Operating systems Books
McGraw-Hill Education CompTIA A Certification AllinOne Exam Guide
Book SynopsisThis bestselling on-the-job reference and test preparation guide has been fully revised for new 2022 exam objectivesThis fully revised and updated resource offers complete coverage of the latest release of CompTIA A+ exams 220-1101 & 220-1102. Youâll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the CompTIA A+ exams with ease, this definitive guide also serves as an essential on-the-job IT reference.Covers all exam topics, including how to: Work with CPUs, RAM, BIOS, motherboards, power supplies, and other personal computer components Install, configure, and maintain hard drives Manage input devices and removable media Set up, upgrade, and maintain Microsoft Windows Troubleshoot and fix computer problems Install printers and other peripherals Configure and secure mobile devices Connect to the IntTable of ContentsCH 1 Safety and ProfessionalismCH 2 The Visible ComputerCH 3 CPUsCH 4 RAMCH 5 FirmwareCH 6 MotherboardsCH 7 Power SuppliesCH 8 Mass Storage TechnologiesCH 9 Implementing Mass StorageCH 10 Essential PeripheralsCH 11 Installing and Upgrading Operating SystemsCH 12 Operating System OperationsCH 13 Users, Groups, and PermissionsCH 14 Maintaining and Optimizing Operating SystemsCH 15 Command Line InterfaceCH 16 Troubleshooting Operating SystemsCH 17 Display TechnologiesCH 18 Networking EssentialsCH 19 Local Area NetworkingCH 20 Wireless NetworkingCH 21 The InternetCH 22 VirtualizationCH 23 Portable ComputingCH 24 Mobile DevicesCH 25 Securing Mobile DevicesCH 26 Printers and Multifunction DevicesCH 27 Securing ComputersCH 28 Operational ProceduresApp A Mapping to the CompTIA A+ ObjectivesApp B About the Online ContentGL Glossary
£35.99
Pearson Education (US) Systems Performance
Book SynopsisTable of ContentsPreface xxixAcknowledgments xxxvAbout the Author xxxvii Chapter 1: Introduction 1 1.1 Systems Performance 1 1.2 Roles 2 1.3 Activities 3 1.4 Perspectives 4 1.5 Performance Is Challenging 5 1.6 Latency 6 1.7 Observability 7 1.8 Experimentation 13 1.9 Cloud Computing 14 1.10 Methodologies 15 1.11 Case Studies 16 1.12 References 19 Chapter 2: Methodologies 21 2.1 Terminology 22 2.2 Models 23 2.3 Concepts 24 2.4 Perspectives 37 2.5 Methodology 40 2.6 Modeling 62 2.7 Capacity Planning 69 2.8 Statistics 73 2.9 Monitoring 77 2.10 Visualizations 79 2.11 Exercises 85 2.12 References 86 Chapter 3: Operating Systems 89 3.1 Terminology 90 3.2 Background 91 3.3 Kernels 111 3.4 Linux 114 3.5 Other Topics 122 3.6 Kernel Comparisons 124 3.7 Exercises 124 3.8 References 125 Chapter 4: Observability Tools 129 4.1 Tool Coverage 130 4.2 Tool Types 133 4.3 Observability Sources 138 4.4 sar 160 4.5 Tracing Tools 166 4.6 Observing Observability 167 4.7 Exercises 168 4.8 References 168 Chapter 5: Applications 171 5.1 Application Basics 172 5.2 Application Performance Techniques 176 5.3 Programming Languages 182 5.4 Methodology 186 5.5 Observability Tools 199 5.6 Gotchas 213 5.7 Exercises 216 5.8 References 217 Chapter 6: CPUs 219 6.1 Terminology 220 6.2 Models 221 6.3 Concepts 223 6.4 Architecture 229 6.5 Methodology 244 6.6 Observability Tools 254 6.7 Visualizations 288 6.8 Experimentation 293 6.9 Tuning 294 6.10 Exercises 299 6.11 References 300 Chapter 7: Memory 303 7.1 Terminology 304 7.2 Concepts 305 7.3 Architecture 311 7.4 Methodology 323 7.5 Observability Tools 328 7.6 Tuning 350 7.7 Exercises 354 7.8 References 355 Chapter 8: File Systems 359 8.1 Terminology 360 8.2 Models 361 8.3 Concepts 362 8.4 Architecture 372 8.5 Methodology 383 8.6 Observability Tools 391 8.7 Experimentation 411 8.8 Tuning 414 8.9 Exercises 419 8.10 References 420 Chapter 9: Disks 423 9.1 Terminology 424 9.2 Models 425 9.3 Concepts 427 9.4 Architecture 435 9.5 Methodology 449 9.6 Observability Tools 458 9.7 Visualizations 487 9.8 Experimentation 490 9.9 Tuning 493 9.10 Exercises 495 9.11 References 496 Chapter 10: Network 499 10.1 Terminology 500 10.2 Models 501 10.3 Concepts 503 10.4 Architecture 509 10.5 Methodology 524 10.6 Observability Tools 533 10.7 Experimentation 562 10.8 Tuning 567 10.9 Exercises 574 10.10 References 575 Chapter 11: Cloud Computing 579 11.1 Background 580 11.2 Hardware Virtualization 587 11.3 OS Virtualization 605 11.4 Lightweight Virtualization 630 11.5 Other Types 634 11.6 Comparisons 634 11.7 Exercises 636 11.8 References 637 Chapter 12: Benchmarking 641 12.1 Background 642 12.2 Benchmarking Types 651 12.3 Methodology 656 12.4 Benchmark Questions 667 12.5 Exercises 668 12.6 References 669 Chapter 13: perf 671 13.1 Subcommands Overview 672 13.2 One-Liners 674 13.3 perf Events 679 13.4 Hardware Events 681 13.5 Software Events 683 13.6 Tracepoint Events 684 13.7 Probe Events 685 13.8 perf stat 691 13.9 perf record 694 13.10 perf report 696 13.11 perf script 698 13.12 perf trace 701 13.13 Other Commands 702 13.14 perf Documentation 703 13.15 References 703 Chapter 14: Ftrace 705 14.1 Capabilities Overview 706 14.2 tracefs (/sys) 708 14.3 Ftrace Function Profiler 711 14.4 Ftrace Function Tracing 713 14.5 Tracepoints 717 14.6 kprobes 719 14.7 uprobes 722 14.8 Ftrace function_graph 724 14.9 Ftrace hwlat 726 14.10 Ftrace Hist Triggers 727 14.11 trace-cmd 734 14.12 perf ftrace 741 14.13 perf-tools 741 14.14 Ftrace Documentation 748 14.15 References 749 Chapter 15: BPF 751 15.1 BCC 753 15.2 bpftrace 761 15.3 References 782 Chapter 16: Case Study 783 16.1 An Unexplained Win 783 16.2 Additional Information 792 16.3 References 793 Appendix A: USE Method: Linux 795Appendix B: sar Summary 801Appendix C: bpftrace One-Liners 803Appendix D: Solutions to Selected Exercises 809Appendix E: Systems Performance Who's Who 811 Glossary 815Index 825
£43.19
Simon & Schuster In the Plex
Book SynopsisDelivers the inside story behind Google, the most successful and admired technology company of our time, now updated with a new Afterword.
£14.24
Pearson Education Limited Modern Operating Systems Global Edition
Book SynopsisAbout our authors Andrew S. Tanenbaum has an S.B. degree from M.I.T. and a Ph.D. from the University of California at Berkeley. He is currently a Professor Emeritus of Computer Science at the Vrije Universiteit in Amsterdam, The Netherlands. He was formerly Dean of the Advanced School for Computing and Imaging, an interuniversity graduate school doing research on advanced parallel, distributed, and imaging systems. He was also an Academy Professor of the Royal Netherlands Academy of Arts and Sciences, which has saved him from turning into a bureaucrat. He also won a prestigious European Research Council Advanced Grant. In the past, he has done research on compilers, operating systems, networking, local-area distributed systems and distributed systems. This research has led to over 200 refereed publications in journals and conferences. Prof. Tanenbaum has also authored or co-authored 5 books, which have been translated into over 20 languages, ranging Table of Contents Introduction Processes and Threads Memory Management File Systems Input/Ouput Deadlocks Virtualization and the Cloud Multiple Processor Systems Security Case Study 1: Unix, Linux, and Android Case Study 2: Windows 11 Operating System Design Reading List and Bibliography
£77.89
Pearson Education (US) The AWK Programming Language
Book SynopsisAlfred V. Aho is Lawrence Gussman Professor Emeritus of Computer Science at Columbia University, and former department chair. Well known for his work on algorithms, data structures, programming languages, compilers, and the foundations of computer science, he has received the ACM A. M. Turing Award and the IEEE John von Neumann Medal. Brian W. Kernighan was a member of the Computing Science Research Center at Bell Labs and is currently a professor in the Computer Science department at Princeton. He is the co-creator of several programming languages and the co-author of numerous books, including the computing classic, The C Programming Language. Peter J. Weinberger, currently at Google, has served as chief technology officer at Renaissance Technologies and as leader of computer science research at Bell Labs. He is a Fellow of the AAAS.Table of ContentsPreface ix Chapter 1: An Awk Tutorial 11.1 Getting Started 11.2 Simple Output 41.3 Formatted Output 71.4 Selection 81.5 Computing with Awk 101.6 Control-Flow Statements 131.7 Arrays 161.8 Useful One-liners 171.9 What Next? 19 Chapter 2: Awk in Action 212.1 Personal Computation 212.2 Selection 232.3 Transformation 252.4 Summarization 272.5 Personal Databases 282.6 A Personal Library 312.7 Summary 34 Chapter 3: Exploratory Data Analysis 353.1 The Sinking of the Titanic 363.2 Beer Ratings 413.3 Grouping Data 433.4 Unicode Data 453.5 Basic Graphs and Charts 473.6 Summary 49 Chapter 4: Data Processing 514.1 Data Transformation and Reduction 514.2 Data Validation 574.3 Bundle and Unbundle 594.4 Multiline Records 604.5 Summary 66 Chapter 5: Reports and Databases 675.1 Generating Reports 675.2 Packaged Queries and Reports 735.3 A Relational Database System 755.4 Summary 83 Chapter 6: Processing Words 856.1 Random Text Generation 856.2 Interactive Text-Manipulation 906.3 Text Processing 926.4 Making an Index 996.5 Summary 105 Chapter 7: Little Languages 1077.1 An Assembler and Interpreter 1087.2 A Language for Drawing Graphs 1117.3 A Sort Generator 1137.4 A Reverse-Polish Calculator 1157.5 A Different Approach 1177.6 A Recursive-Descent Parser for Arithmetic Expressions 1197.7 A Recursive-Descent Parser for a Subset of Awk 1227.8 Summary 126 Chapter 8: Experiments with Algorithms 1298.1 Sorting 1298.2 Profiling 1428.3 Topological Sorting 1448.4 Make: A File Updating Program 1488.5 Summary 153 Chapter 9: Epilogue 1559.1 Awk as a Language 1559.2 Performance 1579.3 Conclusion 160 Appendix A: Awk Reference Manual 163A.1 Patterns 165A.2 Actions 176A.3 User-Defined Functions 196A.4 Output 197A.5 Input 202A.6 Interaction with Other Programs 207A.7 Summary 208 Index 209
£28.79
Penguin Putnam Inc UNIX and Linux System Administration Handbook
Book SynopsisEvi Nemeth pioneered the discipline of UNIX system administration. She taught and mentored computer science students at the University of Colorado Boulder, was visiting faculty member at Dartmouth College and UC San Diego, and helped bring Internet technology to the developing world through her work with the Internet Society and the United Nations. Garth Snyder has worked at NeXT and Sun and holds a BS in Engineering from Swarthmore College and an MD and an MBA from the University of Rochester. Trent R. Hein (@trenthein) is a serial entrepreneur who is passionate about practical cybersecurity and automation. Outside of technology, he loves hiking, skiing, fly fishing, camping, bluegrass, dogs, and the Oxford comma. Trent holds a BS in Computer Science from the University of Colorado. Ben Whaley is the founder of WhaleTech, an independent consultancy. He was honored by Amazon as one of the first
£51.29
O'Reilly Media The Site Reliability Workbook
Book SynopsisGoogle’s Site Reliability Engineering book ignited an industry discussion on what it means to run production services today. Now, Google engineers who worked on that bestseller introduce The Site Reliability Workbook, a hands-on companion that uses concrete examples to show you how to put SRE principles and practices to work in your environment.
