Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Docker Cookbook: Over 100 practical and insightful recipes to build distributed applications with Docker , 2nd Edition
Docker Cookbook: Over 100 practical and insightful recipes to build distributed applications with Docker , 2nd Edition

Leverage Docker to deploying software at scale

Key Features

  • Leverage practical examples to manage containers efficiently
  • Integrate with orchestration tools such as Kubernetes for controlled deployments
  • Learn to implement best practices on improving...
Foundations of Libvirt Development: How to Set Up and Maintain a Virtual Machine Environment with Python
Foundations of Libvirt Development: How to Set Up and Maintain a Virtual Machine Environment with Python
Discover the essential concepts of libvirt development and see how to interface to Linux virtualization environments, such as QEMU/KVM, XEN, Virtuozzo, VMWare ESX, LXC, Bhyve, and more. This book will prepare you to set up and maintain a virtual machine environment.

You'll start by reviewing
...
Hands-On Enterprise Automation with Python.: Automate common administrative and security tasks with Python
Hands-On Enterprise Automation with Python.: Automate common administrative and security tasks with Python

Invent your own Python scripts to automate your infrastructure

Key Features

  • Make the most of Python libraries and modules to automate your infrastructure
  • Leverage Python programming to automate server configurations and administration tasks
  • Efficiently...
Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions
Cybersecurity: Managing Systems, Conducting Testing, and Investigating Intrusions

A must-have, hands-on guide for working in the cybersecurity profession

Cybersecurity involves preventative methods to protect information from attacks. It requires a thorough understanding of potential threats, such as viruses and other malicious code, as well as system vulnerability and security architecture. This...

Pro Hyper-V (Expert's Voice in Virtualization)
Pro Hyper-V (Expert's Voice in Virtualization)
Companies of all sizes worldwide are looking to virtualization to change the way data centers operate. Server consolidation, energy efficiency, simpler management, and deployment and increased capacity are all tangible benefits to be gained from a move to virtual servers and virtually hosted services. Microsoft has introduced Hyper–V, a...
Mastering Windows Server 2016 Hyper-V
Mastering Windows Server 2016 Hyper-V

Build a seamless, flexible, full-service datacenter solution

Microsoft Windows Server 2016 Hyper-V is the IT administrator's guide to this rising datacenter solution. Hyper-V has already surpassed VMWare in datacenter management, identity service for multiple devices, and more; this book shows you how to harness...

Networking: A Beginner's Guide, Sixth Edition
Networking: A Beginner's Guide, Sixth Edition

Current, essential IT networking skills--made easy!

Thoroughly revised to cover the latest technologies, this practical resource provides you with a solid foundation in networking fundamentals. Networking: A Beginner's Guide, Sixth Edition discusses wired and wireless network design, configuration, hardware, protocols,...

Networking, A Beginner's Guide, Fifth Edition (Networking Professional's Library)
Networking, A Beginner's Guide, Fifth Edition (Networking Professional's Library)

A practical guide to networking fundamentals

Fully up to date with the latest technologies, this introductory handbook covers wired and wireless network design, configuration, hardware, protocols, security, backup, recovery, virtualization, and more. After laying the groundwork, Networking: A Beginner's Guide, Fifth...

Red Hat Linux Bible: Fedora and Enterprise Edition
Red Hat Linux Bible: Fedora and Enterprise Edition
Use this comprehensive guide to harness the power of Red Hat Linux on a server, desktop, or laptop computer. Coverage includes desktop and server basics, simple, painless installations, Linux Shell, using VmWare, VNC, and more.

If Red Hat Linux can do it, you can do it too…

With Red Hat Linux separating into the open source...

Guide to Network Defense and Countermeasures
Guide to Network Defense and Countermeasures
This book is intended to provide students and professionals with a solid foundation in the fundamentals of advanced network security. The previous edition of this book placed significant emphasis on intrusion detection, but this edition aims to provide a more balanced approach to the topic of network defense and countermeasures. As...
CompTIA Network+ N10-006 Cert Guide
CompTIA Network+ N10-006 Cert Guide

This approved study guide helps you master topics on the CompTIA Network+ N10-006 exam, including the following:

  •  Computer network fundamentals
  • The OSI model and TCP/IP stack
  • ...
Honeypots and Routers: Collecting Internet Attacks
Honeypots and Routers: Collecting Internet Attacks

As the number of Internet-based consumer transactions continues to rise, the need to protect these transactions against hacking becomes more and more critical. An effective approach to securing information on the Internet is to analyze the signature of attacks in order to build a defensive strategy. This book explains how to...

Result Page: 11 10 9 8 7 6 5 4 3 2 
©2019 LearnIT (support@pdfchm.net) - Privacy Policy