|
|
Books > Computing & IT > Computer communications & networking > Networking standards & protocols
In the event of a disastrous event leading to the loss of
communication networks, ad-hoc networks are a potent wireless
communication resource because of their unique features including
being quickly deployable and having a distributed nature, large
coverage area, reduced cost, and more. Flying ad-hoc networks
(FANETS) and vehicular ad-hoc networks (VANETS) are the future
technology and can solve many problems in e-commerce delivery
through drones, agriculture, vaccine delivery, and more. The unique
characteristics of these networks and special requirements have
created new challenges for the research community in recent
decades. Modelling and Simulation of Fast-Moving Ad-Hoc Networks
(FANETs and VANETs) enhances the modelling and simulation aspects
of FANETS and VANETS and understands the protocols in mac layer and
network layers for fast-moving ad-hoc networks. It presents
simulations run using various simulation tools and measures the
performance metrics of ad-hoc networks. Covering topics such as
emulation tools, secure communication, and modelling software, this
premier reference source is an excellent resource for computer
scientists, IT specialists, business leaders and managers, supply
chain and logistics management, libraries, students, government
officials, international organizations, law enforcement, engineers,
agriculturalists, researchers, and academicians.
Explore Ansible Automation Platform and understand how the
different pieces interact to standardize and scale automation Key
Features Curated by a senior consultant at Red Hat with real-world
examples to maximize use of Ansible Automation Platform Use roles
and modules to create interactive playbooks in Ansible Automation
Platform Discover best practices for simplifying management of
Ansible Automation Platform Book DescriptionWhile you can use any
automation software to simplify task automation, scaling automation
to suit your growing business needs becomes difficult using only a
command-line tool. Ansible Automation Platform standardizes how
automation is deployed, initiated, delegated, and audited, and this
comprehensive guide shows you how you can simplify and scale its
management. The book starts by taking you through the ways to get
Ansible Automation Platform installed, their pros and cons, and the
initial configuration. You'll learn about each object in the
platform, how it interacts with other objects, as well as best
practices for defining and managing objects to save time. You'll
see how to maintain the created pieces with infrastructure as code.
As you advance, you'll monitor workflows with CI/CD playbooks and
understand how Ansible Automation Platform integrates with many
other services such as GitLab and GitHub. By the end of this book,
you'll have worked through real-world examples to make the most of
the platform while learning how to manipulate, manage, and deploy
any playbook to Ansible Automation Platform. What you will learn
Get the hang of different parts of Ansible Automation Platform and
their maintenance Back up and restore an installation of Ansible
Automation Platform Launch and configure basic and advanced
workflows and jobs Create your own execution environment using
CI/CD pipelines Interact with Git, Red Hat Authentication Server,
and logging services Integrate the Automation controller with
services catalog Use Automation Mesh to scale Automation Controller
Who this book is forThis book is for IT administrators, DevOps
engineers, cloud engineers, and automation engineers seeking to
understand and maintain the controller part of Ansible Automation
Platform. If you have basic knowledge of Ansible, can set up a
virtual machine, or have OpenShift experience, and want to know
more about scaling Ansible, this book is for you.
Discover practical recipes to help you efficiently monitor
enterprise IT infrastructure for Microsoft Windows, Linux,
networking, and more Key Features Find out how you can leverage
some of the most exciting features of Zabbix 6 Perform professional
IT infrastructure and application monitoring on multiple platforms
Discover easy-to-follow, practical solutions to problems in network
monitoring with Zabbix Book DescriptionThis updated second edition
of the Zabbix 6 IT Infrastructure Monitoring Cookbook brings you
new recipes, updated with Zabbix 6 functionality. You'll learn how
to set up Zabbix with built-in high availability, use the improved
Business Service Monitoring, set up automatic reporting, and create
advanced triggers. Zabbix offers useful insights into your
infrastructure performance and issues and enables you to enhance
your monitoring setup with its powerful features. This book covers
hands-on, easy-to-follow recipes for using Zabbix 6 to monitor
effectively the performance of devices and applications over the
network. You'll start by working your way through the installation
and most prominent features of Zabbix and make the right design
choices for building a scalable and easily manageable environment.
This Zabbix book contains recipes for building items and triggers
for different types of monitoring, building templates, and using
Zabbix proxies. Next, you'll use the Zabbix API for customization
and manage your Zabbix server and database efficiently. Finally,
you'll find quick solutions to the common and not-so-common
problems that you may encounter in your Zabbix monitoring work. By
the end of this book, you'll be able to use Zabbix for all your
monitoring needs and build a solid Zabbix setup by leveraging its
key functionalities. What you will learn Implement your
high-availability Zabbix setup Build templates and explore the
different types of monitoring available in Zabbix 6 Use Zabbix
proxies to scale your environment effectively Work with custom
integrations and the Zabbix API Set up advanced triggers and
effective alerting Maintain your Zabbix setup for scaling, backups,
and upgrades Discover how to perform advanced Zabbix database
management Monitor cloud-based products such as Amazon Web Services
(AWS), Azure, and Docker Who this book is forThis book is for IT
engineers who want to get started with Zabbix and anyone with an
intermediate-level understanding of Zabbix looking to extend their
knowledge. Although not necessary, prior experience with Zabbix
will help you to make the most of this book.
