Categories
Ebooks
-
Business and economy
- Bitcoin
- Businesswoman
- Coaching
- Controlling
- E-business
- Economy
- Finances
- Stocks and investments
- Personal competence
- Computer in the office
- Communication and negotiation
- Small company
- Marketing
- Motivation
- Multimedia trainings
- Real estate
- Persuasion and NLP
- Taxes
- Social policy
- Guides
- Presentations
- Leadership
- Public Relation
- Reports, analyses
- Secret
- Social Media
- Sales
- Start-up
- Your career
- Management
- Project management
- Human Resources
-
For children
-
For youth
-
Education
-
Encyclopedias, dictionaries
-
E-press
- Architektura i wnętrza
- Health and Safety
- Biznes i Ekonomia
- Home and garden
- E-business
- Ekonomia i finanse
- Esoterecism
- Finances
- Personal finance
- Business
- Photography
- Computer science
- HR & Payroll
- For women
- Computers, Excel
- Accounts
- Culture and literature
- Scientific and academic
- Environmental protection
- Opinion-forming
- Education
- Taxes
- Travelling
- Psychology
- Religion
- Agriculture
- Book and press market
- Transport and Spedition
- Healthand beauty
-
History
-
Computer science
- Office applications
- Data bases
- Bioinformatics
- IT business
- CAD/CAM
- Digital Lifestyle
- DTP
- Electronics
- Digital photography
- Computer graphics
- Games
- Hacking
- Hardware
- IT w ekonomii
- Scientific software package
- School textbooks
- Computer basics
- Programming
- Mobile programming
- Internet servers
- Computer networks
- Start-up
- Operational systems
- Artificial intelligence
- Technology for children
- Webmastering
-
Other
-
Foreign languages
-
Culture and art
-
School reading books
-
Literature
- Antology
- Ballade
- Biographies and autobiographies
- For adults
- Dramas
- Diaries, memoirs, letters
- Epic, epopee
- Essay
- Fantasy and science fiction
- Feuilletons
- Work of fiction
- Humour and satire
- Other
- Classical
- Crime fiction
- Non-fiction
- Fiction
- Mity i legendy
- Nobelists
- Novellas
- Moral
- Okultyzm i magia
- Short stories
- Memoirs
- Travelling
- Narrative poetry
- Poetry
- Politics
- Popular science
- Novel
- Historical novel
- Prose
- Adventure
- Journalism, publicism
- Reportage novels
- Romans i literatura obyczajowa
- Sensational
- Thriller, Horror
- Interviews and memoirs
-
Natural sciences
-
Social sciences
-
School textbooks
-
Popular science and academic
- Archeology
- Bibliotekoznawstwo
- Cinema studies
- Philology
- Polish philology
- Philosophy
- Finanse i bankowość
- Geography
- Economy
- Trade. World economy
- History and archeology
- History of art and architecture
- Cultural studies
- Linguistics
- Literary studies
- Logistics
- Maths
- Medicine
- Humanities
- Pedagogy
- Educational aids
- Popular science
- Other
- Psychology
- Sociology
- Theatre studies
- Theology
- Economic theories and teachings
- Transport i spedycja
- Physical education
- Zarządzanie i marketing
-
Guides
-
Game guides
-
Professional and specialist guides
-
Law
- Health and Safety
- History
- Road Code. Driving license
- Law studies
- Healthcare
- General. Compendium of knowledge
- Academic textbooks
- Other
- Construction and local law
- Civil law
- Financial law
- Economic law
- Economic and trade law
- Criminal law
- Criminal law. Criminal offenses. Criminology
- International law
- International law
- Health care law
- Educational law
- Tax law
- Labor and social security law
- Public, constitutional and administrative law
- Family and Guardianship Code
- agricultural law
- Social law, labour law
- European Union law
- Industry
- Agricultural and environmental
- Dictionaries and encyclopedia