£35.99
Pearson Education Limited Operating Systems Internals and Design Principles
Book SynopsisTable of ContentsOnline Chapters and Appendices VideoNotes Preface About the Author I. Background 1. Computer System Overview 1.1. Basic Elements 1.2. Evolution of the Microprocessor 1.3. Instruction Execution 1.4. Interrupts 1.5. The Memory Hierarchy 1.6. Cache Memory 1.7. Direct Memory Access 1.8. Multiprocessor and Multicore Organization 1.9. Key Terms, Review Questions, and Problems 1A. Performance Characteristics of Two-Level Memories 2. Operating System Overview 2.1. Operating System Objectives and Functions 2.2. The Evolution of Operating Systems 2.3. Major Achievements 2.4. Developments Leading to Modern Operating Systems 2.5. Fault Tolerance 2.6. Os Design Considerations for Multiprocessor and Multicore 2.7. Microsoft Windows Overview 2.8. Traditional Unix Systems 2.9. Modern Unix Systems 2.10. Linux 2.11. Android 2.12. Key Terms, Review Questions, and Problems II. Processes 3. Process Description and Control 3.1. What is a Process? 3.2. Process States 3.3. Process Description 3.4. Process Control 3.5. Execution of the Operating System 3.6. Unix Svr4 Process Management 3.7. Summary 3.8. Key Terms, Review Questions, and Problems 4. Threads 4.1. Processes and Threads 4.2. Types of Threads 4.3. Multicore and Multithreading 4.4. Windows Process and Thread Management 4.5. Solaris Thread and Smp Management 4.6. Linux Process and Thread Management 4.7. Android Process and Thread Management 4.8. Mac OS X Grand Central Dispatch 4.9. Summary 4.10. Key Terms, Review Questions, and Problems 5. Concurrency: Mutual Exclusion and Synchronization 5.1. Mutual Exclusion: Software Approaches 5.2. Principles of Concurrency 5.3. Mutual Exclusion: Hardware Support 5.4. Semaphores 5.5. Monitors 5.6. Message Passing 5.7. Readers/Writers Problem 5.8. Summary 5.9. Key Terms, Review Questions, and Problems 6. Concurrency: Deadlock and Starvation 6.1. Principles of Deadlock 6.2. Deadlock Prevention 6.3. Deadlock Avoidance 6.4. Deadlock Detection 6.5. An Integrated Deadlock Strategy 6.6. Dining Philosophers Problem 6.7. Unix Concurrency Mechanisms 6.8. Linux Kernel Concurrency Mechanisms 6.9. Solaris Thread Synchronization Primitives 6.10. Windows Concurrency Mechanisms 6.11. Android Interprocess Communication 6.12. Summary 6.13. Key Terms, Review Questions, and Problems III. Memory 7. Memory Management 7.1. Memory Management Requirements 7.2. Memory Partitioning 7.3. Paging 7.4. Segmentation 7.5. Summary 7.6. Key Terms, Review Questions, and Problems 7A. Loading and Linking 8. Virtual Memory 8.1. Hardware and Control Structures 8.2. Operating System Software 8.3. Unix and Solaris Memory Management 8.4. Linux Memory Management 8.5. Windows Memory Management 8.6. Android Memory Management 8.7. Summary 8.8. Key Terms, Review Questions, and Problems IV. Scheduling 9. Uniprocessor Scheduling 9.1. Types of Processor Scheduling 9.2. Scheduling Algorithms 9.3. Traditional Unix Scheduling 9.4. Summary 9.5. Key Terms, Review Questions, and Problems <
£72.09
O'Reilly Media Certified Kubernetes Administrator CKA Study
Book SynopsisThis study guide walks you through all the topics covered to fully prepare you for the Certified Kubernetes Administrator (CKA) certification exam.
£39.74
Syngress Media,U.S. Deploying Secure Containers for Training and
Book SynopsisTable of ContentsIntroduction Chapter 1- Containers Chapter 2- Using containers in Training Chapter 3- Experimentation
£26.59
Pearson Education (US) Practical Guide to Linux Commands Editors and
Book Synopsis Mark G. Sobell has forty years of experience working with UNIX and Linux systems and is the author of many best-selling books, including A Practical Guide to Fedora and Red Hat Enterprise Linux, Seventh Edition, and A Practical Guide to Ubuntu Linux, Fourth Edition. Matthew Helmke got his first computer in 1981, a TRS-80 Color Computer. He started using UNIX in 1987 while studying LISP. He works as a technical writer and has written about Linux and other topics for magazines and a diverse set of companies. He is the author of several books, including Ubuntu Unleashed, The Official Ubuntu Book, and VMware Cookbook. Trade Review Praise for Previous Editions of A Practical Guide to Linux® Commands, Editors, and Shell Programming “This book is a very useful tool for anyone who wants to ‘look under the hood’ so to speak, and really start putting the power of Linux to work. What I find particularly frustrating about man pages is that they never include examples. Sobell, on the other hand, outlines very clearly what the command does and then gives several common, easy-to-understand examples that make it a breeze to start shell programming on one’s own. As with Sobell’s other works, this is simple, straight-forward, and easy to read. It’s a great book and will stay on the shelf at easy arm’s reach for a long time.” –Ray Bartlett, Travel Writer “Overall I found this book to be quite excellent, and it has earned a spot on the very front of my bookshelf. It covers the real ‘guts’ of Linux– the command line and its utilities–and does so very well. Its strongest points are the outstanding use of examples, and the Command Reference section. Highly recommended for Linux users of all skill levels. Well done to Mark Sobell and Prentice Hall for this outstanding book!” –Dan Clough, Electronics Engineer and Slackware Linux User “Totally unlike most Linux books, this book avoids discussing everything via GUI and jumps right into making the power of the command line your friend.” –Bjorn Tipling, Software Engineer, ask.com “This book is the best distro-agnostic, foundational Linux reference I’ve ever seen, out of dozens of Linux-related books I’ve read. Finding this book was a real stroke of luck. If you want to really understand how to get things done at the command line, where the power and flexibility of free UNIX-like OSes really live, this book is among the best tools you’ll find toward that end.” –Chad Perrin, Writer, TechRepublic “I moved to Linux from Windows XP a couple of years ago, and after some distro hopping settled on Linux Mint. At age 69 I thought I might be biting off more than I could chew, but thanks to much reading and the help of a local LUG I am now quite at home with Linux at the GUI level. “Now I want to learn more about the CLI and a few months ago bought your book: A Practical Guide to Linux® Commands, Editors, and Shell Programming, Second Edition. “For me, this book is proving to be the foundation upon which my understanding of the CLI is being built. As a comparative ‘newbie’ to the Linux world, I find your book a wonderful, easy-to-follow guide that I highly recommend to other Linux users.” –John Nawell, CQLUG (Central Queensland Linux User Group) “I have the second edition of A Practical Guide to Linux® Commands, Editors, and Shell Programming and am a big fan. I used it while working as a Cisco support engineer. I plan to get the third edition as soon as it is released. We will be doing a ton of command-line work on literally 1000 boxes (IMS core nodes). I feel you have already given me a lot of tools with the second edition. I want to get your new book as soon as possible. The way you write works very well for my style of learning.” –Robert Lingenfelter, Support Engineer, VoIP/IMS Praise for Other Books by Mark G. Sobell “Since I’m in an educational environment, I found the content of Sobell’s book to be right on target and very helpful for anyone managing Linux in the enterprise. His style of writing is very clear. He builds up to the chapter exercises, which I find to be relevant to real-world scenarios a user or admin would encounter. An IT/IS student would find this book a valuable complement to their education. The vast amount of information is extremely well balanced and Sobell manages to present the content without complicated asides and meandering prose. This is a ‘must have’ for anyone managing Linux systems in a networked environment or anyone running a Linux server. I would also highly recommend it to an experienced computer user who is moving to the Linux platform.” –Mary Norbury, IT Director, Barbara Davis Center, University of Colorado at Denver, from a review posted on slashdot.org “I had the chance to use your UNIX books when I when was in college years ago at Cal Poly, San Luis Obispo, CA. I have to say that your books are among the best! They’re quality books that teach the theoretical aspects and applications of the operating system.” –Benton Chan, IS Engineer “The book has more than lived up to my expectations from the many reviews I read, even though it targets FC2. I have found something very rare with your book: It doesn’t read like the standard technical text, it reads more like a story. It’s a pleasure to read and hard to put down. Did I say that?! :-)” –David Hopkins, Business Process Architect “Thanks for your work and for the book you wrote. There are really few books that can help people to become more efficient administrators of different workstations. We hope (in Russia) that you will continue bringing us a new level of understanding of Linux/UNIX systems.” –Anton Petukhov “Mark Sobell has written a book as approachable as it is authoritative.” –Jeffrey Bianchine, Advocate, Author, Journalist “Excellent reference book, well suited for the sysadmin of a Linux cluster, or the owner of a PC contemplating installing a recent stable Linux. Don’t be put off by the daunting heft of the book. Sobell has striven to be as inclusive as possible, in trying to anticipate your system administration needs.” –Wes Boudville, Inventor “A Practical Guide to Red Hat® Linux® is a brilliant book. Thank you, Mark Sobell.” –C. Pozrikidis, University of California at San Diego “This book presents the best overview of the Linux operating system that I have found. . . . [It] should be very helpful and understandable no matter what the reader’s background: traditional UNIX user, new Linux devotee, or even Windows user. Each topic is presented in a clear, complete fashion and very few assumptions are made about what the reader knows. . . . The book is extremely useful as a reference, as it contains a 70-page glossary of terms and is very well indexed. It is organized in such a way that the reader can focus on simple tasks without having to wade through more advanced topics until they are ready.” –Cam Marshall, Marshall Information Service LLC, Member of Front Range UNIX Users Group [FRUUG], Boulder, Colorado “Conclusively, this is THE book to get if you are a new Linux user and you just got into RH/Fedora world. There’s no other book that discusses so many different topics and in such depth.” –Eugenia Loli-Queru, Editor in Chief, OSNews.com “I currently own one of your books, A Practical Guide to Linux®. I believe this book is one of the most comprehensive and, as the title says, practical guides to Linux I have ever read. I consider myself a novice and I come back to this book over and over again.” –Albert J. Nguyen “Thank you for writing a book to help me get away from Windows XP and to never touch Windows Vista. The book is great; I am learning a lot of new concepts and commands. Linux is definitely getting easier to use.” –James Moritz “I am so impressed by how Mark Sobell can approach a complex topic in such an understandable manner. His command examples are especially useful in providing a novice (or even an advanced) administrator with a cookbook on how to accomplish real-world tasks on Linux. He is truly an inspired technical writer!” –George Vish II, Senior Education Consultant, Hewlett-Packard Company “Overall, I think it’s a great, comprehensive Ubuntu book that’ll be a valuable resource for people of all technical levels.” –John Dong, Ubuntu Forum Council Member, Backports Team Leader “The JumpStart sections really offer a quick way to get things up and running, allowing you to dig into the details of the book later.” –Scott Mann, Aztek Networks “I would so love to be able to use this book to teach a class about not just Ubuntu or Linux but about computers in general. It is thorough and well written with good illustrations that explain important concepts for computer usage.” –Nathan Eckenrode, New York Local Community Team “Ubuntu is gaining popularity at the rate alcohol did during Prohibition, and it’s great to see a well-known author write a book on the latest and greatest version. Not only does it contain Ubuntu-specific information, but it also touches on general computer-related topics, which will help the average computer user to better understand what’s going on in the background. Great work, Mark!” –Daniel R. Arfsten, Pro/ENGINEER Drafter/Designer “I read a lot of Linux technical information every day, but I’m rarely impressed by tech books. I usually prefer online information sources instead. Mark Sobell’s books are a notable exception. They’re clearly written, technically accurate, comprehensive, and actually enjoyable to read.” –Matthew Miller, Senior Systems Analyst/Administrator, BU Linux Project, Boston University Office of Information Technology “This is well-written, clear, comprehensive information for the Linux user of any type, whether trying Ubuntu on for the first time and wanting to know a little about it, or using the book as a very good reference when doing something more complicated like setting up a server. This book’s value goes well beyond its purchase price and it’ll make a great addition to the Linux section of your bookshelf.” –Linc Fessenden, Host of The LinuxLink TechShow, tllts.org “The author has done a very good job at clarifying such a detail-oriented operating system. I have extensive Unix and Windows experience and this text does an excellent job at bridging the gaps between Linux, Windows, and Unix. I highly recommend this book to both ‘newbs’ and experienced users. Great job!” –Mark Polczynski, Information Technology Consultant “Your text, A