Learning DockerDocker is a next-generation platform for simplifying application containerization life-cycle. Docker allows you to create a robust and resilient environment in which you can generate portable, composable, scalable, and stable application containers.
This book is a step-by-step guide that will walk you through the various features of Docker from Docker software installation to the impenetrable security of containers. The book starts off by elucidating the installation procedure for Docker and a few troubleshooting techniques. You will be introduced to the process of downloading Docker images and running them as containers. You'll learn how to run containers as a service (CaaS) and also discover how to share data among containers. Later on, you'll explore how to establish the link between containers and orchestrate containers using Docker Compose. You will also come across relevant details about application testing inside a container. You will discover how to debug a container using t ...
Windows Software Compatibility and Hardware TroubleshootingAs companies keep their existing hardware and operating systems for more years than ever before, the need to diagnose and repair problems is becoming ever more important for IT Pros and system administrators.
Whatever version of Windows you're using (including Windows 10) you'll likely need to maintain compatibility with older software that the company must use for mission-critical operations, or older hardware that's required for specific purposes, but you don't want to sacrifice security for the sake of compatibility. In this briefbook you'll learn how to maintain optimal compatibility with the older software and devices that you need to use.
The authors are well-versed in training in classrooms and video, with Andrew Bettany running the IT Academy at the University of York, and IT Masterclasses and Mike Halsey being a teacher, tech-book author, and having produced many tutorial videos under the brand PC Support.tv. ...
WebSocketUntil recently, creating desktop-like applications in the browser meant using inefficient Ajax or Comet technologies to communicate with the server. With this practical guide, you'll learn how to use WebSocket, a protocol that enables the client and server to communicate with each other on a single connection simultaneously. No more asynchronous communication or long polling!
For developers with a good grasp of JavaScript (and perhaps Node.js), author Andrew Lombardi provides useful hands-on examples throughout the book to help you get up to speed with the WebSocket API. You'll also learn how to use WebSocket with Transport Layer Security (TLS). ...
Mastering DartStarting with a discussion about the basic features of Dart, we will dive into the more complicated concepts such as generics, annotation with reflection, errors and exceptions, which will help us improve our code. Moving on, you will learn how and when to create objects and also advanced techniques that will help you execute asynchronous code. You will also learn about the collection framework and how to communicate with the different programs written in JavaScript using Dart.
This book will show you how to add internalization support to your web applications and how i18n and l10n access can be embedded into your code to design applications that can be localized easily. You will be shown how to organize client-to-server communication and how different HTML5 features can be used in Dart. Finally, this book will show you how you can store data locally, break the storage limit, and prevent security issues in your web application. ...
Wireshark EssentialsThis book introduces the Wireshark network analyzer to IT professionals across multiple disciplines.
It starts off with the installation of Wireshark, before gradually taking you through your first packet capture, identifying and filtering out just the packets of interest, and saving them to a new file for later analysis. The subsequent chapters will build on this foundation by covering essential topics on the application of the right Wireshark features for analysis, network protocols essentials, troubleshooting, and analyzing performance issues. Finally, the book focuses on packet analysis for security tasks, command-line utilities, and tools that manage trace files.
Upon finishing this book, you will have successfully added strong Wireshark skills to your technical toolset and significantly increased your value as an IT professional. ...
Learn Active Directory Management in a Month of LunchesAt the heart of your Windows network is Active Directory, the control center for administration, security, and other core management functions. If you're new to Active Directory administration—or if you find yourself unexpectedly thrust into that role - you'll need to get up to speed fast.
Learn Active Directory Management in a Month of Lunches is a hands-on tutorial designed for IT pros new to Active Directory. Without assuming previous administration experience, the book starts by walking you through the most important day-to-day system management tasks. You'll learn how to administer AD both from the GUI tools built into Windows and by using PowerShell at the command line. Along the way, you'll touch on best practices for managing user access, setting group policies, automating backups, and more. ...
Abusing the Internet of ThingsA future with billions of connected "things" includes monumental security concerns. This practical book explores how malicious attackers can abuse popular IoT-based devices, including wireless LED lightbulbs, electronic door locks, baby monitors, smart TVs, and connected cars.
If you're part of a team creating applications for Internet-connected devices, this guide will help you explore security solutions. You'll not only learn how to uncover vulnerabilities in existing IoT devices, but also gain deeper insight into an attacker's tactics. ...
Risk Centric Threat ModelingThis book introduces the Process for Attack Simulation & Threat Analysis (PASTA) threat modeling methodology. It provides an introduction to various types of application threat modeling and introduces a risk-centric methodology aimed at applying security countermeasures that are commensurate to the possible impact that could be sustained from defined threat models, vulnerabilities, weaknesses, and attack patterns.
Risk Centric Threat Modeling: Process for Attack Simulation and Threat Analysis is a resource for software developers, architects, technical risk managers, and seasoned security professionals. ...
Active Directory, 5th EditionOrganize your network resources by learning how to design, manage, and maintain Active Directory. Updated to cover Windows Server 2012, the fifth edition of this bestselling book gives you a thorough grounding in Microsoft's network directory service by explaining concepts in an easy-to-understand, narrative style.
You'll negotiate a maze of technologies for deploying a scalable and reliable AD infrastructure, with new chapters on management tools, searching the AD database, authentication and security protocols, and Active Directory Federation Services (ADFS). This book provides real-world scenarios that let you apply what you've learned—ideal whether you're a network administrator for a small business or a multinational enterprise. ...
Identity, Authentication, and Access Management in OpenStackKeystone - OpenStack's Identity service - provides secure controlled access to a cloud's resources. In OpenStack environments, Keystone performs many vital functions, such as authenticating users and determining what resources users are authorized to access.
Whether the cloud is private, public, or dedicated, access to cloud resources and security is essential. This practical guide to using Keystone provides detailed, step-by-step guidance to creating a secure cloud environment at the Infrastructure-as-a-Service layer - as well as key practices for safeguarding your cloud's ongoing security. ...