Virtualization Books

22 products


  • Continuous Delivery for Kubernetes

    Manning Publications Continuous Delivery for Kubernetes

    1 in stock

    Book SynopsisTake the fast track in your journey to continuous delivery, with open source tools for Kubernetes and cloud applications. This book explores the tools and techniques you'll need to overcome common cloud native challenges. In Continuous Delivery for Kubernetes you will learn how to: Select the right open source project to solve challenges with your Kubernetes application Package, version, distribute and instant cloud native services using Helm Create and run pipelines using Tekton Plan and implement a multicloud strategy with Crossplane Implement risk-free and progressive upgrades with Knative Utilize Knative for serving, routing, and event-driven applications Automate testing, even when you don't have all your services up and running Troubleshoot and measure application performance Continuous Delivery for Kubernetes lays out a toolbox of free, open source projects you can use to implement continuous delivery for Kubernetes-based applications in the cloud. Each chapter covers a different project, clearly demonstrating how it simplifies essential CD tasks like packaging, building pipelines, and multi-cloud deployment. This book shows developers and architects confidently identify common patterns in successful open source tools so they can pick the right options for their own platforms. about the technology Continuous delivery practices help your team quickly introduce, iterate on, and deploy new features so you can get software into production quickly. The tools in this book help facilitate continuous delivery practices by solving the technical and architectural challenges commonly found when adopting Kubernetes, automating essential dev and deployment tasks, and improving your team's collaboration. about the book Continuous Delivery for Kubernetes accelerates development of cloud-based systems with vibrant open source tools of the Kubernetes ecosystem. You'll use powerful open source projects like Helm, Tekton, Knative, and Crossplane to automate your projects from testing through delivery. Learn how to package services, build and deploy services to a Kubernetes cluster, and combine different tools to solve the complex challenges of CD in a cloud native environment. RETAIL SELLING POINTS Select the right open source project to solve challenges with your Kubernetes application Package, version, distribute and instant cloud native services using Helm Utilize Knative for serving, routing, and event-driven applications Automate testing, even when you don't have all your services up and running Troubleshoot and measure application performance AUDIENCE For developers and software architects familiar with the basics of containers and Kubernetes. Trade Review'A great intro to best practices regarding continuous delivery in the cloud.' Rahul Jain 'The material is really excellent: the explanations are clear and the illustrative examples are practical and relevant.' Alain Lompo 'A great soup-to-nuts book for learning about CD for Kubernetes-native applications.' Kent SpillnerTable of Contentstable of contents detailed TOC READ IN LIVEBOOK 1CLOUD-NATIVE CONTINUOUS DELIVERY READ IN LIVEBOOK 2CLOUD-NATIVE APPLICATION CHALLENGES READ IN LIVEBOOK 3SERVICE AND ENVIRONMENT PIPELINES READ IN LIVEBOOK 4MULTI-CLOUD INFRASTRUCTURE READ IN LIVEBOOK 5RELEASE STRATEGIES READ IN LIVEBOOK 6EVENTS FOR CLOUD-NATIVE INTEGRATIONS READ IN LIVEBOOK 7FUNCTIONS FOR KUBERNETES 8 BUILDING A PLATFORM DESIGNED FOR CD 9 THE ROAD TO CONTINUOUS & PROGRESSIVE DELIVERY

    1 in stock

    £41.39

  • Building Data Centers with VXLAN BGP EVPN: A

    Pearson Education (US) Building Data Centers with VXLAN BGP EVPN: A

    Out of stock

    Book SynopsisThe complete guide to building and managing next-generation data center network fabrics with VXLAN and BGP EVPN This is the only comprehensive guide and deployment reference for building flexible data center network fabrics with VXLAN and BGP EVPN technologies. Writing for experienced network professionals, three leading Cisco experts address everything from standards and protocols to functions, configurations, and operations. The authors first explain why and how data center fabrics are evolving, and introduce Cisco’s fabric journey. Next, they review key switch roles, essential data center network fabric terminology, and core concepts such as network attributes, control plane details, and the associated data plane encapsulation. Building on this foundation, they provide a deep dive into fabric semantics, efficient creation and addressing of the underlay, multi-tenancy, control and data plane interaction, forwarding flows, external interconnectivity, and service appliance deployments. You’ll find detailed tutorials, descriptions, and packet flows that can easily be adapted to accommodate customized deployments. This guide concludes with a full section on fabric management, introducing multiple opportunities to simplify, automate, and orchestrate data center network fabrics. Learn how changing data center requirements have driven the evolution to overlays, evolved control planes, and VXLAN BGP EVPN spine-leaf fabrics Discover why VXLAN BGP EVPN fabrics are so scalable, resilient, and elastic Implement enhanced unicast and multicast forwarding of tenant traffic over the VXLAN BGP EVPN fabric Build fabric underlays to efficiently transport uni- and multi-destination traffic Connect the fabric externally via Layer 3 (VRF-Lite, LISP, MPLS L3VPN) and Layer 2 (VPC) Choose your most appropriate Multi-POD, multifabric, and Data Center Interconnect (DCI) options Integrate Layer 4-7 services into the fabric, including load balancers and firewalls Manage fabrics with POAP-based day-0 provisioning, incremental day 0.5 configuration, overlay day-1 configuration, or day-2 operations Table of Contents Introduction xv Chapter 1 Introduction to Programmable Fabric 1 Today’s Data Center Challenges and Requirements 2 The Data Center Fabric Journey 3 Cisco Open Programmable Fabric 10 Fabric-Related Terminology 13 Data Center Network Fabric Properties 14 Server or Endpoint Connectivity Options 15 Summary 17 References 17 Chapter 2 VXLAN BGP EVPN Basics 21 Overlays 23 Introduction to VXLAN 27 VXLAN Flood and Learn (F&L) 30 Introduction to BGP EVPN with VXLAN 32 MP-BGP Features and Common Practices 34 IETF Standards and RFCs 37 Host and Subnet Route Distribution 40 Host Deletion and Move Events 46 Summary 48 References 49 Chapter 3 VXLAN/EVPN Forwarding Characteristics 53 Multidestination Traffic 54 Leveraging Multicast Replication in the Underlying Network 55 Using Ingress Replication 58 VXLAN BGP EVPN Enhancements 60 ARP Suppression 60 Distributed IP Anycast Gateway 65 Integrated Route and Bridge (IRB) 69 Endpoint Mobility 73 Virtual PortChannel (vPC) in VXLAN BGP EVPN 76 DHCP 81 Summary 85 References 85 Chapter 4 The Underlay 87 Underlay Considerations 88 MTU Considerations 91 IP Addressing 93 IP Unicast Routing 99 OSPF as an Underlay 100 IS-IS as an Underlay 102 BGP as an Underlay 103 IP Unicast Routing Summary 106 Multidestination Traffic 107 Unicast Mode 107 Multicast Mode 109 PIM Any Source Multicast (ASM) 112 BiDirectional PIM (PIM BiDir) 114 Summary 119 References 119 Chapter 5 Multitenancy 121 Bridge Domains 123 VLANs in VXLAN 124 Layer 2 Multitenancy: Mode of Operation 129 VLAN-Oriented Mode 130 BD-Oriented Mode 131 VRF in VXLAN BGP EVPN 132 Layer 3 Multitenancy: Mode of Operation 134 Summary 137 References 138 Chapter 6 Unicast Forwarding 139 Intra-Subnet Unicast Forwarding (Bridging) 139 Non-IP Forwarding (Bridging) 147 Inter-Subnet Unicast Forwarding (Routing) 149 Routed Traffic to Silent Endpoints 158 Forwarding with Dual-Homed Endpoint 164 IPv6 167 Summary 169 Chapter 7 Multicast Forwarding 171 Layer 2 Multicast Forwarding 171 IGMP in VXLAN BGP EVPN Networks 174 Layer 2 Multicast Forwarding in vPC 178 Layer 3 Multicast Forwarding 182 Summary 184 References 184 Chapter 8 External Connectivity 185 External Connectivity Placement 185 External Layer 3 Connectivity 189 U-Shaped and Full-Mesh Models 190 VRF Lite/Inter-AS Option A 192 LISP 195 MPLS Layer 3 VPN (L3VPN) 200 External Layer 2 Connectivity 203 Classic Ethernet and vPC 204 Extranet and Shared Services 206 Local/Distributed VRF Route Leaking 207 Downstream VNI Assignment 210 Summary 212 Reference 212 Chapter 9 Multi-Pod, Multifabric, and Data Center Interconnect (DCI) 213 Contrasting OTV and VXLAN 213 Multi-Pod 219 Interconnection at the Spine Layer 227 Interconnection at the Leaf Layer 227 Multifabric 228 Inter-pod/Interfabric 231 Interfabric Option 1: Multi-Pod 232 Interfabric Option 2: Multifabric 233 Interfabric Option 3 (Multisite for Layer 3) 235 Interfabric Option 4 (Multisite for Layer 2) 236 Summary 238 References 238 Chapter 10 Layer 4—7 Services Integration 241 Firewalls in a VXLAN BGP EVPN Network 242 Routing Mode 242 Bridging Mode 244 Firewall Redundancy with Static Routing 245 Static Route Tracking at a Service Leaf 248 Static Routing at a Remote Leaf 248 Physical Connectivity 249 Inter-Tenant/Tenant-Edge Firewall 250 Services-Edge Design 254 Intra-Tenant Firewalls 254 Mixing Intra-Tenant and Inter-Tenant Firewalls 260 Application Delivery Controller (ADC) and Load Balancer in a VXLAN BGP EVPN Network 262 One-Armed Source-NAT 262 Direct VIP Subnet Approach 263 Indirect VIP Subnet Approach 264 Return Traffic 265 Service Chaining: Firewall and Load Balancer 267 Summary 271 References 271 Chapter 11 Introduction to Fabric Management 273 Day-0 Operations: Automatic Fabric Bring-Up 275 In-Band Versus Out-of-Band POAP 276 Other Day-0 Considerations 278 Day-0.5 Operations: Incremental Changes 279 Day-1 Operations: Overlay Services Management 280 Virtual Topology System (VTS) 282 Nexus Fabric Manager (NFM) 282 Data Center Network Manager (DCNM) 283 Compute Integration 283 Day-2 Operations: Monitoring and Visibility 285 VXLAN OAM (NGOAM) 294 Summary 299 References 299 Appendix A VXLAN BGP EVPN Implementation Options 303 9781587144677, TOC, 3/16/17

