 |
|
|
|
|
 Microservices Deployment Cookbook
Key Features
-
Adopt microservices-based architecture and deploy it at scale
-
Build your complete microservice architecture using different recipes for different solutions
-
Identify specific tools for specific scenarios and deliver immediate business results, correlate use cases, and adopt them
... |  |  Pro Data Visualization using R and JavaScript
Pro Data Visualization using R and JavaScript makes the R language approachable, and promotes the idea of data gathering and analysis. You'll see how to use R to interrogate and analyze your data, and then use the D3 JavaScript library to format and display that data in an elegant, informative, and interactive way. You will learn... |  |  Nagios 3 Enterprise Network Monitoring: Including Plug-Ins and Hardware DevicesNagios is an Open Source network, hardware, and application monitoring program. It is designed to inform system administrators of problems on their networks before their clients, end-users or managers do. Nagios is a SysAdmin's best friend. Nagios is installed on over 300,000 machines worldwide, and truly is a global product: approximately 25.6% of... |
|
 |  |  |  |  Practical DevOps
Key Features
-
Get to know the background of DevOps so you understand the collaboration between different aspects of an IT organization and a software developer
-
Improve your organization's performance to ensure smooth production of software and services
-
Deploy top-quality software and
... |
|
 Mac OS X, iPod, and iPhone Forensic Analysis DVD ToolkitThis book and companion DVD provide digital forensic investigators, security professionals, and law enforcement with all of the information, tools, and utilities required to conduct forensic investigations of computers running any variant of the Macintosh OS X operating system, as well as the almost ubiquitous iPod and iPhone. Digital forensic... |  |  Microsoft Windows 2000 Scripting GuideWelcome to the Microsoft® Windows® 2000 Scripting Guide.
As computers and computer networks continue to grow larger and more complex, system administrators continue to face new challenges. Not all that long ago, system administration was limited to managing a... |  |  Hacking Exposed Malware & Rootkits
Malware. In my almost 15 years in information security, malware has become the most powerful tool in a cyber attacker’s arsenal. From sniffing financial records and stealing keystrokes to peer-to-peer networks and auto updating functionality, malware has become the key component in almost all successful attacks. This has not always been... |
|
|
Result Page: 12 11 10 9 8 7 6 5 4 3 |