The DevOps 2.1 Toolkit: Docker Swarm

The DevOps 2.1 Toolkit: Docker Swarm

Author: Viktor Farcic

Publisher: Packt Publishing Ltd

Published: 2017-05-10

Total Pages: 426

ISBN-13: 1787280608

DOWNLOAD EBOOK

Viktor Farcic's latest book, The DevOps 2.1 Toolkit: Docker Swarm, shows you how to successfully integrate Docker Swarm into your DevOps toolset. About This Book Expand your DevOps Toolkit with the DevOps thought leader, Viktor Farcic Build, test, deploy, and monitor services inside Docker Swarm clusters Translate your understanding to different hosting providers like AWS, Azure, and DigitalOcean Go beyond simple deployment to explore how to create a continuous deployment process Extend the deep understanding you gained from Viktor's DevOps 2.0 Toolkit book Who This Book Is For This book is for professionals interested in the full microservices life cycle combined with continuous deployment and containers. Target audience could be architects who want to know how to design their systems around microservices. It could be DevOps wanting to know how to apply modern configuration management practices and continuously deploy applications packed in containers. It is for developers who would like to take the process back into their hands as well as for managers who would like to gain a better understanding of the process used to deliver software from the beginning to the end. This book is for everyone wanting to know more about the software development life cycle starting from requirements and design, through the development and testing all the way until deployment and post-deployment phases. We'll create the processes taking into account the best practices developed by and for some of the biggest companies. What You Will Learn Learn all aspects of Docker Swarm from building, testing, deploying, and monitoring services inside Docker Swarm clusters, available since Docker 1.12. Master the deeper logic of DevOps with Viktor, so that you can successfully apply that logic across any specific set of tools you're working with. Translate a deep understanding to different hosting providers like AWS, Azure, DigitalOcean, among others. You'll go beyond simple deployment: you will explore with Viktor how to create a continuous deployment process. Accomplish zero-downtime deployments, and what to do in case of a failover. Know how to run services at scale, how to monitor the systems, and how to make it heal itself. In Detail Viktor Farcic's latest book, The DevOps 2.1 Toolkit: Docker Swarm, takes you deeper into one of the major subjects of his international best seller, The DevOps 2.0 Toolkit, and shows you how to successfully integrate Docker Swarm into your DevOps toolset. Viktor shares with you his expert knowledge in all aspects of building, testing, deploying, and monitoring services inside Docker Swarm clusters. You'll go through all the tools required for running a cluster. You'll travel through the whole process with clusters running locally on a laptop. Once you're confident with that outcome, Viktor shows you how to translate your experience to different hosting providers like AWS, Azure, and DigitalOcean. Viktor has updated his DevOps 2.0 framework in this book to use the latest and greatest features and techniques introduced in Docker. We'll go through many practices and even more tools. While there will be a lot of theory, this is a hands-on book. You won't be able to complete it by reading it on the metro on your way to work. You'll have to read this book while in front of the computer and get your hands dirty. Style and approach We'll go through many practices and even more tools. While there will be a lot of theory, this is a hands-on book. You'll have to read this book while in front of the computer and get your hands dirty. The goal is not to master one particular set of tools, but to learn the logic behind them so that you can apply it to your job in various contexts.


Guide to Vulnerability Analysis for Computer Networks and Systems

Guide to Vulnerability Analysis for Computer Networks and Systems

Author: Simon Parkinson

Publisher: Springer

Published: 2018-09-04

Total Pages: 381

ISBN-13: 3319926241

DOWNLOAD EBOOK

This professional guide and reference examines the challenges of assessing security vulnerabilities in computing infrastructure. Various aspects of vulnerability assessment are covered in detail, including recent advancements in reducing the requirement for expert knowledge through novel applications of artificial intelligence. The work also offers a series of case studies on how to develop and perform vulnerability assessment techniques using start-of-the-art intelligent mechanisms. Topics and features: provides tutorial activities and thought-provoking questions in each chapter, together with numerous case studies; introduces the fundamentals of vulnerability assessment, and reviews the state of the art of research in this area; discusses vulnerability assessment frameworks, including frameworks for industrial control and cloud systems; examines a range of applications that make use of artificial intelligence to enhance the vulnerability assessment processes; presents visualisation techniques that can be used to assist the vulnerability assessment process. In addition to serving the needs of security practitioners and researchers, this accessible volume is also ideal for students and instructors seeking a primer on artificial intelligence for vulnerability assessment, or a supplementary text for courses on computer security, networking, and artificial intelligence.


