Jump to content

Jessica Brown

Administrators
  • Joined

  • Last visited

Everything posted by Jessica Brown

  1. Structural Equation Modeling with LISREL /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Structural Equation Modeling with LISREL Essentials and Advances by Leslie A. Hayduk Publisher JHU Press Published Date 1987 Page Count 405 Categories Computers / General, Computers / Mathematical & Statistical Software, Mathematics / General, Mathematics / Applied Language EN Average Rating 5 (based on 1 ratings) Maturity Rating No Mature Content Detected ISBN 0801834783 Hayduk is equally at ease explaining the simplest and most advanced applications of the program . . . Hayduk has written more than just a solid text for use in advanced graduate courses on statistical modeling. Those with a firm mathematical background who wish to learn about the approach, or those who know a little about the program and want to know more, will find this an excellent reference. More Information
  2. Introduction to Algorithms /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Introduction to Algorithms A Creative Approach by Udi Manber Publisher Addison-Wesley Published Date 1989 Page Count 478 Categories Computers / Programming / General, Computers / Programming / Algorithms, Computers / Data Science / Data Modeling & Design, Mathematics / Algebra / General, Mathematics / Discrete Mathematics Language EN Average Rating 5 (based on 1 ratings) Maturity Rating No Mature Content Detected ISBN 0201120372 This book emphasizes the creative aspects of algorithm design by examining steps used in the process of algorithm development. The heart of the creative process lies in an analogy between proving mathematical theorems by induction and designing combinatorial algorithms. The book contains hundreds of problems and examples. It is designed to enhance the reader's problem-solving abilities and understanding of the principles behind algorithm design. 0201120372B04062001 More Information
  3. Fundamentals of Optical Waveguides /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Fundamentals of Optical Waveguides by Katsunari Okamoto Publisher Academic Press Published Date 2006 Page Count 561 Categories Computers / Optical Data Processing, Technology & Engineering / Electrical, Technology & Engineering / Electronics / Optoelectronics, Technology & Engineering / Fiber Optics, Technology & Engineering / Lasers & Photonics, Technology & Engineering / Optics, Technology & Engineering / Telecommunications Language EN Average Rating 4 (based on 3 ratings) Maturity Rating No Mature Content Detected ISBN 0125250967 Fundamentals of Optical Waveguides is an essential resource for any researcher, professional or student involved in optics and communications engineering. Any reader interested in designing or actively working with optical devices must have a firm grasp of the principles of lightwave propagation. Katsunari Okamoto has presented this difficult technology clearly and concisely with several illustrations and equations. Optical theory encompassed in this reference includes coupled mode theory, nonlinear optical effects, finite element method, beam propagation method, staircase concatenation method, along with several central theorems and formulas. Since the publication of the well-received first edition of this book, planar lightwave circuits and photonic crystal fibers have fully matured. With this second edition the advances of these fibers along with other improvements on existing optical technologies are completely detailed. This comprehensive volume enables readers to fully analyze, design and simulate optical atmospheres. Features: + Exceptional new chapter on Arrayed-Waveguide Grating (AWG) + In depth discussion of Photonic Crystal Fibers (PCFs) + Thorough explanation of Multimode Interference Devices (MMI) + Full coverage of polarization Mode Dispersion (PMD) About the Author: Katsunari Okamoto was born in Hiroshima, Japan, on October 19, 1949. He received the B.S., M.S., and Ph.D. in electronic engineering from Tokyo University, Japan, in 1972, 1974, and 1977, respectively. He has engaged in research on the transmission characteristics of various fibers, including PANDA fibers, as well as fiber-optic components, and proposed the idea of dispersion-flattened fibers (DFF) on which he has also experimented. Dr. Okamoto has worked for the Optical Fiber Group in Southampton, England and the NTT Photonics Laboratories at the Ibaraki R&D Center, where he developed various AWGs and integrated-optic add/drop multiplexers. He is a fellow of IEEE and a research fellow of NTT Science and Core Technology Laboratory Group. In 2003, he started Okamoto Laboratory Ltd. Okamoto Laboratory is an R&D consulting company that deals with the custom design of optical fibers and functional planar lightwave circuits. More Information
