Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)
Kubernetes radically changes the way applications are built and deployed in the cloud. Since its introduction in 2014, this container orchestrator has become one of the largest and most popular open source projects in the world. The updated edition of this practical book shows developers and ops personnel how Kubernetes and container technology can help you achieve new levels of velocity, agility, reliability, and efficiency. Kelsey Hightower, Brendan Burns, and Joe Beda-who've worked on Kubernetes at Google and beyond-explain how this system fits into the lifecycle of a distributed application. You'll learn how to use tools and APIs to automate scalable distributed systems, whether it's for online services, machine learning applications, or a cluster of Raspberry Pi computers. Create a simple cluster to learn how Kubernetes works Dive into the details of deploying an application using Kubernetes Learn specialized objects in Kubernetes, such as DaemonSets, jobs, ConfigMaps, and secrets Explore deployments that tie together the lifecycle of a complete application Get practical examples of how to develop and deploy real-world applications in Kubernetes
Praise for the First Edition: "This outstanding book ... gives the reader robust concepts and implementable knowledge of this environment. Graphical user interface (GUI)-based users and developers do not get short shrift, despite the command-line interface's (CLI) full-power treatment. ... Every programmer should read the introduction's Unix/Linux philosophy section. ... This authoritative and exceptionally well-constructed book has my highest recommendation. It will repay careful and recursive study." --Computing Reviews, August 2011 Mastering Modern Linux, Second Edition retains much of the good material from the previous edition, with extensive updates and new topics added. The book provides a comprehensive and up-to-date guide to Linux concepts, usage, and programming. The text helps the reader master Linux with a well-selected set of topics, and encourages hands-on practice. The first part of the textbook covers interactive use of Linux via the Graphical User Interface (GUI) and the Command-Line Interface (CLI), including comprehensive treatment of the Gnome desktop and the Bash Shell. Using different apps, commands and filters, building pipelines, and matching patterns with regular expressions are major focuses. Next comes Bash scripting, file system structure, organization, and usage. The following chapters present networking, the Internet and the Web, data encryption, basic system admin, as well as Web hosting. The Linux Apache MySQL/MariaDB PHP (LAMP) Web hosting combination is also presented in depth. In the last part of the book, attention is turned to C-level programming. Topics covered include the C compiler, preprocessor, debugger, I/O, file manipulation, process control, inter-process communication, and networking. The book includes many examples and complete programs ready to download and run. A summary and exercises of varying degrees of difficulty can be found at the end of each chapter. A companion website (http://mml.sofpower.com) provides appendices, information updates, an example code package, and other resources for instructors, as well as students.
In order to thoroughly understand what makes Linux tick and why it works so well on a wide variety of systems, you need to delve deep into the heart of the kernel. The kernel handles all interactions between the CPU and the external world, and determines which programs will share processor time, in what order. It manages limited memory so well that hundreds of processes can share the system efficiently, and expertly organizes data transfers so that the CPU isn't kept waiting any longer than necessary for the relatively slow disks. The third edition of "Understanding the Linux Kernel" takes you on a guided tour of the most significant data structures, algorithms, and programming tricks used in the kernel. Probing beyond superficial features, the authors offer valuable insights to people who want to know how things really work inside their machine. Important Intel-specific features are discussed. Relevant segments of code are dissected line by line. But the book covers more than just the functioning of the code; it explains the theoretical underpinnings of why Linux does things the way it does. This edition of the book covers Version 2.6, which has seen significant changes to nearly every kernel subsystem, particularly in the areas of memory management and block devices. The book focuses on the following topics: Memory management, including file buffering, process swapping, and Direct memory Access (DMA) The Virtual Filesystem layer and the Second and Third Extended Filesystems Process creation and scheduling Signals, interrupts, and the essential interfaces to device drivers Timing Synchronization within the kernel Interprocess Communication (IPC) Program execution "Understanding the Linux Kernel" will acquaint you with all the inner workings of Linux, but it's more than just an academic exercise. You'll learn what conditions bring out Linux's best performance, and you'll see how it meets the challenge of providing good system response during process scheduling, file access, and memory management in a wide variety of environments. This book will help you make the most of your Linux system.
Artificial Intelligence is the most exciting technology of the century, and Deep Learning is, quite literally, the "brain" behind the world's smartest Artificial Intelligence systems out there. Grokking Deep Learning is the perfect place to begin the deep learning journey. Rather than just learning the "black box" API of some library or framework, readers will actually understand how to build these algorithms completely from scratch. Key Features: Build neural networks that can see and understand images Build an A.I. that will learn to defeat you in a classic Atari game Hands-on Learning Written for readers with high school-level math and intermediate programming skills. Experience with Calculus is helpful but not required. ABOUT THE TECHNOLOGY Deep Learning is a subset of Machine Learning, which is a field dedicated to the study and development of machines that can learn, often with the goal of eventually attaining general artificial intelligence.
