|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > Unix, Unix Linux & Unix TCL/TK
A practical guide to understanding the latest features of the Rust
programming language, useful libraries, and frameworks that will
help you design and develop interesting projects Key Features Work
through projects that will help you build high-performance
applications with Rust Delve into concepts such as error handling,
memory management, concurrency, generics, and macros with Rust
Improve business productivity by choosing the right libraries and
frameworks for your applications Book DescriptionRust is a
community-built language that solves pain points present in many
other languages, thus improving performance and safety. In this
book, you will explore the latest features of Rust by building
robust applications across different domains and platforms. The
book gets you up and running with high-quality open source
libraries and frameworks available in the Rust ecosystem that can
help you to develop efficient applications with Rust. You'll learn
how to build projects in domains such as data access, RESTful web
services, web applications, 2D games for web and desktop,
interpreters and compilers, emulators, and Linux Kernel modules.
For each of these application types, you'll use frameworks such as
Actix, Tera, Yew, Quicksilver, ggez, and nom. This book will not
only help you to build on your knowledge of Rust but also help you
to choose an appropriate framework for building your project. By
the end of this Rust book, you will have learned how to build fast
and safe applications with Rust and have the real-world experience
you need to advance in your career. What you will learn Access
TOML, JSON, and XML files and SQLite, PostgreSQL, and Redis
databases Develop a RESTful web service using JSON payloads Create
a web application using HTML templates and JavaScript and a
frontend web application or web game using WebAssembly Build
desktop 2D games Develop an interpreter and a compiler for a
programming language Create a machine language emulator Extend the
Linux Kernel with loadable modules Who this book is forThis Rust
programming book is for developers who want to get hands-on
experience with implementing their knowledge of Rust programming,
and are looking for expert advice on which libraries and frameworks
they can adopt to develop software that typically uses the Rust
language.
Discover advanced virtualization techniques and strategies to
deliver centralized desktop and application services Key Features
Leverage advanced desktop virtualization techniques and strategies
to transform your organization Build better virtualized services
for your users with VMware Horizon 7.8 Develop and deploy
end-to-end virtualized solutions Book DescriptionDesktop
virtualization can be tough, but VMware Horizon 7.8 changes all
that. With a rich and adaptive UX, improved security,and a range of
useful features for storage and networking optimization, there's
plenty to love. But to properly fall in love with it, you need to
know how to use it, and that means venturing deeper into the
software and taking advantage of its extensive range of features,
many of which are underused and underpromoted. This guide will take
you through everything you need to know to not only successfully
virtualize your desktop infrastructure, but also to maintain and
optimize it to keep all your users happy. We'll show you how to
assess and analyze your infrastructure, and how to use that
analysis to design a solution that meets your organizational and
user needs. Once you've done that, you'll find out how to build
your virtualized environment, before deploying your virtualized
solution. But more than that,we'll also make sure you know
everything you need to know about the full range of features on
offer, including the mobile cloud, so that you can use them to take
full control of your virtualized infrastructure. What you will
learn Successfully configure Horizon 7.8 for the needs of your
users Deliver virtual desktops, session-based desktops, and hosted
applications Become familiar with how to develop, and deploy, a
complete, end-to-end solution Discover how to optimize desktop OS
images for virtual desktops Build, optimize, and tune desktop
operating systems to deliver a superior end user experience Explore
the Horizon 7.8 infrastructure so that you can take full advantage
of it Who this book is forThis book is ideal for system admins, and
solution architects interested in gaining hands-on experience with
virtualization. It will take you to an advanced level, but at a
pace that ensures you are always solving real-world problems. Some
experience in desktop management using Windows and Microsoft Office
(and familiarity with Active Directory, SQL, Windows Remote Desktop
Session Hosting, and VMware vSphere technology) is necessary.
A journey toward containerized applications in production with a
cloud-portable, secure, robust and highly available Docker
Enterprise platform. Key Features Get an insider's view into the
container movement and Docker Enterprise Manage the transformation
associated with enterprise container adoption Walk through the
enterprise container adoption journey Book DescriptionWhile known
mostly as the open source engine behind tens of millions of server
nodes, Docker also offers commercially supported enterprise tooling
known as the Docker Enterprise. This platform leverages the deep
roots from Docker Engine - Community (formerly Docker CE) and
Kubernetes, but adds support and tooling to efficiently operate a
secure container platform at scale. With hundreds of enterprises on
board, best practices and adoption patterns are emerging rapidly.
These learning points can be used to inform adopters and help
manage the enterprise transformation associated with enterprise
container adoption. This book starts by explaining the case for
Docker Enterprise, as well as its structure and reference
architecture. From there, we progress through the PoC,pilot and
production stages as a working model for adoption, evolving the
platform's design and configuration for each stage and using
detailed application examples along the way to clarify and
demonstrate important concepts.The book concludes with Docker's
impact on other emerging software technologies, such as Blockchain
and Serverless computing. By the end of this book, you'll have a
better understanding of what it takes to get your enterprise up and
running with Docker Enterprise and beyond. What you will learn
Understand why containers are important to an enterprise Understand
the features and components of Docker Enterprise 2 Find out about
the PoC, pilot, and production adoption phases Get to know the best
practices for installing and operating Docker Enterprise Understand
what is important for a Docker Enterprise in production Run
Kubernetes on Docker Enterprise Who this book is forThis book is
for Software Architects, DevOps Engineers, Tech Ops, Docker
professionals, or any IT professional working with Docker and
containers who wants to move containerized workloads to production.
This book discusses the enterprise adoption of Docker and
Kubernetes,therefore a basic understanding of Docker concepts will
be helpful.
A comprehensive guide to securing your Linux system against
cyberattacks and intruders Key Features Deliver a system that
reduces the risk of being hacked Explore a variety of advanced
Linux security techniques with the help of hands-on labs Master the
art of securing a Linux environment with this end-to-end practical
guide Book DescriptionFrom creating networks and servers to
automating the entire working environment, Linux has been extremely
popular with system administrators for the last couple of decades.
However, security has always been a major concern. With limited
resources available in the Linux security domain, this book will be
an invaluable guide in helping you get your Linux systems properly
secured. Complete with in-depth explanations of essential concepts,
practical examples, and self-assessment questions, this book begins
by helping you set up a practice lab environment and takes you
through the core functionalities of securing Linux. You'll practice
various Linux hardening techniques and advance to setting up a
locked-down Linux server. As you progress, you will also learn how
to create user accounts with appropriate privilege levels, protect
sensitive data by setting permissions and encryption, and configure
a firewall. The book will help you set up mandatory access control,
system auditing, security profiles, and kernel hardening, and
finally cover best practices and troubleshooting techniques to
secure your Linux environment efficiently. By the end of this Linux
security book, you will be able to confidently set up a Linux
server that will be much harder for malicious actors to compromise.
What you will learn Create locked-down user accounts with strong
passwords Configure firewalls with iptables, UFW, nftables, and
firewalld Protect your data with different encryption technologies
Harden the secure shell service to prevent security break-ins Use
mandatory access control to protect against system exploits Harden
kernel parameters and set up a kernel-level auditing system Apply
OpenSCAP security profiles and set up intrusion detection Configure
securely the GRUB 2 bootloader and BIOS/UEFI Who this book is
forThis book is for Linux administrators, system administrators,
and network engineers interested in securing moderate to complex
Linux environments. Security consultants looking to enhance their
Linux security skills will also find this book useful. Working
experience with the Linux command line and package management is
necessary to understand the concepts covered in this book.
|
|