  4. Data Structures and Program Design /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Data Structures and Program Design by Robert Leroy Kruse Publisher Prentice-Hall Published Date 1987 Page Count 586 Categories Computers / General, Computers / Programming / General, Computers / Languages / General, Computers / Software Development & Engineering / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0131958844 No description available. More Information
  5. Data-Driven Science and Engineering /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Data-Driven Science and Engineering Machine Learning, Dynamical Systems, and Control by Steven L. Brunton, J. Nathan Kutz Publisher Cambridge University Press Published Date 2019-02-28 Page Count 472 Categories Computers / General, Computers / Artificial Intelligence / General, Language Arts & Disciplines / Library & Information Science / General, Mathematics / Discrete Mathematics, Mathematics / Probability & Statistics / General, Mathematics / Mathematical Analysis, Mathematics / Optimization, Science / General, Science / Earth Sciences / Meteorology & Climatology, Science / Physics / General, Technology & Engineering / Engineering (General), Technology & Engineering / Robotics Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1108422098 Data-driven discovery is revolutionizing the modeling, prediction, and control of complex systems. This textbook brings together machine learning, engineering mathematics, and mathematical physics to integrate modeling and control of dynamical systems with modern methods in data science. It highlights many of the recent advances in scientific computing that enable data-driven methods to be applied to a diverse range of complex systems, such as turbulence, the brain, climate, epidemiology, finance, robotics, and autonomy. Aimed at advanced undergraduate and beginning graduate students in the engineering and physical sciences, the text presents a range of topics and methods from introductory to state of the art. More Information
  6. Jessica Brown posted a post in a topic in Computers
    Digital Literacy /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Digital Literacy by Paul Gilster Publisher Wiley Published Date 1998-04-03 Page Count 276 Categories Computers / Computer Literacy, Computers / General Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0471249521 "Readers leery of ramping onto the information highway and surfers suffering Internet overload will value the solid advice supplied by Gilster." --Booklist. "Paul Gilster's intelligent, sobering look at the Internet is a breath of fresh air." --Amazon.com "This book sheds light on the skills that Web surfers need to separate the digital garbage from the golden nuggets of good data. It's a good place to start for adult newcomers to the information highway." --Courant Now in paper! Digital Literacy provides Internet novices with the basic thinking skills and core competencies they'll need to thrive in an interactive environment so fundamentally different from passive media. PAUL GILSTER (Raleigh, North Carolina) is the author of The Web Navigator and Finding It on the Internet which have sold over 200,000 copies. More Information
  7. TCP/IP Network Administration /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } TCP/IP Network Administration Help for Unix System Administrators by Craig Hunt Publisher "O'Reilly Media, Inc." Published Date 2002-04-04 Page Count 748 Categories Computers / Networking / Network Protocols, Computers / Internet / General, Computers / Networking / General, Computers / Networking / Intranets & Extranets Language EN Average Rating 3.5 (based on 10 ratings) Maturity Rating No Mature Content Detected ISBN 1449390781 This complete guide to setting up and running a TCP/IP network is essential for network administrators, and invaluable for users of home systems that access the Internet. The book starts with the fundamentals -- what protocols do and how they work, how addresses and routing are used to move data through the network, how to set up your network connection -- and then covers, in detail, everything you need to know to exchange information via the Internet.Included are discussions on advanced routing protocols (RIPv2, OSPF, and BGP) and the gated software package that implements them, a tutorial on configuring important network services -- including DNS, Apache, sendmail, Samba, PPP, and DHCP -- as well as expanded chapters on troubleshooting and security. TCP/IP Network Administration is also a command and syntax reference for important packages such as gated, pppd, named, dhcpd, and sendmail.With coverage that includes Linux, Solaris, BSD, and System V TCP/IP implementations, the third edition contains: Overview of TCP/IPDelivering the dataNetwork servicesGetting startedMBasic configurationConfiguring the interfaceConfiguring routingConfiguring DNSConfiguring network serversConfiguring sendmailConfiguring ApacheNetwork securityTroubleshootingAppendices include dip, ppd, and chat reference, a gated reference, a dhcpd reference, and a sendmail referenceThis new edition includes ways of configuring Samba to provide file and print sharing on networks that integrate Unix and Windows, and a new chapter is dedicated to the important task of configuring the Apache web server. Coverage of network security now includes details on OpenSSH, stunnel, gpg, iptables, and the access control mechanism in xinetd. Plus, the book offers updated information about DNS, including details on BIND 8 and BIND 9, the role of classless IP addressing and network prefixes, and the changing role of registrars.Without a doubt, TCP/IP Network Administration, 3rd Edition is a must-have for all network administrators and anyone who deals with a network that transmits data over the Internet. More Information
