Reduce the complexity of managing applications on Kubernetes and develop an enterprise pattern for application delivery
Key Features
Learn best practices from the core maintainer of Helm for applic……続きを見る
The utility simply known as make is one of the most enduring features of both Unix and other operating systems. First invented in the 1970s, make still turns up to this day as the central engine in ……続きを見る
This book contains simple step-by-step instructions on how to install free antivirus software programs and free virus and spyware removal programs from your computer. Every recommended software come……続きを見る
Written by members of the development team that maintains Subversion, this is the official guide and reference manual for the popular open source revision control technology. The new edition covers ……続きを見る
A competent system administrator knows that a Linux server is a high performance system for routing large amounts of information through a network connection. Setting up and maintaining a Linux serv……続きを見る
This book is the comprehensive guide to Samba administration, officially adopted by the Samba Team. Wondering how to integrate Samba's authentication with that of a Windows domain? How to get Samba ……続きを見る
Packed with practical advice, this hands-on guide provides valuable information you need to most effectively optimize and manage the XenServer open source virtualization platform. Whether you run a ……続きを見る
Create unique and amazing projects by using the powerful combination of Yocto and Raspberry Pi
About This Book
Set up and configure the Yocto Project efficiently with Raspberry Pi
Deploy multimedia……続きを見る
Run Ansible playbooks to launch complex multi-tier applications hosted in public cloudsKey FeaturesBuild your learning curve using AnsibleAutomate cloud, network, and security infrastructures with e……続きを見る
Master Docker and leverage its power in your day-to-day workflow
Key Features
Explore tools such as Docker Engine, Machine, Compose, and Swarm
Discover how Docker can be integrated into your daily ……続きを見る
Over 150 recipes to leverage Microsoft's open source automation framework and command line shell
Key Features
Work effectively on Windows, Linux, and macOS with PowerShell’s object-oriented approac……続きを見る
A comprehensive introduction to automated application deployment on Kubernetes for beginners
Key Features
Effectively manage applications deployed in Kubernetes using Helm
Learn to install, upgrade……続きを見る
Plan, design, and implement identity and access management solutions with Okta Key Features • Learn how to use Okta for complete identity and access management in your organization • Use single sign……続きを見る
Guidance for successful installation of a wide range of IBM software products
KEY FEATURES
● Complete installation guide of IBM software systems, Redhat Enterprise, IBM Cloud, and Docker.
● Expert-l……続きを見る
Leverage Azure's cloud capabilities to find the most optimized path to meet your firm's cloud infrastructure needs
Key Features
Get to grips with the core Azure infrastructure technologies and solu……続きを見る
Become a Linux Superstar!
What if you could learn about Linux in a simple, easy to follow format?
Can you imagine the doors that will be open to you once you gain that knowledge?
Tracing its roots b……続きを見る
Are you ready to protect your online life but don't know where to start?
From keeping your kids and finances safe on the internet to stopping your sex toys from spying on you, Cybersafe For Humans g……続きを見る
The Fourth Edition of the industry-acclaimed OpenStack Cloud Computing Cookbook, from four recognized experts, updated to the latest OpenStack build including Cinder, Nova, and Neutron. About This B……続きを見る
There is a threat lurking behind every online interaction that was first recognized nearly three decades ago, but very little has been done to fix it. It's only a matter of time before the unimagina……続きを見る
**Alors vous voulez apprendre à hacker les réseaux WiFi ? Ai-je raison ?
Le WiFi est partout et si vous pouvez hacker ces réseaux, cela signifie que vous pouvez tout hacker.
Ou vous voulez simplemen……続きを見る
Welcome to this comprehensive guide to personal cybersecurity. As we navigate our lives in an increasingly digital world, cybersecurity has become a paramount concern. Each click, share, and downloa……続きを見る
Develop expertise in Azure to plan, guide, and lead a streamlined modernization processKey FeaturesExplore core Azure infrastructure technologies and solutionsAchieve smooth app migration and modern……続きを見る
Get to grips with the fundamentals of Zero trust, IAM, and Okta, while learning how to carry out foundational configuration of your own tenants with the help of step-by-step instructionsKey Features……続きを見る
A fast, hands-on introduction to offensive hacking techniques
Hands-On Hacking teaches readers to see through the eyes of their adversary and apply hacking techniques to better understand real-world……続きを見る
What if you could sit down with some of the most talented security engineers in the world and ask any network security question you wanted? Security Power Tools lets you do exactly that! Members of ……続きを見る
Zadbaj o bezpiecze?stwo swojego komputera
Poznaj zagro?enia, na jakie nara?ony jest komputer
Naucz si? kontrolowa? dost?p do komputera
Stosuj techniki zapewniajšce bezpiecze?stwo w sieci
Czy mój k……続きを見る
The popularity of wireless networking has grown exponentially over the past few years, despite a general downward trend in the telecommunications industry. More and more computers and users worldwid……続きを見る
This is the must-have book for a must-know field. Today, general security knowledge is mandatory, and, if you who need to understand the fundamentals, Computer Security Basics 2nd Edition is the boo……続きを見る
Both enterprise and consumer cloud adoption will lead the market into new realms. From the “cloud to the ground,” each chapter of our ebook looks back at the short history of cloud computing from th……続きを見る