Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
"What is eBPF? With this revolutionary technology, you can write custom code that dynamically changes the way the kernel behaves. It's an extraordinary platform for building a whole new generation of security, observability, and networking tools. This practical book is ideal for developers, system administrators, operators, and students who are curious about eBPF and want to know how it works. Author Liz Rice, chief open source officer with cloud native networking and security specialists Isovalent, also provides a foundation for those who want to explore writing eBPF programs themselves"--
Get up to speed with Prometheus, the metrics-based monitoring system used by tens of thousands of organizations in production. This practical guide provides application developers, sysadmins, and DevOps practitioners with a hands-on introduction to the most important aspects of Prometheus, including dashboarding and alerting, direct code instrumentation, and metric collection from third-party systems with exporters.This open source system has gained popularity over the past few years for good reason. With its simple yet powerful data model and query language, Prometheus does one thing, and it does it well. Author and Prometheus developer Brian Brazil guides you through Prometheus setup, the Node exporter, and the Alertmanager, then demonstrates how to use them for application and infrastructure monitoring.Know where and how much to apply instrumentation to your application codeIdentify metrics with labels using unique key-value pairsGet an introduction to Grafana, a popular tool for building dashboardsLearn how to use the Node Exporter to monitor your infrastructureUse service discovery to provide different views of your machines and servicesUse Prometheus with Kubernetes and examine exporters you can use with containersConvert data from other monitoring systems into the Prometheus format
Manage your SAP S/4HANA and SAP ERP master data with this hands-on guide! Walk through implementing, configuring, and using SAP Master Data Governance, both on-premise and in the cloud! Whether your organization requires custom applications or works with out-of-the-box central governance, consolidation, and mass processing, you'll find detailed instructions for every step. From data modeling to data replication, this comprehensive guide will help you master your data!a. ModelingCreate and extend data models by mastering entity types, attributes, hierarchies, and other elements. Use the floorplan manager for UI modeling and explore the use of change requests and workflows in process modeling.b. Data Quality and ReplicationEnsure your organization is using quality data in its operations. Learn to remediate and your enrich data. Then, move that data to where it needs to be in your system using tools like the data export framework, data import frameworks, and entity-based upload/download.c. Integrations and ExtensionsPut SAP MDG to use in your entire landscape by integrating with SAP Integration Suite, Central Finance, SAP Product Lifecycle Management, SAP Ariba, and more. Explore SAP MDG's quick start options and complementary solutions from SolEx.Highlights Include:On-premise and cloud deploymentData modelingProcess modelingData qualityData replicationData migrationConsolidationOperationsMass processingIntegrationsExtensionsAnalyticsHighlights:On-premise and cloud deploymentData modelingProcess modelingData qualityData replicationData migrationConsolidationOperationsMass processingIntegrationsExtensionsAnalytics
A comprehensive guide to administering and protecting the latest Windows 11 and Windows Server 2022 from the complex cyber threatsKey Features- Learn to protect your Windows environment using zero-trust and a multi-layered security approach- Implement security controls using Intune, Configuration Manager, Defender for Endpoint, and more- Understand how to onboard modern cyber-threat defense solutions for Windows clientsBook DescriptionAre you looking for the most current and effective ways to protect Windows-based systems from being compromised by intruders? This updated second edition is a detailed guide that helps you gain the expertise to implement efficient security measures and create robust defense solutions using modern technologies.The first part of the book covers security fundamentals with details around building and implementing baseline controls. As you advance, you'll learn how to effectively secure and harden your Windows-based systems through hardware, virtualization, networking, and identity and access management (IAM). The second section will cover administering security controls for Windows clients and servers with remote policy management using Intune, Configuration Manager, Group Policy, Defender for Endpoint, and other Microsoft 365 and Azure cloud security technologies. In the last section, you'll discover how to protect, detect, and respond with security monitoring, reporting, operations, testing, and auditing.By the end of this book, you'll have developed an understanding of the processes and tools involved in enforcing security controls and implementing zero-trust security principles to protect Windows systems.What you will learn- Build a multi-layered security approach using zero-trust concepts- Explore best practices to implement security baselines successfully- Get to grips with virtualization and networking to harden your devices- Discover the importance of identity and access management- Explore Windows device administration and remote management- Become an expert in hardening your Windows infrastructure- Audit, assess, and test to ensure controls are successfully applied and enforced- Monitor and report activities to stay on top of vulnerabilitiesWho this book is forIf you're a cybersecurity or technology professional, solutions architect, systems engineer, systems administrator, or anyone interested in learning how to secure the latest Windows-based systems, this book is for you. A basic understanding of Windows security concepts, Intune, Configuration Manager, Windows PowerShell, and Microsoft Azure will help you get the best out of this book.Table of Contents- Fundamentals of Windows Security- Building a Baseline- Hardware and Virtualization- Networking Fundamentals for Hardening Windows- Identity and Access Management- Administration and Policy Management- Deploying Windows Securely- Keeping Your Windows Client Secure- Advanced Hardening for Windows Clients- Mitigating Common Attack Vectors- Server Infrastructure Management- Keeping Your Windows Server Secure- Security Monitoring and Reporting- Security Operations- Testing and Auditing- Top 10 Recommendations and the Future
