ubuntu server guide
OpenLDAP 3 service-ldap-introduction Introduction 3 service-ldap Installation 3 service-ldap-access-control Access control 3 service-ldap-replication Replication 3 service-ldap-usage Simple LDAP user and samba-file-server Set up a file server 3 samba-print-server Set up a print server 3 samba-share-access-control Share access controls 3 samba-apparmor-profile Create AppArmor profile 3 Legacy pages 4 samba-domain-controller help menu, or pressing Control + Z or F2. If you are accessing the installer via tty1, you can also access a shell by switching to a different virtual terminal (Control + Alt + arrow, or Control + Alt + number0 码力 | 486 页 | 3.33 MB | 1 年前3Cilium v1.6 Documentation
Guide BPF Architecture Toolchain Program Types Further Reading API Reference Introduction How to access the API Compatibility Guarantees API Reference Reference Command Cheatsheet Command utilities: these approaches to struggle to scale side by side with the application as load balancing tables and access control lists carrying hundreds of thousands of rules that need to be updated with a continuously using a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services0 码力 | 734 页 | 11.45 MB | 1 年前3Cilium v1.7 Documentation
Newsletter Podcasts Blog posts Books Talks Further Documents API Reference Introduction How to access the API CLI Client Golang Package Compatibility Guarantees API Reference Reference Command Cheatsheet these approaches to struggle to scale side by side with the application as load balancing tables and access control lists carrying hundreds of thousands of rules that need to be updated with a continuously using a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services0 码力 | 885 页 | 12.41 MB | 1 年前3Cilium v1.9 Documentation
Newsletter Podcasts Blog posts Books Talks Further Documents API Reference Introduction How to access the API CLI Client Golang Package Compatibility Guarantees API Reference Hubble internals Hubble these approaches to struggle to scale side by side with the application as load balancing tables and access control lists carrying hundreds of thousands of rules that need to be updated with a continuously using a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services0 码力 | 1263 页 | 18.62 MB | 1 年前3Cilium v1.5 Documentation
Reference Guide BPF Architecture Toolchain Program Types Further Reading API Reference Introduc�on How to access the API Compa�bility Guarantees API Reference Reference Command Cheatsheet Command u�li�es: Command these approaches to struggle to scale side by side with the applica�on as load balancing tables and access control lists carrying hundreds of thousands of rules that need to be updated with a con�nuously using a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services0 码力 | 740 页 | 12.52 MB | 1 年前3Cilium v1.8 Documentation
Newsletter Podcasts Blog posts Books Talks Further Documents API Reference Introduction How to access the API CLI Client Golang Package Compatibility Guarantees API Reference Hubble internals Hubble these approaches to struggle to scale side by side with the application as load balancing tables and access control lists carrying hundreds of thousands of rules that need to be updated with a continuously using a key-value store. Secure access to and from external services Label based security is the tool of choice for cluster internal access control. In order to secure access to and from external services0 码力 | 1124 页 | 21.33 MB | 1 年前3Cilium v1.11 Documentation
with commit access Granting Commit Access Revoking Commit Access Changing the Policy Voting Company Block Vote Limit Templates Nomination to Grant Commit Access Vote to Grant Commit Access Vote Results for Grant of Commit Access Invitation to Accepted Committer Proposal to Remove Commit Access for Inactivity Notification of Commit Removal for Inactivity Proposal to Revoke Commit Access for Detrimental Behavior Behavior Vote to Revoke Commit Access Vote Results for Revocation of Commit Access Notification of Commit Revocation for Detrimental Behavior Development Guide How To Contribute Clone and Provision0 码力 | 1373 页 | 19.37 MB | 1 年前3Cilium v1.10 Documentation
with commit access Granting Commit Access Revoking Commit Access Changing the Policy Voting Company Block Vote Limit Templates Nomination to Grant Commit Access Vote to Grant Commit Access Vote Results for Grant of Commit Access Invitation to Accepted Committer Proposal to Remove Commit Access for Inactivity Notification of Commit Removal for Inactivity Proposal to Revoke Commit Access for Detrimental Behavior Behavior Vote to Revoke Commit Access Vote Results for Revocation of Commit Access Notification of Commit Revocation for Detrimental Behavior Development Guide How To Contribute Clone and Provision0 码力 | 1307 页 | 19.26 MB | 1 年前3鸟哥的 Linux 私房菜:基础学习篇 第四版
前面提到CPU所使用的数据都是来自于内存(main memory),不论是软件程序还是数据, 都必须要读入内存后CPU才能利用。 个人电脑的内存主要元件为动态随机存取内存 (Dynamic Random Access Memory, DRAM), 随机存取内存只有在通电时才能记录与使 用,断电后数据就消失了。因此我们也称这种RAM为挥发性内存。 DRAM根据技术的更新又分好几代,而使用上较广泛的有所谓的SDRAM与DDR 因为第二层高速缓存(L2 cache)整合到CPU内部,因此这个L2内存的速度必须要CPU频率 相同。 使用DRAM是无法达到这个频率速度的,此时就需要静态随机存取内存(Static Random Access Memory, SRAM)的帮忙了。 SRAM在设计上使用的电晶体数量较多,价格 较高,且不易做成大容量,不过由于其速度快, 因此整合到CPU内成为高速缓存内存以加快 数据的存取是个不错的 我们现在所称的电脑是32或64位主要是依据这个 CPU解析的字组大小而 来的! 个人电脑的内存主要元件为动态随机存取内存(Dynamic Random Access Memory, DRAM), 至于CPU内部的第二层高速缓存则使用静态随机存取内存(Static Random Access Memory, SRAM); BIOS(Basic Input Output System)是一套程序,这套程序是写死到主板上面的一个内0 码力 | 1158 页 | 13.73 MB | 1 年前3鸟哥的Linux私房菜:基础学习篇 第四版
前面提到CPU所使用的数据都是来自于内存(main memory),不论是软件程序还是数据,都必须要读入内存后CPU 才能利用。 个人电脑的内存主要元件为动态随机存取内存(Dynamic Random Access Memory, DRAM), 随机 存取内存只有在通电时才能记录与使用,断电后数据就消失了。因此我们也称这种RAM为挥发性内存。 DRAM根据技术的更新又分好几代,而使用上较广泛的有所谓的SDRAM与DDR 因为第二层高速缓存(L2 cache)整合到CPU内部,因此这个L2内存的速度必须要CPU频率相同。 使用DRAM是无法 达到这个频率速度的,此时就需要静态随机存取内存(Static Random Access Memory, SRAM)的帮忙了。 SRAM在设计上使用的电晶体数量较多,价格较高,且不易做成大容量,不过由于其速度快, 因此整合到CPU内成为高 速缓存内存以加快数据的存取是个不错的方 在所称的电脑是32或64位主要是依据这个 CPU解析的字组大小而来的! 个人电脑的内存主要元件为动态随机存取内存(Dynamic Random Access Memory, DRAM), 至于CPU内 部的第二层高速缓存则使用静态随机存取内存(Static Random Access Memory, SRAM); BIOS(Basic Input Output System)是一套程序,这套程序是写死到主板上面的一个内存芯片中,0 码力 | 1057 页 | 14.60 MB | 1 年前3
共 152 条
- 1
- 2
- 3
- 4
- 5
- 6
- 16