Based on the author's popular Annoyances.org web sites, Windows Me Annoyances is an authoritative collection of techniques for customizing Windows Me. Packed with creative and seldom-documented ways to quickly identify and fix a particular annoyance or customize Windows for individual needs, it's the definitive resource for dealing with crashes, unintelligible error messages, unwanted icons, and much more.
Effectively integrating theory and hands-on practice, Networking Systems Design and Development provides students and IT professionals with the knowledge and skills needed to design, implement, and manage fully functioning network systems using readily available Linux networking tools. Recognizing that most students are beginners in the field of networking, the text provides step-by-step instruction for setting up a virtual lab environment at home. Grounded in real-world applications, this book provides the ideal blend of conceptual instruction and lab work to give students and IT professionals a quick start in developing network systems using the Linux operating system. Leaving nothing to chance, it provides readers with detailed guidance through the many hands-on exercises.
Creating and maintaining a fully functioning enterprise network system doesn?t have to be expensive. This self-contained text provides readers with the tools to create their own networks using open source materials?and the virtual lab environment to develop problem-solving skills that will serve them well in their careers.
For system administrators, programmers, and end users, shell command or carefully crafted shell script can save you time and effort, or facilitate consistency and repeatability for a variety of common tasks. This cookbook provides more than 300 practical recipes for using bash, the popular Unix shell that enables you to harness and customize the power of any Unix or Linux system. Ideal for new and experienced users alike-including proficient Windows users and sysadmins-this updated second edition helps you solve a wide range of problems. You'll learn ways to handle input/output, file manipulation, program execution, administrative tasks, and many other challenges. Each recipe includes one or more scripting examples and a discussion of why the solution works. You'll find recipes for problems including: Standard output and input, and executing commands Shell variables, shell logic, and arithmetic Intermediate shell tools and advanced scripting Searching for files with find, locate, and slocate Working with dates and times Creating shell scripts for various end-user tasks Working with tasks that require parsing Writing secure shell scripts Configuring and customizing bash
A compendium of shell scripting recipes that can immediately be used, adjusted, and applied The shell is the primary way of communicating with the Unix and Linux systems, providing a direct way to program by automating simple-to-intermediate tasks. With this book, Linux expert Steve Parker shares a collection of shell scripting recipes that can be used as is or easily modified for a variety of environments or situations. The book covers shell programming, with a focus on Linux and the Bash shell; it provides credible, real-world relevance, as well as providing the flexible tools to get started immediately.Shares a collection of helpful shell scripting recipes that can immediately be used for various of real-world challenges Features recipes for system tools, shell features, and systems administration Provides a host of plug and play recipes for to immediately apply and easily modify so the wheel doesn't have to be reinvented with each challenge faced Come out of your shell and dive into this collection of tried and tested shell scripting recipes that you can start using right away
The Second Edition of the Best Damn Windows Server Book Period is
completely revised and updated to Windows Server 2008.
Contrary to popular belief, there has never been any shortage of
Macintosh-related security issues. OS9 had issues that warranted
attention. However, due to both ignorance and a lack of research,
many of these issues never saw the light of day. No solid
techniques were published for executing arbitrary code on OS9, and
there are no notable legacy Macintosh exploits. Due to the combined
lack of obvious vulnerabilities and accompanying exploits,
Macintosh appeared to be a solid platform. Threats to Macintosh's
OS X operating system are increasing in sophistication and number.
Whether it is the exploitation of an increasing number of holes,
use of rootkits for post-compromise concealment or disturbed denial
of service, knowing why the system is vulnerable and understanding
how to defend it is critical to computer security.
Firewalls, Network Address Translation (NAT), network logging and accounting are all provided by Linux's Netfilter system, also known by the name of the command used to administer it, iptables. The iptables interface is the most sophisticated ever offered on Linux and makes Linux an extremely flexible system for any kind of network filtering you might do. Large sets of filtering rules can be grouped in ways that makes it easy to test them and turn them on and off. Do you watch for all types of ICMP traffic--some of them quite dangerous? Can you take advantage of stateful filtering to simplify the management of TCP connections? Would you like to track how much traffic of various types you get? This pocket reference will help you at those critical moments when someone asks you to open or close a port in a hurry, either to enable some important traffic or to block an attack. The book will keep the subtle syntax straight and help you remember all the values you have to enter in order to be as secure as possible. The book has an introductory section that describes applications, followed by a reference/encyclopaedic section with all the matches and targets arranged alphabetically.