    Out of stock

    £37.82

  • Virtualization For Dummies

    John Wiley & Sons Inc Virtualization For Dummies

    15 in stock

    Book SynopsisVirtualization has become a megatrend-and for good reason. Implementing virtualization allows for more efficient utilization of network server capacity, simpler storage administration, reduced energy costs, and better use of corporate capital. In other words: virtualization helps you save money, energy, and space.Table of ContentsForeword xvii Introduction 1 Part I: Getting Started with a Virtualization Project 7 Chapter 1: Wrapping Your Head around Virtualization 9 Chapter 2: Making a Business Case for Virtualization 33 Chapter 3: Understanding Virtualization: Technologies and Applications 49 Chapter 4: Peeking at the Future of Virtualization 83 Part II: Server Virtualization 99 Chapter 5: Deciding Whether Server Virtualization Is Right for You 101 Chapter 6: Performing a Server Virtualization Cost-Benefit Analysis 111 Chapter 7: Managing a Virtualization Project 129 Chapter 8: Choosing Hardware for Your Server Virtualization Project 159 Part III: Server Virtualization Software Options 187 Chapter 9: Migrating to Your New Virtualized Environment 189 Chapter 10: Managing Your Virtualized Environment 209 Chapter 11: Creating a Virtualized Storage Environment 221 Part IV: Implementing Virtualization 243 Chapter 12: Implementing VMware Server 245 Chapter 13: Implementing Fedora Virtualization 267 Chapter 14: Implementing XenExpress 291 Part V: The Part of Tens 319 Chapter 15: Ten Steps to Your First Virtualization Project 321 Chapter 16: Ten Virtualization Pitfalls to Avoid 329 Chapter 17: Ten Great Resources on Virtualization 335 Index 341