Practical Guide to Ubuntu Linux®, Third Edition, is a well constructed, informative, superbly written text. You deserve an award for outstanding talent; unfortunately my name is not Pulitzer.” –Harrison Donnelly, Physician “When I first started working with Linux just a short ten years or so ago, it was a little more difficult than now to get going. . . . Now, someone new to the community has a vast array of resources available on the web, or if they are inclined to begin with Ubuntu, they can literally find almost every single thing they will need in the single volume of Mark Sobell’s A Practical Guide to Ubuntu Linux®. “I’m sure this sounds a bit like hyperbole. Everything a person would need to know? Obviously not everything, but this book, weighing in at just under 1200 pages, covers so much so thoroughly that there won’t be much left out. From install to admin, networking, security, shell scripting, package management, and a host of other topics, it is all there. GUI and command-line tools are covered. There is not really any wasted space or fluff, just a huge amount of information. There are screen shots when appropriate but they do not take up an inordinate amount of space. This book is information-dense.” –JR Peck, Editor, GeekBook.org “I have been wanting to make the jump to Linux but did not have the guts to do so–until I saw your familiarly titled A Practical Guide to Red Hat® Linux® at the bookstore. I picked up a copy and am eagerly looking forward to regaining my freedom.” –Carmine Stoffo, Machine and Process Designer to pharmaceutical industry “I am currently reading A Practical Guide to Red Hat® Linux® and am finally understanding the true power of the command line. I am new to Linux and your book is a treasure.” –Juan Gonzalez “Overall, A Practical Guide to Ubuntu Linux® by Mark G. Sobell provides all of the information a beginner to intermediate user of Linux would need to be productive. The inclusion of the Live DVD of the Gutsy Gibbon release of Ubuntu makes it easy for the user to test-drive Linux without affecting his installed OS. I have no doubts that you will consider this book money well spent.” –Ray Lodato, Slashdot contributor, www.slashdot.orgTable of Contents Preface 1: Welcome to Linux and Mac OS X Part I: The Linux and Mac OS X Operating Systems 2: Getting Started 3: The Utilities 4: The Filesystem 5: The Shell Part II: The Editors 6: The vim Editor 7: The emacs Editor Part III: The Shells 8: The Bourne Again Shell (bash) 9: The TC Shell (tcsh) Part IV: Programming Tools 10: Programming the Bourne Again Shell (bash) 11: The Perl Scripting Language 12: The Python Programming Language 13: The MySQL Database Management System 14: The AWK Pattern Processing Language 15: The sed Editor Part V: Secure Network Utilities 16: The rsync Secure Copy Utility 17: The OpenSSH Secure Communication Utilities Part VI: Command Reference Utilities That Display and Manipulate Files Network Utilities Utilities That Display and Alter Status Utilities That Are Programming Tools Miscellaneous Utilities Standard Multiplicative Suffixes Common Options The Sample Utility Part VII: Appendices Appendix A: Regular Expressions Appendix B: Help Appendix C: Keeping the System Up-to-Date Appendix D: Mac OS X Notes Glossary File Tree Index Utility Index Main Index
£40.04
Pearson Education (US) macOS Support Essentials 12 Apple Pro Training
Book SynopsisTable of ContentsInstallation and Configuration Lesson 1 Introduction to macOS Lesson 2 Update, Upgrade, or Reinstall macOS Lesson 3 Set Up and Configure macOS Lesson 4 Use the Command-Line Interface Lesson 5 Use macOS Recovery Lesson 6 Update macOS User Accounts Lesson 7 Manage User Accounts Lesson 8 Manage User Home Folders Lesson 9 Manage Security and Privacy Lesson 10 Manage Password Changes File Systems Lesson 11 Manage File Systems and Storage Lesson 12 Manage FileVault Lesson 13 Manage Permissions and Sharing Lesson 14 Use Hidden Items, Shortcuts, and File Archives Data Management Lesson 15 Manage System Resources Lesson 16 Use Metadata, Siri, and Spotlight Lesson 17 Manage Time Machine Apps and Processes Lesson 18 Install Apps Lesson 19 Manage Files Lesson 20 Manage and Troubleshoot Apps Network Configuration Lesson 21 Manage Basic Network Settings Lesson 22 Manage Advanced Network Settings Lesson 23 Troubleshoot Network Issues Network Services Lesson 24 Manage Network Services Lesson 25 Manage Host Sharing and Personal Firewall System Management Lesson 26 Troubleshoot Peripherals Lesson 27 Manage Printers and Scanners Lesson 28 Troubleshoot Startup and System Issues
£49.39
Pearson Education Limited Brilliant OS X Mountain Lion
Book Synopsis
£15.29
Pearson Education Limited Brilliant Windows 8
Book Synopsis
£16.19
Pearson Education (US) Practice of System and Network Administration The
Book SynopsisThomas A. Limoncelli is an internationally recognized author, speaker, and system administrator with more than twenty years of experience at companies like Google, Bell Labs, and StackOverflow.com. Christina J. Hogan has more than twenty years of experience in system administration and network engineering, from Silicon Valley to Italy and Switzerland. She has a master's degree in computer science, a doctorate in aeronautical engineering, and has been part of a Formula 1 racing team. Strata R. Chalup has more than twenty-five years of experience in Silicon Valley, focusing on IT strategy, best-practices, and scalable infrastructures at firms that include Apple, Sun, Cisco, McAfee, and Palm.Table of ContentsPreface xxxix Acknowledgments xlvii About the Authors li Part I: Game-Changing Strategies 1 Chapter 1: Climbing Out of the Hole 3 1.1 Organizing WIP 5 1.2 Eliminating Time Sinkholes 12 1.3 DevOps 16 1.4 DevOps Without Devs 16 1.5 Bottlenecks 18 1.6 Getting Started 20 1.7 Summary 21 Exercises 22 Chapter 2: The Small Batches Principle 23 2.1 The Carpenter Analogy 23 2.2 Fixing Hell Month 24 2.3 Improving Emergency Failovers 26 2.4 Launching Early and Often 29 2.5 Summary 34 Exercises 34 Chapter 3: Pets and Cattle 37 3.1 The Pets and Cattle Analogy 37 3.2 Scaling 39 3.3 Desktops as Cattle 40 3.4 Server Hardware as Cattle 41 3.5 Pets Store State 43 3.6 Isolating State 44 3.7 Generic Processes 47 3.8 Moving Variations to the End 51 3.9 Automation 53 3.10 Summary 53 Exercises 54 Chapter 4: Infrastructure as Code 55 4.1 Programmable Infrastructure 56 4.2 Tracking Changes 57 4.3 Benefits of Infrastructure as Code 59 4.4 Principles of Infrastructure as Code 62 4.5 Configuration Management Tools 63 4.6 Example Infrastructure as Code Systems 67 4.7 Bringing Infrastructure as Code to Your Organization 71 4.8 Infrastructure as Code for Enhanced Collaboration 72 4.9 Downsides to Infrastructure as Code 73 4.10 Automation Myths 74 4.11 Summary 75 Exercises 76 Part II: Workstation Fleet Management 77 Chapter 5: Workstation Architecture 79 5.1 Fungibility 80 5.2 Hardware 82 5.3 Operating System 82 5.4 Network Configuration 84 5.5 Accounts and Authorization 86 5.6 Data Storage 89 5.7 OS Updates 93 5.8 Security 94 5.9 Logging 97 5.10 Summary 98 Exercises 99 Chapter 6: Workstation Hardware Strategies 101 6.1 Physical Workstations 101 6.2 Virtual Desktop Infrastructure 105 6.3 Bring Your Own Device 110 6.4 Summary 113 Exercises 114 Chapter 7: Workstation Software Life Cycle 117 7.1 Life of a Machine 117 7.2 OS Installation 120 7.3 OS Configuration 120 7.4 Updating the System Software and Applications 123 7.5 Rolling Out Changes . . . Carefully 128 7.6 Disposal 130 7.7 Summary 134 Exercises 135 Chapter 8: OS Installation Strategies 137 8.1 Consistency Is More Important Than Perfection 138 8.2 Installation Strategies 142 8.3 Test-Driven Configuration Development 147 8.4 Automating in Steps 148 8.5 When Not to Automate 152 8.6 Vendor Support of OS Installation 152 8.7 Should You Trust the Vendor's Installation? 154 8.8 Summary 154 Exercises 155 Chapter 9: Workstation Service Definition 157 9.1 Basic Service Definition 157 9.2 Refresh Cycles 161 9.3 Tiered Support Levels 165 9.4 Workstations as a Managed Service 168 9.5 Summary 170 Exercises 171 Chapter 10: Workstation Fleet Logistics 173 10.1 What Employees See 173 10.2 What Employees Don't See 174 10.3 Configuration Management Database 183 10.4 Small-Scale Fleet Logistics 186 10.5 Summary 188 Exercises 188 Chapter 11: Workstation Standardization 191 11.1 Involving Customers Early 192 11.2 Releasing Early and Iterating 193 11.3 Having a Transition Interval (Overlap) 193 11.4 Ratcheting 194 11.5 Setting a Cut-Off Date 195 11.6 Adapting for Your Corporate Culture 195 11.7 Leveraging the Path of Least Resistance 196 11.8 Summary 198 Exercises 199 Chapter 12: Onboarding 201 12.1 Making a Good First Impression 201 12.2 IT Responsibilities 203 12.3 Five Keys to Successful Onboarding 203 12.4 Cadence Changes 212 12.5 Case Studies 212 12.6 Summary 216 Exercises 217 Part III: Servers 219 Chapter 13: Server Hardware Strategies 221 13.1 All Eggs in One Basket 222 13.2 Beautiful Snowflakes 224 13.3 Buy in Bulk, Allocate Fractions 228 13.4 Grid Computing 235 13.5 Blade Servers 237 13.6 Cloud-Based Compute Services 238 13.7 Server Appliances 241 13.8 Hybrid Strategies 242 13.9 Summary 243 Exercises 244 Chapter 14: Server Hardware Features 245 14.1 Workstations Versus Servers 246 14.2 Server Reliability 249 14.3 Remotely Managing Servers 254 14.4 Separate Administrative Networks 257 14.5 Maintenance Contracts and Spare Parts 258 14.6 Selecting Vendors with Server Experience 261 14.7 Summary 263 Exercises 263 Chapter 15: Server Hardware Specifications 265 15.1 Models and Product Lines 266 15.2 Server Hardware Details 266 15.3 Things to Leave Out 278 15.4 Summary 278 Exercises 279 Part IV: Services 281 Chapter 16: Service Requirements 283 16.1 Services Make the Environment 284 16.2 Starting with a Kick-Off Meeting 285 16.3 Gathering Written Requirements 286 16.4 Customer Requirements 288 16.5 Scope, Schedule, and Resources 291 16.6 Operational Requirements 292 16.7 Open Architecture 298 16.8 Summary 302 Exercises 303 Chapter 17: Service Planning and Engineering 305 17.1 General Engineering Basics 306 17.2 Simplicity 307 17.3 Vendor-Certified Designs 308 17.4 Dependency Engineering 309 17.5 Decoupling Hostname from Service Name 313 17.6 Support 315 17.7 Summary 319 Exercises 319 Chapter 18: Service Resiliency and Performance Patterns 321 18.1 Redundancy Design Patterns 322 18.2 Performance and Scaling 326 18.3 Summary 333 Exercises 334 Chapter 19: Service Launch: Fundamentals 335 19.1 Planning for Problems 335 19.2 The Six-Step Launch Process 336 19.3 Launch Readiness Review 345 19.4 Launch Calendar 348 19.5 Common Launch Problems 349 19.6 Summary 351 Exercises 351 Chapter 20: Service Launch: DevOps 353 20.1 Continuous Integration and Deployment 354 20.2 Minimum Viable Product 357 20.3 Rapid Release with Packaged Software 359 20.4 Cloning the Production Environment 362 20.5 Example: DNS/DHCP Infrastructure Software 363 20.6 Launch with Data Migration 366 20.7 Controlling Self-Updating Software 369 20.8 Summary 370 Exercises 371 Chapter 21: Service Conversions 373 21.1 Minimizing Intrusiveness 374 21.2 Layers Versus Pillars 376 21.3 Vendor Support 377 21.4 Communication 378 21.5 Training 379 21.6 Gradual Roll-Outs 379 21.7 Flash-Cuts: Doing It All at Once 380 21.8 Backout Plan 383 21.9 Summary 385 Exercises 385 Chapter 22: Disaster Recovery and Data Integrity 387 22.1 Risk Analysis 388 22.2 Legal Obligations 389 22.3 Damage Limitation 390 22.4 Preparation 391 22.5 Data Integrity 392 22.6 Redundant Sites 393 22.7 Security Disasters 394 22.8 Media Relations 394 22.9 Summary 395 Exercises 395 Part V: Infrastructure 397 Chapter 23: Network Architecture 399 23.1 Physical Versus Logical 399 23.2 The OSI Model 400 23.3 Wired Office Networks 402 23.4 Wireless Office Networks 406 23.5 Datacenter Networks 408 23.6 WAN Strategies 413 23.7 Routing 419 23.8 Internet Access 420 23.9 Corporate Standards 422 23.10 Software-Defined Networks 425 23.11 IPv6 426 23.12 Summary 428 Exercises 429 Chapter 24: Network Operations 431 24.1 Monitoring 431 24.2 Management 432 24.3 Documentation 437 24.4 Support 440 24.5 Summary 446 Exercises 447 Chapter 25: Datacenters Overview 449 25.1 Build, Rent, or Outsource 450 25.2 Requirements 452 25.3 Summary 456 Exercises 457 Chapter 26: Running a Datacenter 459 26.1 Capacity Management 459 26.2 Life-Cycle Management 465 26.3 Patch Cables 468 26.4 Labeling 471 26.5 Console Access 475 26.6 Workbench 476 26.7 Tools and Supplies 477 26.8 Summary 480 Exercises 481 Part VI: Helpdesks and Support 483 Chapter 27: Customer Support 485 27.1 Having a Helpdesk 485 27.2 Offering a Friendly Face 488 27.3 Reflecting Corporate Culture 488 27.4 Having Enough Staff 488 27.5 Defining Scope of Support 490 27.6 Specifying How to Get Help 493 27.7 Defining Processes for Staff 493 27.8 Establishing an Escalation Process 494 27.9 Defining “Emergency” in Writing 495 27.10 Supplying Request-Tracking Software 496 27.11 Statistical Improvements 498 27.12 After-Hours and 24/7 Coverage 499 27.13 Better Advertising for the Helpdesk 500 27.14 Different Helpdesks for Different Needs 501 27.15 Summary 502 Exercises 503 Chapter 28: Handling an Incident Report 505 28.1 Process Overview 506 28.2 Phase A—Step 1: The Greeting 508 28.3 Phase B: Problem Identification 509 28.4 Phase C: Planning and Execution 515 28.5 Phase D: Verification 518 28.6 Perils of Skipping a Step 519 28.7 Optimizing Customer Care 521 28.8 Summary 525 Exercises 527 Chapter 29: Debugging 529 29.1 Understanding the Customer's Problem 529 29.2 Fixing the Cause, Not the Symptom 531 29.3 Being Systematic 532 29.4 Having the Right Tools 533 29.5 End-to-End Understanding of the System 538 29.6 Summary 540 Exercises 540 Chapter 30: Fixing Things Once 541 30.1 Story: The Misconfigured Servers 541 30.2 Avoiding Temporary Fixes 543 30.3 Learn from Carpenters 545 30.4 Automation 547 30.5 Summary 549 Exercises 550 Chapter 31: Documentation 551 