Wydawca: Packt Publishing

Founded in 2004 in Birmingham, UK, Packt's mission is to help the world put software to work in new ways, through the delivery of effective learning and information services to IT professionals. Working towards that vision, we have published over 6,500 books and videos so far, providing IT professionals with the actionable knowledge they need to get the job done - whether that's specific learning on an emerging technology or optimizing key skills in more established tools. As part of our mission, we have also awarded over $1,000,000 through our Open Source Project Royalty scheme, helping numerous projects become household names along the way.
4625
Ładowanie...
EBOOK

OpenStack Orchestration

Adnan Ahmed Siddiqui

This book is focused on setting up and using one of the most important services in OpenStack orchestration, Heat. First, the book introduces you to the orchestration service for OpenStack to help you understand the uses of the templating mechanism, complex control groups of cloud resources, and huge-potential and multiple-use cases. We then move on to the topology and orchestration specification for cloud applications and standards, before introducing the most popular IaaS cloud framework, Heat. You will get to grips with the standards used in Heat, overview and roadmap, architecture and CLI, heat API, heat engine, CloudWatch API, scaling principles, JeOS and installation and configuration of Heat. We wrap up by giving you some insights into troubleshooting for OpenStack.With easy-to-follow, step-by-step instructions and supporting images, you will be able to manage OpenStack operations by implementing the orchestration services of Heat.

4626
Ładowanie...
EBOOK

OpenStack Sahara Essentials. Integrate, deploy, rapidly configure, and successfully manage your own big data-intensive clusters in the cloud using OpenStack Sahara

Omar Khedher

The Sahara project is a module that aims to simplify the building of data processing capabilities on OpenStack.The goal of this book is to provide a focused, fast paced guide to installing, configuring, and getting started with integrating Hadoop with OpenStack, using Sahara.The book should explain to users how to deploy their data-intensive Hadoop and Spark clusters on top of OpenStack. It will also cover how to use the Sahara REST API, how to develop applications for Elastic Data Processing on Openstack, and setting up hadoop or spark clusters on Openstack.

4627
Ładowanie...
EBOOK

OpenStack Trove Essentials. Build your own cloud based Database as a Service using OpenStack Trove

Alok Shrivastwa, Sunil Sarat, Doug Shelley, Amrith...

OpenStack has become an extremely popular solution to build public and private clouds with. Database as a Service (DBaaS) enables the delivery of more agile database services at lower costs. Some other benefits of DBaaS are secure database deployments and compliance to standards and best practices. Trove is a DBaaS built on OpenStack and is becoming more popular by the day.Since Trove is one of the most recent projects of OpenStack, DBAs and system administrators can find it difficult to set up and run a DBaaS using OpenStack Trove. This book helps DBAs make that step. We start by introducing you to the concepts of DBaaS and how is it implemented using OpenStack Trove. Following this, we look at implementing OpenStack and deploying Trove. Moving on, you will learn to create guest images to be used with Trove. We then look at how to provision databases in self-service mode, and how to perform administration tasks such as backup and recovery, and fine-tuning databases. At the end of the book, we will examine some advanced features of Trove such as replication.

4628
Ładowanie...
EBOOK

OpenStreetMap. Once you’ve learnt OpenStreetMap using this book you’ll be your own cartographer, creating whatever maps you wish easily and accurately, for business or leisure. Best of all there are none of the usual restrictions on use

Jonathan Bennett, Steve Coast

Imagine being able to create accurate maps that look how you want them to, and use them on the Web or in print, for free. OpenStreetMap allows exactly that, with no restrictions on how or where you use your maps. OpenStreetMap is perfect for businesses that want to include maps on their website or in publications without paying high fees. With this book in hand you have the power to make, alter, and use this geographical data in a collaborative way from anywhere on the Earth.OpenStreetMap was started because most maps you think of as free actually have legal or technical restrictions on their use, holding back people from using them in creative, productive, or unexpected ways. This book will allow you to take control of your own maps and use them smoothly. This book introduces the reader to the OpenStreetMap project and shows you how to participate in the project, and make use of the data it provides. No prior knowledge of the project is assumed, and technical details are kept to a minimum.In this book, you'll learn how easy it is to add your neighborhood to OpenStreetMap using inexpensive GPS equipment, or even no GPS at all. You'll find out how to communicate with other mappers working in the same area, and where to find more information about how to map the world around you.Once you have your area mapped, you'll learn how to turn this information into maps, whether for use in print or online, large or small, and with the details you want shown. The book describes several rendering methods, each suited to different types of map, and takes you through a tutorial on each one.

