IT eBooks
Download, Read, Use
Mastering VMware vSphere 6.7
Mastering VMware vSphere 6.7

Mastering VMware vSphere 6.7 is the fully updated edition of the bestselling guide to VMware's virtualization solution. With comprehensive coverage of this industry-leading toolset, this book acts as an informative guide and valuable reference. Step-by-step instruction walks you through installation, configuration, operation, security processes, and much more as you conquer the management and automation of your virtual environment. Written by certified VMware vExperts, this indispensable guide provides hands-on instruction and detailed conceptual explanations, anchored by practical applications and real-world examples. This book is the ultimate guide to vSphere, helping administrators master their virtual environment. Learn to: Install, configure, and manage the vCenter Server components; Leverage the Support Tools to provide maintenance and updates; Create and configure virtual networks, storage devices, and virtual machines; Implement the latest features to ensure compatibility an ...
Building Digital Experience Platforms
Building Digital Experience Platforms

Use digital experience platforms (DXP) to improve your development productivity and release timelines. Leverage the pre-integrated feature sets of DXPs in your organization's digital transformation journey to quickly develop a personalized, secure, and robust enterprise platform. In this book the authors examine various features of DXPs and provide rich insights into building each layer in a digital platform. Proven best practices are presented with examples for designing and building layers. A special focus is provided on security and quality attributes needed for business-critical enterprise applications. The authors cover modern and emerging digital trends such as Blockchain, IoT, containers, chatbots, artificial intelligence, and more. The book is divided into five parts related to requirements/design, development, security, infrastructure, and case study. The authors employ proven real-world methods, best practices, and security and integration techniques derived from their ...
Serverless Architectures with AWS
Serverless Architectures with AWS

Serverless Architecture with AWS begins with an introduction to the serverless model and helps you get started with AWS and Lambda. You'll also get to grips with other capabilities of the AWS Serverless Platform and see how AWS supports enterprise-grade serverless applications with and without Lambda. This book will guide you in deploying your first serverless project and exploring the capabilities of serverless Amazon Athena, an interactive query service that makes it easy to analyze data in Amazon Simple Storage Service (S3 Amazon) using standard SQL. You'll also learn about AWS Glue, a fully managed ETL service that makes categorizing data easy and cost-effective. You'll study how Amazon Kinesis makes it possible to unleash the potential of real-time data insights and analytics with capabilities such as video streams, data streams, data firehose, and data analytics. Last but not least, you'll be equipped to combine Amazon Kinesis capabilities with AWS Lambda to create lightweight ...
Microsoft System Center Data Protection Manager Cookbook
Microsoft System Center Data Protection Manager Cookbook

System Center Data Protection Manager (SCDPM) is a robust enterprise backup and recovery system that contributes to your BCDR strategy by facilitating the backup and recovery of enterprise data. With an increase in data recovery and protection problems faced in organizations, it has become important to keep data safe and recoverable. This book contains recipes that will help you upgrade to SCDPM and it covers the advanced features and functionality of SCDPM. This book starts by helping you install SCDPM and then moves on to post-installation and management tasks. You will come across a lot of useful recipes that will help you recover your VMware and Hyper-V VMs. It will also walk you through tips for monitoring SCDPM in different scenarios. Next, the book will also offer insights into protecting windows workloads followed by best practices on SCDPM. You will also learn to back up your Azure Stack Infrastructure using Azure Backup. You will also learn about recovering data from backu ...
Learn Microsoft Azure
Learn Microsoft Azure

Azure is one of the leading public cloud service providers. Thanks to a number of Azure service updates, it continues to make advances in the realm of cloud computing. Learn Microsoft Azure starts with the fundamentals of cloud computing. You will learn to configure and set up the Azure infrastructure. As you make your way through the book, you'll explore Azure services, along with working on virtual memory systems (VMS) and deployment models. You will understand various services in the Azure ecosystem, such as Azure IoT and Azure Analytics, among others. An easy-to-follow introduction to various cloud design patterns will also add to your efficiency in designing cloud solutions. In the concluding chapters, you'll secure your virtual networks using Network security groups and configure Azure Active Directory (Azure AD) to set a custom domain name and company profile. ...
Applied Cryptography in .NET and Azure Key Vault
Applied Cryptography in .NET and Azure Key Vault