31.1 What to Document 552 31.2 A Simple Template for Getting Started 553 31.3 Easy Sources for Documentation 554 31.4 The Power of Checklists 556 31.5 Wiki Systems 557 31.6 Findability 559 31.7 Roll-Out Issues 559 31.8 A Content-Management System 560 31.9 A Culture of Respect 561 31.10 Taxonomy and Structure 561 31.11 Additional Documentation Uses 562 31.12 Off-Site Links 562 31.13 Summary 563 Exercises 564 Part VII: Change Processes 565 Chapter 32: Change Management 567 32.1 Change Review Boards 568 32.2 Process Overview 570 32.3 Change Proposals 570 32.4 Change Classifications 571 32.5 Risk Discovery and Quantification 572 32.6 Technical Planning 573 32.7 Scheduling 574 32.8 Communication 576 32.9 Tiered Change Review Boards 578 32.10 Change Freezes 579 32.11 Team Change Management 581 32.12 Starting with Git 583 32.13 Summary 585 Exercises 585 Chapter 33: Server Upgrades 587 33.1 The Upgrade Process 587 33.2 Step 1: Develop a Service Checklist 588 33.3 Step 2: Verify Software Compatibility 591 33.4 Step 3: Develop Verification Tests 592 33.5 Step 4: Choose an Upgrade Strategy 595 33.6 Step 5: Write a Detailed Implementation Plan 598 33.7 Step 6: Write a Backout Plan 600 33.8 Step 7: Select a Maintenance Window 600 33.9 Step 8: Announce the Upgrade 602 33.10 Step 9: Execute the Tests 603 33.11 Step 10: Lock Out Customers 604 33.12 Step 11: Do the Upgrade with Someone 605 33.13 Step 12: Test Your Work 605 33.14 Step 13: If All Else Fails, Back Out 605 33.15 Step 14: Restore Access to Customers 606 33.16 Step 15: Communicate Completion/Backout 606 33.17 Summary 608 Exercises 610 Chapter 34: Maintenance Windows 611 34.1 Process Overview 612 34.2 Getting Management Buy-In 613 34.3 Scheduling Maintenance Windows 614 34.4 Planning Maintenance Tasks 615 34.5 Selecting a Flight Director 616 34.6 Managing Change Proposals 617 34.7 Developing the Master Plan 620 34.8 Disabling Access 621 34.9 Ensuring Mechanics and Coordination 622 34.10 Change Completion Deadlines 628 34.11 Comprehensive System Testing 628 34.12 Post-maintenance Communication 630 34.13 Reenabling Remote Access 631 34.14 Be Visible the Next Morning 631 34.15 Postmortem 631 34.16 Mentoring a New Flight Director 632 34.17 Trending of Historical Data 632 34.18 Providing Limited Availability 633 34.19 High-Availability Sites 634 34.20 Summary 636 Exercises 637 Chapter 35: Centralization Overview 639 35.1 Rationale for Reorganizing 640 35.2 Approaches and Hybrids 642 35.3 Summary 643 Exercises 644 Chapter 36: Centralization Recommendations 645 36.1 Architecture 645 36.2 Security 645 36.3 Infrastructure 648 36.4 Support 654 36.5 Purchasing 655 36.6 Lab Environments 656 36.7 Summary 656 Exercises 657 Chapter 37: Centralizing a Service 659 37.1 Understand the Current Solution 660 37.2 Make a Detailed Plan 661 37.3 Get Management Support 662 37.4 Fix the Problems 662 37.5 Provide an Excellent Service 663 37.6 Start Slowly 663 37.7 Look for Low-Hanging Fruit 664 37.8 When to Decentralize 665 37.9 Managing Decentralized Services 666 37.10 Summary 667 Exercises 668 Part VIII: Service Recommendations 669 Chapter 38: Service Monitoring 671 38.1 Types of Monitoring 672 38.2 Building a Monitoring System 673 38.3 Historical Monitoring 674 38.4 Real-Time Monitoring 676 38.5 Scaling 684 38.6 Centralization and Accessibility 685 38.7 Pervasive Monitoring 686 38.8 End-to-End Tests 687 38.9 Application Response Time Monitoring 688 38.10 Compliance Monitoring 689 38.11 Meta-monitoring 690 38.12 Summary 690 Exercises 691 Chapter 39: Namespaces 693 39.1 What Is a Namespace? 693 39.2 Basic Rules of Namespaces 694 39.3 Defining Names 694 39.4 Merging Namespaces 698 39.5 Life-Cycle Management 699 39.6 Reuse 700 39.7 Usage 701 39.8 Federated Identity 708 39.9 Summary 709 Exercises 710 Chapter 40: Nameservices 711 40.1 Nameservice Data 711 40.2 Reliability 714 40.3 Access Policy 721 40.4 Change Policies 723 40.5 Change Procedures 724 40.6 Centralized Management 726 40.7 Summary 728 Exercises 728 Chapter 41: Email Service 729 41.1 Privacy Policy 730 41.2 Namespaces 730 41.3 Reliability 731 41.4 Simplicity 733 41.5 Spam and Virus Blocking 735 41.6 Generality 736 41.7 Automation 737 41.8 Monitoring 738 41.9 Redundancy 738 41.10 Scaling 739 41.11 Security Issues 742 41.12 Encryption 743 41.13 Email Retention Policy 743 41.14 Communication 744 41.15 High-Volume List Processing 745 41.16 Summary 746 Exercises 747 Chapter 42: Print Service 749 42.1 Level of Centralization 750 42.2 Print Architecture Policy 751 42.3 Documentation 754 42.4 Monitoring 755 42.5 Environmental Issues 756 42.6 Shredding 757 42.7 Summary 758 Exercises 758 Chapter 43: Data Storage 759 43.1 Terminology 760 43.2 Managing Storage 765 43.3 Storage as a Service 772 43.4 Performance 780 43.5 Evaluating New Storage Solutions 784 43.6 Common Data Storage Problems 787 43.7 Summary 789 Exercises 790 Chapter 44: Backup and Restore 793 44.1 Getting Started 794 44.2 Reasons for Restores 795 44.3 Corporate Guidelines 799 44.4 A Data-Recovery SLA and Policy 800 44.5 The Backup Schedule 801 44.6 Time and Capacity Planning 807 44.7 Consumables Planning 809 44.8 Restore-Process Issues 815 44.9 Backup Automation 816 44.10 Centralization 819 44.11 Technology Changes 820 44.12 Summary 821 Exercises 822 Chapter 45: Software Repositories 825 45.1 Types of Repositories 826 45.2 Benefits of Repositories 827 45.3 Package Management Systems 829 45.4 Anatomy of a Package 829 45.5 Anatomy of a Repository 833 45.6 Managing a Repository 837 45.7 Repository Client 841 45.8 Build Environment 843 45.9 Repository Examples 845 45.10 Summary 848 Exercises 849 Chapter 46: Web Services 851 46.1 Simple Web Servers 852 46.2 Multiple Web Servers on One Host 853 46.3 Service Level Agreements 854 46.4 Monitoring 855 46.5 Scaling for Web Services 855 46.6 Web Service Security 859 46.7 Content Management 866 46.8 Summary 868 Exercises 869 Part IX: Management Practices 871 Chapter 47: Ethics 873 47.1 Informed Consent 873 47.2 Code of Ethics 875 47.3 Customer Usage Guidelines 875 47.4 Privileged-Access Code of Conduct 877 47.5 Copyright Adherence 878 47.6 Working with Law Enforcement 881 47.7 Setting Expectations on Privacy and Monitoring 885 47.8 Being Told to Do Something Illegal/Unethical 887 47.9 Observing Illegal Activity 888 47.10 Summary 889 Exercises 889 Chapter 48: Organizational Structures 891 48.1 Sizing 892 48.2 Funding Models 894 48.3 Management Chain's Influence 897 48.4 Skill Selection 898 48.5 Infrastructure Teams 900 48.6 Customer Support 902 48.7 Helpdesk 904 48.8 Outsourcing 904 48.9 Consultants and Contractors 906 48.10 Sample Organizational Structures 907 48.11 Summary 911 Exercises 911 Chapter 49: Perception and Visibility 913 49.1 Perception 913 49.2 Visibility 925 49.3 Summary 933 Exercises 934 Chapter 50: Time Management 935 50.1 Interruptions 935 50.2 Follow-Through 937 50.3 Basic To-Do List Management 938 50.4 Setting Goals 939 50.5 Handling Email Once 940 50.6 Precompiling Decisions 942
£66.80
Wiley Symbian OS Communications Programming 2 Symbian
Book SynopsisA developera s guide to the Symbian OS (Operating System) Communications Architecture. The Symbian OS Communications Architecture is the cornerstone of Symbian OS -- enabling the combination of voice communications, wireless Internet access and computing functionality.Trade Review"...clear and detailed...the supporting text is lucid and clear..." (www.wirelessdevnet.com, 5 July 2002) "…something useful for everyone…the writing is clear, and the structure makes it easy to learn…" (Forum Nokia, 6 March 12003) "…written in a clear and accessible manner…" (CVu, June 2003)Table of ContentsPreface. Foreword. Section 1: The Basics of Symbian OS Communication. Introduction. Introduction to the Symbian Communication Architecture. Several Introductions to the Architecture Infrastructure. Transport Technologies. Look at Content Technologies. Security and Communication. Section 2: Programming using Symbian OS Communication. Getting Started with Communications Programming. Serial Communications. Communicating via Infrared: Serial Communications. Using Sockets. Communicating via Infrared: Using Sockets. Communicating with TCP/IP. Bluetooth Communications. Telephony. Sending and Receiving Messages. Browsable Content Technologies. Section 3: Miscellaneous Topics. Synchronization: PLP and SyncML. The Communications Database. Looking Ahead. Appendix A Developer Resources and Bibliography. Index.
£27.74
John Wiley & Sons Inc Architecting Enterprise Solutions Patterns for
Book SynopsisBased on real--world problems and systems and illustrated with "war stories," this practical nuts--and--bolts guide to architectural solutions describes step--by--step how to design robustness and flexibility into a system. A running case study illustrates the evolution and iteration of the system as it grows in functionality and capability.Table of ContentsAcknowledgements. An All-Too-Common Story. Introduction. Part 1 Architecture, Patterns and Internet Technology. System Architecture. Internet Technology Systems. Architectural Patterns for Internet Technology Systems. The GlobalTech System. Part 2 The Patterns. Fundamental Patterns. System Performance Patterns. System Control Patterns. System Evolution Patterns. Part 3 Application of the Patterns. GlobalTech Revisited. Appplying the Patterns. Moving on from Here. Appendix Reference Patterns. Bibliography. Glossary.
£23.99
John Wiley & Sons Inc Information Systems 2E wURL A Comprehensive
Book SynopsisHave you been asked to perform an information systems audit and don't know where to start? Examine a company's hardware, software, and data organization and processing methods to ensure quality control and security with this easy, practical guide to auditing computer systems--the tools necessary to implement an effective IS audit.Table of ContentsPreface. Acknowledgments. PART ONE: CORE CONCEPTS. Chapter 1. Basics of Computing Systems. Chapter 2. Identifying Computer Systems. PART TWO: STANDARD INFORMATION SYSTEMS AUDIT APPROACH. Chapter 3. Information Systems Audit Program. Chapter 4. Information Systems Security Policies, Standards, and/or Guidelines. Chapter 5. Auditing Service Organization Applications. Chapter 6. Assessing the Financial Stability of Vendor Organizations, Examining Vendor Organization Contracts, and Examining Accounting Treatment of Computer Equipment and Software. Chapter 7. Physical Security. Chapter 8. Logical Security. Chapter 9. Information Systems Operations. PART THREE: CONTEMPORARY INFORMATION SYSTEMS AUDITING CONCEPTS. Chapter 10. Control Self-Assessment and an Application in an Information Systems Environment. Chapter 11. Encryption and Cryptography. Chapter 12. Computer Forensics. Chapter 13. Other Contemporary Information Systems Auditing Challenges. Chapter 14. Humanistic Aspects of Information Systems Auditing. Chapter 15. Information Systems Project Management Audits. Chapter 16. Conclusion. Appendix A: Professional Auditing Associations and Other Organizations Related to Information Systems Auditing and Computer Security. Appendix B: Common Criteria for Information Technology Security Evaluation. Appendix C: The International Organization for Standardization: Seven-Layer Open Systems Interconnection Reference Model. Selected References. Glossary. Index.
£112.50
John Wiley & Sons Inc Operating Systems In Depth
Book SynopsisThis book is designed for a one-semester operating-systems course for advanced undergraduates and beginning graduate students. Prerequisites for the course generally include an introductory course on computer architecture and an advanced programming course. The goal of this book is to bring together and explain current practice in operating systems. This includes much of what is traditionally covered in operating-system textbooks: concurrency, scheduling, linking and loading, storage management (both real and virtual), file systems, and security. However, the book also covers issues that come up every day in operating-systems design and implementation but are not often taught in undergraduate courses. For example, the text includes: Deferred work, which includes deferred and asynchronous procedure calls in Windows, tasklets in Linux, and interrupt threads in Solaris. The intricacies of thread switching, on both uniprocessor and multiprocessor sysTable of Contents1 Introduction. 1.1 Operating Systems. 1.2 A Brief History of Operating Systems. 1.3 A Simple OS. 1.4 Beyond a Simple OS. 1.5 Conclusions. 1.6 Exercises. 1.7 References. 2 Multithreaded Programming. 2.1 Why Threads? 2.2 Programming with Threads. 2.3 Conclusions. 2.4 Exercises. 2.5 References. 3 Basic Concepts. 3.1 Context Switching. 3.2 Input/Output Architectures. 3.3 Dynamic Storage Allocation. 3.4 Linking and Loading. 3.5 Booting. 3.6 Conclusions. 3.7 Exercises. 3.8 References. 4 Operating-System Design. 4.1 A Simple System. 4.2 Rethinking Operating-System Structure. 4.3 Conclusions. 4.4 Exercises. 4.5 References. 5 Processor Management. 5.1 Threads Implementations. 5.2 Interrupts. 5.3 Scheduling. 5.4 Conclusions. 5.5 Exercises. 5.6 References. 6 File Systems. 6.1 The Basics of File Systems. 6.2 Crash Resiliency. 6.3 Directories and Naming. 6.4 Multiple Disks. 6.5 Flash Memory. 6.6 Case Studies. 6.7 Conclusions. 6.8 Exercises. 6.9 References. 7 Memory Management. 7.1 Memory Management in the Early Days. 7.2 Hardware Support for Virtual Memory. 7.3 Operating-System Issues. 7.4 Conclusions. 7.5 Exercises. 7.6 References. 8 Security. 8.1 Security Goals. 8.2 Security Architectures. 8.3 Conclusions. 8.4 Exercises. 8.5 References. 9 Introduction to Networking. 9.1 Network Basics. 9.2 Remote Procedure Call Protocols. 9.3 Conclusions. 9.4 Exercises. 9.5 References. 10 Distributed File Systems. 10.1 The Basics. 10.2 NFS Version 2. 10.3 Common Internet File System (CIFS). 10.4 DFS. 10.5 NFS Version 4. 10.6 Conclusions. 10.7 Exercises. 10.8 References. Appendix URL Index. Glossary. Index.
