33 resultater (0,30324 sekunder)

Mærke

Butik

Pris (EUR)

Nulstil filter

Produkter
Fra
Butikker

Leadership Paradigms for Remote Agile Development - Pedro Henrique Lobato Sena - Bog - APress - Plusbog.dk

Leadership Paradigms for Remote Agile Development - Pedro Henrique Lobato Sena - Bog - APress - Plusbog.dk

If you are asking yourself Why are my engineers unable to deliver? , Why are so many engineers leaving? or Why is our software riddled with bugs? , then you''ve come to the right place. This book acts as a concise, practical guide on how to lead successful agile projects in a remote environment. The authors draw from industry experience and a wide range of fields and disciplines--from software engineering to criminology and sociology--to teach you how to maintain technical oversight, manage deadlines, and calibrate expectations, while also creating and maintaining a healthy remote work environment. You will gain both practical tips grounded in reality, while learning why such tips work by navigating the background on which they are founded--from Broken Window Theory, Labeling Theory to the Dunning-Kruger Effect. Leadership Paradigms for Remote Agile Development will show you how to avoid the most common mistakes and pitfalls that cause engineering projects to fail while at the same time maintaining high ethical standards. What You''ll Learn - Manage feedback, reduce bureaucracy, create and adapt processes - Understand what to look for in new hires - Carve out a solid road to success for any type of software project Who This Book Is For Anyone who is in, or wishes to move into, an IT leadership position, such as senior software engineers, founders, engineering managers, or team/tech leads.

DKK 307.00
1

Electronics Projects with the ESP8266 and ESP32 - Neil Cameron - Bog - APress - Plusbog.dk

Electronics Projects with the ESP8266 and ESP32 - Neil Cameron - Bog - APress - Plusbog.dk

Discover the powerful ESP8266 and ESP32 microcontrollers and their Wi-Fi communication. The ESP32 microcontroller features Bluetooth and BLE communication in addition to Wi-Fi. The book emphasizes practical projects and readers are guided through Wi-Fi and Bluetooth communication, mobile app design and build, ESP-NOW and LoRa communication, and signal generation. Projects throughout the book utilize the Wi-Fi functionality and processing power of the ESP microcontrollers. Projects are built in the Arduino IDE, so you don't need to download other programming software. Mobile apps are now ubiquitous, making the app build projects of the book very relevant, as are the web page design projects. In Electronics Projects with the ESP8266 and ESP32, you'll see how easy and practical it is to access information over the internet, develop web pages, build mobile apps to remotely control devices with speech recognition or incorporate Google Maps in a GPS route tracking app. You will· Build practical electronics projects with an ESP8266 or ESP32 microcontroller with Wi-Fi communication· Use the Wi-Fi function of the ESP8266 and ESP32 to update web pages· Communicate with your mobile phone or smart watch by Bluetooth Low Energy· Transmit and receive information to control remote devices over the internet· Understand the design and build of mobile apps for internet based applications· Apply your computer programming skills in C++, JavaScript, AJAX and JSON· Use WebSocket, MQTT brokers and IFTTT for fast two-way communication with webpagesWho This Book Is ForThe target audience is for Makers and Tinkerers who want to build internet/intranet based applications with more powerful microcontrollers, such as the ESP8266 or ESP32. A level of C++ programming expertise with the Arduino IDE is assumed, although all sketches are fully described and comprehensively commented.

DKK 455.00
1

The IT Support Handbook - Mike Halsey - Bog - APress - Plusbog.dk

Enterprise-Grade IT Security for Small and Medium Businesses - Denny Cherry - Bog - APress - Plusbog.dk

Enterprise-Grade IT Security for Small and Medium Businesses - Denny Cherry - Bog - APress - Plusbog.dk

