Microservices Deployment Cookbook
Adopt microservices-based architecture and deploy it at scale
Build your complete microservice architecture using different recipes for different solutions
Identify specific tools for specific scenarios and deliver immediate business results, correlate use cases, and adopt them
Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware Devices Nagios is an Open Source network, hardware, and application monitoring program. It is designed to inform system administrators of problems on their networks before their clients, end-users or managers do. Nagios is a SysAdmin's best friend. Nagios is installed on over 300,000 machines worldwide, and truly is a global product: approximately 25.6% of...
Get to know the background of DevOps so you understand the collaboration between different aspects of an IT organization and a software developer
Improve your organization's performance to ensure smooth production of software and services
Deploy top-quality software and
Mac OS X, iPod, and iPhone Forensic Analysis DVD Toolkit This book and companion DVD provide digital forensic investigators, security professionals, and law enforcement with all of the information, tools, and utilities required to conduct forensic investigations of computers running any variant of the Macintosh OS X operating system, as well as the almost ubiquitous iPod and iPhone. Digital forensic... Microsoft Windows 2000 Scripting Guide
Welcome to the Microsoft® Windows® 2000 Scripting Guide.
As computers and computer networks continue to grow larger and more complex, system administrators continue to face new challenges. Not all that long ago, system administration was limited to managing a...
Hacking Exposed Malware & Rootkits
Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been...
|Result Page: 12 11 10 9 8 7 6 5 4 3 |