    15 in stock

    £23.99

  • Building a FutureProof Cloud Infrastructure

    Pearson Education (US) Building a FutureProof Cloud Infrastructure

    15 in stock

    Book SynopsisSilvano Gai, who grew up in a small village near Asti, Italy, has more than 35 years of experience in computer engineering and computer networks. He is the author of several books and technical publications on computer networking as well as multiple Internet Drafts and RFCs. He is responsible for 50 issued patents. His background includes seven years as a full professor of Computer Engineering, tenure track, at Politecnico di Torino, Italy, and seven years as a researcher at the CNR (Italian National Council for Scientific Research). For the past 20 years, he has been in Silicon Valley where, in the position of Cisco Fellow, he was an architect of the Cisco Catalyst family of network switches, of the Cisco MDS family of storage networking switches, of the Nexus family of data center switches, and the Cisco Unified Computing System (UCS). Silvano is currently a Fellow with Pensando Systems.Table of ContentsPreface Chapter 1: Introduction to Distributed Platforms 1.1 The Need for a Distributed Services Platform 1.2 The Precious CPU Cycles 1.3 The Case for Domain-Specific Hardware 1.4 Using Appliances 1.5 Attempts at Defining a Distributed Services Platform 1.6 Requirements for a Distributed Services Platform 1.7 Summary Chapter 2: Network Design 2.1 Bridging and Routing 2.1.1 L2 Forwarding 2.1.2 L3 Forwarding 2.1.3 LPM Forwarding in Hardware 2.1.4 VRF 2.2 Clos Topology 2.3 Overlays 2.3.1 IP in IP 2.3.2 GRE 2.3.3 Modern Encapsulations 2.3.4 VXLAN 2.3.5 MTU Considerations 2.4 Secure Tunnels 2.5 Where to Terminate the Encapsulation 2.6 Segment Routing 2.7 Using Discrete Appliance for Services 2.7.1 Tromboning with VXLAN 2.7.2 Tromboning with VRF 2.7.3 Hybrid Tromboning 2.8 Cache-Based Forwarding 2.9 Generic Forwarding Table 2.10 Summary 2.11 Bibliography Chapter 3: Virtualization 3.1 Virtualization and Clouds 3.2 Virtual Machines and Hypervisors 3.2.1 VMware ESXi 3.2.2 Hyper-V 3.2.3 QEMU 3.2.4 KVM 3.2.5 XEN 3.3 Containers 3.3.1 Docker and Friends 3.3.2 Kata Containers 3.3.3 Container Network Interface 3.3.4 Kubernetes 3.4 The Microservice Architecture 3.4.1 REST API 3.4.2 gRPC 3.5 OpenStack 3.6 NFV 3.7 Summary 3.8 Bibliography Chapter 4: Network Virtualization Services 4.1 Introduction to Networking Services 4.2 Software-Defined Networking 4.2.1 OpenFlow 4.2.2 SD-WAN 4.2.3 gRIBI 4.2.4 Data Plane Development Kit (DPDK) 4.3 Virtual Switches 4.3.1 Open vSwitch (OVS) 4.3.2 tc-flower 4.3.3 DPDK RTE Flow Filtering 4.3.4 VPP (Vector Packet Processing) 4.3.5 BPF and eBPF 4.3.6 XDP 4.3.7 Summary on Virtual Switches 4.4 Stateful NAT 4.5 Load Balancing 4.6 Troubleshooting and Telemetry 4.7 Summary 4.8 Bibliography Chapter 5: Security Services 5.1 Distributed Firewalls 5.2 Microsegmentation 5.3 TLS Everywhere 5.4 Symmetric Encryption 5.5 Asymmetric Encryption 5.6 Digital Certificates 5.7 Hashing 5.8 Secure Key Storage 5.9 PUF 5.10 TCP/TLS/HTTP Implementation 5.11 Secure Tunnels 5.11.1 IPsec 5.11.2 TLS 5.11.3 DTLS 5.12 VPNs 5.13 Secure Boot 5.14 Summary 5.15 Bibliography Chapter 6: Distributed Storage and RDMA Services 6.1 RDMA and RoCE 6.1.1 RDMA Architecture Overview 6.1.2 RDMA Transport Services 6.1.3 RDMA Operations 6.1.4 RDMA Scalability 6.1.5 RoCE 6.1.6 RoCE vs iWARP 6.1.7 RDMA Deployments 6.1.8 RoCEv2 and Lossy Networks 6.1.9 Continued Evolution of RDMA 6.2 Storage 6.2.1 The Advent of SSDs 6.2.2 NVMe over Fabrics 6.2.3 Data Plane Model of Storage Protocols 6.2.4 Remote Storage Meets Virtualization 6.2.5 Distributed Storages Services 6.2.6 Storage Security 6.2.7 Storage Efficiency 6.2.8 Storage Reliability 6.2.9 Offloading and Distributing Storage Services 6.2.10 Persistent Memory as a New Storage Tier 6.3 Summary 6.4 Bibliography Chapter 7: CPUs and Domain-Specific Hardware 7.1 42 Years of Microprocessor Trend Data 7.2 Moore’s Law 7.3 Dennard Scaling 7.4 Amdahl’s Law 7.5 Other Technical Factors 7.6 Putting It All Together 7.7 Is Moore’s Law Dead or Not? 7.8 Domain-specific Hardware 7.9 Economics of the Server 7.10 Summary 7.11 Bibliography Chapter 8: NIC Evolution 8.1 Understanding Server Buses 8.2 Comparing NIC Form Factors 8.2.1 PCI Plugin Cards 8.2.2 Proprietary Mezzanine Cards 8.2.3 OCP Mezzanine Cards 8.2.4 Lan On Motherboard 8.3 Looking at the NIC Evolution 8.4 Using Single Root Input/Output Virtualization 8.5 Using Virtual I/O 8.6 Defining “SmartNIC” 8.7 Summary 8.8 Bibliography Chapter 9: Implementing a DS Platform 9.1 Analyzing the Goals for a Distributed Services Platform 9.1.1 Services Everywhere 9.1.2 Scaling 9.1.3 Speed 9.1.4 Low Latency 9.1.5 Low Jitter 9.1.6 Minimal CPU Load 9.1.7 Observability and Troubleshooting Capability 9.1.8 Manageability 9.1.9 Host Mode versus Network Mode 9.1.10 PCIe Firewall 9.2 Understanding Constraints 9.2.1 Virtualized versus Bare-metal Servers 9.2.2 Greenfield versus Brownfield Deployment 9.2.3 The Drivers 9.2.4 PCIe-only Services 9.2.5 Power Budget 9.3 Determining the Target User 9.3.1 Enterprise Data Centers 9.3.2 Cloud Providers and Service Providers 9.4 Understanding DSN Implementations 9.4.1 DSN in Software 9.4.2 DSN Adapter 9.4.3 DSN Bump-in-the-Wire 9.4.4 DSN in Switch 9.4.5 DSNs in an Appliance 9.5 Summary 9.6 Bibliography Chapter 10: DSN Hardware Architectures 10.1 The Main Building Blocks of a DSN 10.2 Identifying the Silicon Sweet Spot 10.2.1 The 16 nm Process 10.2.2 The 7 nm Process 10.3 Choosing an Architecture 10.4 Having a Sea of CPU Cores 10.5 Understanding Field-Programmable Gate Arrays 10.6 Using Application-Specific Integrated Circuits 10.7 Determining DSN Power Consumption 10.8 Determining Memory Needs 10.8.1 Host Memory 10.8.2 External DRAM 10.8.3 On-chip DRAM 10.8.4 Memory Bandwidth Requirements 10.9 Summary 10.10 Bibliography Chapter 11: The P4 Domain-Specific Language 11.1 P4 Version 16 11.2 Using the P4 Language 11.3 Getting to Know the Portable Switch Architecture 11.4 Looking at a P4 Example 11.5 Implementing the P4Runtime API 11.6 Understanding the P4 INT 11.7 Extending P4 11.7.1 Portable NIC Architecture 11.7.2 Language Composability 11.7.3 Better Programming and Development Tools 11.8 Summary 11.9 Bibliography Chapter 12: Management Architectures for DS Platforms 12.1 Architectural Traits of a Management Control Plane 12.2 Declarative Configuration 12.3 Building a Distributed Control Plane as a Cloud-Native Application 12.4 Monitoring and Troubleshooting 12.5 Securing the Management Control Plane 12.6 Ease of Deployment 12.7 Performance and Scale 12.8 Failure Handling 12.9 API Architecture 12.10 Federation 12.10.1 Scaling a Single SDSP 12.10.2 Distributed Multiple SDSPs 12.10.3 Federation of Multiple SDSPs 12.11 Scale and Performance Testing 12.12 Summary 12.13 Bibliography Index

    15 in stock

    £34.19

  • VCADCV VMware Certified Associate on vSphere

    John Wiley & Sons Inc VCADCV VMware Certified Associate on vSphere

    1 in stock

    Book SynopsisUse this expert guide to prepare for the VCA-DCV exam VCA-DCV VMware Certified Associate on vSphere Study Guide: VCAD-510 is a comprehensive study guide for the VMware Certified Associate Data Center Virtualization exam. Hands-on examples, real-world scenarios, and expert review questions cover the full exam blueprint, and the companion website offers a suite of tools to help you prepare for the exam including practice exams, electronic flashcards, and a glossary of key terms. In addition, the website includes videos that demonstrate how to complete the more challenging tasks. Focused on practical skills, this study guide not only prepares you for the certification exam, but also for the duties expected of a VCA. The VMware Certified Associate-Data Center Virtualization certification targets those with limited virtualization and VMware data center technology experience, providing a springboard to the popular VMware Certified Professional-Data Center VirtualizaTable of ContentsIntroduction xv Assessment Test xxi Chapter 1 Intro to Virtualization 1 What Is Data Center Virtualization? 2 Virtualization Then and Now 3 Physical and Virtual Data Center Components 4 Physical Data Center Components 4 Virtual Data Center Components 5 Physical and Virtual Component Differences 7 Benefits of Using Virtualization 9 Online Tools 13 Summary 14 Exam Essentials 15 Review Questions 16 Chapter 2 VMware Solutions 21 Availability Challenges 22 VMware Availability Products and Technologies 23 Management Challenges 27 VMware Management Products and Technologies 27 Scalability Challenges 28 VMware Scalability Products and Technologies 29 Optimization Challenges 31 VMware Optimization Products and Technologies 32 Summary 36 Exam Essentials 37 Review Questions 39 Chapter 3 vSphere Core Components 43 Virtual Machines 44 What Is a Virtual Machine, Anyway? 44 What Can You Do with Virtual Machines? 45 ESXi Hypervisor 47 vCenter Server 47 vMotion 48 Distributed Resource Scheduler 49 Distributed Power Management 49 Storage vMotion 50 Storage DRS 50 Ftoc.indd 03/24/2015 Page xi vSphere Data Protection 51 High‐Availability Configuration 51 Fault Tolerance 52 vSphere Replication 52 Migration 53 High Availability 54 Host HA 55 Virtual Machine HA 56 Applications HA 57 Fault Tolerance 57 Clusters and Resource Pools 58 Clusters 58 Resource Pools 59 Other VMware Data Center Products 61 vCenter Operations Manager 61 vSphere Data Protection 62 Nsx 62 Virtual SAN 62 vCenter Site Recovery Manager 62 Summary 63 Exam Essentials 64 Review Questions 65 Chapter 4 Storage in a VMware Environment 71 Physical vs. Virtual Storage 72 What Is Shared Storage? 73 VMware Storage Types 75 Local Storage 75 Fibre Channel 76 iSCSI 77 Network File System 77 Virtual Machine File System 78 The VMFS vs. the NFS 78 Disk Provisioning 78 Thick Provisioning 79 Thin Provisioning 80 VMware Virtual Storage Technologies 82 Summary 83 Exam Essentials 84 Review Questions 86 Chapter 5 Networking in a VMware Environment 91 Differentiate Physical and Virtual Networking 92 Physical Switches 92 Ftoc.indd 03/24/2015 Page xii Virtual Switches 94 Differences Between Physical and Virtual Switches 97 Differentiate VMware Virtual Switch Technologies 97 Standard Virtual Switches 98 Distributed Virtual Switches 98 Identify VMware Virtual Switch Components 101 Standard Virtual Switch 101 Distributed Virtual Switch 102 Identify Common Virtual Switch Policies 103 Port Group Policies 103 Distributed Virtual Switch Policies 106 Identify Capabilities of Network I/O Control 108 Summary 113 Exam Essentials 113 Review Questions 115 Chapter 6 Business Challenges Meet VMware Solutions 119 Availability Challenges and Solutions 120 vMotion 121 Storage vMotion 121 Virtual Machine Snapshots 122 High Availability 123 Fault Tolerance 123 vSphere Replication 124 vSphere Data Protection 124 Site Recovery Manager 125 Management Challenges and Solutions 126 Virtual Machines/Physical‐to‐Virtual Conversions 126 vCenter Server 126 vCenter Configuration Manager 127 Optimization Challenges and Solutions 128 vCenter Operations Manager 128 Thin Provisioning 129 Distributed Switches with QoS 130 Distributed Power Management 130 Storage I/O Control 131 vFlash 131 VM Storage Profiles 131 Memory Ballooning 132 Transparent Page Sharing 132 Scalability Challenges and Solutions 133 Virtual Machines 133 Virtual Machine Templates 134 Distributed Resource Scheduler 135 Ftoc.indd 03/24/2015 Page xiii Storage DRS 135 vSphere Storage Appliance 136 Hot Add 136 Distributed Virtual Switches 136 The Differences between SMB and Enterprise Challenges and Solutions 137 Summary 138 Exam Essentials 139 Review Questions 140 Appendices 145 Appendix A Answers to Review Questions 147 Appendix B Online Resources 159 Index 165