  8. The Mythical Man-Month /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } The Mythical Man-Month Essays on Software Engineering by Frederick P. Brooks Jr. Publisher Pearson Education Published Date 1995-08-02 Page Count 336 Categories Computers / Software Development & Engineering / Project Management Language EN Average Rating 4.5 (based on 6 ratings) Maturity Rating No Mature Content Detected ISBN 0132119161 Few books on software project management have been as influential and timeless as The Mythical Man-Month. With a blend of software engineering facts and thought-provoking opinions, Fred Brooks offers insight for anyone managing complex projects. These essays draw from his experience as project manager for the IBM System/360 computer family and then for OS/360, its massive software system. Now, 20 years after the initial publication of his book, Brooks has revisited his original ideas and added new thoughts and advice, both for readers already familiar with his work and for readers discovering it for the first time. The added chapters contain (1) a crisp condensation of all the propositions asserted in the original book, including Brooks' central argument in The Mythical Man-Month: that large programming projects suffer management problems different from small ones due to the division of labor; that the conceptual integrity of the product is therefore critical; and that it is difficult but possible to achieve this unity; (2) Brooks' view of these propositions a generation later; (3) a reprint of his classic 1986 paper "No Silver Bullet"; and (4) today's thoughts on the 1986 assertion, "There will be no silver bullet within ten years." More Information
  9. Jessica Brown posted a post in a topic in Computers
    Gangs and Organized Crime /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Gangs and Organized Crime by Gregg W. Etter, Carter F. Smith, George W. Knox Publisher Taylor & Francis Published Date 2018-07-04 Page Count 520 Categories Computers / Security / General, Law / Criminal Law / General, Law / Forensic Science, Social Science / Criminology, Law / Criminal Law / Juvenile Offenders Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1351644890 In Gangs and Organized Crime, George W. Knox, Gregg W. Etter, and Carter F. Smith offer an informed and carefully investigated examination of gangs and organized crime groups, covering street gangs, prison gangs, outlaw motorcycle gangs, and organized crime groups from every continent. The authors have spent decades investigating gangs as well as researching their history and activities, and this dual professional-academic perspective informs their analysis of gangs and crime groups. They take a multidisciplinary approach that combines criminal justice, public policy and administration, law, organizational behavior, sociology, psychology, and urban planning perspectives to provide insight into the actions and interactions of a variety of groups and their members. This textbook is ideal for criminal justice and sociology courses on gangs as well as related course topics like gang behavior, gang crime and the inner city, organized crime families, and transnational criminal groups. Gangs and Organized Crime is also an excellent addition to the professional’s reference library or primer for the general reader. More Information
  10. Data Science from Scratch /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Data Science from Scratch First Principles with Python by Joel Grus Publisher "O'Reilly Media, Inc." Published Date 2019-04-12 Page Count 406 Categories Computers / Data Science / Data Modeling & Design, Business & Economics / Business Mathematics, Business & Economics / Statistics, Computers / Data Science / General, Computers / Data Science / Data Analytics, Computers / Languages / Python Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1492041106 Data science libraries, frameworks, modules, and toolkits are great for doing data science, but they’re also a good way to dive into the discipline without actually understanding data science. With this updated second edition, you’ll learn how many of the most fundamental data science tools and algorithms work by implementing them from scratch. If you have an aptitude for mathematics and some programming skills, author Joel Grus will help you get comfortable with the math and statistics at the core of data science, and with hacking skills you need to get started as a data scientist. Today’s messy glut of data holds answers to questions no one’s even thought to ask. This book provides you with the know-how to dig those answers out. More Information
