Systems February 17,2019 )
epub |eng | | Author:Mark McDonnell

2.Edit any part of the macro, using some “jiggery pokery.” (Yes, that’s a technical term.) Appending If all you have to do is append some additional commands to the end ...
( Category: Operating Systems February 14,2019 )
epub |eng | | Author:Scott Chacon & Ben Straub

Merge Log Another useful tool when resolving merge conflicts is git log. This can help you get context on what may have contributed to the conflicts. Reviewing a little bit ...
( Category: Operating Systems February 14,2019 )
epub |eng | | Author:Sander van Vugt

node1:∼ # sbd -d /dev/sdc1 list 0 node2 clear 1 node1 clear 7.Now, it’s time for a first test. Use the following command to effectuate a STONITH operation from the ...
( Category: Programming February 14,2019 )
mobi, epub |eng | 2018-05-08 | Author:Graham Dumpleton

Chapter 11. Webhooks and Build Automation The support in OpenShift for the Docker and Source build strategies simplifies the build and deployment process, as OpenShift worries about the details of ...
( Category: Programming February 14,2019 )
mobi, epub |eng | 2017-05-29 | Author:Duncan C. E. Winn

In Diego, the Garden API is currently implemented by the following: Garden-runC (Garden backed by runC), which provides a Linux-specific implementation of a Garden interface. Garden-Windows, which provides a Windows-specific ...
( Category: Networking & Cloud Computing February 14,2019 )
epub |eng | 2010-06-16 | Author:Joli Ballew [Ballew, Joli]

You can also make playlists from other categories in your iPod library, such as podcasts or audiobooks. 5. You can now edit the playlist. Tap the red minus sign and ...
( Category: Hardware & DIY February 11,2019 )
mobi |eng | 2017-02-09 | Author:R. Garg && G. Verma

POINTS TO REMEMBER A technique that allows the execution of processes that may not be completely in the main memory is called virtual memory. To allow the programmer to make ...
( Category: Operating Systems February 9,2019 )
mobi |eng | 2016-01-01 | Author:Sam Siewert and John Pratt

Exercises Create a user-defined interrupt handler for the timer ISR and a task for processing. The timer should be scheduled on a regular basis, and the interrupt handler should signal ...
( Category: Programming February 9,2019 )
epub |eng | 2015-02-09 | Author:Sam Siewert & John Pratt [Sam Siewert]

Exercises Create a user-defined interrupt handler for the timer ISR and a task for processing. The timer should be scheduled on a regular basis, and the interrupt handler should signal ...
( Category: Programming February 9,2019 )
epub |eng | 2017-02-09 | Author:R. Garg & G. Verma

POINTS TO REMEMBER A technique that allows the execution of processes that may not be completely in the main memory is called virtual memory. To allow the programmer to make ...
( Category: Operating Systems February 9,2019 )
mobi |eng | 2017-10-19 | Author:Carl Albing and JP Vossen

Tip When sudo asks for your password, it’s really asking for your password. As in, your user account. Not root. For some reason people often get confused by this at ...
( Category: Operating Systems February 6,2019 )
mobi |eng | 2015-11-17 | Author:Sébastien Goasguen

Warning For testing and learning purposes, you might decide to start the API server with the option --insecure-bind-address=0.0.0.0, which will bind the so-called localhost port to all your network interfaces, ...
( Category: Operating Systems February 6,2019 )
azw3 |eng | 2015-06-30 | Author:Govardhan Gunnala & Daniele Tosatto [Gunnala, Govardhan]

( Category: Operating Systems February 2,2019 )
epub |eng | 2013-04-01 | Author:Shane Young & Steve Caravajal & Todd Klindt

( Category: Software January 31,2019 )

Popular ebooks
Hello! Python by Anthony Briggs(5334)
Hadoop in Practice by Alex Holmes(3197)
Test-Driven iOS Development with Swift 4 by Dominik Hauser(2047)
Learn Windows PowerShell in a Month of Lunches by Don Jones(1136)
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions by Sharma Himanshu(644)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(614)
The Old New Thing by Raymond Chen(511)
MCSA Windows Server 2016 Study Guide: Exam 70-741 by William Panek(463)
Linux Phrasebook (Developer's Library) by Granneman Scott(419)
Database Reliability Engineering: Designing and Operating Resilient Database Systems by Campbell Laine & Majors Charity(414)
Computers For Seniors For Dummies by Nancy C. Muir(403)
RHCSA & RHCE Red Hat Enterprise Linux 7: Training and Exam Preparation Guide (EX200 and EX300), Third Edition by Asghar Ghori(387)
Raspberry Pi Beginners Guide: Ultimate Guide For Rasberry Pi, User guide To Get The Most Out Of Your Investment, Hacking, Programming, Python, Best Hardware, Beginners Guide To Rasberry Pi by Steven Giles(372)
Java Cookbook by Ian F. Darwin(350)
The Complete Windows 10 Privacy Guide: Windows 10 Fall Creators Update version by Martin Brinkmann(347)
| by admin(346)
Mastering Docker - Second Edition by McKendrick Russ & Gallagher Scott(340)
Hacking: Computer Hacking Beginners Guide How to Hack Wireless Network, Basic Security and Penetration Testing, Kali Linux, Your First Hack by Alan T. Norman(319)
Docker on Windows by Stoneman Elton(314)
Continuous Delivery with Docker and Jenkins by Leszko Rafal(302)