Benefit from Microsoft's robust suite of security and cryptography primitives to create a complete, hybrid encryption scheme that will protect your data against breaches. This highly practical book teaches you how to use the .NET encryption APIs and Azure Key Vault, and how they can work together to produce a robust security solution. Applied Cryptography in .NET and Azure Key Vault begins with an introduction to the dangers of data breaches and the basics of cryptography. It then takes you through important cryptographic techniques and practices, from hashing and symmetric/asymmetric encryption, to key storage mechanisms. By the end of the book, you'll know how to combine these cryptographic primitives into a hybrid encryption scheme that you can use in your applications. Author Stephen Haunts brings 25 years of software development and security experience to the table to give you the concrete skills, knowledge, and code you need to implement the latest encryption standards in yo ...
Building Ethereum Dapps
Building Ethereum Dapps

Building Ethereum Dapps introduces you to decentralized applications based on the Ethereum blockchain platform. In this book, you'll learn the principles of Dapps development by rolling up your sleeves and actually building a few! Imagine unbreakably secure applications that handle personal and business transactions without any central agency controlling the process. Decentralized applications, or Dapps, do just this, shifting power to users. The Ethereum blockchain platform provides the tools you need to build Dapps, including an innovative "smart contracts" model and Solidity, a Dapp-aware JavaScript-like programming language. Building Ethereum Dapps teaches Dapps development on the Ethereum blockchain platform. You'll begin with a mental model of how Dapps operate, and then dive into designing and implementing smart contracts in Ethereum's Solidity language. You'll explore Ethereum smart contract development tools, like Truffle and Web3, and pick up best practices for design a ...
HTTP/2 in Action
HTTP/2 in Action

HTTP/2 in Action is a complete guide to HTTP/2, one of the core protocols of the web. Because HTTP/2 has been designed to be easy to transition to, including keeping it backwards compatible, adoption is rapid and expected to increase over the next few years. Concentrating on practical matters, this interesting book presents key HTTP/2 concepts such as frames, streams, and multiplexing and explores how they affect the performance and behavior of your websites. HTTP - Hypertext Transfer Protocol - is the standard for exchanging messages between websites and browsers. And after 20 years, it's gotten a much-needed upgrade. With support for streams, server push, header compression, and prioritization, HTTP/2 delivers vast improvements in speed, security, and efficiency. HTTP/2 in Action teaches you everything you need to know to use HTTP/2 effectively. You'll learn how to optimize web performance with new features like frames, multiplexing, and push. You'll also explore real-world exa ...
CentOS Quick Start Guide
CentOS Quick Start Guide

Linux kernel development has been the worlds largest collaborative project to date. With this practical guide, you will learn Linux through one of its most popular and stable distributions. This book will introduce you to essential Linux skills using CentOS 7. It describes how a Linux system is organized, and will introduce you to key command-line concepts you can practice on your own. It will guide you in performing basic system administration tasks and day-to-day operations in a Linux environment. You will learn core system administration skills for managing a system running CentOS 7 or a similar operating system, such as RHEL 7, Scientific Linux, and Oracle Linux. You will be able to perform installation, establish network connectivity and user and process management, modify file permissions, manage text files using the command line, and implement basic security administration after covering this book. By the end of this book, you will have a solid understanding of working ...
Hands-On Dark Web Analysis
Hands-On Dark Web Analysis

The overall world wide web is divided into three main areas - the Surface Web, the Deep Web, and the Dark Web. The Deep Web and Dark Web are the two areas which are not accessible through standard search engines or browsers. It becomes extremely important for security professionals to have control over these areas to analyze the security of your organization. This book will initially introduce you to the concept of the Deep Web and the Dark Web and their significance in the security sector. Then we will deep dive into installing operating systems and Tor Browser for privacy, security and anonymity while accessing them. During the course of the book, we will also share some best practices which will be useful in using the tools for best effect. By the end of this book, you will have hands-on experience working with the Deep Web and the Dark Web for security analysis. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025