4630
Ładowanie...
EBOOK

OpenVPN: Building and Integrating Virtual Private Networks. Learn how to build secure VPNs using this powerful Open Source application

Markus Feilner, Open VPN Solutions

OpenVPN is a powerful, open source SSL VPN application. It can secure site-to-site connections, WiFi and enterprise-scale remote connections. While being a full-featured VPN solution, OpenVPN is easy to use and does not suffer from the complexity that characterizes other IPSec VPN implementations. It uses the secure and stable TLS/SSL mechanisms for authentication and encryption.This book is an easy introduction to this popular VPN application. After introducing the basics of security and VPN, the book moves on to cover using OpenVPN, from installing it on various platforms, through configuring basic tunnels, to more advanced features, such as using the application with firewalls, routers, proxy servers, and OpenVPN scripting.While providing only necessary theoretical background, the book takes a practical approach, presenting plenty of examples.

4631
Ładowanie...
EBOOK

OpenVPN Cookbook. Get the most out of OpenVPN by exploring it's advanced features. - Second Edition

Jan Just Keijser

OpenVPN provides an extensible VPN framework that has been designed to ease site-specific customization, such as providing the capability to distribute a customized installation package to clients, and supporting alternative authentication methods via OpenVPN’s plugin module interface. This book provides you with many different recipes to help you set up, monitor, and troubleshoot an OpenVPN network. You will learn to configure a scalable, load-balanced VPN server farm that can handle thousands of dynamic connections from incoming VPN clients. You will also get to grips with the encryption, authentication, security, extensibility, and certifications features of OpenSSL. You will also get an understanding of IPv6 support and will get a demonstration of how to establish a connection via IPv64. This book will explore all the advanced features of OpenVPN and even some undocumented options, covering all the common network setups such as point-to-point networks and multi-client TUN-style and TAP-style networks. Finally, you will learn to manage, secure, and troubleshoot your virtual private networks using OpenVPN 2.4.

4633
Ładowanie...
AUDIOBOOK

Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs

Kyle Wilhoit, Joseph Opacki

We’re living in an era where cyber threat intelligence is becoming more important. Cyber threat intelligence routinely informs tactical and strategic decision-making throughout organizational operations. However, finding the right resources on the fundamentals of operationalizing a threat intelligence function can be challenging, and that’s where this book helps.In Operationalizing Threat Intelligence, you’ll explore cyber threat intelligence in five fundamental areas: defining threat intelligence, developing threat intelligence, collecting threat intelligence, enrichment and analysis, and finally production of threat intelligence. You’ll start by finding out what threat intelligence is and where it can be applied. Next, you’ll discover techniques for performing cyber threat intelligence collection and analysis using open source tools. The book also examines commonly used frameworks and policies as well as fundamental operational security concepts. Later, you’ll focus on enriching and analyzing threat intelligence through pivoting and threat hunting. Finally, you’ll examine detailed mechanisms for the production of intelligence.By the end of this book, you’ll be equipped with the right tools and understand what it takes to operationalize your own threat intelligence function, from collection to production.

4634
Ładowanie...
EBOOK

Operationalizing Threat Intelligence. A guide to developing and operationalizing cyber threat intelligence programs

Kyle Wilhoit, Joseph Opacki

We’re living in an era where cyber threat intelligence is becoming more important. Cyber threat intelligence routinely informs tactical and strategic decision-making throughout organizational operations. However, finding the right resources on the fundamentals of operationalizing a threat intelligence function can be challenging, and that’s where this book helps.In Operationalizing Threat Intelligence, you’ll explore cyber threat intelligence in five fundamental areas: defining threat intelligence, developing threat intelligence, collecting threat intelligence, enrichment and analysis, and finally production of threat intelligence. You’ll start by finding out what threat intelligence is and where it can be applied. Next, you’ll discover techniques for performing cyber threat intelligence collection and analysis using open source tools. The book also examines commonly used frameworks and policies as well as fundamental operational security concepts. Later, you’ll focus on enriching and analyzing threat intelligence through pivoting and threat hunting. Finally, you’ll examine detailed mechanisms for the production of intelligence.By the end of this book, you’ll be equipped with the right tools and understand what it takes to operationalize your own threat intelligence function, from collection to production.

4635
Ładowanie...
EBOOK

Operator Training Simulator Handbook. Best practices for developing and investing in OTS

Joseph Philip, Frank David Todd

Operator training simulators in the process industry have been around since the 1970s, but you may not find a book that documents the development of these systems and the standard best practices. The Operator Training Simulator Handbook covers best practices for OTS engineering and OTS training development and delivery, starting from the basic the jargon and the different types of OTS systems. It will take you through the best approaches to project specification as well as building, maintenance, planning, and delivering these systems by sharing real-life experiences and dos and don’ts.As you advance, you'll uncover the various challenges in the planning and delivery of operator training models and understand how to address those by working through real-world projects. This book helps in specifying the best fit for purpose, choosing a cost-effective system when acquiring an OTS. You'll also learn how you can turn your OTS projects into digital twins before finally learning all about documentation in a typical OTS project, covering the sample structure that you can use as a starting point in your projects.By the end of the book, you'll have learned best practices for developing operator training simulator systems and have a reference guide to overcome common challenges.

