0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (7)
  • R250 - R500 (17)
  • R500+ (139)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer communications & networking > Networking packages

Secure Internet Programming - Security Issues for Mobile and Distributed Objects (Paperback, 1999 ed.): Jan Vitek, Christian D.... Secure Internet Programming - Security Issues for Mobile and Distributed Objects (Paperback, 1999 ed.)
Jan Vitek, Christian D. Jensen
R1,798 Discovery Miles 17 980 Ships in 10 - 15 working days

Large-scale open distributed systems provide an infrastructure for assembling global applications on the basis of software and hardware components originating from multiple sources. Open systems rely on publicly available standards to permit heterogeneous components to interact. The Internet is the archetype of a large-scale open distributed system; standards such as HTTP, HTML, and XML, together with the widespread adoption of the Java language, are the cornerstones of many distributed systems. This book surveys security in large-scale open distributed systems by presenting several classic papers and a variety of carefully reviewed contributions giving the results of new research and development. Part I provides background requirements and deals with fundamental issues in trust, programming, and mobile computations in large-scale open distributed systems. Part II contains descriptions of general concepts, and Part III presents papers detailing implementations of security concepts.

Modern Security Operations Center, The (Paperback): Joseph Muniz Modern Security Operations Center, The (Paperback)
Joseph Muniz
R1,279 Discovery Miles 12 790 Ships in 12 - 17 working days

The Industry Standard, Vendor-Neutral Guide to Managing SOCs and Delivering SOC Services This completely new, vendor-neutral guide brings together all the knowledge you need to build, maintain, and operate a modern Security Operations Center (SOC) and deliver security services as efficiently and cost-effectively as possible. Leading security architect Joseph Muniz helps you assess current capabilities, align your SOC to your business, and plan a new SOC or evolve an existing one. He covers people, process, and technology; explores each key service handled by mature SOCs; and offers expert guidance for managing risk, vulnerabilities, and compliance. Throughout, hands-on examples show how advanced red and blue teams execute and defend against real-world exploits using tools like Kali Linux and Ansible. Muniz concludes by previewing the future of SOCs, including Secure Access Service Edge (SASE) cloud technologies and increasingly sophisticated automation. This guide will be indispensable for everyone responsible for delivering security services-managers and cybersecurity professionals alike. * Address core business and operational requirements, including sponsorship, management, policies, procedures, workspaces, staffing, and technology * Identify, recruit, interview, onboard, and grow an outstanding SOC team * Thoughtfully decide what to outsource and what to insource * Collect, centralize, and use both internal data and external threat intelligence * Quickly and efficiently hunt threats, respond to incidents, and investigate artifacts * Reduce future risk by improving incident recovery and vulnerability management * Apply orchestration and automation effectively, without just throwing money at them * Position yourself today for emerging SOC technologies

Integrated Networking, Caching, and Computing (Hardcover): F. Richard Yu, Tao Huang, Yunjie Liu Integrated Networking, Caching, and Computing (Hardcover)
F. Richard Yu, Tao Huang, Yunjie Liu
R2,642 Discovery Miles 26 420 Ships in 12 - 17 working days

This book features the major research advances on integrated networking, caching, and computing. Information-centric networking-based caching is one of the promising techniques for future networks. The cloud computing paradigm has been widely adopted to enable convenient, on-demand network access to a shared pool of configurable computing resources. In addition, fog/edge computing is proposed to deploy computing resources closer to end devices. From the perspective of applications, network, cache and compute are underlying enabling resources. How to manage, control and optimize these resources can have significant impacts on application performance.

Connecting Networks v6 Course Booklet (Paperback): Cisco Networking Academy Connecting Networks v6 Course Booklet (Paperback)
Cisco Networking Academy
R828 R149 Discovery Miles 1 490 Save R679 (82%) Ships in 9 - 15 working days

Your Cisco Networking Academy Course Booklet is designed as a study resource you can easily read, highlight, and review on the go, wherever the Internet is not available or practical: * The text is extracted directly, word-for-word, from the online course so you can highlight important points and take notes in the "Your Chapter Notes" section. * Headings with the exact page correlations provide a quick reference to the online course for your classroom discussions and exam preparation. * An icon system directs you to the online curriculum to take full advantage of the images embedded within the Networking Academy online course interface and reminds you to perform the labs, Class Activities, interactive activities, Packet Tracer activities, watch videos, and take the chapter quizzes and exams. The Course Booklet is a basic, economical paper-based resource to help you succeed with the Cisco Networking Academy online course.

SharePoint For Dummies (Paperback): Ken Withee, Rosemarie Withee SharePoint For Dummies (Paperback)
Ken Withee, Rosemarie Withee 1
R783 R516 Discovery Miles 5 160 Save R267 (34%) Out of stock

All you need to know about SharePoint Online and SharePoint Server SharePoint is an enterprise portal server living under the Microsoft Office umbrella. It can be used as a local installation (on-premises) or an online service. The SharePoint Online service comes bundled with Office 365. You can use SharePoint to aggregate sites, information, data, and applications into a single portal. SharePoint 2019 contains highly integrated features that allow you to work with it directly from other Office products such as Teams, Word, Excel, PowerPoint, and many others. SharePoint For Dummies provides a thorough update on how to make the most of all the new SharePoint and Office features--while still building on the great and well-reviewed content in the prior editions. The book shows those new to SharePoint or new to SharePoint 2019 how to get up and running so that you and your team can become productive with this powerful tool. Find high-level, need-to-know information for "techsumers", administrators, and admins Learn how SharePoint Online can get you started in minutes without the hassle and frustration of building out your own servers Find everything you need to know about the latest release of SharePoint Online and SharePoint Server Get your hands on the best guide on the market for SharePoint!

The Illustrated Network - How TCP/IP Works in a Modern Network (Paperback, 2nd edition): Walter Goralski The Illustrated Network - How TCP/IP Works in a Modern Network (Paperback, 2nd edition)
Walter Goralski
R2,580 R2,259 Discovery Miles 22 590 Save R321 (12%) Ships in 12 - 17 working days

The Illustrated Network: How TCP/IP Works in a Modern Network, Second Edition presents an illustrated explanation on how TCP/IP works, using consistent examples from a working network configuration that includes servers, routers and workstations. Diagnostic traces allow the reader to follow the discussion with unprecedented clarity and precision. True to its title, there are 330+ diagrams and screenshots, as well as topology diagrams and a unique repeating chapter opening diagram. Illustrations are also used as end-of-chapter questions. Based on examples of a complete and modern network, all the material comes from real objects connected and running on the network. The book emphasizes the similarities across all networks, since all share similar components, from the smallest LAN to the global internet. Layered protocols are the rule, and all hosts attached to the Internet run certain core protocols to enable their applications to function properly. This second edition includes updates throughout, along with four completely new chapters that introduce developments that have occurred since the publication of the first edition, including optical networking, cloud concepts and VXLAN.

Microsoft Exchange 2000 Infrastructure Design - Co-existence, Migration and Connectivity (Paperback, 2000 ed.): Kieran McCorry,... Microsoft Exchange 2000 Infrastructure Design - Co-existence, Migration and Connectivity (Paperback, 2000 ed.)
Kieran McCorry, Donald Livengood
R1,629 Discovery Miles 16 290 Ships in 12 - 17 working days

Microsoft Exchange 2000 Infrastructure Design explains from a system designer's and administrator's perspective Microsoft's Active Directory and its interaction with Exchange 2000, details issues concerned with migration to Exchange 2000, and outlines the specific technology and design issues relating to connectivity with Exchange 2000. Readers will learn to use these technologies to seamlessly co-exist with their current environment, migrate to a native Exchange 2000 environment, and connect to the Internet as well as to other messaging systems. The book's blend of expert instruction and best practices will help any organization create optimal system designs and configurations to support different technical and business scenarios.
McCorry and Livengood are experts in Microsoft technologies from Compaq, the world's leading integrator of Exchange systems. In Microsoft Exchange 2000 Infrastructure Design, they spell out the key technologies, features, and techniques IT professionals must master to build a unified and robust Exchange 2000 messaging service. This book details the framework organizations must put in place to most effectively move to Exchange 2000.

Detailed explanations of Active Directory integration with Exchange 2000, migration to Exchange 2000 from another system and Exchange 2000 transport, connectivity, and tools
Gives readers the benefit of authors' extensive experience
Unique description of the software "plumbing" organizations must master to move to Exchange 2000

DCOM Explained (Paperback): Rosemary Rock-Evans DCOM Explained (Paperback)
Rosemary Rock-Evans
R1,273 Discovery Miles 12 730 Ships in 12 - 17 working days

DCOM Explained describes what services DCOM provides, both development and runtime. Thus the aim of the book is not to teach how to program using DCOM, but to explain what DCOM does so readers will become better able to use it more effectively, understand the options available when using DCOM, and understand the types of applications that can be built by using DCOM.
This book describes:
. what each of the services mean, including load balancing, security, guaranteed delivery, deferred delivery, broadcasting and multi-casting, and session handling.
. what the service aims to do, such as saving time and effort or providing a secure, resilient, reliable, high performance network
. how the service could be provided, and what other solutions exist for achieving the same end
. how Microsoft has tackled the problem

Provides a complete, easy to understand, and compact picture of all the services of DCOM
Written from a designer or manager's point of view
Compares DCOM with other middleware"

Understanding and Troubleshooting Cisco Catalyst 9800 Series Wireless Controllers (Paperback): Simone Arena, Nicolas Darchis,... Understanding and Troubleshooting Cisco Catalyst 9800 Series Wireless Controllers (Paperback)
Simone Arena, Nicolas Darchis, Sudha Katgeri, Francisco Crippa
R1,582 Discovery Miles 15 820 Ships in 9 - 15 working days

The definitive professional's guide to the Cisco next-gen 9800 wireless controllers As wireless networks, applications, and services rapidly evolve, they grow increasingly business critical, with steeper requirements for performance, latency, deployment density, and device support. The advanced Catalyst 9800 wireless controllers from Cisco meet these challenges, delivering exceptional adaptability, security, performance, scalability, and programmability. Based on the modern and secure Cisco IOS XE operating system, their support for Cisco intent-based networking will help you continually leverage new innovation. Now, four Cisco experts offer end-to-end guidance, practical tips, and proven recommendations for designing, deploying, and managing wireless networks with the Catalyst 9800. For technical decision makers, this guide delivers a deep understanding of Catalyst 9800 hardware and software, tightly linked to business value. Architects will find essential details for both upfront network design and feature implementation. Network operators and other IT professionals will discover tested tools and methods for reliable and efficient setup, configuration, monitoring, and troubleshooting. Whatever your role, this guide will help you maximize the value of any Catalyst 9800 network, and serve as your indispensable reference for years to come. Understand Catalyst 9800 benefits, capabilities, roles, and architecture Learn the new C9800 Configuration Model, with key design considerations and best practices Deploy and configure the C9800 in private and public clouds Systematically secure the C9800: from AAA and ACLs to rogue detection and wireless intrusion prevention (WIPS) Establish and optimize seamless client roaming in enterprise environments Learn how the C9800 implements key RF concepts Plan and implement an end-to-end architecture for QoS, and design/ deploy for high availability and network services like multicast Discover value-added wireless services available through Cisco DNA Spaces Drive agility and value via network programmability with YANG, Python, RESTCONF, and NETCONF Make the most out of the rich data models of Model-Driven Telemetry and Programmability using open-source tools Walk through wireless network troubleshooting, backup/restore, and upgrades

Apache (Paperback, 3rd edition): Ben Laurie Apache (Paperback, 3rd edition)
Ben Laurie
R1,244 R900 Discovery Miles 9 000 Save R344 (28%) Ships in 12 - 17 working days

Updated to cover the changes in Apache's latest release, 2.0, as well as Apache 1.3, this useful guide discusses how to obtain, set up, secure, modify, and troubleshoot the Apache software on both Unix and Windows systems. In addition to covering the installation and configuration of mod_perl and Tomcat, the book examines PHP, Cocoon, and other new technologies that are associated with the Apache web server.