    1 in stock

    £25.60

  • Mastering VMware vSphere 6.7

    John Wiley & Sons Inc Mastering VMware vSphere 6.7

    15 in stock

    Book SynopsisMaster your virtual environment with the ultimate vSphere guide Mastering VMware vSphere 6.7is the fully updated edition of the bestselling guide to VMware's virtualization solution. With comprehensive coverage of this industry-leading toolset, this book acts as an informative guide and valuable reference. Step-by-step instruction walks you through installation, configuration, operation, security processes, and much more as you conquer the management and automation of your virtual environment. Written by certified VMware vExperts, this indispensable guide provides hands-on instruction and detailed conceptual explanations, anchored by practical applications and real-world examples. This book is the ultimate guide to vSphere, helping administrators master their virtual environment. Learn to: Install, configure, and manage the vCenter Server componentsLeverage the Support Tools to provide maintenance and updatesCreate and configure virtual networks, storage devices, and virtual machineTable of ContentsContents Foreword xxiii Introduction xxv Chapter 1 • Introducing VMware vSphere 6.7 1 Exploring VMware vSphere 6.7 1 Examining the Products in the vSphere Suite 3 Examining the Features in VMware vSphere 8 Licensing VMware vSphere 17 Why Choose vSphere? 20 The Bottom Line 22 Chapter 2 • Planning and Installing VMware ESXi 23 VMware ESXi Architecture 23 Understanding the ESXi Hypervisor 23 Examining the ESXi Components 24 Planning a VMware vSphere Deployment 25 Choosing a Server Platform 26 Determining a Storage Architecture 28 Integrating with the Network Infrastructure 29 Deploying VMware ESXi 30 Installing VMware ESXi Interactively 31 Performing an Unattended Installation of VMware ESXi 35 Deploying VMware ESXi with vSphere Auto Deploy 38 Performing Post-installation Configuration 40 Reconfiguring the Management Network 40 Using the vSphere Host Client 42 Configuring Time Synchronization 43 Configuring Name Resolution 45 The Bottom Line 46 Chapter 3 • Installing and Configuring vCenter Server .47 Introducing vCenter Server 47 Centralizing User Authentication Using vCenter Single Sign-On 49 Understanding the Platform Services Controller 52 Using the vSphere Web Client for Administration 53 Providing an Extensible Framework 54 Choosing the Version of vCenter Server 55 Planning and Designing a vCenter Server Deployment 56 Sizing Hardware for vCenter Server 56 Planning for vCenter Server Availability 58 Running vCenter Server and Its Components as VMs 60 Installing vCenter Server and Its Components 63 Installing vCenter Server in an Enhanced Linked Mode Group 74 Exploring vCenter Server 77 The vSphere Web Client Home Screen 78 Using the Navigator 80 Creating and Managing a vCenter Server Inventory 80 Understanding Inventory Views and Objects 80 Creating and Adding Inventory Objects 83 Exploring vCenter Server’s Management Features 86 Understanding Basic Host Management 86 Examining Basic Host Configuration 89 Using Scheduled Tasks 93 Using the Events and Events Consoles in vCenter Server 95 Working with Host Profiles 95 Tags and Custom Attributes 99 Managing vCenter Server Settings 102 General vCenter Server Settings 102 Licensing 105 Message of the Day 106 Advanced Settings 106 Auto Deploy 106 vCenter HA A 106 Key Management Servers 106 Storage Providers 106 vSphere Web Client Administration 106 Roles 107 Licensing 107 vCenter Solutions Manager 107 System Configuration 107 VMware Appliance Management Administration 109 Summary 110 Monitor 111 Access 113 Networking 113 Time 113 Services 113 Update 114 Administration 114 Syslog 114 Backup 115 The Bottom Line 115 Chapter 4 • vSphere Update Manager and the vCenter Support Tools .117 vSphere Update Manager 117 vSphere Update Manager and the vCenter Server Appliance 120 Installing the Update Manager Download Service (Optional) 121 The vSphere Update Manager Plug-in 122 Reconfiguring the VUM or UMDS Installation with the Update Manager Utility 123 Upgrading VUM from a Previous Version 124 Configuring vSphere Update Manager 124 Creating Baselines 130 Routine Updates 134 Attaching and Detaching Baselines or Baseline Groups 135 Performing a Scan 137 Staging Patches 141 Remediating Hosts 142 Upgrading VMware Tools 145 Upgrading Host Extensions 148 Upgrading Hosts with vSphere Update Manager 148 Importing an ESXi Image and Creating the Host Upgrade Baseline 148 Upgrading a Host 151 Upgrading VM Hardware 152 Performing an Orchestrated Upgrade 154 Investigating Alternative Update Options 155 Using vSphere Update Manager PowerCLI 155 Upgrading and Patching without vSphere Update Manager 156 vSphere Auto Deploy 157 Deploying Hosts with Auto Deploy 157 vCenter Support Tools 172 ESXi Dump Collector 172 Other vCenter Support Tools 175 The Bottom Line 176 Chapter 5 • Creating and Configuring a vSphere Network .179 Putting Together a vSphere Network 179 Working with vSphere Standard Switches 182 Comparing Virtual Switches and Physical Switches 183 Understanding Ports and Port Groups 184 Understanding Uplinks 186 Configuring the Management Network 189 Configuring VMkernel Networking 192 Enabling Enhanced Multicast Functions 197 Configuring TCP/IP Stacks 198 Configuring Virtual Machine Networking 200 Configuring VLANs 202 Configuring NIC Teaming 207 Using and Configuring Traffic Shaping 219 Bringing It All Together 220 Working with vSphere Distributed Switches 224 Creating a vSphere Distributed Switch 224 Removing an ESXi Host from a Distributed Switch 229 Removing a Distributed Switch 230 Managing Distributed Switches 231 Working with Distributed Port Groups 234 Managing VMkernel Adapters 240 Using NetFlow on vSphere Distributed Switches 245 Enabling Switch Discovery Protocols 247 Enabling Enhanced Multicast Functions 248 Setting Up Private VLANs 249 Configuring LACP 252 Configuring Virtual Switch Security 256 Understanding and Using Promiscuous Mode 257 Allowing MAC Address Changes and Forged Transmits 258 The Bottom Line 262 Chapter 6 • Creating and Configuring Storage Devices .265 Reviewing the Importance of Storage Design 265 Examining Shared Storage Fundamentals 267 Comparing Local Storage with Shared Storage 269 Defining Common Storage Array Architectures 271 Explaining RAID 273 Understanding vSAN 278 Understanding Midrange and External Enterprise Storage Array Design 282 Choosing a Storage Protocol 284 Making Basic Storage Choices 299 Implementing vSphere Storage Fundamentals 301 Reviewing Core vSphere Storage Concepts 302 Understanding Virtual Volumes 318 SCs vs LUNs 320 Storage Policies 320 Virtual Volumes 321 Working with VMFS Datastores 322 Working with Raw Device Mappings 337 Working with NFS Datastores 339 Working with vSAN 347 Working with Virtual Machine–Level Storage Configuration 349 Leveraging SAN and NAS Best Practices 361 The Bottom Line 366 Chapter 7 • Ensuring High Availability and Business Continuity .369 Understanding the Layers of High Availability 369 Clustering VMs 371 Introducing Network Load Balancing