 Defensive Security Handbook: Best Practices for Securing Infrastructure
Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook... |  |  Practical Linux Security Cookbook
Key Features
-
This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster.
-
More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network
-
Enhance file system security and local and remote
... |  |  Native Docker Clustering with Swarm
Key Features
-
Get to grips with Docker Swarm, one of the key components of the Docker ecosystem.
-
Optimize Swarm and SwarmKit features for scaling massive applications through containers.
-
Learn about Docker’s scheduling tricks, high availability, security, and platform scalability.
... |