- Public procurement
- Management
-
Tourist guides and travel
- Africa
- Albums
- Southern America
- North and Central America
- Australia, New Zealand, Oceania
- Austria
- Asia
- Balkans
- Middle East
- Bulgary
- China
- Croatia
- The Czech Republic
- Denmark
- Egipt
- Estonia
- Europe
- France
- Mountains
- Greece
- Spain
- Holand
- Iceland
- Lithuania
- Latvia
- Mapy, Plany miast, Atlasy
- Mini travel guides
- Germany
- Norway
- Active travelling
- Poland
- Portugal
- Other
- Przewodniki po hotelach i restauracjach
- Russia
- Romania
- Slovakia
- Slovenia
- Switzerland
- Sweden
- World
- Turkey
- Ukraine
- Hungary
- Great Britain
- Italy
-
Psychology
- Philosophy of life
- Kompetencje psychospołeczne
- Interpersonal communication
- Mindfulness
- General
- Persuasion and NLP
- Academic psychology
- Psychology of soul and mind
- Work psychology
- Relacje i związki
- Parenting and children psychology
- Problem solving
- Intellectual growth
- Secret
- Sexapeal
- Seduction
- Appearance and image
- Philosophy of life
-
Religion
-
Sport, fitness, diets
-
Technology and mechanics
Audiobooks
-
Business and economy
- Bitcoin
- Businesswoman
- Coaching
- Controlling
- E-business
- Economy
- Finances
- Stocks and investments
- Personal competence
- Communication and negotiation
- Small company
- Marketing
- Motivation
- Real estate
- Persuasion and NLP
- Taxes
- Social policy
- Guides
- Presentations
- Leadership
- Public Relation
- Secret
- Social Media
- Sales
- Start-up
- Your career
- Management
- Project management
- Human Resources
-
For children
-
For youth
-
Education
-
Encyclopedias, dictionaries
-
E-press
-
History
-
Computer science
-
Other
-
Foreign languages
-
Culture and art
-
School reading books
-
Literature
- Antology
- Ballade
- Biographies and autobiographies
- For adults
- Dramas
- Diaries, memoirs, letters
- Epic, epopee
- Essay
- Fantasy and science fiction
- Feuilletons
- Work of fiction
- Humour and satire
- Other
- Classical
- Crime fiction
- Non-fiction
- Fiction
- Mity i legendy
- Nobelists
- Novellas
- Moral
- Okultyzm i magia
- Short stories
- Memoirs
- Travelling
- Poetry
- Politics
- Popular science
- Novel
- Historical novel
- Prose
- Adventure
- Journalism, publicism
- Reportage novels
- Romans i literatura obyczajowa
- Sensational
- Thriller, Horror
- Interviews and memoirs
-
Natural sciences
-
Social sciences
-
Popular science and academic
-
Guides
-
Professional and specialist guides
-
Law
-
Tourist guides and travel
-
Psychology
- Philosophy of life
- Interpersonal communication
- Mindfulness
- General
- Persuasion and NLP
- Academic psychology
- Psychology of soul and mind
- Work psychology
- Relacje i związki
- Parenting and children psychology
- Problem solving
- Intellectual growth
- Secret
- Sexapeal
- Seduction
- Appearance and image
- Philosophy of life
-
Religion
-
Sport, fitness, diets
-
Technology and mechanics
Videocourses
-
Data bases
-
Big Data
-
Biznes, ekonomia i marketing
-
Cybersecurity
-
Data Science
-
DevOps
-
For children
-
Electronics
-
Graphics/Video/CAX
-
Games
-
Microsoft Office
-
Development tools
-
Programming
-
Personal growth
-
Computer networks
-
Operational systems
-
Software testing
-
Mobile devices
-
UX/UI
-
Web development
-
Management
Podcasts
- Ebooks
- Computer science
- Computer networks
Computer networks
In this category you will find online books covering a wide variety of topics related to servers, networking hardware, and programming. They explain technologies such as FreeSWITCH, Amazon Web Services, Azure and many more. You will also learn how to successfully pass the Cisco CCNA exams.