Towards new e-Infrastructure and e-Services for Developing Countries

Towards new e-Infrastructure and e-Services for Developing Countries

Author: Rafik Zitouni

Publisher: Springer Nature

Published: 2021-03-03

Total Pages: 350

ISBN-13: 3030705722

DOWNLOAD EBOOK

This book constitutes the thoroughly refereed proceedings of the 12th International Conference on e-Infrastructure and e-Services for Developing Countries, AFRICOMM 2020, held in Ebène City, Mauritius, in December 2020. Due to COVID-19 pandemic the conference was held virtually. The 20 full papers were carefully selected from 90 submissions. The papers are organized in four thematic sections on dynamic spectrum access and mesh networks; wireless sensing and 5G networks; software-defined networking; Internet of Things; e-services and big data; DNS resilience and performance.


Operator Handbook

Operator Handbook

Author:

Publisher:

Published: 2021

Total Pages: 0

ISBN-13:

DOWNLOAD EBOOK

The Operator Handbook takes three disciplines (Red Team, OSINT, Blue Team) and combines them into one complete reference guide. The book contains 100+ individual cheat sheet references for many of the most frequently used tools and techniques by practitioners. Includes content to assist the most seasoned cybersecurity veteran or someone just getting started in the career field. The goal of combining all disciplines into one book was to remove the artificial barriers that only certain knowledge exists within a "Team". The reality is today's complex digital landscape demands some level of knowledge in all areas. The "Operator" culture should mean a well-rounded team member no matter the "Team" you represent. All cybersecurity practitioners are Operators. The Blue Team should observe and understand Red Team tactics, Red Team should continu.


Introduction to FortiGate Part-1 Infrastructure

Introduction to FortiGate Part-1 Infrastructure

Author: Daniel Howard

Publisher:

Published: 2020-06-21

Total Pages: 326

ISBN-13:

DOWNLOAD EBOOK

Looking to step into the Network Security field with the Fortigate firewall? Or are you required to manage a FortiGate NGFW for your organization? Then this is the right book for you! The FortiGate is an amazing device with many cybersecurity features to protect your network. If you are new to FortiGate's then this is the perfect book for you! This book will cover general overview of working with Fortinet. Also, you will gain a solid understanding on day to day administrative tasks. Next, you will learn how FortiGate interacts with various layer-2 protocol. Also you will get a chance how to filter network traffic and apply security policies which is very exciting. Lastly, you will learn about the session table and how Fortigate handles traffic. Below is a full list of what this book covers: Chapter One - Introduction to FortiGate-Identify platform features of FortiGate-Describe Security Processor Unit SPU-Identify factory defaults-Understand the different operational modes-Understand FortiGate and FortiGuard Relationship-Manage administrator profiles-Manage administrative profiles-Manage network interfaces-Manage basic services-backup and restore config file-upgrade and downgrade firmware-Understand CLI structure-Understand GUI navigation-Initial ConfigurationChapter - 2 - Layer two technologies-Configuration of layer-2 VLANs-Describe VLANs and VLAN tagging process-Describe FortiOS Transparent Mode-Configure FortiOS Transparent Mode settings-Describe Transparent Mode Bridge Table-Describe MAC forwarding-Describe how to find MAC address on FortiOS-Describe Forwarding Domains-Describe and configure Virtual Switches-Describe Spanning Tree Protocol-Describe and Configure various NAT Mode layer-2 protocols-Describe and configure Layer-3 VLAN interface-Describe Virtual Wire Pairing-Describe and Configure VXLANChapter-3 Layer Three Technologies: -Configuration of Static Routes-implementation of Policy-Based Routes-Control traffic for well-known Internet Services-Interpret the FortiOS Routing Table-Understand FortiOS anti-spoofing mechanism-Implement route failover and floating route-Understand ECMP-Recognize active route vs standby route vs inactive routes-Use built in sniffer and diagnose flow debug tools, -Understand Session Table Entry.Chapter 4 - Firewall Policy and NAT-Identify components in Firewall Policy-Describe how traffic matches Firewall Policy Entries-Configure Firewall Policy Logging-Describe Policy GUI list views-Describe Policy ID's vs Policy Sequence numbers-Described where objects are referenced-Explain Name restrictions on Firewall Policies-Perform Firewall Policy re-ordering-Describe NAT and PAT-Explain different configuration modes for NAT-Configure and Describe SNAT and DNAT VIPs-Troubleshoot NAT issues


