Kirjojen hintavertailu. Mukana 12 016 292 kirjaa ja 12 kauppaa.

Kirjahaku

Etsi kirjoja tekijän nimen, kirjan nimen tai ISBN:n perusteella.

4 kirjaa tekijältä Harry Colvin

DOCKER in Use: Exploration of Docker in Details

DOCKER in Use: Exploration of Docker in Details

Harry Colvin

Createspace Independent Publishing Platform
2015
nidottu
DOCKER in Use Exploration of Docker in Details This book is an exploration of the Docker in detail. Most of functionalities of the Docker explored in this book are the complex ones. It begins by explaining what you should know before beginning to read this book. The next part of the book explores Docker images, the command line, and the containers. The book will guide you on how to create your image. You will then be able to use this image or push it to the Docker Hub for others to download. The various commands which can be used in the Docker command line are then explored, and thus, you will learn how to execute some of the basic and complex Docker commands. The next part discusses the management of complex Docker containers which can be used in a production environment. You will learn how to use the tool "Docker Machine" for this purpose. The next part explores the process of deploying the Docker. You will learn how to use "Captainhook" for this purpose. Networking in the Docker is also examined in detail. Most of the commands which can be used to play around with Docker ports are covered. You will also learn how to join Docker containers. Docker orchestration tools are explored, so that you will know how to use these. Measures which can be taken to secure the Docker are the explained.Here is a preview of what you'll learn: Management of Complex Docker ContainersDocker Deployment toolsNetworking in the DockerOrchestration in the DockerNetworking in DockerSecurity in the Docker
VirtualBox: An Ultimate Guide Book on Virtualization with VirtualBox

VirtualBox: An Ultimate Guide Book on Virtualization with VirtualBox

Harry Colvin

Createspace Independent Publishing Platform
2015
nidottu
VIRTUALBOXAn Ultimate Guide Book on Virtualization with VirtualBoxThis book is a guide to the user on how to use the VirtualBox. It begins by explaining what VirtualBox is, the reason why it is used, and how it is used. The next part is a guide to how one can install the VirtualBox in either Windows or the Linux operating systems. The book will guide you on the various installation steps for VirtualBox in these operating systems. The book then explores how a virtual machine can be created on the VirtualBox. You will learn how to choose the appropriate size for the VirtualBox, as well as how to choose the storage media for the virtual machine. You will also learn how to install and use Guest Additions in VirtualBox. Desktops are also explored, thus, the book will guide you on how to create them. Templates for the pool have also been discussed, and you will learn how to import them into the pool. Cloning of desktops in a pool is also discussed in detail, thus, you will know how to do it. This book will guide you on how to assign desktops to users. Once you have set up the desktop, the book will guide you on how to establish a connection to it. Management of desktops is also explored.The following topics are discussed: DefinitionInstallation of VirtualBoxCreating a New Virtual MachineInstallation of Guest additions for the VirtualBoxHow to create the DesktopsHow to import a Template into the PoolHow to set up the CloningPersonalized How to assign users to the DesktopsEstablishing a connection to the DesktopManagement of the DesktopsSet up a shared folderEnabling logging for the .MSI host installer of VirtualBox
RASPBERRY Pi 2: Advanced Tips and Tricks

RASPBERRY Pi 2: Advanced Tips and Tricks

Harry Colvin

Createspace Independent Publishing Platform
2016
nidottu
RASPBERRY Pi 2Advanced Tips and tricksThis book is a deep exploration of the Raspberry Pi device. Most of the complex functionalities offered by the device are explored in a step-by-step manner. The first part of the book is a guide on how you can use the Pi device as a router. The various configurations which are necessary for this have been discussed. This next part is a guide on how to set up GPIO (General Purpose Input Output) for your Pi, . After reading this book, you will know how to use the Pi so as to sense movement. The various devices which are necessary for this to happen are explored, as well as the interconnections between them. MATLAB and Simulink for Raspberry are also discussed. You will learn how to use these together with the Pi device. The book will also guide you on how to use the Raspberry so as to sense and record temperatures. Email notifications by use of LEDs is explored in detail. You will also learn how to print from the Pi to a printer connected via the network.Here is a preview of what you'll learn: DefinitionUsing Raspberry Pi as a RouterSetting up GPIO (General Purpose Input Output)Sensing movementMATLAB and Simulink for RaspberryTemperature SensingEmail Notifier using LEDsPrintingDownload your copy of " RASPBERRY Pi 2" by scrolling up and clicking "Buy Now With 1-Click" button.
Cyber Security for Beginners: Everything you need to know about it (Cyber security, Cyberwar, Hacking)
This book is a guide for you on everything you should know about cyber security. The book helps you understand what cyber security is, and the various ways organizations and governments can stay safe from cyber-attacks. Implementing application security is a major approach to countering cyber-attacks. This is the security organizations' and governments' implement on the hardware and software components they are using. The various ways to implement this kind of security are discussed in this book. Information should also be protected against cyber-attacks. The protection of information should be geared towards achieving confidentiality, integrity, and availability. The various ways to achieve these are explored. Computer networks should also be secured so that attacks from network intruders can be thwarted. This requires the use of multiple approaches. These approaches have been explored in this book. Organizations and governments may be attacked by cybercriminals. Such attacks can cripple the operations of the organization or the government. There is a way for these parties to ensure that they have implemented recovery mechanisms, or ensure that their operations will keep on running despite such attacks. This book explores this in details and how to achieve it. States should also stay protected against cyberwar. The following topics have been discussed in this book: - What is Cyber security?- Application Security- Information Security- Network Security- Business Continuity Planning/ Disaster Recovery- Operational Security (OPSEC)- End-User Education- Cyberwar- Hacktivism- Cyber-terroris