Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Using and Administering Linux: Volume 3: Zero to SysAdmin: Network Services
Using and Administering Linux: Volume 3: Zero to SysAdmin: Network Services

Manage complex systems with ease and equip yourself for a new career. This book builds upon the skills you learned in Volumes 1 and 2 of this course and it depends upon the virtual network and virtual machine you created there. 

However, more experienced Linux users can begin with this volume and download an...

Docker Cookbook: Over 100 practical and insightful recipes to build distributed applications with Docker , 2nd Edition
Docker Cookbook: Over 100 practical and insightful recipes to build distributed applications with Docker , 2nd Edition

Leverage Docker to deploying software at scale

Key Features

  • Leverage practical examples to manage containers efficiently
  • Integrate with orchestration tools such as Kubernetes for controlled deployments
  • Learn to implement best practices on improving...
Bash Pocket Reference: Help for Power Users and Sys Admins
Bash Pocket Reference: Help for Power Users and Sys Admins

It’s simple: if you want to interact deeply with Mac OS X, Linux, and other Unix-like systems, you need to know how to work with the Bash shell. This concise little book puts all of the essential information about Bash right at your fingertips.

You’ll quickly find answers to the annoying questions that...

Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
Privileged Attack Vectors: Building Effective Cyber-Defense Strategies to Protect Organizations
See how privileges, passwords, vulnerabilities, and exploits can be combined as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if, but when, your organization will be breached. Attackers target the perimeter network, but, in recent years,...
Foundations of Libvirt Development: How to Set Up and Maintain a Virtual Machine Environment with Python
Foundations of Libvirt Development: How to Set Up and Maintain a Virtual Machine Environment with Python
Discover the essential concepts of libvirt development and see how to interface to Linux virtualization environments, such as QEMU/KVM, XEN, Virtuozzo, VMWare ESX, LXC, Bhyve, and more. This book will prepare you to set up and maintain a virtual machine environment.

You'll start by reviewing
...
Command Line Fundamentals: Learn to use the Unix command-line tools and Bash shell scripting
Command Line Fundamentals: Learn to use the Unix command-line tools and Bash shell scripting

Master shell basics and Unix tools and discover easy commands to perform complex tasks with speed

Key Features

  • Learn why the Bash shell is widely used on Linux and iOS
  • Explore advanced shell concepts, such as pipes and redirection
  • Understand how to use...
Practical Guide to Linux Commands, Editors, and Shell Programming, A (2nd Edition)
Practical Guide to Linux Commands, Editors, and Shell Programming, A (2nd Edition)

For use with all versions of Linux, including Ubuntu,™ Fedora,™ openSUSE,™ Red Hat,® Debian, Mandriva, Mint, and now OS X, too!

  • Get more done faster, and become a true Linux guru by mastering the command line!
  • ...
Mastering Go: Create Golang production applications using network libraries, concurrency, and advanced Go data structures
Mastering Go: Create Golang production applications using network libraries, concurrency, and advanced Go data structures

Exploring the major features and packages of Go, along with its types and data-structures, enabling the reader to write threadsafe, concurrent cloud, and network applications

Key Features

  • Not your typical introduction to the Golang programming language
  • Exploring Golang...
Defensive Security Handbook: Best Practices for Securing Infrastructure
Defensive Security Handbook: Best Practices for Securing Infrastructure

Despite the increase of high-profile hacks, record-breaking data leaks, and ransomware attacks, many organizations don’t have the budget to establish or outsource an information security (InfoSec) program, forcing them to learn on the job. For companies obliged to improvise, this pragmatic guide provides a security-101 handbook...

Linux Complete Command Reference
Linux Complete Command Reference
Compiled by Red Hat Software, Inc., the company that has assembled the most popular x86 installation of Linux, this command reference is massive, authoritative, and as complete as any reference can be. In 1,500 pages of tiny print, this heavy-duty tome documents every command, utility, file system, library function, and administration tool in the...
Cisco Routers for the Small Business: A Practical Guide for IT Professionals (Expert's Voice in Cisco)
Cisco Routers for the Small Business: A Practical Guide for IT Professionals (Expert's Voice in Cisco)
Cisco Routers for the Small Business provides in plain English a no–nonsense approach to setting up all the features of the Cisco IOS for a small business using broadband technologies. This book explains how to use a Cisco router to setup cable modems, DSL and PPPoE, and explains how to configure NAT, Access Control Lists, Firewalls,...
MIPS Assembly Language Programming
MIPS Assembly Language Programming
First impressions are important.

To introduce your Assembly Language programming students to the fundamental concepts of contemporary computer architecture, start with a Reduced Instruction Set Computer (RISC).

When students first encounter computer architecture, they need to begin with the basics of modern...

Result Page: 70 69 68 67 66 65 64 63 62 61 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy