- Hyper-V Security
- Eric Siron Andy Syrewicze
- 191字
- 2021-08-05 16:48:30
Conventions
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "The cmdlet to check the installation status of items is Get-WindowsFeature
."
A block of code is set as follows:
$TargetSystems = "svhv1", "svhv2" $ScriptBlock = { $StoppedStates = "Off", "Saved" $StoppedVMs = Get?VM | where { $_.State ?in $StoppedStates } $StoppedVMs | Start?VM $StoppedVMs | select Name }
Any command-line input or output is written as follows:
certutil –viewstore My certutil –viewstore Root
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "Turn it off on the Features page of the Add Roles and Features wizard in Server Manager."
Note
Warnings or important notes appear in a box like this.
Tip
Tips and tricks appear like this.
- 火格局的時空變異及其在電網防火中的應用
- 高性能混合信號ARM:ADuC7xxx原理與應用開發
- 自動化控制工程設計
- Data Wrangling with Python
- Linux:Powerful Server Administration
- OpenStack Cloud Computing Cookbook
- Blender 3D Printing by Example
- PVCBOT機器人控制技術入門
- 大數據技術基礎:基于Hadoop與Spark
- Building a BeagleBone Black Super Cluster
- INSTANT Munin Plugin Starter
- 3ds Max造型表現藝術
- 計算智能算法及其生產調度應用
- 穿越計算機的迷霧
- Raspberry Pi Projects for Kids