IT eBooks
Download, Read, Use
Cloud Native DevOps with Kubernetes
Cloud Native DevOps with Kubernetes

Kubernetes has become the operating system of today's cloud native world, providing a reliable and scalable platform for running containerized workloads. In this friendly, pragmatic book, cloud experts Justin Domingus and John Arundel show you what Kubernetes can do-and what you can do with it. This updated second edition guides you through the growing Kubernetes ecosystem and provides practical solutions to everyday problems with software tools currently in use. You'll walk through an example containerized application running in Kubernetes step-by-step, from the development environment through the continuous deployment pipeline, exploring patterns you can use for your own applications. Make your development teams lean, fast, and effective by adopting Kubernetes and DevOps principles. - Understand containers and Kubernetes-no experience necessary; - Run your own applications on managed cloud Kubernetes services or on-prem environments; - Design your own cloud native services an ...
Bug Bounty Bootcamp
Bug Bounty Bootcamp

A comprehensive guide for any web application hacker, Bug Bounty Bootcamp is a detailed exploration of the many vulnerabilities present in modern websites and the hands-on techniques you can use to most successfully exploit them. Bug Bounty Bootcamp prepares you for participation in bug bounty programs, which companies set up to reward hackers for finding and reporting vulnerabilities in their applications. The Bootcamp begins with guidance on writing high-quality bug reports and building lasting relationships with client organizations. You'll then set up a hacking lab and dive into the mechanisms of common web vulnerabilities, like XSS and SQL injection, aided by thorough explanations of what causes them, how you can exploit them, where to find them, and how to bypass protections. You'll also explore recon strategies for gathering intel on a target and automate recon with bash scripting. Finally, you'll wade into advanced techniques, like hacking mobile apps, testing APIs, and revi ...
Practical Doomsday
Practical Doomsday

As a leading security engineer, Michal Zalewski has spent his career methodically anticipating and planning for cyberattacks. In Practical Doomsday, Zalewski applies the same thoughtful, rational approach to preparing for disasters of all kinds. By sharing his research, advice, and a healthy dose of common sense, he'll help you rest easy knowing you have a plan for the worst - even if the worst never comes. The book outlines a level-headed model for evaluating risks, one that weighs the probability of scenarios against the cost of preparing for them. You'll learn to apply that model to the whole spectrum of potential crises, from personal hardships like job loss or a kitchen fire, to large-scale natural disasters and industrial accidents, to recurring pop-culture fears like all-out nuclear war. You'll then explore how basic lifestyle adjustments, such as maintaining a robust rainy-day fund, protecting yourself online, and fostering good relationships with your neighbors, can boost y ...
The Hardware Hacking Handbook
The Hardware Hacking Handbook

Embedded devices are chip-size microcomputers small enough to be included in the structure of the object they control, and they're everywhere - in phones, cars, credit cards, laptops, medical equipment, even critical infrastructure. This means understanding their security is critical. The Hardware Hacking Handbook takes you deep inside different types of embedded systems, revealing the designs, components, security limits, and reverse-engineering challenges you need to know for executing effective hardware attacks. Written with wit and infused with hands-on lab experiments, this handbook puts you in the role of an attacker interested in breaking security to do good. Starting with a crash course on the architecture of embedded devices, threat modeling, and attack trees, you'll go on to explore hardware interfaces, ports and communication protocols, electrical signaling, tips for analyzing firmware images, and more. Along the way, you'll use a home testing lab to perform fault-injecti ...
The Art of Cyberwarfare
The Art of Cyberwarfare

Cyber attacks are no longer the domain of petty criminals. Today, companies find themselves targeted by sophisticated nation state attackers armed with the resources to craft scarily effective campaigns. This book is a detailed guide to understanding the major players in these cyber wars, the techniques they use, and the process of analyzing their advanced attacks. Whether you're an individual researcher or part of a team within a Security Operations Center (SoC), you'll learn to approach, track, and attribute attacks to these advanced actors. The first part of the book is an overview of actual cyber attacks conducted by nation-state actors and other advanced organizations. It explores the geopolitical context in which the attacks took place, the patterns found in the attackers' techniques, and the supporting evidence analysts used to attribute such attacks. Dive into the mechanisms of: North Korea's series of cyber attacks against financial institutions, which resulted in billio ...
The HTML Handbook
The HTML Handbook