  11. Microsoft Defender for Cloud /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Microsoft Defender for Cloud by Yuri Diogenes, Tom Janetscheck Publisher Pearson Education Published Date 2022-10-23 Page Count 288 Categories Computers / Security / Network Security, Computers / Operating Systems / Windows Server, Computers / Distributed Systems / Client-Server Computing, Computers / Distributed Systems / Cloud Computing Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0137878451 The definitive practical guide to Microsoft Defender for Cloud covering new components and multi-cloud enhancements! Microsoft Defender for Cloud offers comprehensive tools for hardening resources, tracking security posture, protecting against attacks, and streamlining security management - all in one natively integrated toolset. Now, leading Microsoft security experts Yuri Diogenes and Tom Janetscheck help you apply its robust protection, detection, and response capabilities throughout your operations, protecting workloads running on all your cloud, hybrid, and on-premises platforms. This guide shows how to make the most of new components, enhancements, and deployment scenarios, as you address today's latest threat vectors. Sharing best practices, expert tips, and optimizations only available from Microsoft's Defender for Cloud team, the authors walk through improving everything from policies and governance to incident response and risk management. Whatever your role or experience, they'll help you address new security challenges far more effectively--and save hours, days, or even weeks. Two of Microsoft's leading cloud security experts show how to: Assess new threat landscapes, the MITRE ATT&CK framework, and the implications of ''assume-breach'' Explore Defender for Cloud architecture, use cases, and adoption considerations including multicloud with AWS and GCP Plan for effective governance, successful onboarding, and maximum value Fully visualize complex cloud estates and systematically reduce their attack surfaces Prioritize risks with Secure Score, and leverage at-scale tools to build secure cloud-native apps Establish consistent policy enforcement to avoid drift Use advanced analytics and machine learning to identify attacks based on signals from all cloud workloads Enhance security posture by integrating with the Microsoft Sentinel SIEM/SOAR, Microsoft Purview, and Microsoft Defender for Endpoint Leverage just-in-time VM access and other enhanced security capabilities About This Book For architects, designers, implementers, SecOps professionals, developers, and security specialists working in Microsoft Azure environments For all IT professionals and decision-makers concerned with securing modern hybrid/multicloud environments, cloud-native apps, and PaaS services More Information
  12. Cloud Security and Privacy /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Cloud Security and Privacy by Tim Mather Publisher O'Reilly Published Date 2009 Page Count 312 Categories Cloud computing Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0596807503 No description available. More Information
  13. Cloud Computing /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Cloud Computing A Practical Approach for Learning and Implementation by A Srinivasan Publisher Pearson Education India Published Date 2014 Page Count 440 Categories Uncategorized Language EN Average Rating 3 (based on 2 ratings) Maturity Rating No Mature Content Detected ISBN 9332537259 This book lays a good foundation to the core concepts and principles of cloud computing, walking the reader through the fundamental ideas with expert ease. The book advances on the topics in a step-by-step manner and reinforces theory with a full-fledged pedagogy designed to enhance students' understanding and offer them a practical insight into the subject More Information
  14. Deploying Mission Critical Applications with Linux on POWER /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Deploying Mission Critical Applications with Linux on POWER by Stephen Hochstetler Publisher IBM, International Technical Support Organization Published Date 2007 Page Count 108 Categories Computers Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0738486604 This IBM Redbooks publication gives you the information you need to help you run mission critical applications in an IBM System p environment. Matching applications, such as SAP, and Linux highly available solutions with IBM System p systems provides you with the capabilities to produce a highly available solution. This book will help you think through the process of setting up new solutions or help you review an existing solution. If you are on an previous generation IBM POWER server or running Linux on another architecture, this book will help you understand the benefits of moving your critical applications to Linux running on IBM System p servers. More Information
  15. Jessica Brown posted a post in a topic in Linux