Over 90 recipes to maximize automated solutions and policy-drive application profiles using Cisco ACIAbout This BookConfidently provision your virtual and physical infrastructure for application deploymentIntegrate Cisco ACI with hypervisors and other third party devicesPacked with powerful recipes to automate your IT operationsWho This Book Is ForIf you are a network administrator, system administrator, or engineer and are aware of the basics of Cisco ACI but want to start using it to automate your tasks, then this book is for youWhat You Will LearnMaster the Cisco ACI architectureDiscover the ACI fabric with easy-to-follow stepsSet up quality of service within ACIConfigure external networks with Cisco ACIIntegrate with VMware and track VMware virtual machinesConfigure apply and verify access policiesExtend or migrate a VMware virtual-machine LAN inside the ACI fabricMonitor ACI with third party tools and troubleshoot issuesIn DetailCisco Application Centric Infrastructure (ACI) is a tough architecture that automates IT tasks and accelerates data-center application deployments.This book focuses on practical recipes to help you quickly build, manage, and customize hybrid environment for your organization using Cisco ACI. You will begin by understanding the Cisco ACI architecture and its major components. You will then configure Cisco ACI policies and tenants. Next you will connect to hypervisors and other third-party devices. Moving on, you will configure routing to external networks and within ACI tenants and also learn to secure ACI through RBAC. Furthermore, you will understand how to set up quality of service and network programming with REST, XML, Python and so on. Finally you will learn to monitor and troubleshoot ACI in the event of any issues that arise.By the end of the book, you will gain have mastered automating your IT tasks and accelerating the deployment of your applications.Style and approachA set of exciting recipes to automate your IT operations related to datacenters, the Cloud, and networking tasks
Achieving the Cisco Certified CyberOps Associate 200-201 certification helps you to kickstart your career in cybersecurity operations. This book offers up-to-date coverage of 200-201 exam resources to fully equip you to pass on your first attempt.The book covers the essentials of network security concepts and shows you how to perform security threat monitoring. You'll begin by gaining an in-depth understanding of cryptography and exploring the methodology for performing both host and network-based intrusion analysis. Next, you'll learn about the importance of implementing security management and incident response strategies in an enterprise organization. As you advance, you'll see why implementing defenses is necessary by taking an in-depth approach, and then perform security monitoring and packet analysis on a network. You'll also discover the need for computer forensics and get to grips with the components used to identify network intrusions. Finally, the book will not only help you to learn the theory but also enable you to gain much-needed practical experience for the cybersecurity industry.By the end of this Cisco cybersecurity book, you'll have covered everything you need to pass the Cisco Certified CyberOps Associate 200-201 certification exam, and have a handy, on-the-job desktop reference guide.
Cisco Unified Communications Manager (CUCM) is a software-based call-processing system developed by Cisco Systems. CUCM tracks all active VoIP network components; these include phones, gateways, conference bridges, transcoding resources, and voicemail boxes among others. This scalable, distributable, highly-available enterprise-class system delivers voice, video, mobility, and presence services. It connects up to 30,000 users of IP phones, media processing devices, VoIP gateways, mobile devices, and multimedia applications. With this cookbook you will learn all the important aspects of administering Cisco Unified Communications Manager.Cisco Unified Communications Manager 8: Expert Administration Cookbook is filled with many advanced recipes to effectively and efficiently configure and manage Cisco Unified Communications Manager. This book covers everything an administrator needs during and after Cisco Unified Communications Manager implementation.This practical cookbook contains detailed step-by-step instructions with clear and informative screenshots that cover all the important and advanced aspects of administering Cisco Unified Communications Manager.The book starts with introducing Call Routing and E.164. It then covers configuration and design information for the various call admission control technologies and Media Resources. The book also dives deep into troubleshooting, upgrades, disaster recovery, user management and much more.
CompTIA A+ certification is a trusted credential that’s highly sought after by professionals looking to prove their mettle in today’s digital world. This book will provide you with exam-oriented practice material mirroring the A+ exam’s level of difficulty to prepare you for every challenge that the exam might throw at you.This book is a compilation of hundreds of carefully curated practice questions on each domain, including mobile devices, networking, hardware, virtualization and cloud computing, as well as hardware and network troubleshooting. The realistic tests are designed in a way to help you accelerate your preparation to achieve the industry-celebrated A+ certification.By the end of this practice book, you’ll be well-prepared to pass the CompTIA A+ Core 1 (220-1101) exam with confidence.