Enterprise Integration Patterns - Designing, Building, And Deploying Messaging Solutions (Hardcover): Bobby Woolf, Gregor Hohpe Enterprise Integration Patterns - Designing, Building, And Deploying Messaging Solutions (Hardcover)
Bobby Woolf, Gregor Hohpe
R1,862 R1,481 Discovery Miles 14 810 Save R381 (20%) Ships in 12 - 17 working days

Would you like to use a consistent visual notation for drawing integration solutions? "Look inside the front cover."Do you want to harness the power of asynchronous systems without getting caught in the pitfalls? "See "Thinking Asynchronously" in the Introduction."Do you want to know which style of application integration is best for your purposes? "See Chapter 2, Integration Styles."Do you want to learn techniques for processing messages concurrently? "See Chapter 10, Competing Consumers and Message Dispatcher."Do you want to learn how you can track asynchronous messages as they flow across distributed systems? "See Chapter 11, Message History and Message Store."Do you want to understand how a system designed using integration patterns can be implemented using Java Web services, .NET message queuing, and a TIBCO-based publish-subscribe architecture? "See Chapter 9, Interlude: Composed Messaging."

Utilizing years of practical experience, seasoned experts Gregor Hohpe and Bobby Woolf show how asynchronous messaging has proven to be the best strategy for enterprise integration success. However, building and deploying messaging solutions presents a number of problems for developers. "Enterprise Integration Patterns" provides an invaluable catalog of sixty-five patterns, with real-world solutions that demonstrate the formidable of messaging and help you to design effective messaging solutions for your enterprise.

The authors also include examples covering a variety of different integration technologies, such as JMS, MSMQ, TIBCO ActiveEnterprise, Microsoft BizTalk, SOAP, and XSL. A case study describing a bond trading system illustrates the patterns in practice, and the book offers alook at emerging standards, as well as insights into what the future of enterprise integration might hold.

This book provides a consistent vocabulary and visual notation framework to describe large-scale integration solutions across many technologies. It also explores in detail the advantages and limitations of asynchronous messaging architectures. The authors present practical advice on designing code that connects an application to a messaging system, and provide extensive information to help you determine when to send a message, how to route it to the proper destination, and how to monitor the health of a messaging system. If you want to know how to manage, monitor, and maintain a messaging system once it is in use, get this book.
0321200683B09122003

Juniper Networks Warrior (Paperback): Peter Southwick Juniper Networks Warrior (Paperback)
Peter Southwick
R1,468 R1,043 Discovery Miles 10 430 Save R425 (29%) Ships in 12 - 17 working days

In this practical book, Juniper Networks consulting senior network engineer, Peter Southwick, offers unique first-person field studies on designing, configuring, and troubleshooting new systems that are changing the networking world. Each chapter-long "travelogue" follows a team of Juniper Networks warriors as they solve specific needs with emerging network platform architectures.

In these case studies, Southwick and his fellow warriors analyze a client's particular situation, arrive at an architectural solution, and work through the deployment details. For anyone who operates, installs, designs, or works in IT, this book provides an intimate and entertaining look at what's changing and why.

Among the case studies, you'll discover how: A service provider protected customers from malicious traffic with Juniper Networks IDP systemsSRX5800s improved connectivity and security in a data centerEthernet WAN technology was chosen as a storage solution, rather than a proprietary design on dark fiberAn enterprise severed communications between different departments to comply with government personal credit card standardsCore network and edge devices helped a power company serve local customers and ISPs in the data services marketA hosting company migrated its core, datacenter, edge, and access domains to a state-of-the-art network

"In this uniquely written book, you will get a detailed view of life in the data center, the edge, the core, and the office of the customer's CIO."Steve Fazio, CEO, TorreyPoint

JBoss at Work - A Practical Guide (Paperback): Tom Marrs JBoss at Work - A Practical Guide (Paperback)
Tom Marrs
R862 R637 Discovery Miles 6 370 Save R225 (26%) Ships in 12 - 17 working days

Consisting of a number of well-known open source products, JBoss is more a family of interrelated services than a single monolithic application. But, as with any tool that's as feature-rich as JBoss, there are number of pitfalls and complexities, too. Most developers struggle with the same issues when deploying J2EE applications on JBoss: they have trouble getting the many J2EE and JBoss deployment descriptors to work together; they have difficulty finding out how to get started; their projects don't have a packaging and deployment strategy that grows with the application; or, they find the Class Loaders confusing and don't know how to use them, which can cause problems. "JBoss at Work: A Practical Guide" helps developers overcome these challenges. As you work through the book, you'll build a project using extensive code examples. You'll delve into all the major facets of J2EE application deployment on JBoss, including JSPs, Servlets, EJBs, JMS, JNDI, web services, JavaMail, JDBC, and Hibernate. With the help of this book, you'll: implement a full J2EE application and deploy it on JBoss; discover how to use the latest features of JBoss 4 and J2EE 1.4 , including J2EE-compliant web services; master J2EE application deployment on JBoss with EARs, WARs, and EJB JARs; understand the core J2EE deployment descriptors and how they integrate with JBoss-specific descriptors; and, base your security strategy on JAAS. Written for Java developers who want to use JBoss on their projects, the book covers the gamut of deploying J2EE technologies on JBoss, providing a brief survey of each subject aimed at the working professional with limited time. If you're one of the legions of developers who have decided to give JBoss a try, then "JBoss at Work: A Practical Guide" is your next logical purchase. It'll show you in plain language how to use the fastest growing open source tool in the industry today. If you've worked with JBoss before, this book will get you up to speed on JBoss 4, JBoss WS (web services), and Hibernate 3.

JUnit Pocket Guide (Paperback): Kent Beck JUnit Pocket Guide (Paperback)
Kent Beck
R254 R207 Discovery Miles 2 070 Save R47 (19%) Ships in 10 - 15 working days

JUnit, created by Kent Beck and Erich Gamma, is an open source framework for test-driven development in any Java-based code. JUnit automates unit testing and reduces the effort required to frequently test code while developing it.

While there are lots of bits of documentation all over the place, there isn't a go-to-manual that serves as a quick reference for JUnit. This Pocket Guide meets the need, bringing together all the bits of hard to remember information, syntax, and rules for working with JUnit, as well as delivering the insight and sage advice that can only come from a technology's creator.

Any programmer who has written, or is writing, Java Code will find this book valuable. Specifically it will appeal to programmers and developers of any level that use JUnit to do their unit testing in test-driven development under agile methodologies such as Extreme Programming (XP) [another Beck creation].

Ransomware and Cyber Extortion - Response and Prevention (Paperback): Sherri Davidoff, Matt Durrin, Karen Sprenger Ransomware and Cyber Extortion - Response and Prevention (Paperback)
Sherri Davidoff, Matt Durrin, Karen Sprenger
R1,200 R1,059 Discovery Miles 10 590 Save R141 (12%) Ships in 12 - 17 working days

Protect Your Organization from Devastating Ransomware and Cyber Extortion Attacks Ransomware and other cyber extortion crimes have reached epidemic proportions. The secrecy surrounding them has left many organizations unprepared to respond. Your actions in the minutes, hours, days, and months after an attack may determine whether you'll ever recover. You must be ready. With this book, you will be. Ransomware and Cyber Extortion is the ultimate practical guide to surviving ransomware, exposure extortion, denial-of-service, and other forms of cyber extortion. Drawing heavily on their own unpublished case library, cyber security experts Sherri Davidoff, Matt Durrin, and Karen Sprenger guide you through responding faster, minimizing damage, investigating more effectively, expediting recovery, and preventing it from happening in the first place. Proven checklists help your security teams act swiftly and effectively together, throughout the entire lifecycle--whatever the attack and whatever the source. Understand different forms of cyber extortion and how they evolved Quickly recognize indicators of compromise Minimize losses with faster triage and containment Identify threats, scope attacks, and locate "patient zero" Initiate and manage a ransom negotiation--and avoid costly mistakes Decide whether to pay, how to perform due diligence, and understand risks Know how to pay a ransom demand while avoiding common pitfalls Reduce risks of data loss and reinfection Build a stronger, holistic cybersecurity program that reduces your risk of getting hacked This guide offers immediate value to everyone involved in prevention, response, planning, or policy: CIOs, CISOs, incident responders, investigators, negotiators, executives, legislators, regulators, law enforcement professionals, and others. Register your book for convenient access to downloads, updates, and/or corrections as they become available. See inside book for details.

Managing IMAP (Paperback, 1st ed): Dianna Mullet Managing IMAP (Paperback, 1st ed)
Dianna Mullet
R1,225 R882 Discovery Miles 8 820 Save R343 (28%) Ships in 12 - 17 working days

Whether you're a manager, system integrator, or system administrator on the front lines of Internet messaging, you'll find this a valuable tool for IMAP system provision, maintenance and support. Managing IMAP covers the IMAP protocol, setting up a client, IMAP security, performance monitoring, and tools. There are chapters devoted to two of the most popular servers, the University of Washington server and Cyrus; and detailed appendixes on topics such as TCL, procmail, Sieve, and sendmail.

Asterisk Cookbook (Paperback): Leif Madsen Asterisk Cookbook (Paperback)
Leif Madsen
R715 R520 Discovery Miles 5 200 Save R195 (27%) Ships in 12 - 17 working days

Asterisk has a wealth of features to help you customize your PBX to fill very specific business needs. This short cookbook offers recipes for tackling dialplan fundamentals, making and controlling calls, and monitoring channels in your PBX environment. Each recipe includes a simple code solution you can put to work immediately, along with a detailed discussion that offers insight into why and how the recipe works.

This book focuses on Asterisk 1.8, although many of the conventions and information presented are version-agnostic. These recipes include solutions to help you: Authenticate callers before moving on in your dialplan Redirect calls received by your auto-attendant Create an automatic call-back service Initiate hot-desking to login to and accept calls at any office device Monitor and interrupt live calls to train new employees at a call center Record calls from your Asterisk dialplan

J2EE Design Pattern (Paperback, September 2003): William C.R. Crawford J2EE Design Pattern (Paperback, September 2003)
William C.R. Crawford
R1,220 R876 Discovery Miles 8 760 Save R344 (28%) Ships in 12 - 17 working days

Crawford and Kaplan's J2EE Design Patterns approaches the subject in a unique, highly practical and pragmatic way. Rather than simply present another catalog of design patterns, the authors broaden the scope by discussing ways to choose design patterns when building an enterprise application from scratch, looking closely at the real world tradeoffs that Java developers must weigh when architecting their applications. Then they go on to show how to apply the patterns when writing realworld software. They also extend design patterns into areas not covered in other books, presenting original patterns for data modeling, transaction / process modeling, and interoperability.

Programming .NET Web Services (Paperback): Alex Ferrara Programming .NET Web Services (Paperback)
Alex Ferrara
R991 R728 Discovery Miles 7 280 Save R263 (27%) Ships in 12 - 17 working days

This comprehensive tutorial teaches programmers the skills they need to develop XML web services hosted on the Microsoft .NET platform. Programming .NET Web Services also shows you how to consume these services on both Microsoft and non-Windows clients, and how to weave them into well-designed and scalable applications. For those interested in building industrial-strength web services, this book is full of practical information and good old-fashioned advice.

Microsoft Azure Sentinel - Planning and implementing Microsoft's cloud-native SIEM solution (Paperback, 2nd edition): Yuri... Microsoft Azure Sentinel - Planning and implementing Microsoft's cloud-native SIEM solution (Paperback, 2nd edition)
Yuri Diogenes, Nicholas DiCola, Tiander Turpijn
R916 R811 Discovery Miles 8 110 Save R105 (11%) Ships in 9 - 15 working days

Build next-generation security operations with Microsoft Sentinel Microsoft Sentinel is the scalable, cloud-native, security information and event management (SIEM) solution for automating and streamlining threat identification and response across your enterprise. Now, three leading experts guide you step-by-step through planning, deployment, and operations, helping you use Microsoft Sentinel to escape the complexity and scalability challenges of traditional solutions. Fully updated for the latest enhancements, this edition introduces new use cases for investigation, hunting, automation, and orchestration across your enterprise and all your clouds. The authors clearly introduce each service, concisely explain all new concepts, and present proven best practices for maximizing Microsoft Sentinel's value throughout security operations. Three of Microsoft's leading security operations experts show how to: Review emerging challenges that make better cyberdefense an urgent priority See how Microsoft Sentinel responds by unifying alert detection, threat visibility, proactive hunting, and threat response Explore components, architecture, design, and initial configuration Ingest alerts and raw logs from all sources you need to monitor Define and validate rules that prevent alert fatigue Use threat intelligence, machine learning, and automation to triage issues and focus on high-value tasks Add context with User and Entity Behavior Analytics (UEBA) and Watchlists Hunt sophisticated new threats to disrupt cyber kill chains before you're exploited Enrich incident management and threat hunting with Jupyter notebooks Use Playbooks to automate more incident handling and investigation tasks Create visualizations to spot trends, clarify relationships, and speed decisions Simplify integration with point-and-click data connectors that provide normalization, detection rules, queries, and Workbooks About This Book For cybersecurity analysts, security administrators, threat hunters, support professionals, engineers, and other IT professionals concerned with security operations For both Microsoft Azure and non-Azure users at all levels of experience

