Verleger: K-i-s-publishing
Matthias Marschall, John Ewart, Earl Waud
Chef is a configuration management tool that turns IT infrastructure into code. Chef provides tools to manage systems at scale. This learning path takes you on a comprehensive tour of Chef's functionality, ranging from its core features to advanced development. You will be brought up to speed with what's new in Chef and how to set up your own Chef infrastructure for individuals, or small or large teams. You will learn to use the basic Chef command-line tools. We will also take you through the core concepts of managing users, applications, and your entire cloud infrastructure. You will learn the techniques of the pros by walking you through a host of step-by-step guides to solve real-world infrastructure automation challenges.You will learn to automate and document every aspect of your network, from the hardware to software, middleware, and all your containers. You will become familiar with the Chef'sProvisioning tool. By the end of this course, you will be confident in how to manage your infrastructure, scale using the cloud, and extend the built-in functionality of Chef itself.The books used in this Learning Path are:1) Chef Essentials2)Chef Infrastructure Automation Cookbook – Second Edition3)Mastering Chef Provisioning
Nirav Mehta
There are many powerful open source CMSs available to take the pain away from managing a web site. These systems are feature rich, often easy to use, and free. Unfortunately, there are so many choices it's tough to be sure you're choosing the right one. How can you be sure that you are selecting and working with the right tool?This book will guide you through choosing the right CMS for your needs. You can be confident in your choice of CMS for the needs of your project. It will also help you make a start using the CMS, and give you a feel for what it's like to use it ñ even before you install it yourself.Are you bewildered by the many open source CMSs available online? Open source CMSs are the best way to create and manage sophisticated web sites. You can create a site that precisely meets your business goals, and keep the site up to date easily because these systems give you full control over every aspect of your site. Because open source CMSs are free to download, you have a huge amount of choice between the various systems.Yet there are many open source CMSs to choose from, each with unique strengths ñ and occasionally limitations too. Choosing between the bewildering number of options can be tough.Making the wrong choice early on may lead to a lot of wasted work, because you'll have a half-finished site that doesn't meet your initial requirements ñ and needs to be restarted from scratch.This book will show you how to avoid choosing the wrong CMS. It will guide you through assessing your site requirements, and then using that assessment to identify the CMS that will best fit your needs. It contains discussions of the major CMSs, and the issues that you should consider when choosing: their complexity to use, their features and the power they offer. It discusses technical considerations such as programming languages and compliance with best practice standards in a clear, friendly way that non-technical readers can understand.The book also contains quick-start guides and examples for the most popular CMSs such as WordPress, Joomla!, and Drupal, so that you can experiment with these CMSs, get a feel for how they work, and start using them to build your site.After reading this book, you can be confident that your CMS choice will support your web site's needs because you have carefully assessed your requirements and explored the available options.
ChromeOS System Administrator's Guide. Implement, manage, and optimize ChromeOS features effectively
Dr. Willie Sanders, Jr.
Google's ChromeOS provides a great platform for technicians, system administrators, developers, and casual users alike, providing a seemingly simplistic architecture that is easy enough for a novice user to begin working with. However, beneath the surface, this operating system boasts a plethora of powerful tools, able to rival any other OS on the market. So, learning how to harness the full potential of the OS is critical for you as a technical worker and user to thrive at your workplace. ChromeOS System Administrator’s Guide will help you reap the benefits of all features of ChromeOS.This book explains ChromeOS’ unique architecture and its built-in tools that perform essential tasks such as managing user accounts, working with data, and launching applications. As you build your foundational knowledge of the OS, you'll be exposed to higher-level concepts such as security, command line, and enterprise management.By the end of this book, you’ll be well-equipped to perform a range of system administration tasks within ChromeOS without requiring an alternative operating system, thereby broadening your options as a technician, system administrator, developer, or engineer.
Bob Janes
Joomla! is a fantastic way to create a dynamic CMS. Now you want to go to the next step and interact with your users. Forms are the way you ask questions and get replies. ChronoForms is the extension that lets you do that and this book tells you how.From building your first form to creating rich form based applications we will cover the features that ChronoForms offers you in a clear hands-on way. Drawing on three years daily experience using ChronoForms and supporting users there is valuable help for new users and experienced developers alike.We will take you through form development step by step: from creating your first form using ChronoForms’ built-in drag-and-drop tool; validating user input; emailing the results; saving data in the database, showing the form in your Joomla! site and much more.Each chapter addresses a topic like ‘validation’ or ‘email’ and the recipes in the chapter each address a different user question from the beginners’ question ‘How do I set up an email?’ through to more advanced questions like using some PHP to create a custom email Subject line.Over eight chapters and eighty recipes we cover all of the ‘Frequently Asked Questions’ that new users and developers have about using ChronoForms. The recipe structure allows you to pick and choose just the solution that you need.