The Linux+ certification provides a broad awareness of Linux operating systems, while giving professionals an upper hand in the IT industry. With this certification, you’ll be equipped with the all-important knowledge of installation, operation, administration, and troubleshooting services.This CompTIA Linux+ Certification Guide will give you an overview of the system architecture. You’ll understand how to install and uninstall Linux distributions, followed by working with various package managers. You’ll then move on to manipulating files and processes at the command-line interface (CLI) and creating, monitoring, killing, restarting, and modifying processes.As you progress, you’ll be equipped to work with display managers and learn how you can create, modify, and remove user accounts and groups, as well as understand how to automate tasks. The last set of chapters will help you configure dates and set up local and remote system logging. In addition to this, you’ll explore different internet protocols, and delve into network configuration, security administration, Shell scripting, and SQL management.By the end of this book, you’ll not only have got to grips with all the modules you need to study for the LX0-103 and LX0-104 certification exams, but you’ll also be able to test your understanding with practice questions and mock exams.
CompTIA Network+ Certification Guide. The ultimate guide to passing the N10-007 exam
Glen D. Singh, Rishi Latchmepersad
CompTIA certified professionals have always had the upper hand in the information technology industry. This book will be your ideal guide to efficiently passing and achieving this certification. Learn from industry experts and implement their practices to resolve complex IT issues.This book revolves around networking concepts where readers will learn topics like network architecture, security, network monitoring, and troubleshooting. This book will not only prepare the readers conceptually but will also help them pass the N10-007 exam. This guide will also provide practice exercise after every chapter where readers can ensure their concepts are clear.By the end of this book, readers will leverage this guide and the included practice questions to boost their confidence in appearing for the actual certificate.
The CompTIA Project+ exam is designed for IT professionals who want to improve their career trajectory by gaining certification in project management specific to their industry. This guide covers everything necessary to pass the current iteration of the Project+ PK0-004 exam.The CompTIA Project+ Certification Guide starts by covering project initiation best practices, including an understanding of organizational structures, team roles, and responsibilities. You’ll then study best practices for developing a project charter and the scope of work to produce deliverables necessary to obtain formal approval of the end result. The ability to monitor your project work and make changes as necessary to bring performance back in line with the plan is the difference between a successful and unsuccessful project. The concluding chapters of the book provide best practices to help keep an eye on your projects and close them out successfully. The guide also includes practice questions created to mirror the exam experience and help solidify your understanding of core project management concepts.By the end of this book, you will be able to develop creative solutions for complex issues faced in project management.
CompTIA Security+ is a worldwide certification that establishes the fundamental knowledge required to perform core security functions and pursue an IT security career. CompTIA Security+ Certification Guide is a best-in-class exam study guide that covers all of CompTIA Security+ 501 exam objectives. It is authored by Ian Neil, who is a world-class trainer of CompTIA Security+ 501. Packed with self-assessment scenarios and realistic exam questions, this guide will help you master the core concepts to succeed in the exam the first time you take it. Using relevant examples, you will learn all the important security fundamentals from Certificates and Encryption to Identity and Access Management concepts. You will then dive into the important domains of the exam; namely, threats, attacks and vulnerabilities, technologies and tools, architecture and design, risk management, and cryptography and Public Key Infrastructure (PKI). This book comes with over 600 practice questions with detailed explanation that is at the exam level and also includes two mock exams to help you with your study plan. This guide will ensure that encryption and certificates are made easy for you.
Computer Networks in Packet Tracer for advanced users
The book: “COMPUTER NETWORKS IN PACKET TRACER FOR ADVANCED USERS” is a collection of scenarios and network simulations for users who already have at least basic knowledge of computer networks and experience in the work associated with the administration of basic devices, as well as management of network architecture. The simulations were prepared in such a way as to develop the knowledge already presented in the previous books of Our Publishing House by Jerzy Kluczewski. The second goal, is to popularize the world-famous Packet Tracer program. This book is an excellent resource for students, undergraduates, and participants and graduates of CISCO CCNA networking courses. The themes of the book are very extensive and varied. Multiuser mode visualization, Bluetooth connections, cellular networks, WLAN controllers, industrial routers, IPV6 protocol, are just a few selected issues for which the author has prepared scenarios and ready-made simulation files that can be downloaded from the publisher's website. We encourage you to open the book and browse the table of contents for a broad overview of this book. The author of the publication is Jerzy Kluczewski, a long-time CISCO CCNA Academy instructor. He already has an extensive body of work in the form of published books on information technology. He gained his experience working in industry, and is currently a lecturer at the Gdansk School of Banking. Translation: Agata Skutela an experienced English teacher in Complex of Technical and General Schools in Tarnowskie Góry. Apart from English language she has also been teaching technical English. She is really into teaching and eager to expand her knowledge and workshop to be able to teach the best as she can.
