In their early days, Twitter, Flickr, Etsy, and many other companies experienced sudden spikes in activity that took their web services down in minutes. Today, determining how much capacity you need……続きを見る
A practical guide to rapidly and efficiently mastering Docker containers, along with tips and tricks learned in the field. Key Features- Use Docker containers, horizontal node scaling, modern orches……続きを見る
Manage on-premises and cloud IT assets from one consoleKey FeaturesEmpower yourself with practical recipes to collect and analyze operational insights on Windows and Linux servers in your on premise……続きを見る
Over 60 powerful recipes to scan, exploit, and crack wireless networks for ethical purposesKey FeaturesExpose wireless security threats through the eyes of an attacker,Recipes to help you proactivel……続きを見る
Puppet 5 Beginner's Guide, Third Edition is a practical guide that gets you up and running with the very latest features of Puppet 5.Key Features\* Develop skills to run Puppet 5 on single or multip……続きを見る
This book is written for computer users who want a reference detailed enough to help them to learn about Ubuntu MATE and its applications and to build their confidence and competence in using them t……続きを見る
Over 120 recipes to perform advanced penetration testing with Kali LinuxKey FeaturesPractical recipes to conduct effective penetration testing using the powerful Kali LinuxLeverage tools like Metasp……続きを見る
Le premier livre qui traite à la fois de Linux et de LibreOffice, spécialement conçu pour les administrations et les entreprises !
Toutes les clés pour installer et maîtriser Linux, le système d'exp……続きを見る
Arduino for the Cloud considers the Arduino Yun and the Dragino Yun Shield as components closing the gap between a typical microcontroller application and connection to the cloud. Arduino Yun combin……続きを見る
Over 50+ hands-on recipes to help you pen test networks using Python, discover vulnerabilities, and find a recovery pathKey FeaturesLearn to detect and avoid various types of attack that put system ……続きを見る
A comprehensive guide to mastering the art of preventing your Linux system from getting compromised.Key FeaturesLeverage this guide to confidently deliver a system that reduces the risk of being hac……続きを見る
Cybercrime is on track to become a six trillion dollar problem by 2021. After the Equifax breach, cybercrime advisors are alerting citizens that they should assume their personal information is in t……続きを見る
Malware Data Science explains how to identify, analyze, and classify large-scale malware using machine learning and data visualization.
Security has become a "big data" problem. The growth rate of m……続きを見る
Exploit the secrets of Metasploit to master the art of penetration testing.
About This Book
Discover techniques to integrate Metasploit with the industry's leading tools
Carry out penetration testi……続きを見る
The threat landscape is developing at such a rate that traditional IT security controls can no longer protect us. Legacy IT security mechanisms deal with rules and signatures for known threats comin……続きを見る
Computer System and Network Security provides the reader with a basic understanding of the issues involved in the security of computer systems and networks. Introductory in nature, this important ne……続きを見る
The name of this book ubuntu using hacking this books wrote is a indian author Meet Chauhan with the help of this books you can easily learn ethical hacking and check security and Computer Technolog……続きを見る
Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holesKey Features\[\*\] Know how to set up your ……続きを見る
Este pequeño libro examina los riesgos de algunas prácticas de computación en internet y en las redes sociales. Nuestra informacion confidencial es perjudicada cada vez que entramos en el ciberespac……続きを見る
Cybercrimes are easier than ever to pull off. No global police force exists to go after these criminals, so cybercrimes are increasing exponentially year after year. The FBI estimates that over twel……続きを見る
Use a forty-dollar credit card–sized computer to enhance your amateur radio operating. Learn how to set up and configure the computer. Then learn how to install operating aids, such as logging, time……続きを見る
Abstract:
This paper is a step-by-step “how to” guide for configuring of Openldap server, Kerberos server and shows the procedure for authentication of Linux Machine to Active Directory. The paper p……続きを見る
This work is a step-by-step “how to” guide for configuring Samba file server, Quota and
scheduled backup of important files. The paper provides an installation guide for,
Samba server.
Quota.
……続きを見る
Learn to confidently develop, debug, and deploy robust embedded Linux systems with hands-on examples using BeagleBone and QEMUKey FeaturesStep-by-step guide from toolchain setup to real-time program……続きを見る
Run Ansible playbooks to launch complex multi-tier applications hosted in public cloudsKey FeaturesBuild your learning curve using AnsibleAutomate cloud, network, and security infrastructures with e……続きを見る
Enhance your software deployment workflow using containersKey Features?Get up-and-running with basic to advanced concepts of Docker?Get acquainted with concepts such as Docker containers, Docker ima……続きを見る
Test your C++ programming skills by solving real-world programming problems covered in the bookKey Features\[\*\] Solve a variety of real-world programming and logic problems by leveraging the power……続きを見る
Dieses Buch ist eine umfangreiche Anleitung und Hilfe für alle IT-Forensiker, Daten-Analysten und in-teressierten Mac-Nutzer, die erfahren wollen, welche unentdeckten Möglichkeiten im Apple-Betriebs……続きを見る
Break through the practice of writing tedious code with shell scriptsKey FeaturesLearn to impeccably build shell scripts and develop advanced applicationsCreate smart solutions by writing and debugg……続きを見る