£153.85
Cambridge University Press Compiling with Continuations
Book SynopsisThis book shows how continuation-passing style is used as an intermediate representation on which to perform optimisations and program transformations. It will be essential reading for compiler writers in both industry and academe, as well as for students and researchers in programming language theory.Trade Review"I recommend the book to language designers and implementors specializing in the functional paradigm." F.G. Pagan, Computing ReviewsTable of ContentsAcknowledgements; 1. Overview; 2. Continuation-passing style; 3. Semantics of the CPS; 4. ML-specific optimizations; 5. Conversion into CPS; 6. Optimization of the CPS; 7. Beta expansion; 8. Hoisting; 9. Common subexpressions; 10. Closure conversion; 11. Register spilling; 12. Space complexity; 13. The abstract machine; 14. Machine-code generation; 15. Performance evaluation; 16. The runtime system; 17. Parallel programming; 18. Future directions; Appendices; Bibliography; Index.
£75.99
O'Reilly Media sed awk Pocket Reference
Book SynopsisThis is a reference guide to the information presented in the larger volumes. It presents a concise summary of regular expressions and pattern matching, and summaries of Sed and Awk.Table of ContentsConventions used in this book; matching text; filenames versus patterns; metacharacters; metacharacters, listed by Unix program; examples of searching; the Sed editor; command-line syntax; syntax of Sed commands; group summary of Sed commands; alphabetical summary of Sed commands; the Awk programming language; command-line syntax; important Gawk options; profiling with PGAwk; patterns and procedures; built-in variables; operators variable and array assignment; octal and hexadecimal constants in GAwk; user-defined functions; group listing of Awk functions and commands; coprocesses and sockets with GAwk; implementation limits; alphabetical summary of Awk functions and commands; internationalization with GAwk; additional resources; source code books.
£14.39
John Wiley & Sons Inc DNS for Dummies
Book SynopsisAn entry level guide to Domain Name System (DNS), which translates Internet host names into IP addresses and is used with Internet servers. This book helps beginning systems administrators learn how to install, configure, and troubleshoot DNS on both Windows and UNIX servers.Table of ContentsIntroduction. Part I: How DNS Makes the Internet Go ’Round. Chapter 1: The Basics of DNS. Chapter 2: DNS Namespaces. Chapter 3: The DNS Request Process. Chapter 4: Facilitating Other Applications with DNS. Part II: Working with DNS Clients. Chapter 5: Configuring a DNS Client. Chapter 6: Using the DNS Clients on Your System. Part III: Working with DNS Servers. Chapter 7: Installing a Microsoft DNS Server. Chapter 8: Unix Domain Name Servers. Part IV: The Details: Setting Up Your DNS Zones. Chapter 9: The Basics: Zones and Records. Chapter 10: Using Subdomains. Part V: Security and Advanced DNS Tricks. Chapter 11: An Antidote for a Poisoned Cache: DNS Security. Chapter 12: What Else Can DNS Do? Chapter 13: “It Doesn’t Work!” (Troubleshooting). Part VI: The Part of Tens. Chapter 14: Ten DNS Services and Resources. Chapter 15: Ten Things Even Experienced People Do to Make DNS Break. Chapter 16: The Top Ten Tips for Maintaining a Manageable DNS Server. Chapter 17: The Top Ten DNS Server Design Considerations. Appendix A: Using the DNSCMD Utility. Appendix B: Using Webmin for BIND Administration. Appendix C: Other DNS Server Applications. Index.
£22.39
Mike Murach & Associates Inc. MVS TSO Concepts and ISPF Pt1
Book Synopsis
£35.19
Wood Islands Prints C and the 8051 4th Edition
£31.50
£51.04
Recursive Books Operating Systems Principles and Practice
£52.25
CRC Press Bootstrap
Book SynopsisIf you want to build websites, understanding Bootstrap will save you a lot of time and effort. Bootstrap is a user-friendly CSS framework that allows developers to create mobile-friendly and responsive websites. Bootstrap is the most widely used framework for creating mobile-first, responsive websites. It fixes a number of issues that we experienced previously, including cross-browser compatibility. Today, webpages are optimized for all browsers (Internet Explorer, Firefox, and Chrome, to name but a few) and screen sizes (desktop, tablets, phablets, and phones). Regardless of project size, Bootstrap provides a solid foundation for any website. It includes Reboot, which is based on Normalize.css and aids with the smoothing out of browser disparities for various page elements. Bootstrap also has fantastic typography. Checkboxes, radio buttons, choose choices, and other basic HTML form elements have been restyled to give them a more modern look.Bootstrap's scope extends b
£44.09
Taylor & Francis Ltd Raspberry Pi OS System Administration with
Book SynopsisThe second in a new series exploring the basics of Raspberry Pi Operating System administration, this installment builds on the insights provided in Volume 1 to provide a compendium of easy-to-use and essential Raspberry Pi OS system administration for the novice user, with specific focus on Python and Python3.The overriding idea behind system administration of a modern, 21st-century Linux system such as the Raspberry Pi OS is the use of systemd to ensure that the Linux kernel works efficiently and effectively to provide these three foundation stones of computer operation and management: computer system concurrency, virtualization, and secure persistence. Exercises are included throughout to reinforce the readers' learning goals with solutions and example code provided on the accompanying GitHub site.This book is aimed at students and practitioners looking to maximize their use of the Raspberry Pi OS. With plenty of practical examples, projects, and exercises, this volTable of ContentsSeries Preface. Volume 2 Preface. 0. "Quick Start" into Sysadmin for the Raspberry Pi OS. 1. Raspberry Pi OS System Administration Fundamentals. 2. Python3. Questions, Problems, and Projects. Index.
£42.74
Taylor & Francis Ltd Tiny Android Projects Using Kotlin
Book SynopsisIn today's fast-paced world, Android development is a rapidly evolving field that requires regular updates to keep up with the latest trends and technologies. Tiny Android Projects Using Kotlin is an excellent resource for developers who want to learn to build Android applications using the latest tools and frameworks.KEY FEATURES Teaches building Android apps using Kotlin, XML, and Jetpack Compose Includes saving data on the device using the Room database library Teaches communication between an Android device and data on the internet using REST API Shows how to create different Android menu navigations using Jetpack Compose Introduces the most architectures used in Android Projects and implements MVVM With Kotlin being the most preferred language for Android development, this book provides a practical, hands-on approach to learning the language and building high-quality Android apps using Kotlin, XML, and Table of ContentsChapter 1 ◾ Introduction and Getting StartedChapter 2 ◾ Basic XML Widgets in AndroidChapter 3 ◾ More on Android XML Views: Project 2 – Quiz App: Part 1Chapter 4 ◾ Intents in Android: Project 2 – Quiz App – Part 2Chapter 5 ◾ Android Fragments and ViewPager2Chapter 6 ◾ Networking in Android Using RetrofitChapter 7 ◾ Google Firebase Services: Project 5 – Tour Guide AppChapter 8 ◾ Android MVVM Architecture: Project 5 – Tour Guide Part 2Chapter 9 ◾ Basic Jetpack Compose ElementsChapter 10 ◾ More on Compose ElementsChapter 11 ◾ Room Database with Jetpack ComposeChapter 12 ◾ Menus and Navigation in Jetpack ComposeAPPENDIX
£42.74
CRC Press Propaganda
Book SynopsisThe book is a modern primer on propagandaâaspects like disinformation, trolls, bots, information influence, psychological operations, information operations, and information warfare. Propaganda: From Disinformation and Influence to Operations and Information Warfare offers a contemporary model for thinking about the subject.The first two decades of the 21st century have brought qualitative and quantitative technological and societal changes, and the subject of information influence needs to be re-ordered. Now is the time.The book explains the origins of the meaning and phenomenon of propagandaâwhere it came from and how it has changed over the centuries. The book also covers modern methods, including artificial intelligence (AI) and advertising technologies. Legal, political, diplomatic, and military considerations ensure that the material is covered in depth.The book is recommended for security and cybersecurity professionals (both technical and non-tech
£42.74
O'Reilly Media Learning Modern Linux
Book SynopsisIf you use Linux in development or operations and need a structured approach to help you dive deeper, this book is for you. Author Michael Hausenblas also provides tips and tricks for improving your workflow with this open source operating system.
£39.74
O'Reilly Media Ansible Up and Running
Book SynopsisWith this updated third edition, you'll quickly learn how to be productive with Ansible whether you're a developer deploying code or a system administrator looking for a better automation solution.
£39.74
O'Reilly Linux Pocket Guide
Book Synopsis
£20.39
John Wiley & Sons Inc Shell Scripting
Book SynopsisA compendium of shell scripting recipes that can immediately be used or adjusted The Shell is the primary way of communicating with Unix and Linux and provides a direct way to program the system by automating simple-to-intermediate tasks.Table of ContentsIntroduction xxix Part I: About the Ingredients Chapter 1: The History of Unix, Gnu, and Linux 3 Unix 3 “Everything is a File” and Pipelines 5 BSD 6 GNU 7 Linux 11 Summary 12 Chapter 2: Getting Started 15 Choosing an OS 15 GNU/Linux 15 The BSDs 17 Proprietary Unix 17 Microsoft Windows 17 Choosing an Editor 18 Graphical Text Editors 18 Terminal Emulation 21 Nongraphical Text Editors 22 Setting Up the Environment 24 The Shell Profile 24 Aliases 26 vim Settings 30 Summary 31 Chapter 3: Variables 33 Using Variables 33 Typing 34 Assigning Values to Variables 35 Positional Parameters 39 Return Codes 42 Unsetting Variables 45 Preset and Standard Variables 47 BASH_ENV 47 BASHOPTS 47 SHELLOPTS 48 BASH_COMMAND 50 BASH_SOURCE, FUNCNAME, LINENO, and BASH_LINENO 51 SHELL 55 HOSTNAME and HOSTTYPE 55 Working Directory 55 PIPESTATUS 55 TIMEFORMAT 56 PPID 57 RANDOM 58 REPLY 58 SECONDS 58 BASH_XTRACEFD 59 GLOBIGNORE 60 HOME 62 IFS 62 PATH 63 TMOUT 64 TMPDIR 65 User Identification Variables 65 Summary 66 Chapter 4: Wildcard Expansion 67 Filename Expansion (Globbing) 67 Bash Globbing Features 70 Shell Options 71 Regular Expressions and Quoting 75 Overview of Regular Expressions 76 Quoting 77 Summary 81 Chapter 5: Conditional Execution 83 If/Then 83 Else 85 elif 85 Test ([) 87 Flags for Test 88 File Comparison Tests 95 String Comparison Tests 96 Regular Expression Tests 98 Numerical Tests 101 Combining Tests 103 Case 105 Summary 109 Chapter 6: Flow Control Using Loops 111 For Loops 111 When to Use for Loops 112 Imaginative Ways of Feeding “for” with Data 112 C-Style for Loops 118 while Loops 119 When to Use while Loops 119 Ways to Use while Loops 119 Nested Loops 125 Breaking and Continuing Loop Execution 126 while with Case 130 until Loops 131 select Loops 133 Summary 137 Chapter 7: Variables Continued 139 Using Variables 139 Variable Types 141 Length of Variables 142 Special String Operators 144 Stripping Variable Strings by Length 144 Stripping from the End of the String 146 Stripping Strings with Patterns 147 Searching Strings 151 Using Search and Replace 151 Replacing Patterns 153 Deleting Patterns 153 Changing Case 153 Providing Default Values 153 Indirection 157 Sourcing Variables 158 Summary 159 Chapter 8: Functions and Libraries 161 Functions 161 Defining Functions 162 Function Output 162 Writing to a File 164 Redirecting the Output of an Entire Function 167 Functions with Trap 171 Recursive Functions 173 Variable Scope 177 Libraries 181 Creating and Accessing Libraries 183 Library Structures 183 Network Configuration Library 187 Use of Libraries 191 getopts 191 Handling Errors 194 getopts within Functions 195 Summary 197 Chapter 9: Arrays 199 Assigning Arrays 199 One at a Time 200 All