Clustering 371 Introducing Windows Server Failover Clustering 372 Implementing vSphere High Availability 384 Understanding vSphere High Availability Clusters 384 Understanding vSphere High Availability’s Core Components 385 Enabling vSphere HA 389 Configuring vSphere High Availability 393 Configuring vSphere HA Groups, Rules, Overrides, and Orchestrated VM Restart 409 Managing vSphere High Availability 413 Introducing vSphere SMP Fault Tolerance 415 Using vSphere SMP Fault Tolerance with vSphere High Availability 421 Examining vSphere Fault Tolerance Use Cases 421 Planning for Business Continuity 422 Providing Data Protection 422 Recovering from Disasters 426 Using vSphere Replication 427 The Bottom Line 432 Chapter 8 • Securing VMware vSphere .433 Overview of vSphere Security 433 Securing ESXi Hosts 434 Working with ESXi Authentication 434 Controlling Access to ESXi Hosts 439 Keeping ESXi Hosts Patched 447 Managing ESXi Host Permissions 447 Configuring ESXi Host Logging 455 Securing the ESXi Boot Process 456 Reviewing Other ESXi Security Recommendations 459 Securing vCenter Server 459 Managing vSphere Certificates 460 Working with Certificate Stores 460 Getting Started with Certificate Management 463 Authenticating Users with Single Sign-On 465 Understanding the vpxuser Account 469 Managing vCenter Server Permissions 470 Configuring vCenter Server Appliance Logging 482 Securing Virtual Machines 483 Configuring a Key Management Server for VM and VSAN Encryption 483 Virtual Trusted Platform Module 2.0 490 Configuring Network Security Policies 491 Keeping VMs Patched 492 The Bottom Line 492 Chapter 9 • Creating and Managing Virtual Machines .495 Understanding Virtual Machines 495 Examining Virtual Machines from the Inside 495 Examining Virtual Machines from the Outside 498 Creating a Virtual Machine 503 Choosing Values for Your New Virtual Machine 513 Sizing Virtual Machines 514 Naming Virtual Machines 516 Sizing Virtual Machine Hard Disks 516 Virtual Machine Graphics 518 Installing a Guest Operating System 518 Working with Installation Media 519 Using the Installation Media 521 Working in the Virtual Machine Console 523 Installing VMware Tools 524 Installing VMware Tools in Windows 525 Installing VMware Tools in Linux 529 Managing Virtual Machines 532 Adding or Registering Existing VMs 532 Changing VM Power States 534 Removing VMs 535 Deleting VMs 535 Modifying Virtual Machines 536 Changing Virtual Machine Hardware 536 Using Virtual Machine Snapshots 541 The Bottom Line 546 Chapter 10 • Using Templates and vApps .549 Cloning VMs 549 Creating a Customization Specification 550 Cloning a Virtual Machine 555 Introducing vSphere Instant Cloning 558 Creating Templates and Deploying Virtual Machines 561 Cloning a Virtual Machine to a Template 563 Deploying a Virtual Machine from a Template 564 Using OVF Templates 566 Deploying a VM from an OVF Template 567 Exporting a VM as an OVF Template 569 Examining OVF Templates 571 Using Content Libraries 573 Content Library Data and Storage 573 Content Library Synchronization 574 Creating and Publishing a Content Library 574 Subscribing to a Content Library 575 Operating Content Libraries 577 Working with vApps 579 Creating a vApp 580 Editing a vApp 581 Changing a vApp’s Power State 586 Cloning a vApp 586 Importing Machines from Other Environments 587 The Bottom Line 588 Chapter 11 • Managing Resource Allocation .591 Reviewing Virtual Machine Resource Allocation 591 Working with Virtual Machine Memory 594 Understanding ESXi Advanced Memory Technologies 595 Controlling Memory Allocation 599 Managing Virtual Machine CPU Utilization 608 Default CPU Allocation 609 Setting CPU Affinity 610 Using CPU Reservations 611 Using CPU Limits 612 Using CPU Shares 613 Summarizing How Reservations, Limits, and Shares Work with CPUs 615 Using Resource Pools 615 Configuring Resource Pools 616 Understanding Resource Allocation with Resource Pools 619 Regulating Network I/O Utilization 625 Controlling Storage I/O Utilization 630 Enabling Storage I/O Control 632 Configuring Storage Resource Settings for a Virtual Machine 635 Using Flash Storage 639 The Bottom Line 643 Chapter 12 • Balancing Resource Utilization .645 Comparing Utilization with Allocation 645 Exploring vMotion 646 Examining vMotion Requirements 650 Performing a vMotion Migration within a Cluster 653 Ensuring vMotion Compatibility 656 Using Per-Virtual-Machine CPU Masking 656 Using Enhanced vMotion Compatibility 658 Using Storage vMotion 662 Combining vMotion with Storage vMotion 665 Cross-vCenter vMotion 668 Examining Cross-vCenter vMotion Requirements 669 Performing a Cross-vCenter Motion 670 Exploring vSphere Distributed Resource Scheduler 671 Understanding Manual Automation Behavior 672 Reviewing Partially Automated Behavior 672 Examining Fully Automated Behavior 673 Working with Distributed Resource Scheduler Rules 674 Working with Storage DRS 682 Creating and Working with Datastore Clusters 683 Configuring Storage DRS 686 The Bottom Line 694 Chapter 13 • Monitoring VMware vSphere Performance .697 Overview of Performance Monitoring 697 Using Alarms 698 Understanding Alarm Scopes 700 Creating Alarms 700 Managing Alarms 706 Working with Performance Charts 708 Overview Layout 708 Advanced Layout 710 Working with esxtop 719 Monitoring CPU Usage 721 Monitoring Memory Usage 725 Monitoring Network Usage 727 Monitoring Disk Usage 729 The Bottom Line 732 Chapter 14 • Automating VMware vSphere 735 Why Use Automation? 735 vSphere Automation Options 736 Automating with PowerCLI 737 PowerShell and PowerCLI 737 What’s New in PowerCLI 10 741 Installing and Configuring PowerCLI on Windows 741 Installing and Configuring PowerCLI on macOS 745 Installing and Configuring PowerCLI on Linux 747 Additional PowerCLI Capabilities 749 Getting Started with PowerCLI 750 Building PowerCLI Scripts 755 PowerCLI Advanced Capabilities 767 Additional Resources 771 The Bottom Line 772 Appendix A • The Bottom Line .775 Chapter 1: Introducing VMware vSphere 6.7 775 Chapter 2: Planning and Installing VMware ESXi 776 Chapter 3: Installing and Configuring vCenter Server 777 Chapter 4: vSphere Update Manager and the vCenter Support Tools 780 Chapter 5: Creating and Configuring a vSphere Network 781 Chapter 6: Creating and Configuring Storage Devices 783 Chapter 7: Ensuring High Availability and Business Continuity 787 Chapter 8: Securing VMware vSphere 788 Chapter 9: Creating and Managing Virtual Machines 790 Chapter 10: Using Templates and vApps 792 Chapter 11: Managing Resource Allocation 794 Chapter 12: Balancing Resource Utilization 796 Chapter 13: Monitoring VMware vSphere Performance 798 Chapter 14: Automating VMware vSphere 799 Index 801

    15 in stock

    £38.00

  • Linux Containers and Virtualization

    APress Linux Containers and Virtualization

    1 in stock

    Book SynopsisTable of ContentsChapter 1: Virtualization Basics.- Chapter 2: Hypervisor.- Chapter 3: Namespaces.- Chapter 4: Cgroups.- Chapter 5: Layered File Systems.- Chapter 6: Creating a Simple Container Framework.- Chapter 7: Introduction to Rust.- Chapter 8: Containers in Rust.

