Published by : minhchick | Views: 90 | Category: Tutorials | Date: 9-04-2020
How to Catch and Ride Extended Waves

How to Catch and Ride Extended Waves
English | Size: 15.36 GB
Genre: eLearning



Read More     
Dislike 0 Like
Published by : voska89 | Views: 136 | Category: Tutorials | Date: 9-04-2020

The Freelancers Cheatsheet Make Upwork Clients CHASE YOU!
The Freelancers Cheatsheet: Make Upwork Clients CHASE YOU!
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 48000 Hz, 2ch | Size: 458 MB
Genre: eLearning Video | Duration: 10 lectures (1 hour, 15 mins) | Language: English



Read More     
Dislike 0 Like
Published by : voska89 | Views: 92 | Category: Tutorials | Date: 9-04-2020

Reduce Anxiety While in Isolation
Reduce Anxiety While in Isolation
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 48000 Hz, 2ch | Size: 446 MB
Genre: eLearning Video | Duration: 7 lectures (2 hour, 4 mins) | Language: English



Read More     
Dislike 0 Like
Published by : Link_ | Views: 113 | Category: Tutorials | Date: 9-04-2020
Boudoir Photography Workshop by James Schmelzer ..





Boudoir Photography Workshop by James Schmelzer ..


English | Video: 1080p
http://jamesschmelzerworkshops.com/workshops/





Read More     
Dislike -1 Like
Published by : minhchick | Views: 118 | Category: Tutorials / IT Technology | Date: 9-04-2020
Cloud Academy - Introduction to Azure Container Service ACS

Cloud Academy - Introduction to Azure Container Service ACS-STM
English | Size: 798.50 MB
Category: Tutorial

The Azure Container Service (ACS) is a cloud-based container deployment and management service that supports popular open source tools and technologies for container and container orchestration. ACS allows you to run containers at scale in production and manages the underlying infrastructure for you by configuring the appropriate VMs and clusters for you. ACS is orchestrator agnostic and allows you to use the container orchestration solution that best suits your needs. Learn how to use ACS to scale and orchestrate applications using DC/OS, Docker Swarm, or Kubernetes


Read More     
Dislike 0 Like
Published by : voska89 | Views: 155 | Category: Tutorials | Date: 9-04-2020

Python Network Programming for Network Engineers (Python 3)
Python Network Programming for Network Engineers (Python 3)
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch | Size: 2.68 GB
Genre: eLearning Video | Duration: 170 lectures (11 hour, 25 mins) | Language: English



Read More     
Dislike 0 Like
Published by : Link_ | Views: 115 | Category: Tutorials | Date: 9-04-2020
Edit like Ronny Garcia 13 (Psd file + Video tutorial) ..


Edit like Ronny Garcia 13 (Psd file + Video tutorial) ..


https://sellfy.com/p/tmjdv5/





Read More     
Dislike 0 Like
Published by : voska89 | Views: 94 | Category: Tutorials | Date: 9-04-2020

Python 3 Bootcamp Hands On Guide To Learn Python
Python 3 Bootcamp: Hands On Guide To Learn Python
Video: .mp4 (1280x720, 30 fps(r)) | Audio: aac, 44100 Hz, 2ch | Size: 115 MB
Genre: eLearning Video | Duration: 5 lectures (35 mins) | Language: English



Read More     
Dislike 0 Like
Published by : minhchick | Views: 100 | Category: Tutorials / IT Technology | Date: 9-04-2020
Cloud Academy - Implementing Multi Factor Authentication on Azure

Cloud Academy - Implementing Multi Factor Authentication on Azure-STM
English | Size: 549.74 MB
Category: Tutorial

Multi-factor authentication or MFA is no longer optional and it is paramount that you protect not only your privileged accounts but enable it for all accounts. Azure Active Directory offers the ability to secure your identities with an additional authentication method Verification of your identity can be done via an automated voice call, text message, through the Microsoft Authenticator app, or with a verification code Azure multi-factor authentication can be enforced using different methods. We will configure the user settings to give the ability to a user to report fraudulent attempts on their accounts. We will also review how an administrator can provide a one-time bypass code and whitelist trusted locations to bypass the two-step verification. Lastly, you will see how to configure Azure Active Directory conditional access to enforce MFA on cloud-based applications


Read More     
Dislike 0 Like
← Previous    1 2 3 4 5 6 7 8 9 10 ... 78    Next →