IT eBooks
Download, Read, Use
Getting Structured Data from the Internet
Getting Structured Data from the Internet

Utilize web scraping at scale to quickly get unlimited amounts of free data available on the web into a structured format. This book teaches you to use Python scripts to crawl through websites at scale and scrape data from HTML and JavaScript-enabled pages and convert it into structured data formats such as CSV, Excel, JSON, or load it into a SQL database of your choice. This book goes beyond the basics of web scraping and covers advanced topics such as natural language processing (NLP) and text analytics to extract names of people, places, email addresses, contact details, etc., from a page at production scale using distributed big data techniques on an Amazon Web Services (AWS)-based cloud infrastructure. It book covers developing a robust data processing and ingestion pipeline on the Common Crawl corpus, containing petabytes of data publicly available and a web crawl data set available on AWS's registry of open data. Getting Structured Data from the Internet also includes a st ...
Pro Google Kubernetes Engine
Pro Google Kubernetes Engine

Discover methodologies and best practices for getting started with Google Kubernetes Engine (GKE). This book helps you understand how GKE provides a fully managed environment to deploy and operate containerized applications on Google Cloud infrastructure. You will see how Kubernetes makes it easier for users to manage clusters and the container ecosystem. And you will get detailed guidance on deploying and managing applications, handling administration of container clusters, managing policies, and monitoring cluster resources. You will learn how to operate the GKE environment through the GUI-based Google Cloud console and the "gcloud" command line interface. The book starts with an introduction to GKE and associated services. The authors provide hands-on examples to set up Container Registry and GKE Cluster, and you will follow through an application deployment on GKE. Later chapters focus on securing your GCP GKE environment, GKE monitoring and dashboarding, and CI/CD automation ...
Microservices Security in Action
Microservices Security in Action

Unlike traditional enterprise applications, Microservices applications are collections of independent components that function as a system. Securing the messages, queues, and API endpoints requires new approaches to security both in the infrastructure and the code. Microservices Security in Action teaches you how to address microservices-specific security challenges throughout the system. This practical guide includes plentiful hands-on exercises using industry-leading open-source tools and examples using Java and Spring Boot. Integrating independent services into a single system presents special security challenges in a microservices deployment. With proper planning, however, you can build in security from the start. Learn to create secure services and protect application data throughout development and deployment. As microservices continue to change enterprise application systems, developers and architects must learn to integrate security into their design and implementation. Beca ...
Modern Web Development on the JAMstack
Modern Web Development on the JAMstack

Learn how to run your web projects - everything from simple sites to complex applications - without a single server. It's possible with the JAMstack, a modern web development architecture for deploying fast, highly-scalable sites and applications that don't require traditional origin infrastructure. This practical report explains how the JAMstack delivers better performance, higher security, and lower cost of scaling than server-run web apps. Based on client-side JavaScript, reusable APIs, and prebuilt Markup, the JAMstack sits at the center of several converging trends and technologies already being used to support today's web projects. Authors Mathias Biilmann and Phil Hawksworth from Netlify demonstrate how the JAMstack drastically improves performance, increases reliability, and reduces the surface for attacks. ...
Azure DevOps for Web Developers
Azure DevOps for Web Developers

Explore the architecture, product offerings, and the various stages of implementation processes in Azure DevOps. The book starts with the basic concepts of DevOps and moves on to discuss project management in Azure DevOps. Next, you will learn requirement management and version control in DevOps. Along the way, you will go through test management followed by continuous integration and build automation with more details on code quality and security implementations. Moving forward, you will learn release pipeline and infrastructure as code implementation including ARM-based environment provisioning and execution. Finally, you'll cover DevOps architecture blueprints used for deploying your web applications to different platforms. After reading this book, you will be able to understand each stage of Azure DevOps and master its implementation. ...
AWS Penetration Testing
AWS Penetration Testing