    1 in stock

    £31.99

  • Learning VMware Workstation for Windows

    APress Learning VMware Workstation for Windows

    Out of stock

    Book SynopsisOnce built you'll see how to manage these virtual machines, before finally upgrading your VMware Workstation Pro environment. In the end, you'll learn how to build and manage different virtual machines running on different operating systems and build an ESXi lab environment with VMware Workstation.Table of Contents1. Introduction to hypervisors2. Introduction to VMware Workstation3. Configuring CPU resources4. Configuring Storage Resources5. Configuring Network Resources6. Virtual hardware7. Installing VMware Workstation8. A guided tour of the UI9. Creating a Windows VM10. Installing VMware vSphere11. Configuring VM options12. Managing and working with existing VMs13. Upgrading to a new version of Workstation

    Out of stock

    £47.49

  • LISP Network, The: Evolution to the

    Pearson Education (US) LISP Network, The: Evolution to the

    10 in stock

    Book SynopsisIn an era of ubiquitous clouds, virtualization, mobility, and the Internet of Things, information and resources must be accessible anytime, from anywhere. Connectivity to devices and workloads must be seamless even when people move: location must be fully independent of device identity. The LISP protocol makes all this possible. LISP is address-family agnostic, so it can encapsulate any protocol within another, and route across virtually any network. LISP applications include very-large-scale virtualization for WANs and multi-tenant data centers; host mobility and location services across data centers; advanced mobile networks; ad-hoc networks; IPv6 enablement, seamless site multi-homing; workload mobility; cellular mobility; multicast and traffic engineering, and more. The LISP Network is the first comprehensive, in-depth guide to LISP concepts, architecture, techniques, and applications. Co-authored by LISP co-creator Dino Farinacci and two pioneering developers of Cisco's LISP implementation, this guide will help you plan and implement LISP in any data center, WAN edge, or service provider core network. Largely implementation-agnostic, this book offers actionable answers to questions such as: What problems does LISP address, and how does it address them? How does LISP work? What are LISP's applications, and how do you architect LISP solutions for each application? How does LISP fit with SDN, IoT, and IPv6? What is LISP's future? The LISP Network concludes with detailed deployment case studies of several LISP applications, each drawn from the authors' pioneering experience.Table of Contents 1. LISP and the Future of Networking 2. LISP Architecture 3. LISP Unicast Handling Fundamentals 4. LISP Multicasting Fundamentals 5. Traffic Engineering and LISP 6. LISP Host Mobility 7. LISP Network Virtualization/Multi-tenancy 8. LISP and the Multi-homed Internet Edge 9. Programmability, Policy and LISP: Integration and Application 10. LISP and the Internet of Things 11. LISP Application Deployment, Configuration and Troubleshooting

    10 in stock

    £39.59

  • LISP Network Deployment and Troubleshooting: The

    Pearson Education (US) LISP Network Deployment and Troubleshooting: The

    1 in stock

    Book SynopsisThe LISP overlay protocol helps organizations provide seamless connectivity to devices and workloads wherever they move, enabling open and highly scalable networks with unprecedented flexibility and agility. LISP Network Deployment and Troubleshooting is the single source for understanding, configuring and troubleshooting LISP on Cisco IOS, IOS XR and NX-OS platforms. It brings together comprehensive coverage of how LISP works, how it integrates with leading Cisco platforms, how to configure it for maximum efficiency, and how to troubleshoot LISP-related issues such as scalability and convergence. Focusing on design and deployment in real production environments, leading Cisco LISP engineers Tarique Shakil and Vinit Jain offer authoritative coverage of deploying LISP, verifying its operation, and optimizing its performance in widely diverse environments. Drawing on their unsurpassed experience supporting LISP deployments, they share detailed configuration examples, templates, and best practices designed to help you succeed with LISP no matter how you intend to use it. Coverage includes: Problems LISP solves, current use cases, and powerful emerging applications Standards and architecture, including control and data planes, packets, messaging, and communication processes LISP IPv4 unicast routing, IPv6 enablement/transition, and multicast LISP mobility in traditional data center and VXLAN fabrics LISP network virtualization and multi-tenancy LISP in the enterprise multi-homed Internet/WAN edge Securing, managing, and automating LISP Table of Contents 1. LISP Introduction 2. LISP Architecture 3. LISP IPv4 Unicast Routing 4. LISP IPv6 Unicast Routing 5. LISP Multicast Routing Fundamentals 6. LISP IP Mobility in Traditional Data Center Network 7. LISP IP Mobility in Modern Data Center Fabrics 8. LISP Network Virtualization/Multi-tenancy 9. LISP in the Enterprise Multi-homed Internet/WAN Edge 10. LISP Security

    1 in stock

    £40.49

  • Cisco Digital Network Architecture: Intent-based

    Pearson Education (US) Cisco Digital Network Architecture: Intent-based

    2 in stock

    Book SynopsisThis guide systematically introduces Cisco’s Digital Network Architecture (DNA), the enterprise network architecture for the next decade. Combining indispensable new insider information with content previously scattered through multiple technical documents, Cisco Digital Network Architecture combines technical depth, coherence, and comprehensiveness. This “living book” will be supported with regular online updates at a Cisco Press DNA website, offering a single authoritative source for everyone involved with DNA planning, implementation, and operation. Authored by insiders responsible for helping Cisco’s largest customers succeed with DNA, it: Addresses emerging trends now driving business transformation Explains why networks must become radically more intelligent, flexible, and adaptable Shows how DNA empowers businesses by coherently integrating virtualization, automation, analytics, and cloud services. Authoritative and fully up-to-date, Cisco Digital Network Architecture will help technical professionals, decision-makers, and consultants prepare to drive maximum value from next-generation networking.Table of Contents Chapter 1 Why Transform Your Business Digitally? Chapter 2 The Business Value of DNA 1 Chapter 3 Designing for Humans Chapter 4 Introducing the Digital Network Architecture Chapter 5 The Digital Network Architecture Blueprint Chapter 6 Introduction to DNA Infrastructure Chapter 7 Hardware Innovations Chapter 8 Software Innovations Chapter 9 Protocol Innovations Chapter 10 DNA Infrastructure–Virtualization Chapter 11 DNA Cloud Chapter 12 Introduction to DNA Automation Chapter 13 Device Programmability Chapter 14 DNA Automation Chapter 15 Introduction to DNA Analytics Chapter 16 DNA Analytics Components Chapter 17 DNA Analytics Engines Chapter 18 DNA Virtualization Solutions: Enterprise Network Functions Virtualization and Secure Agile Exchange Chapter 19 DNA Software-Defined Access Chapter 20 DNA Application Policy Chapter 21 DNA Analytics and Assurance Chapter 22 DNA Encrypted Traffic Analytics Chapter 23 DNA Evolution

    2 in stock

    £39.59

  • OpenStack in Action

    Manning Publications OpenStack in Action

    4 in stock

    Book Synopsis DESCRIPTION In the cloud computing model, a cluster of physical computers hosts an environment that provides shared services (public and private) and offers the flexibility to easily add, remove, and expand virtual servers and applications. OpenStack is an open source framework that can be installed on individual physical servers to a cloud platform and enables the building of custom infrastructure (IaaS), platform (PaaS), and software (SaaS) services without the high cost and vendor lock-in associated with proprietary cloud platforms. OpenStack in Action offers real world use cases and step-by-step instructions to develop cloud platforms from inception to deployment. It explains the design of both the physical hardware cluster and the infrastructure services needed to create a custom cloud platform. It shows how to select and set up virtual and physical servers, implement software-defined networking, and the myriad other technical details required to design, deploy, and operate an OpenStack cloud in an enterprise. It also discusses the cloud operation techniques needed to establish security practices, access control, efficient scalability, and day-to-day DevOps practices. RETAIL SELLING POINTS Real world examples Thorough step-by-step instruction Shows how to harness the power of OpenStack AUDIENCE The book is perfect systems administrators, developers, and architects interested in the design, construction, and operation of clouds using OpenStack. No prior experience with OpenStack or cloud development required. ABOUT THE TECHNOLOGY OpenStack as a framework for managing, designing, defining, and utilizing cloud resources. There are over 13k OpenStack contributors in over 131 countries. Every major IT vendor has some form of OpenStack representation, even those with directly competing products.