Prepare for Microsoft Exam 70-774-and help demonstrate your real-world mastery of performing key data science activities with Azure Machine Learning services. Designed for experienced IT professionals ready to advance their status, Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the MCSA level. Focus on the expertise measured by these objectives: Prepare data for analysis in Azure Machine Learning and export from Azure Machine Learning Develop machine learning models Operationalize and manage Azure Machine Learning Services Use other services for machine learning This Microsoft Exam Ref: Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you are familiar with Azure data services, machine learning concepts, and common data science processes About the Exam Exam 70-774 focuses on skills and knowledge needed to prepare data for analysis with Azure Machine Learning; find key variables describing your data's behavior; develop models and identify optimal algorithms; train, validate, deploy, manage, and consume Azure Machine Learning Models; and leverage related services and APIs. About Microsoft Certification Passing this exam as well as Exam 70-773: Analyzing Big Data with Microsoft R earns your MCSA: Machine Learning certifi?cation, demonstrating your expertise in operationalizing Microsoft Azure machine learning and Big Data with R Server and SQL R Services. See full details at: microsoft.com/learning
Microsoft Forefront is a comprehensive suite of security products
that will provide companies with multiple layers of defense against
threats. Computer and Network Security is a paramount issue for
companies in the global marketplace. Businesses can no longer
afford for their systems to go down because of viruses, malware,
bugs, trojans, or other attacks. Running a Microsoft Forefront
Suite within your environment brings many different benefits.
Forefront allows you to achieve comprehensive, integrated, and
simplified infrastructure security. This comprehensive suite of
tools provides end-to-end security stretching from Web servers back
to the desktop. This book will provide system administrators
familiar with Syngress' existing Microsoft networking and security
titles with a complete reference to Microsoft's flagship security
products.
A virtual evolution in IT shops large and small has begun. VMware s
ESX Server is the enterprise tool to free your infrastructure from
its physical limitations providing the great transformation into a
virtual environment--this book shows you how. Use Syngress proven
How to Cheat methodology to configure and build VMware s ESX Server
version 3. This clear, concise guide provides all the information
you need to become a virtual whiz
The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them. If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox. * A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis * Covers Android application building blocks and security as well as debugging and auditing Android apps * Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack Android Hacker's Handbook is the first comprehensive resource for IT professionals charged with smartphone security.
Apple gives macOS new features and improvements right on your desktop and under the hood with Catalina-aka OS X 10.15. With this updated guide, you'll learn how to use your iPad as a second screen, work with iPad apps on your Mac, and use Screen Time on your Mac. This new edition of the #1 bestselling Mac book shows you how to use the revamped apps for Music, Podcasts, and TV. Loaded with illustrations, step-by-step instructions, tips, and tricks, this book from David Pogue-Missing Manual series creator, New York Times columnist, and Emmy-winning tech correspondent for CNBC, CBS, and NPR-covers everything Catalina has to offer with lots of humor and technical insight.
" Biometric Technologies and Verification Systems" is organized
into nine parts composed of 30 chapters, including an extensive
glossary of biometric terms and acronyms. It discusses the current
state-of-the-art in biometric verification/authentication,
identification and system design principles. It also provides a
step-by-step discussion of how biometrics works; how biometric data
in human beings can be collected and analyzed in a number of ways;
how biometrics are currently being used as a method of personal
identification in which people are recognized by their own unique
corporal or behavioral characteristics; and how to create detailed
menus for designing a biometric verification system.
This manual contains all the problems to Leonard Kleinrock's Queueing Systems, Volume One, and their solutions. The manual offers a concise introduction so that it can be used independently from the text. Contents include:
Over 95% of computers around the world are running at least one
Microsoft product. Microsoft Windows Software Update Service is
designed to provide patches and updates to every one of these
computers.
Linux Security Fundamentals provides basic foundational concepts of securing a Linux environment. The focus is the digital self-defense of an individual user. This includes a general understanding of major threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them. This book is useful for anyone considering a career as a Linux administrator or for those administrators who need to learn more about Linux security issues. Topics include: Security Concepts Encryption Node, Device and Storage Security Network and Service Security Identity and Privacy Readers will also have access to Sybex's superior online interactive learning environment and test bank, including chapter tests, a practice exam, electronic flashcards, a glossary of key terms.