Preparing for your SAP Extension Suite development associate exam? Make the grade with this certification study guide! From user interfaces to security, this guide will review the key technical knowledge you need to pass the test. Explore test methodology, key concepts for each topic area, and practice questions and answers. Your path to SAP Extension Suite certification begins here! Highlights include:1) Exam C_CPE_132) SAP S/4HANA3) SAP Extension Suite 4) SAP Integration Suite 5) SAP API Business Hub6) SAP Business Application Studio7) SAP Business Technology Platform (SAP BTP)8) SAP Fiori9) APIs10) Continuous integration and continuous delivery (CI/CD)11) Extensibility12) Security
If you have been in the dark about how to use Kubernetes to its full potential or are hoping to maximize your knowledge of this platform, then Kubernetes: A Step-By-Step Guide to learn and Master Kubernetes is the book for you! From Deployments to Pods, Services, Extensions, Client Libraries, and a host of other valuable aspects of the Kubernetes platform, this book is perfect for readers interested in mastering this platform. Not to mention, this text makes effective use of practical examples that will augment your use of the platform so that you can achieve and surpass whatever goals that you have. Do not hinder yourself from becoming the very best user of Kubernetes that you can be! Maximize your talents and adopt all of the helpful practices, methods, and strategies that are elaborated upon this e-book! In this way, a true step-by-step approach is presented. Moving through all of the various features of the platform, readers will gain access to knowledge that will pay dividends throughout their use of Kubernetes. Not to mention, it will not be surprising if many readers continue to use this book as a reference whenever they are confronted by issues or struggles when using the platform. The detailed nature of this book gives readers the perfect balance of background information and practical tools and insight.Hence, go ahead and dive right into the contents of the book! Inside, you will find: -The precise manner in which Kubernetes functions, including what it was developed for and how it can assist users;-The limitations of the platform, along with alternative measures to circumvent these limitations;-Each of the various aspects and features of the platform;-The benefits of Kubernetes Extensions;...and much more!
A groundbreaking, triumphant investigation of the uterus?from birth to death, in sickness and in health, throughout history and into our possible future?from midwife and acclaimed writer Leah HazardThe size of a clenched fist and the shape of a light bulb?with no less power and potential. Every person on Earth began inside a uterus, but how much do we really understand about the womb?Bringing together medical history, scientific discoveries, and journalistic exploration, Leah Hazard embarks on a journey in search of answers about the body's most miraculous and contentious organ. We meet the people who have shaped our relationship with the uterus: doctors and doulas, yoni steamers and fibroid-tea hawkers, legislators who would regulate the organ's very existence, and boundary-breaking researchers on the frontiers of the field.With a midwife's warmth and humor, Hazard tackles pressing questions: Is the womb connected to the brain? Can cervical crypts store sperm? Do hysterectomies affect sexual pleasure? How can smart tampons help health care? Why does endometriosis take so long to be diagnosed? Will external gestation be possible in our lifetime?A clear-eyed examination of the cultural prejudices and assumptions that have made the uterus so poorly understood for centuries, Womb takes a fresh look at an organ that brings us pain and pleasure?a small part of our bodies that has a larger impact than we ever thought possible.
This hands-on guidebook to the inner workings of containers peels back the layers to provide a deep understanding of what a container is, how containerization changes the way programs run, and how Kubernetes provides computing, networking, and storage.Containers ensure that software runs reliably no matter where it’s deployed, and Kubernetes lets you manage all of your containers from a single control plane. In this comprehensive tour of the open-source platform, each chapter includes a set of example scripts with just enough automation to start your container exploration with ease. Beginning with an overview of modern architecture and the benefits of orchestration, you'll quickly learn how to create containers; how to deploy, administer and debug Kubernetes clusters all the way down to the OS; and how container networking works at the packet level across multiple nodes in a cluster.
Packed with examples, Simply SQL is a step-by-step introduction to learning SQL. You'll discover how easy it is to use SQL to interact with best-practice, robust databases. Rather than bore you with theory, it focuses on the practical use of SQL with common databases and uses plenty of diagrams, easy-to-read text, and examples to help make learning SQL easy and fun.* Step through the basic SQL syntax* Learn how to use best practices in database design * Master advanced syntax like inner joins, groups, and subqueries* Understand the SQL datatypes* And much more...
Ideal for busy parents who want to find free gifts and great bargains for their kids, this parenting bargain resource is packed with information on free or reduced-cost medical and health care, education information, arts and crafts, sports and games, magazines and books, travel bargains, and more. Contact information for each company or organization is arranged so that it is quick and easy to take advantage of all of the offers in the book.
The Legacy Apocalypse is upon us and business, community, and political leaders at all levels need this timely and thoughtful book from a superstar in the field. Aging computer systems present complex technical challenges for organizations both large and small, and Kill It with Fire provides sound strategies for spearheading modernization efforts.Kill It with Fire examines aging computer systems, the evolution of technology over time, and how organizations can modernize, maintain, and future-proof their current systems.In playful and engaging prose, Marianne Bellotti uses real-world case studies to illustrate the technical challenges of modernizing complex legacy systems, as well as the organizational challenges of time-intensive maintenance efforts. The book explains how to evaluate existing architecture, create upgrade plans, and handle communication structures. Team exercises and historical analyses of complex computer systems make this a valuable resource for those in both older and newer companies, and will help readers restore or create systems built to evolve as time goes on.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.