- Disaster Recovery Using VMware vSphere Replication and vCenter Site Recovery Manager
- Abhilash GB
- 159字
- 2021-07-16 11:48:51
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "For instance, if you were protecting the SQL Server VMs, then you might name the protection group as SQL Server Protection Group
."
Any command-line input or output is written as follows:
For instance, to run a batch script in D:\demoscript.bat
, include the following command:
c:\windows\system32\cmd.exe /c d:\demoscript.bat
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "Click on Recovery Plans on the left pane."
- 數字身份與元宇宙信任治理
- Kali Linux CTF Blueprints
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- Web安全與攻防入門很輕松(實戰超值版)
- 安全技術運營:方法與實踐
- 反黑命令與攻防從新手到高手(微課超值版)
- Learning Veeam? Backup & Replication for VMware vSphere
- Learning Devise for Rails
- Spring Security(Third Edition)
- 博弈論與數據安全
- Kali Linux高級滲透測試(原書第4版)
- 黑客攻防從入門到精通:命令版
- 信息組織
- 5G網絡安全規劃與實踐
- ATT&CK視角下的紅藍對抗實戰指南