    4 in stock

    £39.59

  • Docker in Action

    Manning Publications Docker in Action

    1 in stock

    Book SynopsisThe idea behind Docker is simple. Create a tiny virtual environment called a container that holds just your application and its dependencies. The Docker engine uses the host operating system to keep track of your containers. Applications running inside containers share resources, making their footprints small. They are easy to install, manage, and remove. Docker in Action, Second Edition teaches you to create, deploy, and manage applications hosted in Docker containers running on Linux. Fully updated, with four new chapters and revised best practices and examples, this second edition begins with a clear explanation of the Docker model. Then, you go hands-on with packaging applications, testing, installing, running programs securely, and deploying them across a cluster of hosts. With examples showing how Docker benefits the whole dev lifecycle, you'll discover techniques for everything from dev-and-test machines to full-scale cloud deployments.Trade Review'Jeff and Stephen took their battle-hardened experience and updated this already great book with new details and examples.' Bret Fisher, Docker Captain and Container Consultant 'Strikes the perfect balance between instructional manual and reference book. Ideal for everyone from beginner to seasoned pro.' Paul G. Brown, Diversified Services Network 'A must-have for those looking to level-up their organization's software and infrastructure virtualization.' Chris Phillips, Dell 'An excellent and detailed resource. Useful for developers, IT admins, and dev-ops engineers.' Ethan Rivett, PowerleyTable of Contentstable of contents READ IN LIVEBOOK 1WELCOME TO DOCKER 1.1What is Docker? 1.1.1“Hello, World” 1.1.2Containers 1.1.3Containers are not virtualization 1.1.4Running software in containers for isolation 1.1.5Shipping containers 1.2What problems does Docker solve? 1.2.1Getting organized 1.2.2Improving portability 1.2.3Protecting your computer 1.3Why is Docker important? 1.4Where and when to use Docker 1.5Docker in the Larger Ecosystem 1.6Getting help with the Docker command line Summary PART 1: PROCESS ISOLATION AND ENVIRONMENT-INDEPENDENT COMPUTING READ IN LIVEBOOK 2RUNNING SOFTWARE IN CONTAINERS READ IN LIVEBOOK 3SOFTWARE INSTALLATION SIMPLIFIED READ IN LIVEBOOK 4WORKING WITH STORAGE AND VOLUMES READ IN LIVEBOOK 5SINGLE-HOST NETWORKING READ IN LIVEBOOK 6LIMITING RISK WITH RESOURCE CONTROLS PART 2: PACKAGING SOFTWARE FOR DISTRIBUTION READ IN LIVEBOOK 7PACKAGING SOFTWARE IN IMAGES READ IN LIVEBOOK 8BUILDING IMAGES AUTOMATICALLY WITH DOCKERFILES READ IN LIVEBOOK 9PUBLIC AND PRIVATE SOFTWARE DISTRIBUTION READ IN LIVEBOOK 10IMAGE PIPELINES PART 3: HIGHER-LEVEL ABSTRACTIONS AND ORCHESTRATION READ IN LIVEBOOK 11SERVICES WITH DOCKER AND COMPOSE READ IN LIVEBOOK 12FIRST-CLASS CONFIGURATION ABSTRACTIONS READ IN LIVEBOOK 13ORCHESTRATING SERVICES ON A CLUSTER OF DOCKER HOSTS WITH SWARM

    1 in stock

    £27.89

  • Podman in Action

    Manning Publications Podman in Action

    1 in stock

    Book SynopsisDiscover Podman, a next-generation container engine that manages containers rootlessly and provides extra layers of exceptional security unavailable in Docker and other container platforms. In Podman in Action you will learn how to: Build and run containers in rootless mode Develop and manage pods Use SystemD to oversee a container's lifecycle Work with the Podman service via Python Keep your containers confined using Podman security features Manage containerized applications on edge devices Podman in Action shows you how to deploy containerized applications on Linux, Windows, and MacOS systems using Podman. Written by Daniel Walsh, who leads the Red Hat Podman team, this book teaches you how to securely manage the entire application lifecycle without human intervention. It also demonstrates how, with Podman, you can easily convert containerized applications into Kubernetes-based microservices. about the technology Podman is a daemonless container engine that lets you build and run containers on all Linux distributions, Windows, and MacOS. It supports the fork exec model for running containers, which allows for better integration with a system and makes it easier to run rootless. It also boasts unique advanced features, such as the ability to create and run Pods that are similar to Kubernetes, and execute Kubernetes YAML. And if you're not ready to completely move on from Docker, Podman can run as a service and support the Docker API in a way that works with docker-compose and docker-py. about the reader For developers or system administrators experienced with Linux and the basics of Docker.

    1 in stock

    £41.39

  • Virtual Civilization in the 21st Century

    Nova Science Publishers Inc Virtual Civilization in the 21st Century

    2 in stock

    Book SynopsisThis book analyzes a new phenomenon in civilization: the transformation of the current "Information Wave" into virtual civilization. In the 21st century, the "real-space" of the world civilization, due to the massive, network-intensive use of computers world-wide, gained the virtual space known as cyberspace. Cyberspace is a product of information technology exemplified by the Internet as the world system of information highway(s) [INFOSTRADA(S)] which forms a digital space containing all sorts of files and communication exchanges practiced in online and real-time modes. For the first time in 6,000 years of human civilization, society has become a quantum society, which can be real and virtual at the same time. The virtual society is invisible for those who do not use computer networks. Even for those who do use them, cyberspace access requires some sort of commercial transactions-oriented activities (ex. on Amazon or eBay and others), searching on Google or Yahoo or communicating as a member of one of social networks, e.g.. Facebook, Twitter, LinkedIn, and others.

    2 in stock

    £159.74

  • Virtual Civilization in the 21st Century

    Nova Science Publishers Inc Virtual Civilization in the 21st Century

    2 in stock

    Book SynopsisThis book analyzes a new phenomenon in civilization: the transformation of the current "Information Wave" into virtual civilization. In the 21st century, the "real-space" of the world civilization, due to the massive, network-intensive use of computers world-wide, gained the virtual space known as cyberspace. Cyberspace is a product of information technology exemplified by the Internet as the world system of information highway(s) [INFOSTRADA(S)] which forms a digital space containing all sorts of files and communication exchanges practiced in online and real-time modes. For the first time in 6,000 years of human civilization, society has become a quantum society, which can be real and virtual at the same time. The virtual society is invisible for those who do not use computer networks. Even for those who do use them, cyberspace access requires some sort of commercial transactions-oriented activities (ex. on Amazon or eBay and others), searching on Google or Yahoo or communicating as a member of one of social networks, e.g.. Facebook, Twitter, LinkedIn, and others.