Unblockchain - A Brain-Friendly Guide for Blockchain, from Bitcoin to Ethereum Deep-Dive (Paperback): Henrique Centieiro Unblockchain - A Brain-Friendly Guide for Blockchain, from Bitcoin to Ethereum Deep-Dive (Paperback)
Henrique Centieiro
R579 Discovery Miles 5 790 Ships in 10 - 15 working days
OpenShift Multi-Cluster Management Handbook - Go from architecture to pipelines using GitOps (Paperback): Giovanni Fontana,... OpenShift Multi-Cluster Management Handbook - Go from architecture to pipelines using GitOps (Paperback)
Giovanni Fontana, Rafael Pecora, Marcos Amorim
R1,121 Discovery Miles 11 210 Ships in 10 - 15 working days

Discover best practices for designing and scaling robust OpenShift clusters' architecture for different workloads Manage multiple clusters on-premise or in the cloud using multi-cluster management tools to keep them secure and compliant Implement multi-cluster CI/CD on OpenShift using GitOps Key Features Discover best practices to design robust OpenShift architecture and scale them to different workloads Understand the minimal collection of topics you should consider in your container security strategy Implement multi-cluster CI/CD on OpenShift using GitOps Book DescriptionFor IT professionals working with Red Hat OpenShift Container Platform, the key to maximizing efficiency is understanding the powerful and resilient options to maintain the software development platform with minimal effort. OpenShift Multi-Cluster Management Handbook is a deep dive into the technology, containing knowledge essential for anyone who wants to work with OpenShift. This book starts by covering the architectural concepts and definitions necessary for deploying OpenShift clusters. It then takes you through designing Red Hat OpenShift for hybrid and multi-cloud infrastructure, showing you different approaches for multiple environments (from on-premises to cloud providers). As you advance, you'll learn container security strategies to protect pipelines, data, and infrastructure on each layer. You'll also discover tips for critical decision making once you understand the importance of designing a comprehensive project considering all aspects of an architecture that will allow the solution to scale as your application requires. By the end of this OpenShift book, you'll know how to design a comprehensive Red Hat OpenShift cluster architecture, deploy it, and effectively manage your enterprise-grade clusters and other critical components using tools in OpenShift Plus. What you will learn Understand the important aspects of OpenShift cluster architecture Design your infrastructure to run across hybrid clouds Define the best strategy for multitenancy on OpenShift Discover efficient troubleshooting strategies with OpenShift Build and deploy your applications using OpenShift Pipelines (Tekton) Work with ArgoCD to deploy your applications using GitOps practices Monitor your clusters' security using Red Hat Advanced Cluster Security Who this book is forThis book is for a wide range of IT professionals using or looking to use OpenShift with a hybrid/multi-cloud approach. In this book, IT architects will find practical guidance on OpenShift clusters' architecture, while Sysadmins, SREs, and IT operators will learn more about OpenShift deployment, troubleshooting, networking, security, and tools to manage multiple clusters from a single pane. For DevOps engineers, this book covers CI/CD strategies for multiple clusters using GitOps. Equipped with just basic knowledge of containerization and Kubernetes, you're ready to get started.