    Linux For Non-Geeks /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Linux For Non-Geeks by Rickford Grant Publisher Shroff Publishers & Distributors Published Date 2004 Page Count 336 Categories Linux Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 8173668825 This book is for any home user who has switched or is thinking of switching to Linux. Based on Red Hat's Fedora Core, Linux For Non-Geeks avoids geeky subjects like server and network setup and concentrates on the subjects of interest to the average home user: Installation, the Internet, playing CDs and audio files, desktop customization, games, downloading software and fonts, USB storage devices, printing, and more. Readers with only basic experience with Windows or another Linux distribution will learn how to do everything on their Linux machine that they are used to doing with Windows. More Information
  16. The Cloud Revolution /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } The Cloud Revolution How the Convergence of New Technologies Will Unleash the Next Economic Boom and a Roaring 2020s by Mark P. Mills Publisher Encounter Books Published Date 2021 Page Count 464 Categories Business & Economics / Economics / Macroeconomics, Business & Economics / Industries / Computers & Information Technology, Business & Economics / Forecasting, Political Science / General, Social Science / General, Technology & Engineering / General, TECHNOLOGY & ENGINEERING / General, Technology & Engineering / Inventions Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1641772301 The conventional wisdom on how technology will change the future is wrong. Mark Mills lays out a radically different and optimistic vision for what's really coming. The mainstream forecasts fall into three camps. One considers today as the "new normal," where ordering a ride or food on a smartphone or trading in bitcoins is as good as it's going to get. Another foresees a dystopian era of widespread, digitally driven job- and business-destruction. A third believes that the only technological revolution that matters will be found with renewable energy and electric cars. But according to Mills, a convergence of technologies will instead drive an economic boom over the coming decade, one that historians will characterize as the "Roaring 2020s." It will come not from any single big invention, but from the confluence of radical advances in three primary technology domains: microprocessors, materials, and machines. Microprocessors are increasingly embedded in everything. Materials, from which everything is built, are emerging with novel, almost magical capabilities. And machines, which make and move all manner of stuff, are undergoing a complementary transformation. Accelerating and enabling all of this is the Cloud, history's biggest infrastructure, which is itself based on the building blocks of next-generation microprocessors and artificial intelligence. We've seen this pattern before. The technological revolution that drove the great economic expansion of the twentieth century can be traced to a similar confluence, one that was first visible in the 1920s: a new information infrastructure (telephony), new machines (cars and power plants), and new materials (plastics and pharmaceuticals). Single inventions don't drive great, long-cycle booms. It always takes convergent revolutions in technology's three core spheres--information, materials, and machines. Over history, that's only happened a few times. We have wrung much magic from the technologies that fueled the last long boom. But the great convergence now underway will ignite the 2020s. And this time, unlike any previous historical epoch, we have the Cloud amplifying everything. The next long boom starts now. More Information
  17. Arduino for the Cloud /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Arduino for the Cloud Arduino Yun and Dragino Yun Shield by Claus Kuhnel Publisher Universal-Publishers Published Date 2015 Page Count 198 Categories Computers / Hardware / Mainframes & Minicomputers, Computers / Operating Systems / Linux, Computers / Distributed Systems / Cloud Computing Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1627340351 Arduino for the Cloud considers the Arduino Yún and the Dragino Yún Shield as components closing the gap between a typical microcontroller application and connection to the cloud. Arduino Yún combines the classic Arduino with an Atheros AR9331 system-on-a-chip (SoC) for wireless access points and routers platforms, which uses the Linux distribution Linino (OpenWRT) operating system. The Dragino Yun Shield expands any Arduino with network capabilities by the Atheros AR9331.The combination of microcontroller and Linux device supports the whole chain from sensor to software applications in the cloud by hardware and software. This book deals with the Arduino and the Linux device and their interaction, without the need of detailed Linux knowledge. More Information