    2 in stock

    £81.59

  • Docker for Rails Developers

    The Pragmatic Programmers Docker for Rails Developers

    Out of stock

    Book SynopsisDocker does for DevOps what Rails did for web development--it gives you a new set of superpowers. Gone are works on my machine woes and lengthy setup tasks, replaced instead by a simple, consistent, Docker-based development environment that will have your team up and running in seconds. Gain hands-on, real-world experience with a tool that's rapidly becoming fundamental to software development. Go from zero all the way to production as Docker transforms the massive leap of deploying your app in the cloud into a baby step. Docker makes life as a Ruby and Rails developer easier. It helps build, ship, and run your applications, solving major problems you face every day. It allows you to run applications at scale, adding new resources as needed. Docker provides a reliable, consistent environment that's guaranteed to work the same everywhere. Docker lets you do all things DevOps without needing a PhD in infrastructure and operations. Want to spin up a cluster to run your app? No problem. Scale it up or down at will? You bet. Start by running a Ruby script without having Ruby installed on the local machine. Then Dockerize a Rails application and run it using containers, including creating your own custom Docker images tailored for running Rails apps. Describe your app declaratively using Docker Compose, specifying the software dependencies along with everything needed to run the application. Then set up continuous integration, as well as your deployment pipeline and infrastructure. Along the way, find out the best practices for using Docker in development and production environments. This book gives you a solid foundation on using Docker and fitting it into your development workflow and deployment process. What You Need: All you need is a Windows, Mac OS X or Linux machine to do development on. This book guides you through the process of installing Docker. Some basic familiarity with Linux/Unix is recommended even if you're using a Windows machine.

    Out of stock

    £24.64

  • Proxmox Cookbook

    Packt Publishing Limited Proxmox Cookbook

    1 in stock

    Book SynopsisOver 60 hands-on recipes to perform server virtualization and manage virtualized server solutions with ProxmoxAbout This Book Learn the process of installing, configuring, and managing Proxmox clusters Explore ways of integrating various storage systems with Proxmox Step-by-step and easy-to-learn instructions to build virtual environments of any size using ProxmoxWho This Book Is ForThis book is perfect for system administrators who want to learn to implement and administer Proxmox VE environments. Since this book will not cover the basics of Proxmox, a basic understanding of virtualization and networking with Proxmox VE is required. What You Will Learn Install and configure an enterprise grade, cluster-based virtual environment using Proxmox Manage a cluster with Graphical User Interface using datacenter, node, KVM, and OpenVZ menus among others Learn different ways of configuring your network and clusters to create complex cloud services Configure and manage the built-in Proxmox firewall to protect your virtual environment Integrate storage systems such as Ceph, Sheepdog, and ZFS for virtual machine management to suit your business needs Backup and restore your data via stop suspend, and snapshot modes Upgrade a Proxmox node with new releases and apply update patches through GUI or CLI Monitor the resources and virtual machines to maintain performance and uptime Explore commands used for Proxmox and Ceph cluster through CLIIn DetailProxmox VE goes head to head with big virtualization platforms without bearing the overheads of high costs and vendor lock-ins. Rock solid stability and extremely easy manageability gives Proxmox VE an edge in the world of virtualization. The Proxmox cluster file system (pmxcfs) is designed uniquely for storage of configuration files with high security and reliability. Its simplicity and robustness make it easy for system administrators to manage their systems efficiently. Proxmox VE's intuitive interface, high availability, and unique central management system puts it on par with the world's best virtualization platforms. Its simplicity and high quality of service is what makes it the foremost choice for most system administrators. Starting with a step-by-step installation of Proxmox nodes along with an illustrated tour of Proxmox graphical user interface where you will spend most of your time managing a cluster, this book will get you up and running with the mechanisms of Proxmox VE. Various entities such as Cluster, Storage, and Firewall are also covered in an easy to understand format. You will then explore various backup solutions and restore mechanisms, thus learning to keep your applications and servers safe. Next, you will see how to upgrade a Proxmox node with a new release and apply update patches through GUI or CLI. Monitoring resources and virtual machines is required on an enterprise level, to maintain performance and uptime; to achieve this, we learn how to monitor host machine resources and troubleshoot common issues in the setup. Finally, we will walk through some advanced configurations for VM followed by a list of commands used for Proxmox and Ceph cluster through CLI. With this focused and detailed guide you will learn to work your way around with Proxmox VE quickly and add to your skillset. Style and approachThis book is an inclusive and extensive handbook. It takes a pragmatic approach to complement your system admin skills and accomplish tasks within the Proxmox environment. It consists of illustrations and code-files to help you work with the data as you go from one recipe to the other.

    1 in stock

    £35.99

  • Mastering Probabilistic Graphical Models Using Python Master probabilistic graphical models by learning through realworld problems and illustrative code examples in Python

    15 in stock

    £35.99

  • Mastering VMware vSphere 6.7: Effectively deploy,

    Packt Publishing Limited Mastering VMware vSphere 6.7: Effectively deploy,

    1 in stock

    Book SynopsisUnleash the benefits of VMware vSphere 6.7 to provide a powerful, flexible and secure digital infrastructureKey Features Deep dive into areas like management, security, scalability, availability and more with vSphere 6.7 Design, deploy and manage VMware vSphere virtual datacenters Implement monitoring and security of VMware workloads with ease Book DescriptionvSphere 6.7 is the latest release of VMware’s industry-leading, virtual cloud platform. It allows organisations to move to hybrid cloud computing by enabling them to run, manage, connect and secure applications in a common operating environment.This up-to-date, 2nd edition provides complete coverage of vSphere 6.7. Complete with step-by-step explanations of essential concepts, practical examples and self-assessment questions, you will begin with an overview of the products, solutions and features of the vSphere 6.7 suite.You’ll learn how to design and plan a virtual infrastructure and look at the workflow and installation of components. You'll gain insight into best practice configuration, management and security. By the end the book you'll be able to build your own VMware vSphere lab that can run even the most demanding of workloads. What you will learn Explore the immense functionality of vSphere 6.7 Design, manage and administer a virtualization environment Get tips for the VCP6-DCV and VCIX6-DCV exams Understand how to implement different migration techniques across different environments Explore vSphere 6.7s powerful capabilities for patching, upgrading and managing the configuration of virtual environments. Understand core vSphere components Master resource management, disaster recovery, troubleshooting, monitoring and security Who this book is forThis book is for Administrators, Infrastructure Engineers, Architects, and Consultants with basic knowledge of VMware vSphere.Table of ContentsTable of Contents Evolution to vSphere 6.7 Design and plan a virtualization infrastructure Analysis and Assessment of an Existing Environment Deployment Workflow and Component Installation Configuring and Managing vSphere 6.7 Lifecycle Management, Patching, and Upgrading Manage networking resources Manage storage resources VM deployment and management VM Resource Management Availability and disaster recovery Securing and Protecting Your Environment Analyze and optimize your environment Troubleshooting your environment Building your own VMware vSphere Lab

    1 in stock

    £29.44

  • Ethik Im Cyberspace

    Peter Lang AG Ethik Im Cyberspace

    Out of stock

    Book SynopsisDie Virtuelle Realität lässt Menschen in Welten eintauchen, in denen ihr Verantwortungsbereich nur noch verwaschen erkennbar ist. Zudem generiert der Cyberspace Muster mit religiöser Qualität: Menschen erschaffen sich ihr virtuelles Double. Allein indem man in den Cyberspace eintaucht, kommen neurophysiologisch nachweisbare Glücksgefühle auf. Die Erlebnisgehalte werden dabei unwichtig; es kommt allein auf die subjektive Erlebnisintensität an. Das gesuchte Glück steigt insofern über die Welt hinaus in ein virtuelles Jenseits. Auf der einen Seite vervielfachen sich menschliche Identitäten, auf der anderen Seite gewinnen Phantasien Künstlicher Intelligenz an Kontur. Die Autoren gehen der Frage nach, welche Auswirkungen diese Entwicklung für ethische Subjekte hat, in denen sich Mensch und Maschine vermischen.

    Out of stock

    £50.00

  • DevOps Essentials Bootcamp

    BPB Publications DevOps Essentials Bootcamp

    1 in stock

    1 in stock

    £28.49

© 2025 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account