Home | Amazing | Today | Tags | Publishers | Years | Search 
Getting Started with Containerization: Reduce the operational burden on your system by automating and managing your containers
Getting Started with Containerization: Reduce the operational burden on your system by automating and managing your containers

Choose the smarter way to learn about containerizing your applications and running them in production.

Key Features

  • Deploy and manage highly scalable, containerized applications with Kubernetes
  • Build high-availability Kubernetes clusters
  • Secure your...
Practical Node.js: Building Real-World Scalable Web Apps
Practical Node.js: Building Real-World Scalable Web Apps

Learn how to build a wide range of scalable real-world web applications using a professional development toolkit. If you already know the basics of Node.js, now is the time to discover how to bring it to production level by leveraging its vast ecosystem of packages.With this book, you'll work with a varied collection of standards...

Splunk Certified Study Guide: Prepare for the User, Power User, and Enterprise Admin Certifications
Splunk Certified Study Guide: Prepare for the User, Power User, and Enterprise Admin Certifications

Make your Splunk certification easier with this exam study guide that covers the User, Power User, and Enterprise Admin certifications. This book is divided into three parts. The first part focuses on the Splunk User and Power User certifications starting with how to install Splunk, Splunk Processing Language (SPL), field...

Mastering Kubernetes: Large scale container deployment and management
Mastering Kubernetes: Large scale container deployment and management

Master the art of container management utilizing the power of Kubernetes.

About This Book

  • This practical guide demystifies Kubernetes and ensures that your clusters are always available, scalable, and up to date
  • Discover new features such as autoscaling, rolling updates, resource quotas,...
Nessus Network Auditing, Second Edition
Nessus Network Auditing, Second Edition
In the war zone that is the modern Internet, manually reviewing each networked system for security fl aws is no longer feasible. Operating systems, applications, and network protocols have grown so complex over the last decade that it takes a dedicated security administrator to keep even a relatively small network shielded from attack.
...
Virtual Realism
Virtual Realism
From the simple VR games found in upscale video arcades, to the ultimate "immersion"--the CAVE, a surround screen, surround sound system that projects 3 D computer graphics into a ten-foot high cube--virtual reality has introduced what is literally a new dimension of reality to daily life. But it is not without controversy. Indeed, some...
A Developer's Guide to Amazon SimpleDB
A Developer's Guide to Amazon SimpleDB

The Complete Guide to Building Cloud Computing Solutions with Amazon SimpleDB

 

Using SimpleDB, any organization can leverage Amazon Web Services (AWS), Amazon’s powerful cloud-based computing platform–and dramatically reduce the cost...

Host Your Web Site In The Cloud: Amazon Web Services Made Easy: Amazon EC2 Made Easy
Host Your Web Site In The Cloud: Amazon Web Services Made Easy: Amazon EC2 Made Easy

Host Your Web Site On The Cloud is the OFFICIAL step-by-step guide to this revolutionary approach to hosting and managing your websites and applications, authored by Amazon's very own Jeffrey Barr.

"Host Your Web Site in the Cloud" shows you just how easy it is to host your website in the cloud with...

Coupled Model Transformations for QoS Enabled Component-Based Software Design
Coupled Model Transformations for QoS Enabled Component-Based Software Design

Performance-aware Component-based Software-Development A characteristic of an engineering discipline is the ability to predict the impact of design decisions. For example, in civil engineering accurate predictions of the impact of adding an additional ?oor on a construction’s statics are available. Having a similar ability in software...

Radiation Dose from Adult and Pediatric Multidetector Computed Tomography (Medical Radiology / Diagnostic Imaging)
Radiation Dose from Adult and Pediatric Multidetector Computed Tomography (Medical Radiology / Diagnostic Imaging)
The use of computed tomography (CT) has seen enormous growth over the past decade. In the US, approximately 63 million examinations were performed in 2005 (Niagara Health Quality Coalition 2004) compared to 35 million in 2000. The increased number of clinical applications (e.g., in emergency and trauma, paediatric, cardiac, and...
Hands-On Oracle Application Express Security: Building Secure Apex Applications
Hands-On Oracle Application Express Security: Building Secure Apex Applications
AT RECX we’ve been involved in the world of IT Security for more than a decade. We were involved in some of the fi rst penetration tests performed in the UK, where large organizations and government departments allowed ethical hackers into their networks to determine the risk they faced from what are now known as cyber attacks....
Managing Windows Servers with Chef
Managing Windows Servers with Chef

Harness the power of Chef to automate management of Windowsbased systems using handson examples

About This Book

  • Discover how Chef can be used to manage a heterogeneous network of Windows and Linux systems with ease
  • Configure an entire .NET application stack, deploy it, and scale in the...
Result Page: 7 6 5 4 3 2 1 
©2024 LearnIT (support@pdfchm.net) - Privacy Policy