Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
CoreOS in Action: Running Applications on Container Linux
CoreOS in Action: Running Applications on Container Linux

Summary

CoreOS in Action is a clear tutorial for deploying container-based systems on CoreOS Container Linux.

Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.

About the Technology

Traditional Linux...

Fruit and Vegetable Gardening
Fruit and Vegetable Gardening

Whether you have a kitchen garden, a spot in a community garden, a small vegetable patch, or just a collection of pots and window boxes, Fruit & Vegetable Gardening is an essential, comprehensive guidebook for growing your own fruits and veggies.

Offering all the basics, from soil preparation and organic manures, to...

Metasploit Penetration Testing Cookbook
Metasploit Penetration Testing Cookbook

Penetration testing is one of the core aspects of network security in today's scenario. It involves a complete analysis of the system by implementing real-life security tests. It helps in identifying potential weaknesses in the system's major components which can occur either in its hardware or software. The reason which makes...

Practical Linux Security Cookbook
Practical Linux Security Cookbook

Key Features

  • This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
  • More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
  • Enhance file system security and local and remote...
Debugging Linux Systems
Debugging Linux Systems

Debugging Linux Systems discusses the main tools available today to debug 2.6 Linux Kernels. We start by exploring the seemingly esoteric operations of the Kernel Debugger (KDB), Kernel GNU DeBugger (KGDB), the plain GNU DeBugger (GDB), and JTAG debuggers. We then investigate Kernel Probes, a feature that lets you intrude into a kernel...

Human Ear Recognition by Computer (Advances in Pattern Recognition)
Human Ear Recognition by Computer (Advances in Pattern Recognition)

Biometrics deals with recognition of individuals based on their physiological or behavioral characteristics. The human ear is a new feature in biometrics that has several merits over the more common face, fingerprint and iris biometrics. Unlike the fingerprint and iris, it can be easily captured from a distance without a fully cooperative...

MCSA/MCSE: Windows Server 2003 Network Security Administration Study Guide (70-299)
MCSA/MCSE: Windows Server 2003 Network Security Administration Study Guide (70-299)
Here's the book you need to prepare for the Implementing and Administering Security in a Microsoft Windows Server 2003 Network exam (70-299). This Study Guide was developed to meet the exacting requirements of today's certification candidates. In addition to the consistent and...
Windows Server 2003 Security Cookbook
Windows Server 2003 Security Cookbook
In the last few years, security has become a hot-button issue for IT organizations of all sizes. Accordingly, many of the security features that were either optional or suspect in Windows 2000 have become solid, effective fixtures in Windows Server 2003-making it the most secure operating system Microsoft has ever produced. That is, if you know...
SQL Server Tacklebox Essential tools and scripts for the day-to-day DBA
SQL Server Tacklebox Essential tools and scripts for the day-to-day DBA

For the day-to-day DBA, there are dangers around every corner; monsters waiting to strike down the unsuspecting database with a resource-hungry query, an inefficient data load, or even outright data corruption. When the worst happens, and SQL Server is down, or performance is suffering, customers are quick to complain.. During such difficult...

Comparing and Merging Files with GNU diff and patch
Comparing and Merging Files with GNU diff and patch
This manual describes how to use GNU diff and patch to compare and merge files.

GNU diff and patch are free software. The term "free software" is sometimes misunderstood — it has nothing to do with price. It is about freedom. It refers to your freedom to run, copy, distribute, study, change and improve the software. With
...
Joomla! 1.5 SEO
Joomla! 1.5 SEO
Some sites always appear at the top of a search result while others fail to even make it to the top ten. Wouldn't you want to see your site on the first page of any search result? This is not easily feasible if you are depending solely on the marketing guys whom you hire for SEO.

Joomla! SEO will help you to attract more visitors and
...
Absolute BSD: The Ultimate Guide to FreeBSD
Absolute BSD: The Ultimate Guide to FreeBSD
    Welcome to Absolute BSD! This book is a one-stop shop for new UNIX administrators who want to build, configure, and manage dedicated FreeBSD servers. It will also be useful for those folks who want to run FreeBSD on their desktop or combined desktop/server systems.
    By the time you finish this book, you
...
Result Page: 8 7 6 5 4 3 2 1 
©2018 LearnIT (support@pdfchm.net) - Privacy Policy