Conventions

In this book, you will find a number of text styles that distinguish between different kinds of information. Here are some examples of these styles and an explanation of their meaning.

Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "DSC operates in a push scenario when configurations are manually pushed to target nodes using the Start-DscConfiguration Cmdlet."

Any command-line input or output is written as follows:

PS C:Examples> .TestExample.ps1

    Directory: C:ExamplesTestExample

Mode                LastWriteTime     Length Name
----                -------------     ------ ----
-a---         5/20/2015   7:28 PM       1136 localhost.mof

Important words are shown in bold and appear in the text like this: "These will typically fail with a generic Access Denied, which will most likely lead you down the wrong path when troubleshooting."

Note

Warnings or important notes appear in a box like this.

Tip

Tips and tricks appear like this.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset