Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
|||
Showing 1 - 6 of 6 matches in All Departments
Andrew Block's checklist is a tool for the book collector, the librarian, the bookseller, the research student, and the supervisor of research students. It can be used for the rapid finding of the wanted fact; it is a useful reference book for any collection.
From the National Wildlife Federation(R) comes the most up-to-date, all-photographic field guide to North American trees. The Jeffrey Pine, Coconut Palm, Staghorn Sumac, and Western Hemlock: this single, portable volume features these, plus more than 700 other tree species and varieties, with special emphasis on their leaves, bark, fruits, and flowers. More than 2,000 stunning images show these trees in their natural habitats. Other features include: a unique identification tip for each tree; range maps showing distribution in North America; How to Identify a Tree section; a detailed glossary of tree parts and leaf, fruit, flower, and bark types; essays on ecology, conservation, and North America's important forest types; plus a complex species and quick-flip indexes. The guide's unique waterproof cover makes it especially valuable for use in the field.
Safely store secret information like passwords, keys, and certificates in Kubernetes. In this practical guide, you'll discover methods for adding layers of security that will defend the critical data of your applications. In Securing Kubernetes Secrets you will find: Strategies for storing secure assets in Kubernetes Cryptographic options and how to apply them in Kubernetes Using the HashiCorp Vault server on Kubernetes for secure secrets storage Managing security with public cloud providers Applying security concepts using tools from the Kubernetes ecosystem End-to-end secrets storage from development to operations Implementing in Kubernetes in CI/CD systems Secrets, like database passwords and API keys, are some of the most important data in your application. Securing Kubernetes Secrets reveals how to store these sensitive assets in Kubernetes in a way that's protected against leaks and hacks. You'll learn about the default capabilities of Kubernetes secrets, where they're lacking, and alternative options to strengthen applications and infrastructure. Kubernetes secrets include small and sensitive data like passwords, tokens, and keys. The security defaults of Kubernetes are rarely enough to protect this valuable data, and can leave it-and you-exposed. In this book, you'll learn how to bake security into Kubernetes-based applications right from the start with security best practices and reliable third-party tools like HashiCorp Vault
Reduce the complexity of managing applications on Kubernetes and develop an enterprise pattern for application delivery Key Features Learn best practices from the core maintainer of Helm for application delivery and life cycle management Manage applications deployed in Kubernetes effectively using Helm Go beyond the basics when using Helm with key security considerations and management options Book DescriptionContainerization is one of the best ways to implement DevOps, and learning how to execute it effectively is an essential part of a developer's skillset. Kubernetes is the current industry standard for container orchestration. This book will help you discover the efficiency of managing applications running on Kubernetes with Helm. Starting with a brief introduction to Helm and its impact on users working with containers and Kubernetes, you'll delve into the primitives of Helm charts and their architecture and use cases. From there, you'll understand how to write Helm charts in order to automate application deployment on Kubernetes and work your way toward more advanced strategies. These enterprise-ready patterns are focused on concepts beyond the basics so that you can use Helm optimally, looking at topics related to automation, application development, delivery, lifecycle management, and security. By the end of this book, you'll have learned how to leverage Helm to build, deploy, and manage applications on Kubernetes. What you will learn Understand how to deploy applications on Kubernetes with ease Package dynamic applications for deployment on Kubernetes Integrate Helm into an existing software release process Develop an enterprise automation strategy on Kubernetes using Helm Use Helm within a Helm Kubernetes operator Leverage Helm in a secure and stable manner that fits the enterprise Discover the ins and outs of automation with Helm Who this book is forThis book is for Kubernetes developers or administrators who are interested in learning Helm to provide automation for app development on Kubernetes. Although no prior knowledge of Helm is required, basic knowledge of Kubernetes application development will be useful.
A comprehensive introduction to automated application deployment on Kubernetes for beginners Key Features Effectively manage applications deployed in Kubernetes using Helm Learn to install, upgrade, share, and manage applications deployed in Kubernetes Get up and running with a package manager for Kubernetes Book DescriptionContainerization is currently known to be one of the best ways to implement DevOps. While Docker introduced containers and changed the DevOps era, Google developed an extensive container orchestration system, Kubernetes, which is now considered the frontrunner in container orchestration. With the help of this book, you'll explore the efficiency of managing applications running on Kubernetes using Helm. Starting with a short introduction to Helm and how it can benefit the entire container environment, you'll then delve into the architectural aspects, in addition to learning about Helm charts and its use cases. You'll understand how to write Helm charts in order to automate application deployment on Kubernetes. Focused on providing enterprise-ready patterns relating to Helm and automation, the book covers best practices for application development, delivery, and lifecycle management with Helm. By the end of this Kubernetes book, you will have learned how to leverage Helm to develop an enterprise pattern for application delivery. What you will learn Develop an enterprise automation strategy on Kubernetes using Helm Create easily consumable and configurable Helm charts Use Helm in orchestration tooling and Kubernetes operators Explore best practices for application delivery and life cycle management Leverage Helm in a secure and stable manner that is fit for your enterprise Discover the ins and outs of automation with Helm Who this book is forThis book is for Kubernetes developers or administrators who are interested in learning Helm to provide automation for application development on Kubernetes. Although no prior knowledge of Helm is required, basic knowledge of Kubernetes application development will be useful.
Psychosocial factors, such as caregiver support and patients’ expectations for quality of life after surgery, can have a strong impact on surgery outcomes. This book presents evidence-based approaches to presurgical psychological assessment across a broad range of medical conditions. Psychologists and other mental health professionals are increasingly included within the preoperative evaluation process for patients preparing for major surgery. Presurgical psychological assessment (PPA) aims to assess both the risk factors for poor surgical outcome, as well as patient strengths and resources that can have a positive impact on surgery results. This book presents evidence-based approaches to PPA across a broad range of medical conditions. Chapters outline a flexible model and practical tips for conducting PPA. They also offer selection and administration guidelines for psychological testing and clinical interviews, and information about relevant ethical and legal issues. Chapters review specific surgical areas in which PPAs are routinely conducted, including metabolic and bariatric, gynecologic, spinal procedures, gender embodiment, breast cancer treatment and prevention, solid organ transplant, deep brain stimulation, and treatment for temporal lobe epilepsy. Â
|
You may like...
|