CI/CD Design Patterns. Design and implement CI/CD using proven design patterns
Garima Bajpai, Michel Schildmeijer, Muktesh Mishra, Pawel...
The fast-changing world of software development demands robust CI/CD solutions that go beyond traditional methods to address the complexities of modern pipelines. This practical guide presents proven design patterns to streamline your CI/CD processes, tackling pain points often overlooked by other resources. This book introduces continuous delivery design patterns to help practitioners and engineering teams design, adopt, and implement CI/CD. Drawing from decades of combined industry experience, the expert author team—including DevOps and cloud leader Garima Bajpai, industry expert Michel Schildmeijer, CI/CD framework creator Pawel Piwosz, and open source advocate Muktesh Mishra—provides invaluable insights from leading voices in the industry.The book lays a solid foundation by starting with the importance of CI/CD design patterns, components, and principles. You’ll learn strategies for scaling CI/CD with a focus on performance, security, measurements, and pipeline auditability, along with infrastructure and release automation. The book also covers advanced design patterns that integrate machine learning, generative AI, and near real-time CI/CD processes.By the end of this book, you’ll have a deep understanding of continuous delivery design patterns, a solid foundation for audits and controls, and be able to mitigate risks associated with the rapid integration of modern technology into the SDLC.
Rui Miguel Santos Madeira, Dawid Gorny
Cinder is one of the most exciting frameworks available for creative coding. It is developed in C++ for increased performance and allows for the fast creation of visually complex, interactive applications.Cinder Creative Coding Cookbook will show you how to develop interactive and visually dynamic applications using simple-to-follow recipes.You will learn how to use multimedia content, draw generative graphics in 2D and 3D, and animate them in compelling ways. Beginning with creating simple projects with Cinder, you will use multimedia, create animations, and interact with the user.From animation with particles to using video, audio, and images, the reader will gain a broad knowledge of creating applications using Cinder.With recipes that include drawing in 3D, image processing, and sensing and tracking in real-time from camera input, the book will teach you how to develop interesting applications.Cinder Creative Coding Cookbook will give you the necessary knowledge to start creating projects with Cinder that use animations and advanced visuals.
Giovanni Visai
As Unreal Engine 5 continues to conquer all industries thanks to its real-time technology, UE skills are becoming more sought after than ever. This three-part book covers all the processes behind the creation of a stunning environment in UE 5.Starting with the steps for installing the game engine and learning about its potential, you’ll quickly progress toward generating a variety of different upwards scaling outputs, each bigger than the previous one. After completing the first part and getting realistic shots of a single object, you’ll delve into the world of landscapes, procedural material and foliage, the Landmass plugin, and water tools by creating an environment using Megascan assets. At this point, you’ll know everything you need to create a fascinating and realistic environment. The final part of this book will teach you how to craft cinematic shots by working with cinematic tools, post processing, and framing tools, and by rendering a photorealistic shot in the last chapter.By the end of this Unreal Engine book, you'll be able to create outstanding and realistic environments using the powerful tools provided by UE as well as have an understanding of the importance of filming and composition in world building.
Hemang Doshi
With the latest updates and revised study material, this second edition of the Certified Information Systems Auditor Study Guide provides an excellent starting point for your CISA certification preparation. The book strengthens your grip on the core concepts through a three-step approach. First, it presents the fundamentals with easy-to-understand theoretical explanations. Next, it provides a list of key aspects that are crucial from the CISA exam perspective, ensuring you focus on important pointers for the exam. Finally, the book makes you an expert in specific topics by engaging you with self-assessment questions designed to align with the exam format, challenging you to apply your knowledge and sharpen your understanding.Moreover, the book comes with lifetime access to supplementary resources on an online platform, including CISA flashcards, practice questions, and valuable exam tips. With unlimited access to the website, you’ll have the flexibility to practice as many times as you desire, maximizing your exam readiness.By the end of this book, you’ll have developed the proficiency to successfully obtain the CISA certification and significantly upgrade your auditing career.