Get to grips with the most common as well as complex Linux
networking configurations, tools, and services to enhance your
professional skills Key Features Learn how to solve critical
networking problems using real-world examples Configure common
networking services step by step in an enterprise environment
Discover how to build infrastructure with an eye toward defense
against common attacks Book DescriptionAs Linux continues to gain
prominence, there has been a rise in network services being
deployed on Linux for cost and flexibility reasons. If you are a
networking professional or an infrastructure engineer involved with
networks, extensive knowledge of Linux networking is a must. This
book will guide you in building a strong foundation of Linux
networking concepts. The book begins by covering various major
distributions, how to pick the right distro, and basic Linux
network configurations. You'll then move on to Linux network
diagnostics, setting up a Linux firewall, and using Linux as a host
for network services. You'll discover a wide range of network
services, why they're important, and how to configure them in an
enterprise environment. Finally, as you work with the example
builds in this Linux book, you'll learn to configure various
services to defend against common attacks. As you advance to the
final chapters, you'll be well on your way towards building the
underpinnings for an all-Linux datacenter. By the end of this book,
you'll be able to not only configure common Linux network services
confidently, but also use tried-and-tested methodologies for future
Linux installations. What you will learn Use Linux as a
troubleshooting and diagnostics platform Explore Linux-based
network services Configure a Linux firewall and set it up for
network services Deploy and configure Domain Name System (DNS) and
Dynamic Host Configuration Protocol (DHCP) services securely
Configure Linux for load balancing, authentication, and
authorization services Use Linux as a logging platform for network
monitoring Deploy and configure Intrusion Prevention Services (IPS)
Set up Honeypot solutions to detect and foil attacks Who this book
is forThis book is for IT and Windows professionals and admins
looking for guidance in managing Linux-based networks. Basic
knowledge of networking is necessary to get started with this book.
With the internet of things (IoT), it is proven that enormous
networks can be created to interconnect objects and facilitate
daily life in a variety of domains. Research is needed to study how
these improvements can be applied in different ways, using
different technologies, and through the creation of different
applications. IoT Protocols and Applications for Improving
Industry, Environment, and Society contains the latest research on
the most important areas and challenges in the internet of things
and its intersection with technologies and tools such as artificial
intelligence, blockchain, model-driven engineering, and cloud
computing. The book covers subfields that examine smart homes,
smart towns, smart earth, and the industrial internet of things in
order to improve daily life, protect the environment, and create
safer and easier jobs. While covering a range of topics within IoT
including Industry 4.0, security, and privacy, this book is ideal
for computer scientists, engineers, practitioners, stakeholders,
researchers, academicians, and students who are interested in the
latest applications of IoT.
Harness the capabilities of Zscaler to deliver a secure,
cloud-based, scalable web proxy and provide a zero-trust network
access solution for private enterprise application access to end
users Key Features Get up to speed with Zscaler without the need
for expensive training Implement Zscaler Internet Access (ZIA) and
Zscaler Private Access (ZPA) security solutions with real-world
deployments Find out how to choose the right options and features
to architect a customized solution with Zscaler Book
DescriptionMany organizations are moving away from on-premises
solutions to simplify administration and reduce expensive hardware
upgrades. This book uses real-world examples of deployments to help
you explore Zscaler, an information security platform that offers
cloud-based security for both web traffic and private enterprise
applications. You'll start by understanding how Zscaler was born in
the cloud, how it evolved into a mature product, and how it
continues to do so with the addition of sophisticated features that
are necessary to stay ahead in today's corporate environment. The
book then covers Zscaler Internet Access and Zscaler Private Access
architectures in detail, before moving on to show you how to map
future security requirements to ZIA features and transition your
business applications to ZPA. As you make progress, you'll get to
grips with all the essential features needed to architect a
customized security solution and support it. Finally, you'll find
out how to troubleshoot the newly implemented ZIA and ZPA solutions
and make them work efficiently for your enterprise. By the end of
this Zscaler book, you'll have developed the skills to design,
deploy, implement, and support a customized Zscaler security
solution. What you will learn Understand the need for Zscaler in
the modern enterprise Study the fundamental architecture of the
Zscaler cloud Get to grips with the essential features of ZIA and
ZPA Find out how to architect a Zscaler solution Discover best
practices for deploying and implementing Zscaler solutions
Familiarize yourself with the tasks involved in the operational
maintenance of the Zscaler solution Who this book is forThis book
is for security engineers, security architects, security managers,
and security operations specialists who may be involved in
transitioning to or from Zscaler or want to learn about deployment,
implementation, and support of a Zscaler solution. Anyone looking
to step into the ever-expanding world of zero-trust network access
using the Zscaler solution will also find this book useful.
Develop technical skills and expertise to automate AWS networking
tasks Key Features A fast paced guide that will help you pass the
exam with confidence Learn advanced skill sets to build effective
AWS networking solutions Enhance your AWS skills with practice
exercises and mock tests Book DescriptionAmazon has recently come
up a with specialty certifications which validates a particular
user's expertise that he/she would want to build a career in. Since
the Cloud market now demands of AWS networking skills this becomes
the most wanted certification to upheld ones industry portfolio.