Computer Networks in Packet Tracer for beginners
Damian Strojek, Robert Wszelaki, Marek Smyczek, Jerzy KLuczewski
The book: “COMPUTER NETWORKS IN PACKET TRACER FOR BEGINNERS" provides advice for people who want to learn about the operation of networks and the hardware that makes up today's network architecture. Beginners will learn how to download the simulator software and how to start working with it. The reader will find here the basics of configuring network devices. He will learn network services such as: TELNET, SSH, FTP, EMAIL, DHCP, DNS and routing protocols RIP, EIGRP, OSPF. Learn how to design and deploy virtual VLAN networks. The authors, describing the issues of administering computer networks, use many examples and exercises. The book is an updated compilation of our Packet Tracer publications for CISCO courses, has a described, changed interface of the currently latest Packet Tracer software and contains a set of new examples and exercises. The authors of this book are an intergenerational and interdisciplinary team. A talented student of the School of Communication in Gdańsk, Damian Strojek. His passion is computer networks, he has a set of CCNA R&S certificates and is in the middle of the CCNA Security educational path. Jerzy Kluczewski, long-time instructor of the CISCO CCNA Academy. His authorial achievements already include several books on the Packet Tracer simulator. He gained his experience while working in industry, currently he is a lecturer at the WSB University in Gdańsk. Robert Wszelaki is passionate about networking and programming. He completed a full CISCO CCNA course. He is a graduate of ZS1 in Piekary Śląskie, currently studying computer science at the Faculty of Automatic Control, Electronics and Computer Science of the Silesian University of Technology. Marek Smyczek is an experienced teacher of IT and electrical subjects, and at the same time an instructor of the CISCO CCNA program. He is the author and editor of several dozen publications in the fields of electronics and computer science. Translations: Joanna Margowniczy English teacher at Primary School No. 13 in Jaworzno and ZDZ in Sosnowiec, international IT ESSENTIALS instructor, OKE examiner.
Computer Networks in Packet Tracer for intermediate users
Damian Strojek, Jerzy Kluczewski
The book: “COMPUTER NETWORKS IN PACKET TRACER FOR INTERMEDIATE USERS” is designed for people who want to expand their skills and knowledge in the field of managing LAN and WAN networks. The reader finds here descriptions and practical exercises on configuring CISCO devices. It is a continuation of the first book with the same title. The authors have adopted the principle: minimum of theory, maximum of practical examples which will enable the reader to learn how to administer ICT networks in many complex device configurations without the need to purchase expensive CISCO equipment. The content of the book covers the basics of configuring protocols, services and network techniques such as: dynamic routing RIP, EGIRP, OSPF, eBGP, static routing, access control lists VoIP, STP, RS,VTP, FRAME RELAY, PPP, PAP and CHAP authentication RADIUS, NETFLOW, NAT, L2NAT, VPN tuneling. This part also includes configuring multilayer switches 3560-24PS and 3650-24PS. The authors of this book are an intergenerational and interdisciplinary team. Talented student of the Communications School Complex in Gdansk Damian Strojek. His passion is computer networks, and he holds certifications CCNA R&S and CCNA Security. Jerzy Kluczewski, a long-time CISCO CCNA Academy instructor. He already has several book publications to his credit about the Packet Tracer simulator. He gained his experience while working in industry and is currently a lecturer at the Gdansk School of Banking. Translation: a very talented student of applied linguistics at Silesian University in Katowice – Julia Skutela. She has been studying English and Russian to become a professional translator. Eager to expand her knowledge and building a workshop of the translator she has decided to raise up to the challenge of translating the following book into English.
CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książki
Katarzyna Chałubińska-Jentkiewicz, Agnieszka Brzostek, Waldemar Kitler, Katarzyna Badźmirowska-Masłowska
CYBERBEZPIECZEŃSTWO W POLSCE I NA ŚWIECIE Pakiet 2 książki 1) STRATEGIE CYBERBEZPIECZEŃSTWA WSPÓŁCZESNEGO ŚWIATA Opracowanie odnosi się do kwestii cyberbezpieczeństwa w sferze nie tylko krajowej, ale również międzynarodowej, co pozwala na szersze spojrzenie na przedmiotową problematykę. W związku z tym należy je nie tylko ocenić wysoko, ale też szczególnie podkreślić ten fakt. Umiędzynarodowienie cyberbezpieczeństwa pozwala na skuteczniejsze działania w tej sferze, w tym na zapobieganie incydentom mającym niekorzystny wpływ na bezpieczeństwo systemów informacyjnych, a działania takie są ujęte właśnie w strategiach cyberbezpieczeństwa. Prof. Dr hab. Mirosław Karpiuk Zaprezentowane badania cechuje dojrzałość naukowa oraz doskonała znajomość tematyki, która nie ogranicza się jedynie do realiów polskich. Autorki bowiem wnikliwie omawiają i analizują także kształtowanie się systemu cyberbezpieczeństwa w Stanach Zjednoczonych Ameryki, Kanadzie, Francji i Republice Federalnej Niemiec. [...] W recenzowanej monografii można wyróżnić dwie części. Pierwsza jest o charakterze teoretycznym, w której Autorki koncentrują się na aspektach bezpieczeństwa cyberprzestrzeni jako elementu polityki państwa oraz na miejscu cyberbezpieczeństwa w systemie bezpieczeństwa. W drugiej natomiast zostały poddane analizie obowiązujące oraz przyjęte w ubiegłych latach w wybranych państwach strategie i polityki cyberbezpieczeństwa. dr Justyna Kurek 2) SYSTEM BEZPIECZEŃSTWA W CYBERPRZESTRZENI RP Przedstawione dociekania naukowe są trafne i merytoryczne. Wychodzą naprzeciw zapotrzebowaniu państwa i społeczeństwa. (...) jest to dzieło dojrzałe, merytorycznie spójne, ukierunkowane na potrzeby związane z tworzeniem systemu bezpieczeństwa w cyberprzestrzeni RP. płk. dr hab. inż. Piotr Dela, prof. ASzWoj Przedstawione do recenzji opracowanie, o niezwykle nośnym i ambitnym tytule System bezpieczeństwa w cyberprzestrzeni RP, dotykające niezwykle ważnej współcześnie problematyki cyberbezpieczeństwa jest dziełem zbiorowym, gdzie znajduje ujście wiele ciekawych wątków związanych z zakreślonym w tytule obszarem. dr hab. Mirosław Karpiuk, prof. UWM
This exam guide enables you to install, configure, and manage the vSphere 6.5 infrastructure in all its components: vCenter Server, ESXi hosts, and virtual machines, while helping you to prepare for the industry standard certification.This data center book will assist you in automating administration tasks and enhancing your environment’s capabilities. You will begin with an introduction to all aspects related to security, networking, and storage in vSphere 6.5. Next, you will learn about resource management and understand how to back up and restore the vSphere 6.5 infrastructure. As you advance, you will also cover troubleshooting, deployment, availability, and virtual machine management. This is followed by two mock tests that will test your knowledge and challenge your understanding of all the topics included in the exam.By the end of this book, you will not only have learned about virtualization and its techniques, but you’ll also be prepared to pass the VCP6.5-DCV (2V0-622) exam.
Virtualized systems are well established now, and their disparate components can be found bundled together in hyper-converged infrastructures, such as VxRail from Dell EMC. Dell VxRail System Design and Best Practices will take you, as a system architect or administrator, through the process of designing and protecting VxRail systems.While this book assumes a certain level of knowledge of VMware, vSphere 7.x, and vCenter Server, you’ll get a thorough overview of VxRail's components, features, and architecture, as well as a breakdown of the benefits of this hyper-converged system. This guide will give you an in-depth understanding of VxRail, as well as plenty of practical examples and self-assessment questions along the way to help you plan and design every core component of a VxRail system – from vSAN storage policies to cluster expansion. It's no good having a great system if you lose everything when it breaks, so you'll spend some time examining advanced recovery options, such as VMware Site Recovery Manager and Veeam Backup and Replication.By the end of this book, you will have got to grips with Dell’s hyper-converged VxRail offering, taking your virtualization proficiency to the next level.