Hemang Doshi
Are you looking to prepare for the CISA exam and understand the roles and responsibilities of an information systems (IS) auditor?The CISA - Certified Information Systems Auditor Study Guide is here to help you get started with CISA exam prep.This book covers all the five CISA domains in detail to help you pass the exam. You’ll start by getting up and running with the practical aspects of an information systems audit. The book then shows you how to govern and manage IT, before getting you up to speed with acquiring information systems. As you progress, you’ll gain knowledge of information systems operations and understand how to maintain business resilience, which will help you tackle various real-world business problems. Finally, you’ll be able to assist your organization in effectively protecting and controlling information systems with IT audit standards.By the end of this CISA book, you'll not only have covered the essential concepts and techniques you need to know to pass the CISA certification exam but also have the ability to apply them in the real world.
Hemang Doshi, Javen Khoo Ai Wee
Following on from the success of its bestselling predecessor, this third edition of the CISA - Certified Information Systems Auditor Study Guide serves as your go-to resource for acing the CISA exam. Written by renowned CISA expert Hemang Doshi, this guide equips you with practical skills and in-depth knowledge to excel in information systems auditing, setting the foundation for a thriving career.Fully updated to align with the 28th edition of the CISA Official Review Manual, this guide covers the latest exam objectives and provides a deep dive into essential IT auditing areas, including IT governance, systems development, and asset protection. The book follows a structured, three-step approach to solidify your understanding. First, it breaks down the fundamentals with clear, concise explanations. Then, it highlights critical exam-focused points to ensure you concentrate on key areas. Finally, it challenges you with self-assessment questions that reflect the exam format, helping you assess your knowledge.Additionally, you’ll gain access to online resources, including mock exams, interactive flashcards, and invaluable exam tips, ensuring you’re fully prepared for the exam with unlimited practice opportunities.By the end of this guide, you’ll be ready to pass the CISA exam with confidence and advance your career in auditing.
Stuart Fordham
Over 90 recipes to maximize automated solutions and policy-drive application profiles using Cisco ACIAbout This BookConfidently provision your virtual and physical infrastructure for application deploymentIntegrate Cisco ACI with hypervisors and other third party devicesPacked with powerful recipes to automate your IT operationsWho This Book Is ForIf you are a network administrator, system administrator, or engineer and are aware of the basics of Cisco ACI but want to start using it to automate your tasks, then this book is for youWhat You Will LearnMaster the Cisco ACI architectureDiscover the ACI fabric with easy-to-follow stepsSet up quality of service within ACIConfigure external networks with Cisco ACIIntegrate with VMware and track VMware virtual machinesConfigure apply and verify access policiesExtend or migrate a VMware virtual-machine LAN inside the ACI fabricMonitor ACI with third party tools and troubleshoot issuesIn DetailCisco Application Centric Infrastructure (ACI) is a tough architecture that automates IT tasks and accelerates data-center application deployments.This book focuses on practical recipes to help you quickly build, manage, and customize hybrid environment for your organization using Cisco ACI. You will begin by understanding the Cisco ACI architecture and its major components. You will then configure Cisco ACI policies and tenants. Next you will connect to hypervisors and other third-party devices. Moving on, you will configure routing to external networks and within ACI tenants and also learn to secure ACI through RBAC. Furthermore, you will understand how to set up quality of service and network programming with REST, XML, Python and so on. Finally you will learn to monitor and troubleshoot ACI in the event of any issues that arise.By the end of the book, you will gain have mastered automating your IT tasks and accelerating the deployment of your applications.Style and approachA set of exciting recipes to automate your IT operations related to datacenters, the Cloud, and networking tasks
Glen D. Singh
Achieving the Cisco Certified CyberOps Associate 200-201 certification helps you to kickstart your career in cybersecurity operations. This book offers up-to-date coverage of 200-201 exam resources to fully equip you to pass on your first attempt.The book covers the essentials of network security concepts and shows you how to perform security threat monitoring. You'll begin by gaining an in-depth understanding of cryptography and exploring the methodology for performing both host and network-based intrusion analysis. Next, you'll learn about the importance of implementing security management and incident response strategies in an enterprise organization. As you advance, you'll see why implementing defenses is necessary by taking an in-depth approach, and then perform security monitoring and packet analysis on a network. You'll also discover the need for computer forensics and get to grips with the components used to identify network intrusions. Finally, the book will not only help you to learn the theory but also enable you to gain much-needed practical experience for the cybersecurity industry.By the end of this Cisco cybersecurity book, you'll have covered everything you need to pass the Cisco Certified CyberOps Associate 200-201 certification exam, and have a handy, on-the-job desktop reference guide.
