Your data has already been sold... Get it back.
There are so many times when we are online, and we need to make sure that our data is safe. We assume that we are doing a good job with a bit of anti-……続きを見る
Learn how to deploy and test Linux-based Docker containers with the help of real-world use casesKey FeaturesUnderstand how to make a deployment workflow run smoothly with Docker containersLearn Dock……続きを見る
Learn over 116 Linux commands to develop the skills you need to become a professional Linux system administrator
Key Features
Explore essential Linux commands and understand how to use Linux help t……続きを見る
Plan, design, and implement identity and access management solutions with OktaKey FeaturesLearn how to use Okta for complete identity and access management in your organizationUse single sign-on, mu……続きを見る
Panduan Penggunaan Sistem Operasi Free Opensource Manjaro Linux Untuk Pemula Dalam Bahasa Inggris Edisi Ultimate.
Manjaro adalah distribusi linux yang mudah digunakan, berbasis sistem operasi Arch y……続きを見る
Learn how to configure, automate, orchestrate, troubleshoot, and monitor KVM-based environments capable of scaling to private and hybrid cloud modelsKey FeaturesGain expert insights into Linux virtu……続きを見る
Discover how to manage and scale your infrastructure using Infrastructure as Code (IaC) with TerraformKey FeaturesGet up and running with the latest version of Terraform, v0.13Design and manage infr……続きを見る
Apply Kubernetes beyond the basics of Kubernetes clusters by implementing IAM using OIDC and Active Directory, Layer 4 load balancing using MetalLB, advanced service integration, security, auditing,……続きを見る
Gluster Filesystem es un sistema de archivo en red que es escalable, independiente del hardware y con diversos esquemas de estructuración de los datos, lo que le proporciona integraciones importante……続きを見る
Enhance Linux security, application platforms, and virtualization solutions with SELinux 3 to work within your boundaries, your rules, and your policiesKey FeaturesLearn what SELinux is, and how it ……続きを見る
Gluster Filesystem is a scalable network file system, independent of hardware and with various data structuring schemes, which provides important integrations with Hyperconvergence platforms, Contai……続きを見る
Cyberspace is a critical part of our lives. Although we all use cyberspace for work, entertainment, and social life, much of its infrastructure and operation is invisible to us. We spend a big part ……続きを見る
Hoe wapen je jezelf en je gezin tegen cybercriminelen?
Hoe bescherm je je gegevens tegen verlies?
Zijn openbare wifinetwerken veilig?
INCLUSIEF HANDIGE WOORDENLIJST
Ongeveer elke dag worden 24.000 k……続きを見る
Explore various Rust features, data structures, libraries, and toolchain to build modern systems software with the help of hands-on examplesKey FeaturesLearn techniques to design and build system to……続きを見る
Take your AWS SysOps skills to the next level by learning infrastructure automation techniques using CloudFormation, Terraform, and Boto3Key FeaturesBook DescriptionAmazon Web Services (AWS) is one ……続きを見る
著者:Adidas Wilson
出版社: Adidas Wilson
発売日: 2020年11月04日
In origine, il termine “hacker” indicava un programmatore esperto di sistemi operativi per computer e di codice macchina. Oggi si riferisce a chiunque svolga attività di hacking. Per “hacking” si in……続きを見る
221 Linux System Administrator Interview Questions
75 HR Interview Questions
Real life scenario-based questions
Strategies to respond to interview questions
2 Aptitude Tests
Linux System Administr……続きを見る
225 Operating Systems Interview Questions
77 HR Interview Questions
Real life scenario-based questions
Strategies to respond to interview questions
2 Aptitude Tests
Operating Systems Interview Que……続きを見る
Highlights:
Covers Red Hat Enterprise Linux 8
Covers ALL official exam objectives for the RHCSA exam based on Red Hat Enterprise Linux 8
Equally good for self-study and in-class training
81 Step-by……続きを見る
Security, privacy, and trust in the Internet of Things (IoT) and CPS (Cyber-Physical Systems) are different from conventional security as concerns revolve around the collection and aggregation of da……続きを見る
If you are a Linux fan, but not satisfied with the kind of content that various crash courses or tutorial caters. Then this e-book can help optimize your Linux knowledge regardless of your experienc……続きを見る
Turn cyber intelligence into meaningful business decisions and reduce losses from cyber events
Cyber Intelligence-Driven Risk provides a solution to one of the most pressing issues that executives a……続きを見る
Using the SARS-CoV-2/CoVID-19 pandemic as a giant case study, and following the structure of the domains of information security, this book looks at what the crisis teaches us about security. It poi……続きを見る
Focused coverage of every topic on the current version of the CompTIA CySA+ exam
Get on the fast track to becoming CompTIA CySA+ certified with this affordable, portable study tool. Inside, cybersec……続きを見る
The paper concerns about basic Microsoft ISA server and Linux Squid Server configuration As a lot of technicians switch between ISA server and Squid server, I decided to write this paper to present ……続きを見る
UNIX: The Textbook, Third Edition provides a comprehensive introduction to the modern, twenty-first-century UNIX operating system. The book deploys PC-BSD and Solaris, representative systems of the ……続きを見る
The objective of this work is to provide some quick tutorials in computer networking hacking.
The work includes the following tutorials:
Tutorial 1: Setting Up Penetrating Tutorial in Linux.
Tutori……続きを見る
It is common these days for a single system to host many domains, for example uniswa.com and mtn.com or acme .com may run on a single host machine, but behave as if they were on three different host……続きを見る