at Once 200 By Index 201 All at Once from a Source 201 Read from Input 203 Accessing Arrays 205 Accessing by Index 205 Length of Arrays 206 Accessing by Variable Index 206 Selecting Items from an Array 209 Displaying the Entire Array 209 Associative Arrays 210 Manipulating Arrays 211 Copying an Array 211 Appending to an Array 213 Deleting from an Array 214 Advanced Techniques 216 Summary 217 Chapter 10: Processes 219 The ps Command 219 ps Line Length 220 Parsing the Process Table Accurately 220 killall 223 The /proc pseudo-filesystem 225 prtstat 226 I/O Redirection 227 Appending Output to an Existing File 229 Permissions on Redirections 229 exec 229 Using exec to Replace the Existing Program 230 Using exec to Change Redirection 231 Pipelines 237 Background Processing 237 wait 238 Catching Hangups with nohup 239 Other Features of /proc and /sys 242 Version 242 SysRq 242 /proc/meminfo 245 /proc/cpuinfo 245 /sys 246 /sys/devices/system/node 251 sysctl 253 Summary 254 Chapter 11: Choosing and Using Shells 255 The Bourne Shell 256 The KornShell 256 The C Shell 256 The Tenex C Shell 257 The Z Shell 257 The Bourne Again Shell 257 The Debian Almquist Shell 258 Dotfiles 258 Interactive Login Shells 259 Interactive Non-Login Shells 260 Non-Interactive Shells 261 Logout Scripts 262 Command Prompts 262 The PS1 Prompt 262 The PS2, PS3, and PS4 Prompts 264 Aliases 265 Timesavers 265 Modifying Behaviors 265 History 266 Recalling Commands 267 Searching History 267 Timestamps 268 Tab Completion 269 ksh 269 tcsh 270 zsh 270 bash 271 Foreground, Background, and Job Control 272 Backgrounding Processes 272 Job Control 273 nohup and disown 275 Summary 276 Part II: Recipes For Using and Extending System Tools Chapter 12: File Manipulation 279 stat 279 cat 281 Numbering Lines 282 Dealing with Blank Lines 282 Non-Printing Characters 283 cat Backwards is tac 284 Redirection 285 Redirecting Output: The Single Greater-Than Arrow (>) 285 Appending: The Double Greater-Than Arrow (>>) 286 Input Redirection: The Single Less-Than Arrow (<) 288 Here Documents: The Double Less-Than Arrow (<< EOF) 290 dd 292 df 294 mktemp 295 join 297 install 298 grep 300 grep Flags 300 grep Regular Expressions 301 split 303 tee 304 touch 306 find 307 find-exec 310 Summary 313 Chapter 13: Text Manipulation 315 cut 315 echo 316 dial1 316 dial2 319 fmt 320 head and tail 323 Prizes 323 World Cup 324 od 328 paste 331 pr 334 printf 335 shuf 337 Dice Thrower 337 Card Dealer 338 Travel Planner 340 sort 341 Sorting on Keys 342 Sorting Log Files by Date and Time 344 Sorting Human-Readable Numbers 345 tr 346 uniq 350 wc 351 Summary 352 Chapter 14: Tools For Systems Administration 353 basename 353 date 355 Typical Uses of date 355 More Interesting Uses of date 359 dirname 360 factor 362 identity, groups, and getent 364 logger 367 md5sum 368 mkfi fo 370 Master and Minions 371 Reversing the Order 373 Networking 375 telnet 376 netcat 376 ping 378 Scripting ssh and scp 381 OpenSSL 383 nohup 390 seq 391 Integer Sequences 391 Floating Point Sequences 393 sleep 394 timeout 394 Shutdown Script 396 Network Timeout 399 uname 400 uuencode 401 xargs 402 yes 405 Summary 406 Part III: Recipes For Systems Administration Chapter 15: Shell Features 409 Recipe 15-1: Installing Init Scripts 409 Technologies Used 410 Concepts 410 Potential Pitfalls 410 Structure 410 Recipe 412 Invocation 414 Summary 414 Recipe 15-2: RPM Report 414 Technologies Used 415 Concepts 415 Potential Pitfalls 415 Structure 415 Recipe 417 Invocation 419 Summary 420 Recipe 15-3: Postinstall Scripts 421 Technologies Used 421 Concepts 421 Potential Pitfalls 422 Structure 422 Recipe 423 Invocation 425 Summary 426 Chapter 16: Systems Administration 427 Recipe 16-1: init Scripts 427 Technologies Used 428 Concepts 428 Potential Pitfalls 429 Structure 430 Recipe 431 Invocation 432 Summary 433 Recipe 16-2: CGI Scripts 433 Technologies Used 433 Concepts 434 Potential Pitfalls 434 Structure 435 Recipe 438 Invocation 441 Summary 445 Recipe 16-3: Configuration Files 445 Technologies Used 445 Concepts 445 Potential Pitfalls 446 Structure 446 Recipe 446 Invocation 447 Summary 448 Recipe 16-4: Locks 448 Technologies Used 448 Concepts 448 Potential Pitfalls 449 Structure 450 Recipe 453 Invocation 455 Summary 458 Chapter 17: Presentation 459 Recipe 17-1: Space Game 459 Technologies Used 459 Concepts 460 Potential Pitfalls 462 Structure 462 Recipe 464 Invocation 469 Summary 470 Chapter 18: Data Storage and Retrieval 471 Recipe 18-1: Parsing HTML 471 Technologies Used 471 Concepts 472 Potential Pitfalls 472 Structure 472 Recipe 473 Invocation 474 Summary 476 Recipe 18-2: CSV Formatting 476 Technologies Used 476 Concepts 476 Potential Pitfalls 477 Structure 477 Recipe 478 Invocation 480 Summary 481 Chapter 19: Numbers 483 Recipe 19-1: The Fibonacci Sequence 483 Technologies Used 483 Concepts 484 Potential Pitfalls 484 Structure for Method 1 485 Recipe for Method 1 486 Invocation of Method 1 486 Structure for Method 2 487 Recipes for Method 2 488 Invocations of Method 2 489 Structure for Method 3 490 Recipe for Method 3 490 Invocation of Method 3 491 Summary 492 Recipe 19-2: PXE Booting 492 Technologies Used 492 Concepts 493 Potential Pitfalls 493 Structure 493 Recipe 494 Invocation 497 Summary 499 Chapter 20: Processes 501 Recipe 20-1: Process Control 501 Technologies Used 501 Concepts 502 Potential Pitfalls 503 Structure 503 Recipe 506 Invocation 511 Summary 516 Chapter 21: Internationalization 517 Recipe 21-1: Internationalization 517 Technologies Used 518 Concepts 518 Potential Pitfalls 519 Structure 520 Recipe 521 Invocation 525 Summary 526 Part IV: Reference Appendix: Further Reading 529 Shell Tutorials and Documentation 529 Arrays 530 Tools 530 Unix Flavors 531 Shell Services 531 Glossary 533 Index 539
£32.00
John Wiley & Sons Inc VCADCV VMware Certified Associate on vSphere
Book SynopsisUse this expert guide to prepare for the VCA-DCV exam VCA-DCV VMware Certified Associate on vSphere Study Guide: VCAD-510 is a comprehensive study guide for the VMware Certified Associate Data Center Virtualization exam. Hands-on examples, real-world scenarios, and expert review questions cover the full exam blueprint, and the companion website offers a suite of tools to help you prepare for the exam including practice exams, electronic flashcards, and a glossary of key terms. In addition, the website includes videos that demonstrate how to complete the more challenging tasks. Focused on practical skills, this study guide not only prepares you for the certification exam, but also for the duties expected of a VCA. The VMware Certified Associate-Data Center Virtualization certification targets those with limited virtualization and VMware data center technology experience, providing a springboard to the popular VMware Certified Professional-Data Center VirtualizaTable of ContentsIntroduction xv Assessment Test xxi Chapter 1 Intro to Virtualization 1 What Is Data Center Virtualization? 2 Virtualization Then and Now 3 Physical and Virtual Data Center Components 4 Physical Data Center Components 4 Virtual Data Center Components 5 Physical and Virtual Component Differences 7 Benefits of Using Virtualization 9 Online Tools 13 Summary 14 Exam Essentials 15 Review Questions 16 Chapter 2 VMware Solutions 21 Availability Challenges 22 VMware Availability Products and Technologies 23 Management Challenges 27 VMware Management Products and Technologies 27 Scalability Challenges 28 VMware Scalability Products and Technologies 29 Optimization Challenges 31 VMware Optimization Products and Technologies 32 Summary 36 Exam Essentials 37 Review Questions 39 Chapter 3 vSphere Core Components 43 Virtual Machines 44 What Is a Virtual Machine, Anyway? 44 What Can You Do with Virtual Machines? 45 ESXi Hypervisor 47 vCenter Server 47 vMotion 48 Distributed Resource Scheduler 49 Distributed Power Management 49 Storage vMotion 50 Storage DRS 50 Ftoc.indd 03/24/2015 Page xi vSphere Data Protection 51 High‐Availability Configuration 51 Fault Tolerance 52 vSphere Replication 52 Migration 53 High Availability 54 Host HA 55 Virtual Machine HA 56 Applications HA 57 Fault Tolerance 57 Clusters and Resource Pools 58 Clusters 58 Resource Pools 59 Other VMware Data Center Products 61 vCenter Operations Manager 61 vSphere Data Protection 62 Nsx 62 Virtual SAN 62 vCenter Site Recovery Manager 62 Summary 63 Exam Essentials 64 Review Questions 65 Chapter 4 Storage in a VMware Environment 71 Physical vs. Virtual Storage 72 What Is Shared Storage? 73 VMware Storage Types 75 Local Storage 75 Fibre Channel 76 iSCSI 77 Network File System 77 Virtual Machine File System 78 The VMFS vs. the NFS 78 Disk Provisioning 78 Thick Provisioning 79 Thin Provisioning 80 VMware Virtual Storage Technologies 82 Summary 83 Exam Essentials 84 Review Questions 86 Chapter 5 Networking in a VMware Environment 91 Differentiate Physical and Virtual Networking 92 Physical Switches 92 Ftoc.indd 03/24/2015 Page xii Virtual Switches 94 Differences Between Physical and Virtual Switches 97 Differentiate VMware Virtual Switch Technologies 97 Standard Virtual Switches 98 Distributed Virtual Switches 98 Identify VMware Virtual Switch Components 101 Standard Virtual Switch 101 Distributed Virtual Switch 102 Identify Common Virtual Switch Policies 103 Port Group Policies 103 Distributed Virtual Switch Policies 106 Identify Capabilities of Network I/O Control 108 Summary 113 Exam Essentials 113 Review Questions 115 Chapter 6 Business Challenges Meet VMware Solutions 119 Availability Challenges and Solutions 120 vMotion 121 Storage vMotion 121 Virtual Machine Snapshots 122 High Availability 123 Fault Tolerance 123 vSphere Replication 124 vSphere Data Protection 124 Site Recovery Manager 125 Management Challenges and Solutions 126 Virtual Machines/Physical‐to‐Virtual Conversions 126 vCenter Server 126 vCenter Configuration Manager 127 Optimization Challenges and Solutions 128 vCenter Operations Manager 128 Thin Provisioning 129 Distributed Switches with QoS 130 Distributed Power Management 130 Storage I/O Control 131 vFlash 131 VM Storage Profiles 131 Memory Ballooning 132 Transparent Page Sharing 132 Scalability Challenges and Solutions 133 Virtual Machines 133 Virtual Machine Templates 134 Distributed Resource Scheduler 135 Ftoc.indd 03/24/2015 Page xiii Storage DRS 135 vSphere Storage Appliance 136 Hot Add 136 Distributed Virtual Switches 136 The Differences between SMB and Enterprise Challenges and Solutions 137 Summary 138 Exam Essentials 139 Review Questions 140 Appendices 145 Appendix A Answers to Review Questions 147 Appendix B Online Resources 159 Index 165
£25.60
John Wiley & Sons Inc VMware vSphere PowerCLI Reference
Book SynopsisMaster vSphere automation with this comprehensive reference VMware vSphere PowerCLI Reference, Automating vSphere Administration, 2nd Edition is a one-stop solution for vSphere automation. Fully updated to align with the latest vSphere and PowerCLI release, this detailed guide shows you how to get the most out of PowerCLI''s handy cmdlets using real-world examples and a practical, task-based approach. You''ll learn how to store, access, update, back up, and secure massive amounts of data quickly through the power of virtualization automation, and you''ll get acquainted with PowerCLI as you learn how to automate management, monitoring, and life-cycle operations for vSphere. Coverage includes areas like the PowerCLI SDK, SRM, vCOPS, and vCloud Air. Plus guidance toward scheduling and viewing automation, using DevOps methodology and structured testing and source control of your PowerCLI scripts. Clear language and detailed explanations make this reference the Table of ContentsIntroduction xxiii Part I Install, Configure, and Manage the vSphere Environment 1 Chapter 1 Automating vCenter Server Deployment and Configuration 3 Chapter 2 Automating vSphere Hypervisor Deployment and Configuration 41 Chapter 3 Automating Networking 75 Chapter 4 Automating Storage 119 Rule Sets 146 Chapter 5 Using Advanced vSphere Features 165 Part II Managing the Virtual Machine Life Cycle 211 Chapter 6 Creating Virtual Machines 213 Chapter 7 Using Templates and Customization Specifications 243 Chapter 8 Configuring Virtual Machine Hardware 265 Chapter 9 Advanced Virtual Machine Features 293 Chapter 10 Using vApps 331 Part III Securing Your vSphere Environment 373 Chapter 11 Backing Up and Restoring Your Virtual Machines 375 Chapter 12 Organize Your Disaster Recovery 397 Chapter 13 Hardening the vSphere Environment 441 Chapter 14 Maintain Security in Your vSphere Environment 475 Part IV Monitoring and Reporting 495 Chapter 15 Reporting and Auditing 497 Chapter 16 Using Statistical Data 545 Chapter 17 Alarms 585 Part V Integration 619 Chapter 18 The SDK 621 Managed Object References 644 Chapter 19 vCloud Director 663 Chapter 20 vCloud Air 693 Chapter 21 vRealize Orchestrator 711 Chapter 22 Site Recovery Manager 791 Chapter 23 PowerActions 811 Part VI PowerCLI and DevOps 839 Chapter 24 Source Control 841 Chapter 25 Running Scripts 895 Appendix Example Reports 915 Index 935