  18. Foundations of Modern Networking /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Foundations of Modern Networking SDN, NFV, QoE, IoT, and Cloud by William Stallings Publisher Pearson Published Date 2015-10-22 Page Count 538 Categories Computers / Networking / General, Computers / Client-Server Computing Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0134175395 Foundations of Modern Networking is a comprehensive, unified survey of modern networking technology and applications for today's professionals, managers, and students. Dr. William Stallings offers clear and well-organized coverage of five key technologies that are transforming networks: Software-Defined Networks (SDN), Network Functions Virtualization (NFV), Quality of Experience (QoE), the Internet of Things (IoT), and cloudbased services. Dr. Stallings reviews current network ecosystems and the challenges they face-from Big Data and mobility to security and complexity. Next, he offers complete, self-contained coverage of each new set of technologies: how they work, how they are architected, and how they can be applied to solve real problems. Dr. Stallings presents a chapter-length analysis of emerging security issues in modern networks. He concludes with an up-to date discussion of networking careers, including important recent changes in roles and skill requirements. Coverage: Elements of the modern networking ecosystem: technologies, architecture, services, and applications Evolving requirements of current network environments SDN: concepts, rationale, applications, and standards across data, control, and application planes OpenFlow, OpenDaylight, and other key SDN technologies Network functions virtualization: concepts, technology, applications, and software defined infrastructure Ensuring customer Quality of Experience (QoE) with interactive video and multimedia network traffic Cloud networking: services, deployment models, architecture, and linkages to SDN and NFV IoT and fog computing in depth: key components of IoT-enabled devices, model architectures, and example implementations Securing SDN, NFV, cloud, and IoT environments Career preparation and ongoing education for tomorrow's networking careers Key Features: Strong coverage of unifying principles and practical techniques More than a hundred figures that clarify key concepts Web support at williamstallings.com/Network/ QR codes throughout, linking to the website and other resources Keyword/acronym lists, recommended readings, and glossary Margin note definitions of key words throughout the text More Information
  19. Getting Started with OpenShift /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Getting Started with OpenShift A Guide for Impatient Beginners by Steve Pousty, Katie Miller Publisher "O'Reilly Media, Inc." Published Date 2014-05-14 Page Count 104 Categories Computers / General, Computers / Programming / Open Source, Computers / Internet / Web Programming, Computers / Distributed Systems / Cloud Computing Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1491904720 Intrigued by the possibilities of developing web applications in the cloud? With this concise book, you get a quick hands-on introduction to OpenShift, the open source Platform as a Service (PaaS) offering from Red Hat. You’ll learn the steps necessary to build, deploy, and host a complete real-world application on OpenShift, without having to read long, detailed explanations of the technologies involved. Though the book uses Python, application examples in other languages are available on GitHub. If you can build web applications, use a command line, and program in Java, Python, Ruby, Node.js, PHP, or Perl, you’re ready to get started. Dive in and create your first example application with OpenShiftModify the example with your own code and hot-deploy the changesAdd components such as a database, task scheduling, and monitoringUse external libraries and dependencies in your applicationDelve into networking, persistent storage, and backup optionsExplore ways to adapt your team processes to use OpenShiftLearn OpenShift terms, technologies, and commandsGet a list of resources to learn more about OpenShift and PaaS More Information
  20. Is Your Company Ready for Cloud? /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Is Your Company Ready for Cloud? Choosing the Best Cloud Adoption Strategy for Your Business by Pamela Isom, Kerrie Holley Publisher IBM Press Published Date 2012 Page Count 347 Categories Business & Economics / Decision-Making & Problem Solving, Business & Economics / Industrial Management, Business & Economics / Information Management, Business & Economics / Business Mathematics, Computers / Business & Productivity Software / General, Computers / Networking / General, Computers / Distributed Systems / Client-Server Computing Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0132599848 "This book successfully addresses the approach for adopting cloud into organizations (small and large), realizing that every application may not be a fit for a cloud environment. The writer does an excellent job of integrating cloud into the approach for an enterprise architecture and drilling down into how to evaluate cloud in its variety of implementation techniques, along with the benefits