While you can use any automation software to simplify task automation, scaling automation to suit your growing business needs becomes difficult using only a command-line tool. Ansible Automation Platform standardizes how automation is deployed, initiated, delegated, and audited, and this comprehensive guide shows you how you can simplify and scale its management.The book starts by taking you through the ways to get Ansible Automation Platform installed, their pros and cons, and the initial configuration. You’ll learn about each object in the platform, how it interacts with other objects, as well as best practices for defining and managing objects to save time. You’ll see how to maintain the created pieces with infrastructure as code. As you advance, you’ll monitor workflows with CI/CD playbooks and understand how Ansible Automation Platform integrates with many other services such as GitLab and GitHub.By the end of this book, you’ll have worked through real-world examples to make the most of the platform while learning how to manipulate, manage, and deploy any playbook to Ansible Automation Platform.
Designing and Implementing Microsoft Azure Networking Solutions. Exam Ref AZ-700 preparation guide
Designing and Implementing Microsoft Azure Networking Solutions is a comprehensive guide that covers every aspect of the AZ-700 exam to help you fully prepare to take the certification exam.Packed with essential information, this book is a valuable resource for Azure cloud professionals, helping you build practical skills to design and implement name resolution, VNet routing, cross-VNet connectivity, and hybrid network connectivity using the VPN Gateway and the ExpressRoute Gateway. It provides step-by-step instructions to design and implement an Azure Virtual WAN architecture for enterprise use cases.Additionally, the book offers detailed guidance on network security design and implementation, application delivery services, private platform service connectivity, and monitoring networks in Azure. Throughout the book, you’ll find hands-on labs carefully integrated to align with the exam objectives of the Azure Network Engineer certification (AZ-700), complemented by practice questions at the end of each chapter, allowing you to test your knowledge.By the end of this book, you’ll have mastered the fundamentals of Azure networking and be ready to take the AZ-700 exam.
In today's rapidly evolving world of DevOps, traditional silos are a thing of the past. Database administrators are no longer the only experts; site reliability engineers (SREs) and DevOps engineers are database experts as well. This blurring of the lines has led to increased responsibilities, making members of high-performing DevOps teams responsible for end-to-end ownership. This book helps you master DevOps for databases, making it a must-have resource for achieving success in the ever-changing world of DevOps.You’ll begin by exploring real-world examples of DevOps implementation and its significance in modern data-persistent technologies, before progressing into the various types of database technologies and recognizing their strengths, weaknesses, and commonalities. As you advance, the chapters will teach you about design, implementation, testing, and operations using practical examples, as well as common design patterns, combining them with tooling, technology, and strategies for different types of data-persistent technologies. You’ll also learn how to create complex end-to-end implementation, deployment, and cloud infrastructure strategies defined as code.By the end of this book, you’ll be equipped with the knowledge and tools to design, build, and operate complex systems efficiently.
Neependra Khare, Ke-Jou Carol Hsu, Hideto Saito, John Arundel, ...
With so many IT management and DevOps tools on the market, both open source and commercial, it’s difficult to know where to start. DevOps is incredibly powerful when implemented correctly, and here’s how to get it done.This Learning Path covers three broad areas: Puppet, Docker, and Kubernetes. This Learning Path is a large resource of recipes to ease your daily DevOps tasks. We begin with recipes that help you develop a complete and expert understanding of Puppet’s latest and most advanced features. Then we provide recipes that help you efficiently work with the Docker environment. Finally, we show you how to better manage containers in different scenarios in production using Kubernetes.This course is based on these books:1. Puppet Cookbook, Third Edition 2. Docker Cookbook 3. Kubernetes Cookbook
Docker Deep Dive. Zero to Docker in a single book - Fifth Edition
Docker Deep Dive provides a comprehensive introduction to container technology and Docker’s essential role in modern software development. It covers installation across platforms and presents both developer and operational perspectives to build a solid foundation. Early chapters explain container basics, Docker architecture, and key ecosystem standards.The book then explores advanced technical topics including the Docker Engine, image and container management, application containerization, and multi-container apps with Docker Compose. It guides readers through deploying and managing Docker Swarm clusters and introduces emerging areas like WebAssembly containers and AI workloads with Docker Model Runner.Extensive coverage of networking, persistent storage, and security equips readers with enterprise-grade skills for deploying and maintaining containerized applications. The practical approach ensures confidence in implementing Docker solutions for development and production environments.This newly updated edition includes a brand-new chapter on Docker Model Runner with a full AI LLM project, updates to BuildKit, buildx, Docker Build Cloud, debugging tools, WebAssembly content, and a streamlined Docker Swarm chapter.