Victor Wu
Cisco Unified Computing System (UCS) is a data center server platform that is used for computing, deploying, and storing resources in data center environments.This cookbook aims to teach you about various tasks you can implement to improve your existing method of configuring and deploying UCS. You will start by learning how to upgrade your firmware on Brocade and Cisco Fibre Channel Switch and will move on to enhance your knowledge of LAN connectivity. We will then discuss how to configure Windows 2008 and 2012 local boot in Cisco UCS. Next, you will learn how to install the operating system on Cisco UCS and use Cisco UCS Power Calculator to calculate the UCS consumption. Finally, we’ll take a look at backup solutions.By the end of the book, you will know several ways to build and compute in data center environment using Cisco UCS.
Tanner Ezell
Cisco Unified Communications Manager (CUCM) is a software-based call-processing system developed by Cisco Systems. CUCM tracks all active VoIP network components; these include phones, gateways, conference bridges, transcoding resources, and voicemail boxes among others. This scalable, distributable, highly-available enterprise-class system delivers voice, video, mobility, and presence services. It connects up to 30,000 users of IP phones, media processing devices, VoIP gateways, mobile devices, and multimedia applications. With this cookbook you will learn all the important aspects of administering Cisco Unified Communications Manager.Cisco Unified Communications Manager 8: Expert Administration Cookbook is filled with many advanced recipes to effectively and efficiently configure and manage Cisco Unified Communications Manager. This book covers everything an administrator needs during and after Cisco Unified Communications Manager implementation.This practical cookbook contains detailed step-by-step instructions with clear and informative screenshots that cover all the important and advanced aspects of administering Cisco Unified Communications Manager.The book starts with introducing Call Routing and E.164. It then covers configuration and design information for the various call admission control technologies and Media Resources. The book also dives deep into troubleshooting, upgrades, disaster recovery, user management and much more.
M. L. Srinivasan
Certified Information Systems Security Professional (CISSP) is an internationally recognized and coveted qualification. Success in this respected exam opens the door to your dream job as a security expert with an eye-catching salary. But passing the final exam is challenging. Every year a lot of candidates do not prepare sufficiently for the examination, and fail at the final stage. This happens when they cover everything but do not revise properly and hence lack confidence.This simple yet informative book will take you through the final weeks before the exam with a day-by-day plan covering all of the exam topics. It will build your confidence and enable you to crack the Gold Standard exam, knowing that you have done all you can to prepare for the big day.This book provides concise explanations of important concepts in all 10 domains of the CISSP Common Body of Knowledge (CBK). Starting with Confidentiality, Integrity, and Availability, you will focus on classifying information and supporting assets. You will understand data handling requirements for sensitive information before gradually moving on to using secure design principles while implementing and managing engineering processes. You will understand the application of cryptography in communication security and prevent or mitigate strategies for network attacks. You will also learn security control requirements and how to assess their effectiveness. Finally, you will explore advanced topics such as automated and manual test result analysis and reporting methods.A complete mock test is included at the end to evaluate whether you're ready for the exam. This book is not a replacement for full study guides; instead, it builds on and reemphasizes concepts learned from them.
Ted Jordan
The CISSP exam is for security professionals who understand that poor security can put a company out of business. The exam covers eight important security domains - risk management, security architecture, data security, network security, identity management, auditing, security operations, and software development security. Designed to cover all the concepts tested in the CISSP exam, CISSP (ISC)2 Certification Practice Exams and Tests will assess your knowledge of information security and introduce you to the tools you need to master to pass the CISSP exam (version May 2021). With more than 100 questions for every CISSP domain, this book will test your understanding and fill the gaps in your knowledge with the help of descriptive answers and detailed explanations. You'll also find two complete practice exams that simulate the real CISSP exam, along with answers. By the end of this book, you'll be ready to take and pass the (ISC)2 CISSP exam and achieve the Certified Information Systems Security Professional certification putting you in the position to build a career as a security engineer, security manager, or chief information security officer (CISO)