Cloud security has always been treated as the highest priority by AWS while designing a robust cloud infrastructure. AWS has now extended its support to allow users and security experts to perform penetration tests on its environment. This has not only revealed a number of loopholes and brought vulnerable points in their existing system to the fore, but has also opened up opportunities for organizations to build a secure cloud environment. This book teaches you how to perform penetration tests in a controlled AWS environment. You'll begin by performing security assessments of major AWS resources such as Amazon EC2 instances, Amazon S3, Amazon API Gateway, and AWS Lambda. Throughout the course of this book, you'll also learn about specific tests such as exploiting applications, compromising Identity and Access Management (IAM) keys, testing permissions flaws, and discovering weak policies. Moving on, you'll discover how to establish private-cloud access through backdoor Lambda functi ...
Data Pipelines Pocket Reference
Data Pipelines Pocket Reference

Data pipelines are the foundation for success in data analytics. Moving data from numerous diverse sources and transforming it to provide context is the difference between having data and actually gaining value from it. This pocket reference defines data pipelines and explains how they work in today's modern data stack. You'll learn common considerations and key decision points when implementing pipelines, such as batch versus streaming data ingestion and build versus buy. This book addresses the most common decisions made by data professionals and discusses foundational concepts that apply to open source frameworks, commercial products, and homegrown solutions. You'll learn: What a data pipeline is and how it works; How data is moved and processed on modern data infrastructure, including cloud platforms; Common tools and products used by data engineers to build pipelines; How pipelines support analytics and reporting needs; Considerations for pipeline maintenance, testing, and a ...
How the Internet Really Works
How the Internet Really Works

The internet has profoundly changed interpersonal communication, but most of us don't really understand how it works. What enables information to travel across the internet? Can we really be anonymous and private online? Who controls the internet, and why is that important? And… what's with all the cats? How the Internet Really Works answers these questions and more. Using clear language and whimsical illustrations, the authors translate highly technical topics into accessible, engaging prose that demystifies the world's most intricately linked computer network. Alongside a feline guide named Catnip, you'll learn about: - The "How-What-Why" of nodes, packets, and internet protocols; - Cryptographic techniques to ensure the secrecy and integrity of your data; - Censorship, ways to monitor it, and means for circumventing it; - Cybernetics, algorithms, and how computers make decisions; - Centralization of internet power, its impact on democracy, and how it hurts human rights; - ...
How To Manage Remote Servers with Ansible
How To Manage Remote Servers with Ansible

This book is designed to introduce you to using Ansible to manage your servers. You'll learn how to install and configure Ansible on a control node, and then how to use it to configure and run commands on remote servers. You'll also learn how to collect tasks into complete Playbooks to automate server setup from start to finish. The topics that it covers include how to: - Become familiar with configuration management tools and processes, and the benefits of using them to manage your infrastructure. - Install and configure Ansible on an Ubuntu 20.04 control node, ensuring that your servers are properly set up and that you are able to execute remote instructions through Ansible. - Build inventory files and organize your servers into groups to selectively control how and where Ansible commands are run. - Run Ad Hoc commands to execute individual tasks on one, or multiple remote servers. - Package individual commands into Playbooks that you can use to automate the provisioning of m ...
Chaos Engineering
Chaos Engineering

Auto engineers test the safety of a car by intentionally crashing it and carefully observing the results. Chaos engineering applies the same principles to software systems. In Chaos Engineering: Site reliability through controlled disruption, you'll learn to run your applications and infrastructure through a series of tests that simulate real-life failures. You'll maximize the benefits of chaos engineering by learning to think like a chaos engineer, and how to design the proper experiments to ensure the reliability of your software. With examples that cover a whole spectrum of software, you'll be ready to run an intensive testing regime on anything from a simple WordPress site to a massive distributed system running on Kubernetes. Can your network survive a devastating failure? Could an accident bring your day-to-day operations to a halt? Chaos engineering simulates infrastructure outages, component crashes, and other calamities to show how systems and staff respond. Testing systems ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025