-
SDN: Software Defined Networks
Author Ken Gray , Thomas D. Nadeau
Explore the emerging definitions, protocols, and standards for SDN—software-defined, software-driven, programmable networks—with this comprehensive guide. Two senior network engineers show you what’s required for building networks that use software for bi-directiona....
Release Date 2013/08 -
Author Harold Davis
SEO--short for Search Engine Optimization--is the art, craft, and science of driving web traffic to web sites.Web traffic is food, drink, and oxygen--in short, life itself--to any web-based business. Whether your web site depends on broad, general traffic, or high-q....
Release Date 2006/05 -
Author Steven Holzner
Whether you want to create your own RSS feeds or just would like to locate and add them to your Web site, this is the book for you. In the Secrets of RSS, author Steve Holzner provides real-world guidance and advice to introduce you everything you need to know about....
Release Date 2006/06 -
Secure Shell in the Enterprise
Author Jason Reid
The best practices guide to building, scaling and deploying Open SSH for legacy Solaris (2.6, 7, and 8) and Solaris 9 OE systems.Covers the new Solaris Secure Shell for all versions of Solaris.Shows how to secure remote logins, integrate Secure Shell into existing s....
Release Date 2003/06 -
Author Boudhayan Chakrabarty , Sandeep R Patil , Shashank Shingornikar , Ashish Kothekar
Having appropriate storage for hosting business-critical data and advanced Security Information and Event Management (SIEM) software for deep inspection, detection, and prioritization of threats has become a necessity for any business. This IBM® Redpaper publication explains how the storage features....
Release Date 2021/09 -
Author Julien Vehent
Securing DevOps teaches you the essential techniques to secure your cloud services. Using compelling case studies, it shows you how to build security into automated testing, continuous delivery, and other core DevOps processes. This experience-rich book is filled w....
Release Date 2018/08 -
Author Scott Gallagher
Learn how to secure your Docker environment and keep your environments secure irrespective of the threats out thereAbout This BookGain confidence in using Docker for containerization without compromising on securityThis book covers different techniques to help you ....
Release Date 2016/03 -
Securing Remote Access in Palo Alto Networks
Explore everything you need to know to set up secure remote access, harden your firewall deployment, and protect against phishingKey FeaturesLearn the ins and outs of log forwarding and troubleshooting issuesSet up GlobalProtect satellite connections, configure site-to-site VPNs, and troubleshoot LS.... -
Securing Web Services with WS-Security
Author David L. Remy , Jothy Rosenberg
Comprehensive coverage is given in this up-to-date and practical guide to Web services security--the first to cover the final release of new standards SAML 1.1 and WS-Security. Rosenberg and Remy are security experts who co-founded GeoTrust, the #2 Web site certific....
Release Date 2004/05 -
Author Mike Danseglio
With the success of computer viruses like Slammer, security issues are now a top priority for Windows system administrators, right alongside day-to-day tasks such as setting up accounts and managing performance. If you use Windows 2003 Server at a small to medium-s....
Release Date 2004/11 -
Securing Your Cloud: IBM z/VM Security for IBM z Systems and LinuxONE
Author Willian Rampazzo , Klaus Mueller , Klaus Egeler , Vic Cross , Edi Lopes Alves , Lydia
As workloads are being offloaded to IBM® z Systems™ based cloud environments, it is important to ensure that these workloads and environments are secure.This IBM Redbooks® publication describes the necessary steps to secure your environment for all of the component....
Release Date 2016/10 -
Security and Microservice Architecture on AWS
Security is usually an afterthought when organizations design microservices for cloud systems. Most companies today are exposed to potential security threats, but their responses are often more reactive than proactive. This leads to unnecessarily complicated systems that are hard to implement and ev.... -
Security Observability with eBPF
Author Jed Salazar , Natalia Reka Ivanko
Kubernetes has become the de facto cloud operating system, making it a rich target for both passive and direct attackers. In fact, the largest concern most organizations have with Kubernetes is securing their production environments. But Kubernetes doesn't include observability or a default securit....
Release Date 2022/04 -
Author Heiko Schnell , Joerg Schmidbauer , Antoinette Kaschner , Ingo Franzki , Helmut Hell
One of a firm's most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data has to be securely managed and controlled, and simultaneously made available to those users authorized to see it. The IBM® z/VSE™....