Seniors Guide to iPhone 12 Pro and 12 Pro Max Cameras - Seniors Guide to Shooting Professional photographs and Cinematic Videos... Seniors Guide to iPhone 12 Pro and 12 Pro Max Cameras - Seniors Guide to Shooting Professional photographs and Cinematic Videos on the iPhone 12 Pro and 12 Pro Max (Paperback)
Konrad Christopher
R404 Discovery Miles 4 040 Ships in 10 - 15 working days
Google Drive Made Easy - Online Storage and Sharing the Easy Way (Paperback): James Bernstein Google Drive Made Easy - Online Storage and Sharing the Easy Way (Paperback)
James Bernstein
R398 Discovery Miles 3 980 Ships in 10 - 15 working days
Microsoft Office 365 and SharePoint Online Cookbook - - An all-in-one guide to Microsoft 365 workloads, including SharePoint,... Microsoft Office 365 and SharePoint Online Cookbook - - An all-in-one guide to Microsoft 365 workloads, including SharePoint, Microsoft Teams, Power Platform, and more (Paperback, 2nd Revised edition)
Gaurav Mahajan, Sudeep Ghatak, Nate Chamberlain, Scott Brewster
R1,195 Discovery Miles 11 950 Ships in 10 - 15 working days

With over 100 practical recipes that offer extensive coverage of Microsoft 365, learn how to enhance collaboration, implement RPA, and develop business intelligence for your organization -with an accompanying eBook for extra coverage. Key Features * Enhanced focus on core topics for SharePoint Online, Power Platform, and Microsoft Teams * Collaborate with your team and external users effectively using MS Teams * Create low-code solutions such as bots, forms, dashboards, and workflows using the Power Platform. Book Description Microsoft 365 provides tools for managing organizational tasks like content management, communication, report creation, and business automation processes. With this book, you'll get to grips with enabling workspace collaboration and productivity using Microsoft SharePoint Online, Teams, and the Power Platform. Featuring an additional online resource introducing popular Microsoft apps such as To Do, Viva Insights, and Viva Learning. In addition to guiding you through the implementation of Microsoft 365 apps, this practical guide helps you to learn from a Microsoft consultant's extensive experience of working with the Microsoft business suite. This cookbook covers recipes for implementing SharePoint Online for various content management tasks. You'll learn how to create sites for your organization and enhance collaboration across the business and then see how you can boost productivity with apps such as Microsoft Teams, Power Platform, Planner, Delve, and M365 Groups. You'll find out how to use the Power Platform step-by-step, making the most of Power Apps, Power Automate, Power BI, and Power Virtual Agents. Finally, the book focuses on the SharePoint framework, which helps you to build custom Teams and SharePoint solutions. By the end of the book, you will be ready to use Microsoft 365 and SharePoint Online to enhance business productivity using a broad set of tools What you will learn * Discover the new employee experience application, Microsoft Viva * Use Microsoft Forms to create polls, surveys, tests, and quizzes * Encounter a wide range of apps and cloud services in Microsoft 365 * Discover how to use SharePoint Online to create and manage content * Store and share documents using SharePoint Online * Improve your search experience with Microsoft Search * Build business solutions with extra coverage of the Power Platform * Enhance capabilities in Teams using the SharePoint Framework (SPFx) Who This Book Is For This book is for business professionals, IT administrators, enterprise developers and architects, and anyone who is new to using MS 365 for the effective implementation of Microsoft apps. Prior experience with Office 365 and SharePoint will assist with understanding the recipes effortlessly, but is not required.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Enterprise Level Security 2 - Advanced…
Kevin E. Foltz, William R. Simpson, … Paperback R1,397 Discovery Miles 13 970
Foundations Of BizTalk Server 2006
Daniel Woolston Paperback R1,053 R849 Discovery Miles 8 490
Right Way to Select Technology - Get the…
Tony Byrne, Jarrod Gingras Paperback R1,268 Discovery Miles 12 680
Designing and Developing Secure Azure…
Michael Howard, Simone Curzi, … Paperback R827 Discovery Miles 8 270
High-Performance Computing and…
Marian Bubak, Roy Williams, … Paperback R3,096 Discovery Miles 30 960
Programming Workflow Applications with…
Richard Lam Paperback R1,814 Discovery Miles 18 140
Slack For Dummies
P. Simon Paperback R498 Discovery Miles 4 980
CompuServe 2000 Made Simple
Keith Brindley Paperback R454 Discovery Miles 4 540
Network Automation Made Easy
Ivo Pinto Paperback R1,220 Discovery Miles 12 200
Pro Apache Geronimo
Kishore Kumar Paperback R1,059 R855 Discovery Miles 8 550

 

Partners