and drawbacks of each." -- Sue Miller-Sylvia, IBM Fellow and Vice President, Application Innovation Services, IBM Global Business Services Make the Right Cloud Adoption and Deployment Decisions for Your Business This is the first complete guide to cloud decision making for senior executives in both technology and non-technology roles. IBM® Global Business Services® Executive Architect Pamela K. Isom and IBM Fellow Kerrie Holley present practical business cases, vignettes, and techniques to help you understand when cloud investments make sense and when they don't. You'll find decision models that are anchored with practical experiences and lessons to guide your decision making, best practices for leveraging investments you've already made, and expert assistance with every aspect of the cloud transition. Drawing on their extensive experience working with enterprise clients, Isom and Holley show how to integrate both business and technical considerations, set the right priorities, and successfully manage everything from security and performance to governance. Whatever your company's size, industry, or challenges, this book will help you drive maximum business value from the cloud--on your terms and on your timeline. Coverage includes Assessing the business value of a cloud adoption strategy based on 10 specific expectations Gaining more value by incorporating cloud into enterprise architecture Implementing cloud when you don't already have an enterprise architecture Fully understanding the financial implications of cloud-based strategies and technologies Incorporating cloud in environments that have already adopted Service Oriented Architecture (SOA) Selecting components of your cloud portfolio, including elements of larger outsourced or managed solutions Governing cloud as part of your overall organizational landscape Systematically recognizing and mitigating cloud adoption risks, including security, cost, and performance Planning the transition: retiring legacy applications, transforming business processes, and selecting partners Anticipating and guiding the use of cloud business patterns, trends, and technologies More Information
  21. Jessica Brown posted a post in a topic in Cloud Computing
    ICloud /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } ICloud by Tom Negrino Publisher Peachpit Published Date 2012 Page Count 185 Categories Cloud computing Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0132927551 Learn to use Apple's iCloud services with Mac, PC and iOS devices. More Information
  22. Jessica Brown posted a post in a topic in Cloud Computing
    Adobe Acrobat DC /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Adobe Acrobat DC by Brie Gyncild, Lisa Fridsma Publisher Adobe Press Published Date 2017 Page Count N/A Categories COMPUTERS Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0134844750 No description available. More Information
  23. Jessica Brown posted a post in a topic in Cloud Computing
    Hadoop Operations /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Hadoop Operations by Eric Sammer Publisher "O'Reilly Media, Inc." Published Date 2012-10-09 Page Count 282 Categories Computers / General, Computers / Computer Science, Computers / Data Science / General, Computers / Data Science / Data Analytics, Computers / Programming / General, Computers / Programming / Parallel, Computers / Languages / JavaScript, Computers / Languages / Java Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 1449327052 If you’ve been asked to maintain large and complex Hadoop clusters, this book is a must. Demand for operations-specific material has skyrocketed now that Hadoop is becoming the de facto standard for truly large-scale data processing in the data center. Eric Sammer, Principal Solution Architect at Cloudera, shows you the particulars of running Hadoop in production, from planning, installing, and configuring the system to providing ongoing maintenance. Rather than run through all possible scenarios, this pragmatic operations guide calls out what works, as demonstrated in critical deployments. Get a high-level overview of HDFS and MapReduce: why they exist and how they work Plan a Hadoop deployment, from hardware and OS selection to network requirements Learn setup and configuration details with a list of critical properties Manage resources by sharing a cluster across multiple groups Get a runbook of the most common cluster maintenance tasks Monitor Hadoop clusters—and learn troubleshooting with the help of real-world war stories Use basic tools and techniques to handle backup and catastrophic failure More Information
  24. Jessica Brown posted a post in a topic in Linux