Apple's .Mac service (pronounced dot Mac) offers everything Mac OS X users have come to expect: an attractive, intuitive interface and a wealth of features with all the underlying power you'll ever need. .Mac includes web mail, an online contact management system, storage space, a fully customizable web site of your own, and much more. On your first tour of this suite of subscriber-based services, you'll be delighted by how easy and convenient .Mac is to use. But you'll soon discover that there's a lot more to .Mac than meets the eye! Inside .Mac will help you get the most out of Apple's new Internet services. This handy, quick reference offers a clear overview of the entire .Mac package and many of its not-so-obvious features. You'll learn how to set up and manage your account quickly and without fuss. Each .Mac service is discussed in an objective, no-frills fashion that'll show you how to use--and what to expect from--iDisk, web mail, your personal web site, and everything else that .Mac offers. The book covers: Setting up your .Mac account: a guided tour to getting started with .Mac, Using your iDisk: a detailed look at using iDisk, its directories, the iDisk utility and more, Mac Software: a look at what's included in the software directory, including Virex anti-virus software, the Backup utility, Mac Slides Publisher, and third-party software, . Mac Email: everything you need to know, on configuring your settings to adding additional email accounts, Building a HomePage: an overview of HomePage options that covers uploading files, publishing iPhoto libraries, protecting your site, and publishing and announcing your site, Synchronizing Your Mac with .Mac: learn how to set up and sync your Address Book, iCal Calendars, and more using iSync. From enthusiastic new users to hardcore Mac geeks, anyone who uses .Mac will want to get the most from their subscription service. Inside .Mac is the only book that shows you how. There's no better way take control than with this handy guide.
The bestselling book on Windows, now updated for the new 8.1 features Microsoft has fine-tuned Windows 8 with some important new features, and veteran author Andy Rathbone explains every one in this all-new edition of a long-time bestseller. Whether you're using Windows for the first time, upgrading from an older version, or just moving from Windows 8 to 8.1, here's what you need to know. Learn about the dual interfaces, the new Start button, how to customize the interface and boot operations, and how to work with programs and files, use the web and social media, manage music and photos, and much more. You'll even find troubleshooting tips! * This edition covers the upgrades in Windows 8.1, including the dual interfaces, basic mechanics, file storage, and how to get the free upgrade to Windows 8.1 * Shows how to manipulate app tiles, give Windows the look you choose, set up boot-to-desktop capabilities, connect to a network, and create user accounts * Covers working with programs, apps, and files; using the Internet and social media; new apps and capabilities for working with onboard and online media; and how to move files to a new PC * Written by Andy Rathbone, author of every edition of the bestselling Windows For Dummies Windows 8.1 For Dummies is exactly what you need to get going and be productive with the newest Windows update.
UNIX and Linux System Administration Handbook, Fifth Edition is today's definitive guide to installing, configuring and maintaining any Unix or Linux system -- including the systems that provide core Internet and cloud infrastructure. Now fully updated for today's Linux distributions and cloud environments, it details best practices for every facet of system administration, including storage management, network design and administration, web hosting and scale-out, automation, configuration management, performance analysis, virtualization, DNS, security, management of IT service organizations, and much more. For modern system and network administrators, this edition contains indispensable new coverage of cloud deployments, continuous delivery, Docker and other containerization solutions, and much more.
The first major book on MDM written by Group Policy and Enterprise Mobility MVP and renowned expert, Jeremy Moskowitz! With Windows 10, organizations can create a consistent set of configurations across the modern enterprise desktop--for PCs, tablets, and phones--through the common Mobile Device Management (MDM) layer. MDM gives organizations a way to configure settings that achieve their administrative intent without exposing every possible setting. One benefit of MDM is that it enables organizations to apply broader privacy, security, and application management settings through lighter and more efficient tools. MDM also allows organizations to target Internet-connected devices to manage policies without using Group Policy (GP) that requires on-premises domain-joined devices. This makes MDM the best choice for devices that are constantly on the go. With Microsoft making this shift to using Mobile Device Management (MDM), a cloud-based policy-management system, IT professionals need to know how to do similar tasks they do with Group Policy, but now using MDM, with its differences and pitfalls. What is MDM (and how is it different than GP) Setup Azure AD and MDM Auto-Enrollment New PC Rollouts and Remote Refreshes: Autopilot and Configuration Designer Enterprise State Roaming and OneDrive Documents Roaming Renowned expert and Microsoft Group Policy and Enterprise Mobility MVP Jeremy Moskowitz teaches you MDM fundamentals, essential troubleshooting techniques, and how to manage your enterprise desktops. |
You may like...
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, …
Paperback
R1,036
Discovery Miles 10 360
|