Conducting Network Penetration and Espionage in a Global Environment
When it’s all said and done, penetration testing remains the most effective way to identify security vulnerabilities in computer networks. Conducting Network Penetration and Espionage in a Global Environment provides detailed guidance on how to perform effective penetration testing of computer networksâusing free, open...
Introducing Linux Distros
Learn the pros and the cons of the most frequently used distros in order to find the one that is right for you. You will explore each distro step by step, so that you don't have to endure hours of web surfing, countless downloads, becoming confused by new concepts and, in the worst cases, reading complex and marathon installation guides....
Mastering Kubernetes: Large scale container deployment and management
Master the art of container management utilizing the power of Kubernetes.
About This Book
This practical guide demystifies Kubernetes and ensures that your clusters are always available, scalable, and up to date
Discover new features such as autoscaling, rolling updates, resource quotas,...
|Result Page: 245 244 243 242 241 240 239 238 237 236 |