8 resultater (0,27941 sekunder)

Mærke

Butik

Pris (EUR)

Nulstil filter

Produkter
Fra
Butikker

Certified OpenStack Administrator Study Guide - Andrey Markelov - Bog - APress - Plusbog.dk

The Business Value of Developer Relations - Mary Thengvall - Bog - APress - Plusbog.dk

The Business Value of Developer Relations - Mary Thengvall - Bog - APress - Plusbog.dk

Discover the true value of Developer Relations as you learn to build and maintain positive relationships with your developer community. Use the principles laid out in this book to walk through your company goals and discover how you can formulate a plan tailored to your specific needs. First you will understand the value of a technical community: why you need to foster a community and how to do it. Then you will learn how to be involved in community building on a daily basis: finding the right audience, walking the tightrope between representing the company and building a personal brand, in-person events, and more. Featuring interviews with Developer Relations professionals from many successful companies including Red Hat, Google, Chef, Docker, Mozilla, SparkPost, Heroku, Twilio, CoreOS, and more, and with a foreword by Jono Bacon, The Business Value of Developer Relations is the perfect book for anyone who is working in the tech industry and wants to understand where DevRel is now and how to get involved. Don''t get left behind - join the community today. What You''ll Learn - Define community and sell community to your company - Find, build, and engage with the community - Determine how and when to hire community managers - Build your own personal brand Who This Book Is For Any business leaders/owners/stakeholders in the tech industry, tech evangelists, community managers or developer advocates.

DKK 455.00
1

Pro Linux System Administration - James Turnbull - Bog - APress - Plusbog.dk

Pro Linux System Administration - James Turnbull - Bog - APress - Plusbog.dk

Implement a SOHO or SMB Linux infrastructure to expand your business and associated IT capabilities. Backed by the expertise and experienced guidance of the authors, this book provides everything you need to move your business forward. Pro Linux System Administration makes it easy for small- to medium-sized businesses to enter the world of zero-cost software running on Linux and covers all the distros you might want to use, including Red Hat, Ubuntu, Debian, and CentOS. Pro Linux System Administration takes a layered, component-based approach to open source business systems, while training system administrators as the builders of business infrastructure. Completely updated for this second edition, Dennis Matotek takes you through an infrastructure-as-code approach, seamlessly taking you through steps along the journey of Linux administration with all you need to master complex systems. This edition now includes Jenkins, Ansible, Logstash and more. What You''ll Learn: - Understand Linux architecture - Build, back up, and recover Linux servers - Create basic networks and network services with Linux - Build and implement Linux infrastructure and services including mail, web, databases, and file and print - Implement Linux security - Resolve Linux performance and capacity planning issues Who This Book Is For: Small to medium-sized business owners looking to run their own IT, system administrators considering migrating to Linux, and IT systems integrators looking for an extensible Linux infrastructure management approach. -

DKK 450.00
1

Numerical Python - Robert Johansson - Bog - APress - Plusbog.dk

Numerical Python - Robert Johansson - Bog - APress - Plusbog.dk

Leverage the numerical and mathematical modules in Python and its standard library as well as popular open source numerical Python packages like NumPy, SciPy, FiPy, matplotlib and more. This fully revised edition, updated with the latest details of each package and changes to Jupyter projects, demonstrates how to numerically compute solutions and mathematically model applications in big data, cloud computing, financial engineering, business management and more. Numerical Python, Second Edition , presents many brand-new case study examples of applications in data science and statistics using Python, along with extensions to many previous examples. Each of these demonstrates the power of Python for rapid development and exploratory computing due to its simple and high-level syntax and multiple options for data analysis. After reading this book, readers will be familiar with many computing techniques including array-based and symbolic computing, visualization and numerical file I/O, equation solving, optimization, interpolation and integration, and domain-specific computational problems, such as differential equation solving, data analysis, statistical modeling and machine learning. W hat You''ll Learn - Work with vectors and matrices using NumPy - Plot and visualize data with Matplotlib - Perform data analysis tasks with Pandas and SciPy - Review statistical modeling and machine learning with statsmodels and scikit-learn - Optimize Python code using Numba and Cython Who This Book Is For Developers who want to understand how to use Python and its related ecosystem for numerical computing.

DKK 495.00
1

Deploying SharePoint 2019 - Vlad Catrinescu - Bog - APress - Plusbog.dk

Deploying SharePoint 2019 - Vlad Catrinescu - Bog - APress - Plusbog.dk

Update to a version of SharePoint that offers the best of both on-premise and the cloud using SharePoint 2019, the latest release of this cornerstone technology from Microsoft. Don your technical learning hat to get up close and confident on the new time-saving modern features of on-premise, and the many new security and hybrid settings. Deploying SharePoint 2019 begins with a general introduction to SharePoint 2019, covering new features and expanding your knowledge and capability with the technology systematically. You will learn about the new world of SharePoint, and how it was "cloud-born" from Office 365. From there you will dive into learning how to design a physical architecture for SharePoint Server 2019 and get familiar with the key concepts of high availability (HA) and disaster recovery (DR) solutions. What You''ll Learn - Install, configure, and optimize SharePoint 2019 - Understand SharePoint 2019 as a hybrid framework - Get comfortable with new tools, such as Flow, PowerApps, and Power BI - Configure systems connected to SharePoint, such as Office Online Server and Workflow Manager - Migrate content and service databases from previous versions of SharePoint to SharePoint 2019 - Implement HA and DR topologies with SharePoint 2019 to satisfy business continuity requirements Who This Book Is For Those tasked with installing, configuring, and maintaining SharePoint Server 2019 for their organization. This book assumes some working knowledge of a previous release of SharePoint Server, such as SharePoint 2013 or SharePoint 2016.

