Catalog Search Results
Author
Series
Language
English
Formats
Description
Whether you're in charge of a small network or a large network, Networking All-in-One is full of the information you'll need to set up a network and keep it functioning. Fully updated to capture the latest Windows 10 releases through Spring 2018, this is the comprehensive guide to setting up, managing, and securing a successful network. Inside, nine minibooks cover essential, up-to-date information for networking in systems such as Windows 10 and...
Author
Publisher
Apress
Pub. Date
2021
Language
English
Description
There is a rapid growth of automation in server rooms and data centers. The days of having many administrators running around busily configuring and maintaining servers are gone and have been replaced with droves of Salt-Minions; agents beavering away on the target nodes ensuring the configuration is as specified. This book covers Salt Open (also known as SaltStack Open) from the ground up and shows you how to work with two Linux distributions. You'll...
Author
Language
English
Formats
Description
"With their rapidly changing architecture and API-driven automation, cloud platforms come with unique security challenges and opportunities. This hands-on book guides you through security best practices for multivendor cloud environments, whether your company plans to move legacy on-premises projects to the cloud or build a new infrastructure from the ground up. Developers, IT architects, and security professionals will learn cloud-specific techniques...
Author
Publisher
PACKT PUBLISHING LIMITED
Pub. Date
2022.
Language
English
Description
Implement Secure Access Service Edge (SASE) for secure network and application communications, exploring SASE services including SD-WAN, ZTF, and more with expert Jeremiah Ginn who helps CxO leaders achieve SASE success Key Features Merge networking and security services into a single architecture to simplify network infrastructure Explore how zero trust network access (ZTNA) restricts access to provide native application segmentation Focus on a native,...
Author
Publisher
Addison-Wesley
Pub. Date
2020.
Language
English
Description
The classic guide to cryptography and network security -- now fully updated! "Alice and Bob are back!" Widely regarded as the most comprehensive yet comprehensible guide to network security and cryptography, the previous editions of Network Security received critical acclaim for lucid and witty explanations of the inner workings of cryptography and network security protocols. In this edition, the authors have significantly updated and revised the...
Author
Publisher
O'Reilly Media, Inc
Pub. Date
[2022]
Language
English
Description
When it comes to system design, failure is inevitable. Scientists and engineers implement solutions based on the available information, without a complete knowledge of the future. You can't always anticipate the next zero-day event, viral media trend, weather disaster, or shift in technology. But you can be prepared to respond when incidents like these affect your systems. With this report, SRE and DevOps practitioners, IT managers, and engineering...
Author
Publisher
McGraw-Hill Education
Pub. Date
[2018]
Language
English
Formats
Description
This professional guide shows, step by step, how to design and deploy highly secure systems on time and within budget. The book offers comprehensive examples, objectives, and best practices and shows how to build and maintain powerful, cost-effective cybersecurity systems. Readers will learn to think strategically, identify the highest priority risks, and apply advanced countermeasures that address the entire attack space. Engineering Trustworthy...
Author
Publisher
No Starch Press, Inc
Language
English
Formats
Description
"Explores common attacks and vulnerabilities that web developers need to look out for. The first half of the book describes security concepts every developer should know ; the second half delves into individual vulnerabilities, such as SQL injection and cross-site scripting, offering real-world examples and code samples"--
Author
Pub. Date
[2018]
Language
English
Appears on list
Formats
Description
"Provides an overview of the essential topics required for entry-level cybersecurity certifications, discussing the concepts and practices within securing the infrastructure, devices, local networks and the perimeter."--Provided by publisher.
Author
Publisher
O'Reilly Media
Pub. Date
2018.
Language
English
Description
Get up speed with Prometheus, the metrics-based monitoring system used by tens of thousands of organisations in production. This practical guide provides application developers, sysadmins, and DevOps practitioners with a hands-on introduction to the important aspects of Prometheus, including infrastructure and application monitoring, dashboarding and alerting, direct code instrumentation, and metric collection from thrid-party systems with exporters....
Author
Series
Language
English
Description
Explore the latest developments in cybersecurity with this essential guide Every day it seems we read another story about one company or another being targeted by cybercriminals. It makes some of us wonder: am I safe online? The good news is that we can all be cybersecure--and it doesn't take a degree in computer science to make it happen! Cybersecurity For Dummies is the down-to-earth guide you need to secure your own data (and your company's, too)....
15) Hacking
Author
Series
Publisher
John Wiley & Sons, Inc
Language
English
Formats
Description
Learn to think like a hacker to secure your own systems and data Your smartphone, laptop, and desktop computer are more important to your life and business than ever before. On top of making your life easier and more productive, they hold sensitive information that should remain private. Luckily for all of us, anyone can learn powerful data privacy and security techniques to keep the bad guys on the outside where they belong. Hacking For Dummies takes...
Author
Publisher
Apress
Pub. Date
2021
Language
English
Description
The need for every professional to have a solid presence on the Internet is more important than ever before. Having a presence beyond an email account, such as a custom web page or web application, usually requires a clumsy assortment of outside services or hiring a dedicated administrator. Thus it is more sensible for the average professional to become adept at managing their own private server. In Set Up and Manage Your Virtual Private Server, author...
Author
Publisher
DPUNKT VERLAG
Pub. Date
2022
Language
Deutsch
Description
Der erste Teil gibt einen kurzen �Uberblick �uber das Thema Monitoring mit Icinga: Von der Installation �uber die grunds�tzliche Konfiguration und einen ersten Blick auf die Benutzeroberfl�che Icinga Web 2 werden alle wichtigen Komponenten erkl�rt.Im zweiten Teil geht es um zu ermittelnde Daten auf unterschiedlichen Betriebsystemen, vor allem Linux und Windows. Er befasst sich damit, wie diese Daten auf dem zu �uberwachenden System ermittelt...
Author
Publisher
O'Reilly
Pub. Date
[2018]
Language
English
Description
Before you can establish great monitoring for your cloud, you have to identify and correct bad habits you may have adopted or observed in your environment. This lesson explains how to watch out for and fix monitoring anti-patterns such as tool obsession, monitoring-as-job, checkbox monitoring, using monitoring as a crutch, and using manual monitoring configuration so that you can foster positive monitoring habits.
Author
Publisher
Dpunkt.verlag
Pub. Date
[2018]
Language
English
Description
»Icinga 2« gibt eine umfassende Einführung in das gleichnamige Monitoringprodukt, das als Fork einer etablierten Lösung für Verfügbarkeitsmonitoring entstanden ist, in Version 2 jedoch mit vielen, meist massiven, Verbesserungen aufwarten kann. Dabei zeigt es Umsteigern von anderen freien Monitoringlösungen genauso wie Monitoring-Neulingen, wie eine Umgebung aufgebaut und Schritt für Schritt immer umfangreicher und umfassender gestaltet wird.Die...
Didn't find it?
Can't find what you are looking for? Try our Materials Request Service. Submit Request