Release Date 2011/11 -
Author Ingo Franzki Helmut Hellner Antoinette Kaschner , Joerg Schmidbauer , Heiko Schnel
AbstractOne of a firm’s most valuable resources is its data: client lists, accounting data, employee information, and so on. This critical data must be securely managed and controlled, and simultaneously made available to those users authorized to see it.The IBM® z....
Release Date 2018/06 -
Security Strategies in Linux Platforms and Applications
Author Michael Jang
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES! Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Written by an industry expert, this book is divided into....
Release Date 2010/10 -
Security Strategies in Linux Platforms and Applications, 2nd Edition
Author Jang
The Second Edition of Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Written by an industry expert, this book is divided into three natural parts to illustrate key concepts in the field. It opens with....
Release Date 2015/10 -
Security Strategies in Linux Platforms and Applications, 3rd Edition
Author Ric Messier , Michael Jang
The third edition of Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Using real-world examples and exercises, this useful resource incorporates hands-on activities to walk readers through the fundamentals of security strategies related....
Release Date 2022/10 -
Security Strategies in Windows Platforms and Applications, 3rd Edition
Author Michael G. Solomon
Revised and updated to keep pace with this ever changing field, Security Strategies in Windows Platforms and Applications, Third Edition focuses on new risks, threats, and vulnerabilities associated with the Microsoft Windows operating system, placing a particular ....
Release Date 2019/10 -
sed and awk Pocket Reference, 2nd Edition
Author Arnold Robbins
For people who create and modify text files, sed and awk are power tools for editing. sed, awk, and regular expressions allow programmers and system administrators to automate editing tasks that need to be performed on one or more files, to simplify the task of perf....
Release Date 2002/06 -
sed, awk and Regular Expressions Pocket Reference
Author Arnold Robbins
For people who create and modify text files, sed and awk are power tools for editing. sed, awk, and regular expressions allow programmers and system administrators to automate editing tasks that need to be performed on one or more files, to simplify the task of per....
Release Date 2000/01 -
Author David N. Blank-Edelman
Organizations big and small have started to realize just how crucial system and application reliability is to their business. They’ve also learned just how difficult it is to maintain that reliability while iterating at the speed demanded by the marketplace. Site R....
Release Date 2018/09 -
Author Craig Huegen , John Monaghan , Monique Morrow , Steve Pickavance , Chris Lewis
A guide to using and defining MPLS VPN servicesAnalyze strengths and weaknesses of TDM and Layer 2 WAN servicesUnderstand the primary business and technical issues when evaluating IP/MPLS VPN offeringsDescribe the IP addressing, routing, load balancing, convergence,....
Release Date 2006/02 -
Self-Service Linux®: Mastering the Art of Problem Determination
Author Dan Behman , Mark Wilding
"This welcome addition to the Linux bookshelf provides real insight into the black-art of debugging. All too often debugging books concentrate solely on the tools but this book avoids that pitfall by concentrating on examples. The authors dissect and discuss each ex....
Release Date 2005/09 -
Author Bill McCarty
The intensive search for a more secure operating system has often left everyday, production computers far behind their experimental, research cousins. Now SELinux (Security Enhanced Linux) dramatically changes this. This best-known and most respected security-relat....
Release Date 2004/10 -
SELinux System Administration - Second Edition
Author Sven Vermeulen
Ward off traditional security permissions and effectively secure your Linux systems with SELinuxAbout This BookLeverage SELinux to improve the secure state of your Linux systemA clear approach to adopting SELinux within your organizationEssential skills and techniq....
Release Date 2016/12 -
SELinux System Administration - Third Edition
Enhance Linux security, application platforms, and virtualization solutions with SELinux 3 to work within your boundaries, your rules, and your policiesKey FeaturesLearn what SELinux is, and how it acts as a mandatory access control system on LinuxApply and tune SELinux enforcement to users, applica.... -
Author Deniz Olmez , Joseph Kraynak
Sell on Amazon and Make Them Do the Heavy LiftingSelling on Amazon has become one of the most popular ways to earn income online. In fact, there are over 2 million people selling on Amazon worldwide. Amazon allows any business, no matter how small, to get their products i....
Release Date 2020/07 -
Selling Through Tough Times: Grow Your Profits and Mental Resilience Through any Downturn
Author Paul Reilly
An indispensable guide to thriving in a challenging sales environmentAs a sales professional, you know that it’s harder to sell in tough times—whether it’s a recession, industry-wide challenge, or global pandemic. You may also have noticed that some salespeople and managers not only survive, but thr....
Release Date 2021/09