HTML, a shorthand for Hyper Text Markup Language, is one of the most fundamental building blocks of the Web. This handbook is aimed at a vast audience. - First, the beginner. I explain HTML from zero in a succinct but comprehensive way, so you can use this book to learn HTML from the basics. - Then, the professional. HTML is often considered like a secondary thing to learn. It might be given for granted. Even if you don't write HTML in your day to day work, knowing how HTML works can help save you some headaches when you need to understand it from time to time, for example while tweaking a web page. ...
The NGINX Real-Time API Handbook
The NGINX Real-Time API Handbook

Discover how to deliver reliable, high-performance APIs with our NGINX Real-Time API Handbook. Compiled by leading experts on real-time API management, this handbook is a comprehensive guide to reducing latency in your applications and APIs without making any compromises. Learn why now, more than ever, your APIs need to perform in real time to meet digital business requirements. This eBook covers trends driving real-time APIs, a practical reference architecture for any enterprise, and helpful vendor comparisons and case studies to make the business case for investing in the proper API management solution. ...
Mastering QuickBooks 2022, 3rd Edition
Mastering QuickBooks 2022, 3rd Edition

Whether you have bookkeeping experience or not, handling the financial side of your growing business requires expertise. With Mastering QuickBooks® 2022, Third Edition, you'll learn how to use QuickBooks® to build the perfect budget, simplify tax return preparation, manage inventory, track job costs, generate income statements and financial reports, and perform all accounting-related tasks with ease. Throughout the book, you'll be guided by an experienced Certified Public Accountant and Advanced Certified QuickBooks ProAdvisor - from setup to core features and beyond. This new edition has every chapter revised to cover a range of new features and updates available, including smart invoicing and cash flow projections. You'll learn how to create multilingual invoices, track mileage, work with a cash flow dashboard that helps you with cash forecasting and planning reports, and upload batches of bills and checks. This book will also teach you how to manage sales tax, including h ...
Extreme DAX
Extreme DAX

This book helps business analysts generate powerful and sophisticated analyses from their data using DAX and get the most out of Microsoft Business Intelligence tools. Extreme DAX will first teach you the principles of business intelligence, good model design, and how DAX fits into it all. Then, you'll launch into detailed examples of DAX in real-world business scenarios such as inventory calculations, forecasting, intercompany business, and data security. At each step, senior DAX experts will walk you through the subtleties involved in working with Power BI models and common mistakes to look out for as you build advanced data aggregations. You'll deepen your understanding of DAX functions, filters, and measures, and how and when they can be used to derive effective insights. You'll also be provided with PBIX files for each chapter, so that you can follow along and explore in your own time. ...
97 Things Every SRE Should Know
97 Things Every SRE Should Know

Site reliability engineering (SRE) is more relevant than ever. Knowing how to keep systems reliable has become a critical skill. With this practical book, newcomers and old hats alike will explore a broad range of conversations happening in SRE. You'll get actionable advice on several topics, including how to adopt SRE, why SLOs matter, when you need to upgrade your incident response, and how monitoring and observability differ. Editors Jaime Woo and Emil Stolarsky, co-founders of Incident Labs, have collected 97 concise and useful tips from across the industry, including trusted best practices and new approaches to knotty problems. You'll grow and refine your SRE skills through sound advice and thought-provokingquestions that drive the direction of the field. Some of the 97 things you should know: "Test Your Disaster Plan" - Tanya Reilly "Integrating Empathy into SRE Tools" - Daniella Niyonkuru "The Best Advice I Can Give to Teams" - Nicole Forsgren "Where to SRE" - Fatema B ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025