£38.00
John Wiley & Sons Inc Decision Making in Systems Engineering and
Book SynopsisDECISION MAKING IN SYSTEMS ENGINEERING AND MANAGEMENT A thoroughly updated overview of systems engineering management and decision making In the newly revised third edition of Decision Making in Systems Engineering and Management, the authors deliver a comprehensive and authoritative overview of the systems decision process, systems thinking, and qualitative and quantitative multi-criteria value modeling directly supporting decision making throughout the system lifecycle. This book offers readers major new updates that cover recently developed system modeling and analysis techniques and quantitative and qualitative approaches in the field, including effective techniques for addressing uncertainty. In addition to Excel, six new open-source software applications have been added to illustrate key topics, including SIPmath Modeler Tools, Cambridge Advanced Modeller, SystemiTool2.0, and Gephi 0.9.2. The authors have reshaped the book's organization and presentaTable of ContentsList of Figures xiii List of Tables xxiii 1 Working with Systems 1 1.1 Introduction 1 1.2 The Systems Engineering Perspective 7 1.2.1 Systems Trends That Challenge System Engineers 8 1.2.2 Fundamental Tasks of Systems Engineers 12 1.2.3 Relationship of Systems Engineers to Other Engineering Disciplines 14 1.2.4 Education, Training, and Knowledge of Systems Engineers 15 1.3 Systems thinking 17 1.4 System life cycles 20 1.4.1 System life cycle model 23 1.5 Other major system life cycle models 29 1.6 Systems Decision Process (SDP) 34 1.7 Stakeholders and Vested Interests 39 References 47 2 Applied Systems Thinking 51 2.1 Holism Framing Systems 51 2.1.1 Systems versus Analytic Thinking 54 2.1.2 Check on Learning 56 2.2 Element Dependencies 57 2.2.1 Check on Learning 58 2.3 Expansive and Contractive Thinking 59 2.3.1 Check on Learning 60 2.4 Structure 61 2.5 Classifying Systems 68 2.6 Boundaries 69 2.7 Visibility and Spatial Arrangement 72 2.7.1 Visibility 72 2.7.2 Spatial Arrangement 74 2.7.3 Check on Learning 76 2.8 Evolution and Dynamics 77 References 81 3 System Representations 83 3.1 Introduction 83 3.2 System Model Concepts 84 3.2.1 What Models Are 85 3.2.2 Role of Models in Solution Design 86 3.2.3 Qualities of useful models 87 3.2.4 Building System Models 89 3.2.5 Characteristics of models 95 3.2.6 Exercise the Model 96 3.2.7 Revise the model 97 3.3 Systemigrams 98 3.3.1 Systemigram Rules 99 3.4 Directional Dependency (D2) Diagrams 102 3.4.1 D2 diagrams into math representations 103 3.5 DSM and DMM Models 107 3.5.1 Dependency Structure Matrix (DSM) 108 3.5.2 System Adjacency Matrices 114 3.5.3 Check on Learning 120 3.5.4 Domain Mapping Matrix (DMM) 120 3.6 System Dynamics 122 3.7 IDEF0 Models 129 3.8 Simulation Modeling 138 3.8.1 Analytical Methods versus Simulation 138 3.8.2 Check on Learning 143 3.9 Determining Simulation Sample Size 143 References 147 4 The Systems Decision Process 151 4.1 Introduction 151 4.2 Value versus Alternative Focused Thinking 151 4.3 The SDP in Detail 154 4.3.1 The System Environment 156 4.3.2 When to Use the Systems Decision Process 159 4.3.3 Check on Learning 161 4.4 The Role of Stakeholders 164 References 169 5 Problem Definition 171 5.1 Purpose of the Problem Definition Phase 171 5.1.1 Comparison with Other Systems Engineering Processes 173 5.2 Research and “What is?” 174 5.2.1 Check on Learning 178 5.3 Stakeholder Analysis 179 5.3.1 Techniques for Stakeholder Analysis 181 5.3.2 At Completion FCR Matrix 195 5.4 Requirements Analysis 197 5.4.1 Margins 201 5.5 Functional Analysis 204 5.6 Assessing System Readiness 213 5.7 Initial Risk Assessment 218 5.7.1 Risk identification 219 5.7.2 Risk Mitigation 229 References 231 6 Value Modeling 235 6.1 Introduction 235 6.2 Qualitative Value Modeling 239 6.2.1 Measures 242 6.3 Quantitative Value Model 249 6.3.1 Value Functions 251 6.3.2 Value Increment Method 256 6.3.3 Weighting Options 259 References 275 7 Solution Design 277 7.1 Introduction 277 7.2 Ideation Techniques 279 7.2.1 Brainstorming 279 7.2.2 Brainwriting 282 7.2.3 Design Thinking 282 7.2.4 Affinity Diagramming 284 7.2.5 Delphi 285 7.2.6 Groupware 287 7.2.7 Lateral and Parallel Thinking and Six Thinking Hats 287 7.2.8 Morphology 287 7.2.9 EndsMeans Chains 289 7.2.10 Other Ideation Techniques 289 7.3 Screening and Feasibility 291 7.4 Improving Candidate Alternatives 296 7.4.1 Design of Experiments 299 7.4.2 Fractional factorial design 304 7.4.3 Pareto analysis 312 References 315 8 Costing Systems 317 8.1 Introduction 317 8.2 Types of Costs 323 8.3 Cost Estimating Techniques 324 8.3.1 Estimating by Analogy 325 8.3.2 Parametric Estimation Using Cost Estimating Relationships 326 8.3.3 Learning Curves 339 8.4 Time Effects on Cost 345 8.4.1 Time Value of Money 345 8.4.2 Inflation 346 8.4.3 Net Present Value 348 8.4.4 Breakeven Analysis and Replacement Analysis 350 References 353 9 Decision Making via Tradespace Analysis 355 9.1 Introduction 355 9.2 Tradespace Properties 358 9.3 Scoring Solution Alternatives 360 9.4 Scoring Options 363 9.4.1 Candidate Systems Scoring 364 9.4.2 Candidate Components Scoring 367 9.5 Tradespace Analysis on Scoring Results 372 9.5.1 Analyzing Sensitivity on Weights 377 9.5.2 Sensitivity Analysis on Weights Using Excel 379 9.6 Applying Valuefocused Thinking 380 9.6.1 Improving nonDominated Alternatives 384 9.6.2 Improving Dominated Alternatives 385 9.7 Supporting the Tradespace Decision 386 9.8 Use valuefocused thinking to improve solutions 388 9.8.1 Decision Analysis of Dependent Risks 389 9.9 Reporting and Decision Handoff 392 9.9.1 Developing the Report 392 9.9.2 Developing the Presentation 393 9.9.3 Presenting Analysis Results 394 9.9.4 Concluding the Presentation 395 9.9.5 Using a Storyline Approach 396 References 399 10 Stochastic Tradespace Analysis 401 10.1 Introduction 401 10.2 Uncertainty Concepts 403 10.3 Flaw of Averages Considerations 406 10.4 Uncertainty Distributions 409 10.5 Monte Carlo Uncertainty Simulation 410 10.6 Cost Uncertainty Modeling 413 10.7 Realization Analysis 417 10.7.1 Level 1 Analysis Choice Set Reduction 419 References 429 11 System Reliability 433 11.1 Modeling System Reliability 433 11.2 Math Models in Reliability 434 11.2.1 Common Continuous Reliability Distributions 438 11.2.2 Common Discrete Distributions 444 11.2.3 Check on Learning 446 11.3 Reliability Block Diagrams 446 11.3.1 Series System 449 11.3.2 Parallel System 454 11.3.3 Combined Series and Parallel RBD 455 11.3.4 Koutof N Systems 456 11.3.5 Complex Systems 456 11.4 Component Reliability Importance Measures 458 11.4.1 Importance Measure for Series System 459 11.4.2 Importance Measure for Parallel System 461 11.4.3 Check on Learning 463 11.5 Allocating and Improving Reliability 463 11.5.1 Check on Learning 465 11.6 Markov models of repairable systems 465 11.6.1 Kolmogorov Differential Equations 466 11.6.2 Transient Analysis 466 11.6.3 Steady State Analysis 468 11.6.4 CTMC Models of Repairable Systems 469 11.6.5 Modeling Multiple Machine Problems 471 References 477 12 Solution Implementation 479 12.1 Introduction 479 12.2 Solution Implementation Phase 481 12.3 The Initiating Process 483 12.4 Planning 485 12.5 Executing 488 12.6 Monitoring and Controlling 489 12.7 Closing 492 12.8 Implementation During Life Cycle Stages 492 12.8.1 Implementation in “Produce the System” 492 12.8.2 Implementation in “Deploy the System” 494 12.8.3 Implementation in “Operate the System” 496 12.8.4 Check on Learning 499 References 503 13 EpilogueProfessional Practice 505 13.1 Systems Engineering Activities 507 13.2 Working with the systems development team 510 13.3 Building an Interdisciplinary Team 513 13.4 Systems engineering responsibilities 517 13.5 Roles of the Systems Engineer 524 13.6 Characteristics of the Ideal Systems Engineer 525 13.7 Summary 526 References 527 Appendix A: Realization Analysis Levels 0 and 2 529 A.1 Level 0 Analysis Refined Choice Set Identification 530 A.2 Level 2 Analysis Postselection Insights 533 References 537 Appendix B: Software Fundamentals 539 B.1 SystemiTool 539 B.2 Cambridge Advanced Modeller (CAM) 540 B.3 Mathematica 542 B.4 Gephi 543 B.5 Vensim PLE 544 B.6 SIPmath 545
£107.96
McGraw-Hill Companies Looseleaf for Survey of Operating Systems 7e
Book Synopsis
£174.60
Pearson Education Limited Modern Operating Systems Global Edition 4 Ed
Book SynopsisTable of Contents CHAPTER 1 "INTRODUCTION" CHAPTER 2 "PROCESSES AND THREADS" CHAPTER 3 "MEMORY MANAGEMENT" CHAPTER 4 "FILE SYSTEMS" CHAPTER 5 "INPUT/OUTPUT" CHAPTER 6 "DEADLOCKS" CHAPTER 7 "VIRTUALIZATION AND THE CLOUD" CHAPTER 8 "MULTIPLE PROCESSOR SYSTEMS" CHAPTER 9 "SECURITY" CHAPTER 10 "CASE STUDY 1: UNIX, LINUX, AND ANDROID" CHAPTER 11 "CASE STUDY 2: WINDOWS 8" CHAPTER 13 "OPERATING SYSTEM DESIGN" CHAPTER 14 READING LIST AND BIBLIOGRAPHY
£68.39
Cengage Learning, Inc Shelly Cashman Series MicrosoftÂWindows 10
Book SynopsisNo matter what your depth or range of experience, the practical, user-friendly Shelly Cashman Series MICROSOFT WINDOWS 10: COMPREHENSIVE can equip you with the complete skills and thorough knowledge you need to effectively navigate and fully utilize Microsoft Windows 10. Part of the acclaimed Shelly Cashman Series, this book offers a trademark, step-by-step, screen-by-screen approach that encourages you to expand your understanding of the Microsoft Windows 10 operating system through experimentation, exploration, and advanced planning. You'll find proven, hands-on features and accompanying online resources specifically designed to keep your attention and prepare you for future success in working with MS Office and Windows.Table of ContentsFront Matter. 1. Introduction to Windows 10. 2. Working with the Windows 10 Desktop. 3. File and Folder Management. 4. Personalizing Your Work Environment. 5. Advanced Personalization and Customization. 6. Advanced Searching Techniques. 7. Microsoft Edge. 8. Mastering Digital Media. 9. Understanding Security, Networking and Utilities. Index.
£180.27
APress Exploring the Raspberry Pi 2 with C
Book SynopsisYou have a Pi 2, but what exactly can you do with it? This book takes you on a tour of the Pi 2 hardware and all of the fantastic things that you can do to create innovative and useful projects with your Pi. Start with creating a workstation that does actual work, and move into installing a custom kernel, creating a clock, learning the ins and outs of the GPIO interface, and pick up some useful C++ skills along the way.Warren Gay, author of Mastering the Raspberry Pi, takes you through a set of experiments to show just what the Pi 2 is capable of and how you can use it to make your own fantastic creations.What You Will Learn: How to create an experimenter''s workstation for the Pi 2, complete with breadboard and even Arduino All the details of GPIO, including a custom command for working with it Useful projects like a general purpose clock and the PiSpy Quick intro to C++ for the Table of ContentsChapter 1: Introduction to Pi 2.- Chapter 2: Workstation.- Chapter 3: The Matrix.- Chapter 4: Installing a Kernel.- Chapter 5: GPIO gp Command.- Chapter 6: General Purpose Clock.- Chapter 7: Pulse Width Modulation.- Chapter 8: Physics of the GPIO Interface.- Chapter 9: PiSpy.- Chapter 10: Debouncing.- Chapter 11: Fast Track to C++.- Chapter 12: Multi-core Webserver.- Appendix A: GPIO Class, Part I.- Appendix B: GPIO Class, Part II.- Appendix C: GPIO Class, Part III.- Appendix D: MAX7219 Class.- Appendix E: Matrix Class.- Appendix F: MTop and Diskstat.- Appendix G: The Rest.