DKK 476.00
1

Bug Bounty Hunting for Web Security - Sanjib Sinha - Bog - APress - Plusbog.dk

Bug Bounty Hunting for Web Security - Sanjib Sinha - Bog - APress - Plusbog.dk

Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your virtual lab. You will then discover how request forgery injection works on web pages and applications in a mission-critical setup. Moving on to the most challenging task for any web application, you will take a look at how cross-site scripting works and find out about effective ways to exploit it. You will then learn about header injection and URL redirection along with key tips to find vulnerabilities in them. Keeping in mind how attackers can deface your website, you will work with malicious files and automate your approach to defend against these attacks. Moving on to Sender Policy Framework (SPF), you will see tips to find vulnerabilities in it and exploit them. Following this, you will get to know how unintended XML injection and command injection work to keep attackers at bay. Finally, you will examine different attack vectors used to exploit HTML and SQL injection. Overall, Bug Bounty Hunting for Web Security will help you become a better penetration tester and at the same time it will teach you how to earn bounty by hunting bugs in web applications. What You Will Learn - - Implement an offensive approach to bug hunting - Create and manage request forgery on web pages - Poison Sender Policy Framework and exploit it - Defend against cross-site scripting (XSS) attacks - Inject headers and test URL redirection - Work with malicious files and command injection - Resist strongly unintended XML attacks Who This Book Is For White-hat hacking enthusiasts who are new to bug hunting and are interested in understanding the core concepts.

DKK 476.00
1

Cisco Networks - Chris Carthern - Bog - APress - Plusbog.dk

Cisco Networks - Chris Carthern - Bog - APress - Plusbog.dk

For beginning and experienced network engineers tasked with building LAN, WAN, and data center connections, this book lays out clear directions for installing, configuring, and troubleshooting networks with Cisco devices. Cisco Networks, 2nd Edition is a practical guide and desk reference for Cisco engineers. This new edition will discuss tools that can be used to automate and troubleshoot networks. A new chapter on quality of service has been added to teach managing network resources by prioritizing specific types of network traffic. The new edition has an updated wireless section which focuses on an updated controller and integration with Cisco Identity Services Engine (ISE) and Cisco Prime Infrastructure. This practical desk companion doubles as a comprehensive overview of the basic knowledge and skills needed by CCNA and CCNP exam takers. Prior familiarity with Cisco routing and switching is desirable but not necessary, as Chris Carthern, Dr. Will Wilson, and Noel Rivera start their book with a review of network basics. Further they explain practical considerations and troubleshooting when establishing a physical medium for network communications. Later they explain the concept of network layers, intermediate LAN switching, and routing. Next they introduce you to the tools and automation used with Cisco networks. Moving forward they explain management planes, data planes, and control planes. Next they describe advanced security, trouble shooting, and network management. They conclude the book with a section which focuses on using network automation to automate Cisco IOS networks. What You Will Learn - Configure Cisco switches, routers, and data center devices in typical corporate network architectures - Use black-hat tools to conduct penetration testing on the security of your network - Configure and secure virtual private networks (VPNs) - Enable identity management in your network with the Cisco Identity Services Engine (ISE) Who This Book Is For Network designers, engineers, programmers, managers, and students.

DKK 986.00
1

Beginning Ethical Hacking with Kali Linux - Sanjib Sinha - Bog - APress - Plusbog.dk

Beginning Ethical Hacking with Kali Linux - Sanjib Sinha - Bog - APress - Plusbog.dk

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux . With the theory out of the way, you''ll move on to an introduction to VirtualBox, networking, and common Linux commands, followed by the step-by-step procedure to build your own web server and acquire the skill to be anonymous . When you have finished the examples in the first part of your book, you will have all you need to carry out safe and ethical hacking experiments. After an introduction to Kali Linux, you will carry out your first penetration tests with Python and code raw binary packets for use in those tests. You will learn how to find secret directories on a target system, use a TCP client in Python, and scan ports using NMAP. Along the way you will discover effective ways to collect important information, track email, and use important tools such as DMITRY and Maltego, as well as take a look at the five phases of penetration testing. The coverage of vulnerability analysis includes sniffing and spoofing, why ARP poisoning is a threat, how SniffJoke prevents poisoning, how to analyze protocols with Wireshark, and using sniffing packets with Scapy. The next part of the book shows you detecting SQL injection vulnerabilities, using sqlmap, and applying brute force or password attacks. Besides learning these tools, you will see how to use OpenVas, Nikto, Vega, and Burp Suite. The book will explain the information assurance model and the hacking framework Metasploit, taking you through important commands, exploit and payload basics. Moving on to hashes and passwords you will learn password testing and hacking techniques with John the Ripper and Rainbow. You will then dive into classic and modern encryption techniques where you will learn the conventional cryptosystem. In the final chapter you will acquire the skill of exploiting remote Windows and Linux systems and you will learn how to own a target completely. What You Will Learn - Master common Linux commands and networking techniques - Build your own Kali web server and learn to be anonymous - Carry out penetration testing using Python - Detect sniffing attacks and SQL injection vulnerabilities - Learn tools such as SniffJoke, Wireshark, Scapy, sqlmap, OpenVas, Nikto, and Burp Suite - Use Metasploit with Kali Linux - Exploit remote Windows and Linux systems Who This Book Is For Developers new to ethical hacking with a basic understanding of Linux programming.

DKK 604.00
1