Our website is made possible by displaying online advertisements to our visitors.
Please consider supporting us by disabling your ad blocker.

Download links will be available after you disable the ad blocker and reload the page.
Showing: 1-10 results of 9352


Containers are here and resistance is futile! Now that we're getting our heads around Docker, we need an orchestration platform to help us manage our containerized apps. Kubernetes has emerged as the hottest and most important container orchestration platform in the world. This book gets you up to speed fast, and it's constantly kept up-to-date!

Time is a precious commodity, especially if you're a system administrator. No other job pulls people in so many directions at once. Users interrupt you constantly with requests, preventing you from getting anything done. Your managers want you to get long-term projects done but flood you with requests for quick-fixes that prevent you from ever getting to those long-term projects. But the pressure is on you to produce... more...

Prepare for a career in network administration using Microsoft Windows 10 with the real-world examples and hands-on activities that reinforce key concepts in MICROSOFT SPECIALIST GUIDE TO MICROSOFT WINDOWS 10. This book also features troubleshooting tips for solutions to common problems that you will encounter in Windows 10 administration. This book's in-depth study focuses on all of the functions and features of installing, configuring, and... more...

This essential resource for software developers highlights the weak points in "well-protected" software, shows how crackers break common protection schemes, and how to defend against crackers. Includes in-depth discussions of anti-debugging and anti-disassembling. The CD-ROM contains compression and encoding software, debuggers and anti-debugging tricks, practical protection demonstrations, and extended examples from... more...


Any good attacker will tell you that expensive security monitoring and prevention tools aren’t enough to keep you secure. This practical book demonstrates a data-centric approach to distilling complex security monitoring, incident response, and threat analysis ideas into their most basic elements. You’ll learn how to develop your own threat intelligence and incident detection strategy, rather than depend on... more...

This book will focus upon Mining and Analyzing social network. Some chapters in this book are extended from the papers that pre-sented in MSNDS2009 (the First International Workshop on Mining Social Networks for Decision Support) and SNMABA2009 ((The International Workshop on Social Networks Mining and Analysis for Business Applications)). In addition, we also sent invitations to researchers that are famous in this research area to contribute for this... more...

Migrate to a dynamic, on-demand data delivery platform"If you're looking to hit the ground running with any virtualization project, large or small, this book is going to give you the start you need, and along the way will offer you some cautionary tales that will even take some seasoned virtualization veterans by surprise." --From the foreword by Chris Wolf, Senior Analyst, Burton GroupTransform your IT infrastructure into a leaner, greener datacenter... more...

Over 80 delicious recipes to automate your cloud and server infrastructure with Chef Overview Configure, deploy, and scale your applications Automate error prone and tedious manual tasks Manage your servers on-site or in the cloud Solve real world automation challenges with task-based recipes The book is filled with working code and easy-to-follow, step-by-step instructions In Detail Irrespective of... more...

Description are not available