£35.99
APress Cybersecurity for Hospitals and Healthcare
Book SynopsisLearn how to detect and prevent the hacking of medical equipment at hospitals and healthcare facilities. A cyber-physical attack on building equipment pales in comparison to the damage a determined hacker can do if he/she gains access to a medical-grade network as a medical-grade network controls the diagnostic, treatment, and life support equipment on which lives depend. News reports inform us how hackers strike hospitals with ransomware that prevents staff from accessing patient records or scheduling appointments. Unfortunately, medical equipment also can be hacked and shut down remotely as a form of extortion. Criminal hackers will not ask for a $500 payment to unlock an MRI, PET or CT scan, or X-ray machinethey will ask for much more. Litigation is bound to follow and the resulting punitive awards will drive up hospital insurance costs and healthcare costs in general. This will undoubtedly result in increased regulations for hospitals and higher costs for compliance. Unless hosTable of ContentsChapter 1: Hacker Reconnaissance of a Hospital Network .- Chapter 2: How Hackers Gain Access to a Hospital Network .- Chapter 3: Active Medical Device Cyber-Attacks.- Chapter 4: Medical Facility Cyber-Physical Attacks.- Chapter 5: Hospital Insider Threat.- Chapter 6: Detection of Cyber-Attacks.- Chapter 7: Preventing Cyber-Attacks.- Chapter 8: Cyber-Attack Response and Recovery Planning.- Chapter 9: Appendix. Cyber-Attack Response Procedures Template.-
£51.99
Apress Professional Sitecore 8 Development
Book SynopsisTable of ContentsChapter 1: Getting Started.- Chapter 2: Building Your First Component.- Chapter 3: Data Templates and Content.- Chapter 4: Back-End Dev Architectures.- Chapter 5: Improving the Design with Patterns.- Chapter 6: Front-End Dev Techniques.- Chapter 7: Unit Testing Sitecore.- Chapter 8: Search-Driven Solutions.- Chapter 9: Programming the Customer Journey.- Chapter 10: PowerShell Extensions for Sitecore.- Chapter 11: Extending the Experience Editor.-
£52.24
APress Practical NATS
Book SynopsisLearn to use NATS and messaging as a solution for communication between services. The NATS project has been around since 2010, but it has become more popular in recent years due to how well it fits into the paradigm of cloud native applications and microservices architectures. It''s fast becoming a very attractive option thanks to its great performance characteristics--a single server can push millions of messages per second--and overall simple design. First you will learn the fundamentals of NATS, such as its design, protocol and the styles of communications it enables, internals of the NATS clients, and how to use the basic API provided by all the official clients. You will also understand how to setup and configure NATS servers using the configuration file. Next you''ll work with real-world projects and see how to develop a production-ready cloud native application using NATS as the control plane over which clients communicate. Finally you''ll learn Table of Contents1. Introduction to NATS2. The NATS Protocol3. The NATS Clients4. Setting up NATS5. High Availability with NATS Clustering6. Developing a Cloud Native NATS Application7. Monitoring NATS8. Securing NATS9. Troubleshooting NATS10. Advanced NATS Techniques
£49.49
APress Patterns in the Machine
Book SynopsisDiscover how to apply software engineering patterns to develop more robust firmware faster than traditional embedded development approaches. In the authors'' experience, traditional embedded software projects tend towards monolithic applications that are optimized for their target hardware platforms. This leads to software that is fragile in terms of extensibility and difficult to test without fully integrated software and hardware. Patterns in the Machine focuses on creating loosely coupled implementations that embrace both change and testability.This book illustrates how implementing continuous integration, automated unit testing, platform-independent code, and other best practices that are not typically implemented in the embedded systems world is not just feasible but also practical for today''s embedded projects.After reading this book, you will have a better idea of how to structure your embedded software projects. You will recognize that while writing unit tests, creating simulators, and implementing continuous integration requires time and effort up front, you will be amply rewarded at the end of the project in terms of quality, adaptability, and maintainability of your code. What You Will Learn Incorporate automated unit testing into an embedded project Design and build functional simulators for an embedded project Write production-quality software when hardware is not available Use the Data Model architectural pattern to create a highly decoupled design and implementation Understand the importance of defining the software architecture before implementation starts and how to do it Discover why documentation is essential for an embedded project Use finite state machines in embedded projects Who This Book Is ForMid-level or higher embedded systems (firmware) developers, technical leads, software architects, and development managers.Table of Contents1: Introduction2: Core Concepts3: Design Theory For Embedded Programming4: Persistent Storage Example5: Software Architecture6: Automated Unit Testing7: Functional Simulator8: Continuous Integration9: Data Model10: Finite State Machines11: Documentation12: File Organization and Naming13: More About Late Bindings14: Main and Initialization15: More Best Practices16: Example Code17: Rules For DevelopmentAppendix A: TerminologyAppendix B: UML Cheat SheetAppendix C: Notation for State MachinesAppendix D: Coding ConventionsAppendix E: Why C++
£35.99
APress Salt Open
Book SynopsisThere is a rapid growth of automation in server rooms and data centers. The days of having many administrators running around busily configuring and maintaining servers are gone and have been replaced with droves of Salt-Minions; agents beavering away on the target nodes ensuring the configuration is as specified. This book covers Salt Open (also known as SaltStack Open) from the ground up and shows you how to work with two Linux distributions. You'll see how Salt Open is duplicated with ArubaOS and IOS networking devices, which can be configured without the underlying OS. As you step through the configuration options, you'll learn how to run remote execution modules from the CLI before looking at stateful configuration using SLS files. Moving on, you'll learn how to configure the systems where you also need to monitor your devices and that is when reactors and beacons come into play. Creating beacons to alert the server when thresholds are exceeded, you will be able to create reactoTable of ContentsChapter 1: Understanding Salt and Configuration AutomationChapter Goal: Learn about Salt Open and its' commercial sibling, SaltConfig, from VMwareNo of pages 8Sub - Topics-Salt Open and the SaltProjectSaltConfig and VMwareSpeed, the Salt advantageSpeed, the Salt advantageChapter 2: Installing Salt Chapter Goal: In this chapter we will outline the labs systems used throughout the book and optional networking equipment before moving onto installing the Salt-Master Salt-Minions and providing basic tests No of pages: 12 Sub - Topics 1. Identity Lab setup 2. Install latest version of Salt Master and Minions 3. Configuring Master and Minions 4. Configuring Times Services 5. Signing Keys 6. Implementing basic tests 7. Implement firewalling on the Salt Master Chapter 3: Installing Additional Minions Chapter Goal: We have just one server and a Minion on the same server. We will now expand this to include additional Linux distribution and learn more about Salt authentication No of pages : 8 Sub - Topics: 1. Authenticating with Minion public keys and key management 2. Automating key signing 3. Locating the Salt Master 4. Automating the Minion ID Chapter 4: Targeting Minions Chapter Goal: Learn how we can target tasks to the required Minions in Salt Open No of pages: 12 Sub - Topics: 1. Salt Targeting 2. Understanding grains and using them as targets 3. Targeting using regular expressions and IP notation 4. Creating Node groups and using them as targets Chapter 5: Working with Remote Execution Modules in Salt Open Chapter Goal: At the heart of Salt we have remote execution modules and we stale a look at the construction in Python and how we use them and find their documentation No of pages: 15Sub topics 1. Using Modules and Functions 2. Listing the salt module indices 3. Using salt and salt-call to execute modules 4. Locate command line help 5. The big three: packages, services, and files Chapter 6: Writing YAML Chapter Goal: Learn to write and understand YAML files. Configure your command line editor for YAML No of pages: 8 Sub - Topics: 1. YAML Ain't Markup Language 2. Using Online Parser to process YAML 3. Configuring the nano editor 4. Configuring the vim editor for YAML and SLS filesChapter 7: Writing Salt State Files Chapter Goal: Create repeatable configurations using SLS files No of pages: 15 Sub - Topics: 1. State vs Flow 2. Jinja and YAML Parsing 3. Creating Jinja2 templates 4. Installing packages with Salt states 5. Managing services with state files 6. Delivering files with salt states 7. Syntax checking state filesChapter 8: Building an effective state tree Chapter Goal: The top.sls file can be referenced as the inverted root of the state tree to include the required states for different systems No of pages: 8 Sub - Topics: 1. Creating the top file 2. Understanding state.sl, state.apply and state.highstate 3. Targeting in the top file Chapter 9: Creating Reusable State Files Chapter Goal: Learn to implement states that fit a variety of systems No of pages: 15 Sub - Topics: 1. Using variables and Jinja 2. Using grains 3. Configuring Salt Pillar 4. Using logic to remove reliance on external data 5. Speeding the process with map files 6. Accessing templated data Chapter 10: Implementing Reactors and Beacons Chapter Goal: The Salt Master maintain the high-speed message bus. Events are written to this bust and we can view the events to help understand and debug the salt system. Working with events we can configure the master to react to events using Reactors. This can move configuration management into the realms of orchestration. Taking this further we can configure beacons on Minions to send events to the bus when triggered by thresholds on the managed device No of pages: 18 Sub - Topics: 1. Reading and Identify events on the event bus 2. Configuring reactors on the Salt Master 3. Configuring Beacons on MinionsChapter 11: Using Salt-SSH Chapter Goal: Where a long running Minion service is not desirable we can use salt-ssh to deploy configuration No of pages: 8 Sub - Topics: 1. Salt-SSH 2. Deploy key based ssh authentication 3. Using Salt-SSH Chapter 12: Deploy Virtual Machines Using Salt-Cloud Chapter Goal: Using salt-cloud the single utility can be used to manage your virtual machine deployment irrespective of the cloud system used No of pages: 10 Sub - Topics: 1. Managing VMs with salt-cloud 2. Using salt-cloud with AWS 3. Configuring providers and profiles 4. Using map files 5. Managing systems Chapter 13: Scaling Configuration Management Using Salt-Syndic Chapter Goal: Implementing Salt-syndic you add additional masters to the system that report back to the Master or Masters. This can load balance your Minions or act to traverse a network link No of pages: 6 Sub - Topics: 1. Installing Salt Syndic 2. Configuring Syndic on minion 3. Configuring Minions to use Syndic Chapter 14: Automating Network Infrastructure with Salt Proxy Chapter Goal: Salt Proxy is used to connect to devices that don’t maintain a long running Minion such as network devices No of pages: 15 Sub - Topics: 1. Configuring Pillar Data for Proxy 2. Installing NAPALM modules 3. Configuring Proxy Systems 4. Enabling SSH on Cisco IOS 5. Configuring NTP services on Cisco Devices 6. Backing up Configuration on Cisco and Aruba systems 7. Restoring configurations 8. Using salt-sproxy as a Proxy Minion alternative
£42.49
APress Beginning Ethereum Smart Contracts Programming
Book SynopsisUse this book to write an Ethereum blockchain smart contract, test it, deploy it, and create a web application to interact with your smart contract. This new edition has been expanded and updated to cover web3.js APIs, additional Consensus Protocols, non-Fungible Tokens (NFTs), developing NFT tokens using ERC-721, and more! Beginning Ethereum Smart Contracts Programming, second edition is your fastest and most efficient means of getting started if you are unsure where to begin and how to connect to the Ethereum blockchain. The book begins with a foundational discussion of blockchain and the motivation behind it. From there, you will get up close and personal with the Ethereum blockchain, learning how to use an Ethereum client (geth) to create a private Ethereum blockchain to perform transactions such as sending Ethers to another account on another node. You will learn about smart contracts without haviTable of Contents---NEW Chapter---- Chapter 1 - Technologies Behind Blockchain Basic Cryptography Types of Cryptographic algorithms Symmetric Asymmetric Hashing Digital Signature Summary Chapter 2 - Understanding Blockchain ---NEW Section--- Consensus Protocols Proof of Stake (PoS) Proof of Elapsed Time Proof of Space ... ----------------- Chapter 3 - Implementing Your Own Blockchain using Python Chapter 4 - Connecting to the Ethereum Blockchain using Geth Chapter 5 - Creating Your Own Private Ethereum Test Networks Chapter 6 - Using the Crypto Wallet - MetaMask Chapter 7 - Getting Started with Solidity Smart Contracts Chapter 8 - Testing Smart Contracts using Ganache Chapter 9 - Building Decentralized Apps using the web3.js APIs Chapter 10 - Handling Smart Contract Events Chapter 11 - Project - Online Lottery Chapter 12 - Creating Tokens using ERC-20 ---revised using OpenZepplin’s contract--- ---NEW Chapters---- Chapter 13 - Creating Non-Fungible Tokens using ERC-721 What is a NFT? Storing Digital Assets using IPFS What is IPFS Uploading a file to IPFS Accessing a file from IPFS NFT and IPFS Creating the NFT Token Contract Deploying the contract Minting the NFT Token Contract Getting the Owner of the NFT Getting the Name and Symbol of NFT Finding the Balance of NFT for an Address Getting the Owner of the NFT Getting the TokenURI Transferring a NFT Transferring Ownership of the NFT Contract Chapter 14 – Introduction to DeFi What is Decentralized Finance Stablecoins Types of Stablecoins USDC DAI Services in DeFi Components in DeFi Applications of DeFi ------------------
£41.24
APress Practical Rust Projects
Book SynopsisGo beyond the basics and build complete applications using the Rust programming language, updated for Rust 2021 edition. The applications you''ll build over the course of this book include a high-performance web client, an embedded computer (for a robot, for example), a game, a serverless web app, and an application that incorporates AI and machine learning. Each chapter is organized in the following format: what the kind of should application look like; requirements and user stories of our example program; an introduction to the Rust libraries used; the actual implementation of the example program, including common pitfalls and their solutions; and a brief comparison of libraries for building each application, if there is no clear preference. Practical Rust Projects, Second Edition will open your eyes to how Rust can be put to practical, real-world use. After reading this book, you will be able to use Rust to build a varTable of Contents1. Welcome to the World of Rust2. Building a Command-Line Program3. Creating Graphical User Interfaces (GUIs)4. High-performance Web Frontend using WebAssembly5. Building REST APIs6. Going Serverless with Amazon AWS Rust SDK7. Building a Game8. Physical Computing in Rust9. Artificial Intelligence and Machine Learning10. What else can you do with Rust?---------------------------------------------------------1. Welcome to the World of Rust * Add a note on what's changed in the 2nd edition. * Add a note on Rust 20212. Building a Command-Line Program3. Creating Graphical User Interfaces (GUIs) * Upgrade to GTK 4?4. High-performance Web Frontend using WebAssembly5. Building REST APIs 6. 6. Going Serverless with Amazon AWS Rust SDK * Using the new AWS SDK for Rust and Rust runtime for AWS Lambda7. Building a Game * Use a different game engine because the one used in the 1st edition seized development8. Physical Computing in Rust * Maybe add a section on using WebAssembly on RPi9. Artificial Intelligence and Machine Learning * Maybe add a section on deep learning10. What else can you do with Rust? * Remove the web part that is included in 2nd edition
£46.74