4636
Ładowanie...
EBOOK

OPNsense Beginner to Professional. Protect networks and build next-generation firewalls easily with OPNsense

Julio Cesar Bueno de Camargo

OPNsense is one of the most powerful open source firewalls and routing platforms available. With OPNsense, you can now protect networks using features that were only previously available to closed source commercial firewalls.This book is a practical guide to building a comprehensive network defense strategy using OPNsense. You’ll start with the basics, understanding how to install, configure, and protect network resources using native features and additional OPNsense plugins. Next, you’ll explore real-world examples to gain in-depth knowledge of firewalls and network defense. You’ll then focus on boosting your network defense, preventing cyber threats, and improving your knowledge of firewalling using this open source security platform.By the end of this OPNsense book, you’ll be able to install, configure, and manage the OPNsense firewall by making the most of its features.

4637
Ładowanie...
EBOOK

Optimizing Citrix XenDesktop for High Performance. Successfully deploy XenDesktop sites for a high performance Virtual Desktop Infrastructure (VDI)

Craig Thomas Ellrod

Citrix XenDesktop is a suite of desktop virtualization tools designed to provide users with fast and convenient access to their Windows desktops and applications through any device. Virtual desktops mean that rather than setting up hundreds or thousands of individual computers in an enterprise, companies can instead opt to create servers with large amounts of memory, disk, and processing resources, and use virtualization to offer these resources to end users. The result of this is that users are provided with an experience that appears to be identical to having an individual desktop PC. Each user has some disk space, processor time, and memory allocated to them, as though it is present on their own physical machine, when in reality, the resources are physically present on a centralized server.This book starts by answering the basic questions you need to ask when considering XenDesktop, followed by methods of how you can properly size your server infrastructure for XenDesktop. You’ll discover how to optimize the virtual machines used in XenDesktop, how to optimize your network for XenDesktop, and how to optimize the hypervisor and the cloud. You’ll also learn how to monitor XenDesktop to maximize performance.By the end of the book, you will be able to plan, design, build, and deploy high performance XenDesktop Virtualization systems in enterprises. You will also know how to monitor and maintain your systems to ensure smooth operation.

4638
Ładowanie...
EBOOK

Optimizing Databricks Workloads. Harness the power of Apache Spark in Azure and maximize the performance of modern big data workloads

Anirudh Kala, Anshul Bhatnagar, Sarthak Sarbahi

Databricks is an industry-leading, cloud-based platform for data analytics, data science, and data engineering supporting thousands of organizations across the world in their data journey. It is a fast, easy, and collaborative Apache Spark-based big data analytics platform for data science and data engineering in the cloud.In Optimizing Databricks Workloads, you will get started with a brief introduction to Azure Databricks and quickly begin to understand the important optimization techniques. The book covers how to select the optimal Spark cluster configuration for running big data processing and workloads in Databricks, some very useful optimization techniques for Spark DataFrames, best practices for optimizing Delta Lake, and techniques to optimize Spark jobs through Spark core. It contains an opportunity to learn about some of the real-world scenarios where optimizing workloads in Databricks has helped organizations increase performance and save costs across various domains.By the end of this book, you will be prepared with the necessary toolkit to speed up your Spark jobs and process your data more efficiently.

4640
Ładowanie...
EBOOK

Optimizing Microsoft Azure Workloads. Leverage the Well-Architected Framework to boost performance, scalability, and cost efficiency

Rithin Skaria, Jatinder Pal Singh

It’s easy to learn and deploy resources in Microsoft Azure, without worrying about resource optimization. However, for production or mission critical workloads, it’s crucial that you follow best practices for resource deployment to attain security, reliability, operational excellence and performance. Apart from these aspects, you need to account for cost considerations, as it’s the leading reason for almost every organization’s cloud transformation.In this book, you’ll learn to leverage Microsoft Well-Architected Framework to optimize your workloads in Azure. This Framework is a set of recommended practices developed by Microsoft based on five aligned pillars; cost optimization, performance, reliability, operational excellence, and security. You’ll explore each of these pillars and discover how to perform an assessment to determine the quality of your existing workloads. Through the book, you’ll uncover different design patterns and procedures related to each of the Well-Architected Framework pillars.By the end of this book, you’ll be well-equipped to collect and assess data from an Azure environment and perform the necessary upturn of your Azure workloads.