Category: Networking & Server

The AI Revolution in Networking, Cybersecurity, and Emerging Technologies 0

The AI Revolution in Networking, Cybersecurity, and Emerging Technologies

eBook Details: Paperback: 224 pages Publisher: WOW! eBook (February 23, 2024) Language: English ISBN-10: 0138293694 ISBN-13: 978-0138293697 eBook Description: The AI Revolution in Networking, Cybersecurity, and Emerging Technologies: The AI Revolution is Here. Discover its Dynamic Applications in Networking, Cybersecurity, and More. AI is having a profound impact on nearly every sector of the workforce. Huge professional and financial opportunities await in the key domains of computer networking, cybersecurity, IoT, and cloud computing. The AI Revolution in Networking, Cybersecurity, and Emerging Technologies will give you the edge you need to harness AI for your benefit. Learn how AI can efficiently identify shadow data, fortify...

Linux Under the Hood, 2nd Edition (Video Course) 0

Linux Under the Hood, 2nd Edition (Video Course)

Linux Under the Hood, 2nd Edition (Video Course) English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 162 Lessons (11h 47m) | 2.41 GB Linux Under the Hood, 2nd Edition (Video Course): Become a Linux power user! Learn the ins and outs of Linux Internals and discover what makes Linux the most powerful operating system Get under the hood and understand how Linux really works Perform in-depth practical investigations of key Linux functionalities Linux Under the Hood, 2nd Edition (Video Course) offers an extensive exploration of how Linux functions, allowing you to fully harness its capabilities. Familiarizing yourself...

Learning Continuous Integration with Jenkins, Third Edition 0

Learning Continuous Integration with Jenkins, Third Edition

eBook Details: Paperback: 396 pages Publisher: WOW! eBook; 3rd edition (February 9, 2024) Language: English ISBN-10: 1835087736 ISBN-13: 978-1835087732 eBook Description: Learning Continuous Integration with Jenkins, 3rd Edition: Integrate Jenkins, Kubernetes, and more on cloud into a robust, GitOps-driven CI/CD system, leveraging JCasC, IaC, and AI for a streamlined software delivery process This updated Learning Continuous Integration with Jenkins, Third Edition is your one-stop guide to implementing CI/CD with Jenkins, addressing crucial technologies such as cloud computing, containerization, Infrastructure as Code, and GitOps. Tailored to both beginners and seasoned developers, the book provides a practical path to mastering a production-grade, secure,...

Network Architect’s Handbook 0

Network Architect’s Handbook

eBook Details: Paperback: 418 pages Publisher: WOW! eBook (January 31, 2024) Language: English ISBN-10: 1837637830 ISBN-13: 978-1837637836 eBook Description: Network Architect’s Handbook: Follow a step-by-step roadmap to developing essential competencies in network architecture design, relationship management, systems, and services, coupled with certification guidance and expert tips Becoming a network architect is challenging-it demands hands-on engineering skills, encompassing hardware installation, configuration, and fabric layout design. Equally crucial, it involves collaboration with internal teams and C-Suite stakeholders, and adeptly managing external entities like vendors and service providers. The Network Architect’s Handbook comprehensively covers these vital aspects, guiding you to evolve into an effective network...

Kubernetes Secrets Handbook 0

Kubernetes Secrets Handbook

eBook Details: Paperback: 294 pages Publisher: WOW! eBook (January 31, 2024) Language: English ISBN-10: 180512322X ISBN-13: 978-1805123224 eBook Description: Kubernetes Secrets Handbook: Gain hands-on skills in Kubernetes Secrets management, ensuring a comprehensive overview of the Secrets lifecycle and prioritizing adherence to regulatory standards and business sustainability Securing Secrets in containerized apps poses a significant challenge for Kubernetes IT professionals. This Kubernetes Secrets Handbook tackles the critical task of safeguarding sensitive data, addressing the limitations of Kubernetes encryption, and establishing a robust Secrets management system for heightened security for Kubernetes. Starting with the fundamental Kubernetes architecture principles and how they apply to the...