This book would be your ideal companion to getting skilled with
complex and creative networking solutions. Cloud practitioners or
associate-level certified individuals interested in validating
advanced skills in networking can opt for this practical guide.
This book will include topics that will help you design and
implement AWS and hybrid IT network architectures along with some
network automation tasks. You will also delve deep into topics that
will help you design and maintain network architecture for all AWS
services. Like most of our certification guides this book will also
follow a unique approach of testing your learning with
chapter-level practice exercises and certification-based mock
tests. The exam mock tests will help you gauge whether you are
ready to take the certification exam or not. This book will also be
an advanced guide for networking professionals to enhance their
networking skills and get certified. By the end of this book, you
will be all equipped with AWS networking concepts and techniques
and will have mastered core architectural best practices. What you
will learn Formulate solution plans and provide guidance on AWS
architecture best practices Design and deploy scalable, highly
available, and fault-tolerant systems on AWS Identify the tools
required to replicate an on-premises network in AWS Analyze the
access and egress of data to and from AWS Select the appropriate
AWS service based on data, compute, database, or security
requirements Estimate AWS costs and identify cost control
mechanisms Who this book is forIf you are a system administrator,
or a network engineer interested in getting certified with an
advanced Cloud networking certification then this book is for you.
Prior experience in Cloud administration and networking would be
necessary.
A comprehensive guide to securing your Linux system against
cyberattacks and intruders Key Features Deliver a system that
reduces the risk of being hacked Explore a variety of advanced
Linux security techniques with the help of hands-on labs Master the
art of securing a Linux environment with this end-to-end practical
guide Book DescriptionFrom creating networks and servers to
automating the entire working environment, Linux has been extremely
popular with system administrators for the last couple of decades.
However, security has always been a major concern. With limited
resources available in the Linux security domain, this book will be
an invaluable guide in helping you get your Linux systems properly
secured. Complete with in-depth explanations of essential concepts,
practical examples, and self-assessment questions, this book begins
by helping you set up a practice lab environment and takes you
through the core functionalities of securing Linux. You'll practice
various Linux hardening techniques and advance to setting up a
locked-down Linux server. As you progress, you will also learn how
to create user accounts with appropriate privilege levels, protect
sensitive data by setting permissions and encryption, and configure
a firewall. The book will help you set up mandatory access control,
system auditing, security profiles, and kernel hardening, and
finally cover best practices and troubleshooting techniques to
secure your Linux environment efficiently. By the end of this Linux
security book, you will be able to confidently set up a Linux
server that will be much harder for malicious actors to compromise.
What you will learn Create locked-down user accounts with strong
passwords Configure firewalls with iptables, UFW, nftables, and
firewalld Protect your data with different encryption technologies
Harden the secure shell service to prevent security break-ins Use
mandatory access control to protect against system exploits Harden
kernel parameters and set up a kernel-level auditing system Apply
OpenSCAP security profiles and set up intrusion detection Configure
securely the GRUB 2 bootloader and BIOS/UEFI Who this book is
forThis book is for Linux administrators, system administrators,
and network engineers interested in securing moderate to complex
Linux environments. Security consultants looking to enhance their
Linux security skills will also find this book useful. Working
experience with the Linux command line and package management is
necessary to understand the concepts covered in this book.
Become well-versed with basic networking concepts such as routing,
switching, and subnetting, and prepare for the Microsoft 98-366
exam Key Features Build a strong foundation in networking concepts
Explore both the hardware and software aspects of networking
Prepare by taking mock tests with up-to-date exam questions Book
DescriptionA network is a collection of computers, servers, mobile
devices, or other computing devices connected for sharing data.
This book will help you become well versed in basic networking
concepts and prepare to pass Microsoft's MTA Networking
Fundamentals Exam 98-366. Following Microsoft's official syllabus,
the book starts by covering network infrastructures to help you
differentiate intranets, internets, and extranets, and learn about
network topologies. You'll then get up to date with common network
hardware devices such as routers and switches and the media types
used to connect them together. As you advance, the book will take
you through different protocols and services and the requirements
to follow a standardized approach to networking. You'll get to
grips with the OSI and TCP/IP models as well as IPv4 and IPv6. The
book also shows you how to recall IP addresses through name
resolution. Finally, you'll be able to practice everything you've
learned and take the exam confidently with the help of mock tests.
By the end of this networking book, you'll have developed a strong
foundation in the essential networking concepts needed to pass Exam
98-366. What you will learnThings you will learn: Become well
versed in networking topologies and concepts Understand network
infrastructures such as intranets, extranets, and more Explore
network switches, routers, and other network hardware devices Get
to grips with different network protocols and models such as OSI
and TCP/IP Work with a variety of network services such as DHCP,
NAT, firewalls, and remote access Apply networking concepts in
different real-world scenarios Who this book is forIf you're new to
the IT industry or simply want to gain a thorough understanding of
networking, this book is for you. A basic understanding of the
Windows operating system and your network environment will be
helpful.
|
|