Docker Deep Dive. Zero to Docker in a Single Book - Second Edition
Most applications, even the funky cloud-native microservices ones, need high-performance, production-grade infrastructure to run on. Having impeccable knowledge of Docker will help you thrive in the modern cloud-first world. With this book, you will gain the skills you need in order to work with Docker and its containers.The book begins with an introduction to containers and explains their functionality and application in the real world. You will then get an overview of VMware, Kubernetes, and Docker and learn to install Docker on Windows, Mac, and Linux. Once you have understood the Ops and Dev perspective of Docker, you will be able to see the big picture and understand what Docker exactly does. The book then turns its attention to the more technical aspects, guiding you through practical exercises covering Docker engine, Docker images, and Docker containers. You will learn techniques for containerizing an app, deploying apps with Docker Compose, and managing cloud-native applications with Swarm. You will also build Docker networks and Docker overlay networks and handle applications that write persistent data. Finally, you will deploy apps with Docker stacks and secure your Docker environment.By the end of this book, you will be well-versed in Docker and containers and have developed the skills to create, deploy, and run applications on the cloud.
Domowe sieci komputerowe. Gotowe rozwiązania
Szybko zbuduj własną, niezawodną sieć! Jak udostępniać foldery? Jak być widocznym w Internecie? Jak zabezpieczyć komputer w sieci? Domowa sieć komputerowa daje możliwość wymiany plików i folderów pomiędzy użytkownikami. Pozwala wszystkim korzystać z tej samej drukarki lub skanera. Zaś podłączenie jej do Internetu znacznie ułatwia codzienną pracę i zapewnia rozrywkę, a także umożliwia szybki kontakt z rodziną i znajomymi na całym świecie dzięki poczcie elektronicznej, komunikatorom lub darmowym połączeniom telefonicznym. Czytając tę książkę, nauczysz się samodzielnie budować i obsługiwać bezpieczną domową sieć komputerową -- w taki sposób, abyś mógł cieszyć się zdobyczami informatyki! Książka "Domowe sieci komputerowe. Gotowe rozwiązania" to praktyczny przewodnik zawierający wszelkie niezbędne informacje, które pozwolą Ci samodzielnie podłączyć i skonfigurować domowy komputer do pracy w Internecie. Z tego podręcznika dowiesz się także, jakie urządzenia umożliwiają rozdzielenie łącza na kilku użytkowników, jak dobrać odpowiednie okablowanie, w jaki sposób udostępniać urządzenia współpracujące z komputerem, a także jak korzystać z darmowych połączeń telefonii internetowej oraz komunikatorów. Nauczysz się nie tylko zabezpieczać swój komputer przed atakami z sieci, ale także usuwać wirusy, gdy sprzęt zostanie zainfekowany. Przygotowanie komputera do pracy w sieci Podłączanie i okablowanie Instalacja karty sieciowej Adresy IP Udostępnianie drukarki Dostęp do Internetu -- rodzaje łączy Poczta elektroniczna Komunikatory internetowe Telefonia internetowa Program Skype Bezpieczeństwo pracy w sieci Zostań administratorem własnej domowej sieci komputerowej!
The migration of computing to the edge is the logical progression of where computing is performed on a global scale. Edge computing is not a new paradigm but a necessary technology to address issues such as latency, service charges, reliability, connectivity, and privacy. This book walks you through the definition and architecture of edge computing systems and why they are critical in today’s ecosystem of IoT devices and an “everything connected” world.You will start your journey with an introduction to different edge computing hardware platforms, which vary by use case. From there, you’ll explore operating systems and middleware packages that manage edge devices such as Azure IoT. Then, you will explore communication systems such as near-range Bluetooth and RFID as well as long-range systems such as 5G. Networking protocols will be covered, which are the heart of edge systems. Technologies such as MQTT, which make up the backbone of edge to cloud communication, are examined. Then, you will move on to edge applications such as edge predictive AI and federated computing. We wrap up by investigating the security and vulnerability envelope of edge systems.This book is intended to quickly familiarize you with edge systems technologies and use cases, without burdening you with complicated jargon and low-level details.