Fortinet NSE4_FGT-7.2 Exam Preparation - NEW Version

Fortinet NSE4_FGT-7.2 Exam Preparation - NEW Version

Author: Georgio Daccache

Publisher: Georgio Daccache

Published:

Total Pages: 127

ISBN-13:

DOWNLOAD EBOOK

Fortinet NSE4_FGT-7.2 Exam Preparation Book NEW Version Ace your Fortinet NSE4_FGT-7.2 exam on your first attempt with the latest questions, detailed explanations, and references. Prepare for your Fortinet NSE4_FGT-7.2 exam witha new and exclusive preparation book designed to test your knowledge and help you pass on your first try. Save both time and money with this invaluable resource. If you're seeking to assess your knowledge and practice real exam questions, you've come to the right place. This new book includes the most recent questions, detailed and exclusive explanations, alongwith references. Our new book comprehensively covers all topics in the Fortinet NSE4_FGT-7.2 exam. Designed to boost your confidence for the official exam, it allows you to test your knowledge and skills across all necessary areas. To succeed in passing the Network Security Professional NSE4_FGT-7.2 exam on your initial try, you must dedicate yourself to studying these Fortinet NSE4_FGT-7.2 questions, which offer updated information on the entire exam syllabus. The Fortinet NSE 4 - FortiOS 7.2 exam assesses your understanding and proficiency with FortiGate devices. It evaluates your practical knowledge of FortiGate configuration, operation, and daily administration. The exam includes operational scenarios, configuration extracts, and troubleshooting scenarios. This book includes 2 practice tests) Exam duration: 105 minutes Product version: FortiOS 7.2 Welcome!


Social Engineering

Social Engineering

Author: Christopher Hadnagy

Publisher: John Wiley & Sons

Published: 2010-11-29

Total Pages: 416

ISBN-13: 1118029712

DOWNLOAD EBOOK

The first book to reveal and dissect the technical aspect of many social engineering maneuvers From elicitation, pretexting, influence and manipulation all aspects of social engineering are picked apart, discussed and explained by using real world examples, personal experience and the science behind them to unraveled the mystery in social engineering. Kevin Mitnick—one of the most famous social engineers in the world—popularized the term “social engineering.” He explained that it is much easier to trick someone into revealing a password for a system than to exert the effort of hacking into the system. Mitnick claims that this social engineering tactic was the single-most effective method in his arsenal. This indispensable book examines a variety of maneuvers that are aimed at deceiving unsuspecting victims, while it also addresses ways to prevent social engineering threats. Examines social engineering, the science of influencing a target to perform a desired task or divulge information Arms you with invaluable information about the many methods of trickery that hackers use in order to gather information with the intent of executing identity theft, fraud, or gaining computer system access Reveals vital steps for preventing social engineering threats Social Engineering: The Art of Human Hacking does its part to prepare you against nefarious hackers—now you can do your part by putting to good use the critical information within its pages.


FortiGate - Troubleshooting Guide Quick Reference

FortiGate - Troubleshooting Guide Quick Reference

Author: Hubert Wiśniewski

Publisher: Independently Published

Published: 2020-04-21

Total Pages: 166

ISBN-13:

DOWNLOAD EBOOK

FortiGate - Troubleshooting Guide Quick Reference presents easy to understand techniques of troubleshooting on FortiGate platform. There are many debug command examples, which explain, how to read and understand the command output. The intention of the book is not to teach you how presented technologies work. I do not explain configuration examples. If you do not feel confident to perform troubleshooting effectively, the book is for you.


501 Writing Prompts

501 Writing Prompts

Author: LearningExpress (Organization)

Publisher:

Published: 2018

Total Pages: 168

ISBN-13:

DOWNLOAD EBOOK

"This eBook features 501 sample writing prompts that are designed to help you improve your writing and gain the necessary writing skills needed to ace essay exams. Build your essay-writing confidence fast with 501 Writing Prompts!" --


Rock Stress '03

Rock Stress '03

Author: K. Sugawara

Publisher: CRC Press

Published: 2020-12-17

Total Pages: 602

ISBN-13: 100010818X

DOWNLOAD EBOOK

This publication contains three special lectures, six keynote addresses and sixty-eight technical papers presented at the symposium. The wide variety of topics covered are grouped in the proceedings according to subject.