 |
|
|
 Mastering Citrix XenServer
Design and implement highly optimized virtualization solutions using Citrix® XenServer® 6.2
About This Book
-
Master mission-critical aspects of virtualization to develop, deploy, and administer virtual infrastructures
-
Integrate Citrix XenServer with OpenStack and CloudStack to...
|  |  OAuth 2.0 Identity and Access Management Patterns
Want to learn the world’s most widely used authorization framework? This tutorial will have you implementing secure Oauth 2.0 grant flows without delay. Written for practical application and clear instruction, it’s the complete guide.
Overview
-
Build web, client-side, desktop, and server-side...
|  |  Social Engineering: The Art of Human Hacking
The first book to reveal and dissect the technical aspect of many social engineering maneuvers
From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the... |
|
|
 Docker in Action
Summary
Docker in Action teaches readers how to create, deploy, and manage applications hosted in Docker containers.
Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.
About the Technology
The idea behind... |  |  |  |  Extending Docker
Key Features
-
Get the first book on the market that shows you how to extend the capabilities of Docker using plugins and third-party tools
-
Master the skills of creating various plugins and integrating great tools in order to enhance the functionalities of Docker
-
A practical and learning guide
... |
|
Result Page: 15 14 13 12 11 10 9 8 7 6 5 4 3 2 1 |