    Advanced Linux Networking /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } Advanced Linux Networking by Roderick W. Smith Publisher Addison-Wesley Published Date 2002 Page Count 752 Categories Computers / Networking / General, Computers / Operating Systems / General, Computers / Operating Systems / UNIX, Computers / Operating Systems / Linux Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0201774232 With an increasing number of networks and mission-critical applications running on Linux, system and network administrators must be able to do more than set up a server and rely on its default configuration. "Advanced Linux Networking" is designed to help you achieve a higher level of competence. It focuses on powerful techniques and features of Linux networking and provides you with the know-how you need to improve server efficiency, enhance security, and adapt to new requirements. This book begins with a brief introduction to low-level configuration, including a guide to getting your network up and running. Part II outlines those servers and procedures most likely to be used by the computers on your local network: DHCP servers, Kerberos, Samba, time servers, and network backups, among others. Part III covers Internet servers: DNS, SMTP (sendmail, Postfix, and Exim), Apache, and FTP servers. Part IV examines network security, exploring such topics as using a chroot jail, iptables configuration, and VPNs. Wherever pertinent, the author addresses the differences between Caldera OpenLinux, Debian GNU/Linux, Mandrake, Red Hat, Slackware, SuSE, and TurboLinux. Specific topics covered include: Configuring small but potentially important servers quickly and easily Optimizing Linux network operation Using advanced system features effectively Using systems and software in alternative ways to reach your goals Avoiding possible damage to your system and violations of ISP policies Securing your system "Advanced Linux Networking" is the single-volume tutorial and reference for Linux networking that will help you achieve expert status. 0201774232B05172002 More Information
  25. UNIX and Linux System Administration Handbook /* Scoped styles for the book post */ #book-post { padding: 20px; } #book-post .post-container { padding: 20px; border-radius: 8px; max-width: 800px; box-shadow: 0 2px 5px rgba(0,0,0,0.1); } #book-post .post-header { margin-bottom: 20px; } #book-post .post-header h1 { margin: 0; font-size: 2em; } #book-post .post-header h2 { margin: 0; font-size: 1.2em; } #book-post .book-details { width: 100%; border-collapse: collapse; margin-bottom: 20px; } #book-post .book-details th, #book-post .book-details td { border: 1px solid oklch(0.351 0.0176 260); padding: 8px; text-align: left; } #book-post .book-cover { max-width: 200px; border-radius: 8px; margin: 0 auto; padding-left: 15px; float: right; } #book-post .description { line-height: 1.6; } #book-post .info-link { display: block; margin-top: 20px; } UNIX and Linux System Administration Handbook by Evi Nemeth, Evi Nemeth. Garth Snyder. Trent Hein R. Ben Whaley. Dan Mackin, Garth Snyder, Trent R. Hein, Ben Whaley, Dan Mackin, James Garnett, Fabrizio Branca, Adrian Mouat Publisher Addison-Wesley Published Date 2017 Page Count N/A Categories COMPUTERS Language EN Average Rating N/A (based on N/A ratings) Maturity Rating No Mature Content Detected ISBN 0134278305 "As an author, editor, and publisher, I never paid much attention to the competition--except in a few cases. This is one of those cases. The UNIX System Administration Handbook is one of the few books we ever measured ourselves against."--Tim O'Reilly, founder of O'Reilly Media "This edition is for those whose systems live in the cloud or in virtualized data centers; those whose administrative work largely takes the form of automation and configuration source code; those who collaborate closely with developers, network engineers, compliance officers, and all the other worker bees who inhabit the modern hive." --Paul Vixie, Internet Hall of Fame-recognized innovator and founder of ISC and Farsight Security "This book is fun and functional as a desktop reference. If you use UNIX and Linux systems, you need this book in your short-reach library. It covers a bit of the systems' history but doesn't bloviate. It's just straight-forward information delivered in a colorful and memorable fashion." --Jason A. Nunnelley UNIX® and Linux® System Administration Handbook, Fifth Edition, is today's definitive guide to installing, configuring, and maintaining any UNIX or Linux system, including systems that supply core Internet and cloud infrastructure. Updated for new distributions and cloud environments, this comprehensive guide covers best practices for every facet of system administration, including storage management, network design and administration, security, web hosting, automation, configuration management, performance analysis, virtualization, DNS, security, and the management of IT service organizations. The authors--world-class, hands-on technologists--offer indispensable new coverage of cloud platforms, the DevOps philosophy, continuous deployment, containerization, monitoring, and many other essential topics. Whatever your role in running systems and networks built on UNIX or Linux, this conversational, well-written guide will improve your efficiency and help solve your knottiest problems. More Information

Important Information

Terms of Use Privacy Policy Guidelines We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.