Understand the IT security features that are needed to secure the IT infrastructure of a small to medium-size business. This book will give IT managers and executives a solid understanding of the different technology solutions that their business relies upon-or should be employing-in order to make reasoned decisions regarding the implementation of those features. Coverage includes multi-factor authentication, firewalls, zero-trust environments, network segmentation, remote access solutions, and the people aspects of security that are often overlooked and represent an organization''s biggest vulnerability. Chapters on the various technologies such as multi-factor authentication and zero-trust environments explain in plain English the values and benefits that each technology provides. Clear technical explanations are accompanied by business case explanations that explain the "why" of each technology and when each technology should be implemented. You will come away equipped to have business-driven discussions with your IT staff that allow for a productive balancing of the need for security with the need to do business and drive profits. You Will Learn - The importance of multi-factor authentication - The limits of what multi-factor authentication can protect - How firewalls are used to protect your company from attackers - What zero-trust environments are and what they mean - Whether zero-trust networks are what is needed to secure your own environment - The security benefits from implementing a network segmentation policy - The best ways to access files and resources from remote locations outside the office Who This Book Is For Managers and executives at small to medium-size businesses who want to understand the core aspects of IT security on which their business relies, business leaders who want to be able to follow along with and engage in discussions with IT professionals about security features, and leaders who are tasked with making decisions on which IT security features to implement

DKK 519.00
1

Sensors and Protocols for Industry 4.0 - Bharathi N - Bog - APress - Plusbog.dk

Sensors and Protocols for Industry 4.0 - Bharathi N - Bog - APress - Plusbog.dk

This book Identifies the right sensors and single board computers for any application to achieve the best performance in Industry 4.0 settings and applications. You''ll see what technologies apply the IIoT with elegant efficiency to drastically improve remote monitoring and controlling, decision making, and preventative maintenance. Start by learning exactly what Industry 4.0 is and advance your knowledge from simple Internet of Things projects to full-on Industrial IoT deployment. You''ll automate advanced processes, incorporate professional procedures, and take your IoT skills to a professional level. Then move into the protocols and standards expected for industrial applications of sensors at an industrial level. Match the right SBCs to the right use cases and sensor technologies to optimize efficiency and ensure peak performance. Then move into setting up a smart factory and monitoring your supply chain with tech. Finally, you''ll dive into programming with the Node-Red platform and Python packages for CPS. By the end of this book, you''ll have jumped from simple, home-based IoT systems up to industrial and professional applications. Conquer your supply chain and both forward and backward processes with accessible Maker tech! What You''ll Learn - - Support industrial applications of SBCs and Maker tech - - Achieve peak performance by combining the right sensors with the right processing boards - - Improve remote monitoring and controlling drastically for better decision making and preventative maintenance Who This Book Is For Students and aspiring professionals working with Internet of things technologies moving towards industrial applications. Prerequisite knowledge in basic Internet of Things, simple python concepts, automation, and industry procedures is required for this book. Engineers and scientists who are pursuing research and contributing to industrial internet of things might also benefit.

DKK 519.00
1

Reinventing ITIL and DevOps with Digital Transformation - Abhinav Krishna Kaiser - Bog - APress - Plusbog.dk

Reinventing ITIL and DevOps with Digital Transformation - Abhinav Krishna Kaiser - Bog - APress - Plusbog.dk

The second edition of this book has been fully updated to show how the DevOps way of working has continued to adapt to changing technologies. The ITIL processes which were an integral part of the DevOps world have been merged with the DevOps framework, reflecting the current emphasis on product models rather than viewing project and support models separately. This book starts with the basics of digital transformation before exploring how this works in practice: that is, people, processes and technology, and org structures. It delves into value streams that are the basis for ITIL and DevOps, highlighting the differences between the methods of the past and new methodologies needed to ensure products to meet contemporary expectations. This updated edition includes new chapters that discuss digital transformation for business success, introduce the battle tank framework, leading people in the digital world, managing work in a remote working model, and the product-led transformation model. These new chapters provide the guidance necessary to move beyond DevOps into a holistic digital transformation exercise. The ideas, recommendations, and solutions you''ll learn over the course of this book can be applied to develop solutions or create proposals for clients, and to deliver seamless services for DevOps projects. What You Will Learn - Understand digital transformation - Leverage the battle tank framework for digital transformation - Gain insight into the confluence of DevOps and ITIL - Adapt ITIL processes in DevOps projects - Move organizations from a project to a product-led model - Lead teams in a digital world - Manage the work of remote teams Who This Book Is For IT consultants and IT professionals who are looking for guidance to strategize, plan and implement digital transformation initiatives; design and redesign ITIL processes to adapt to the digital ways of working; moving organizations to product-led business; and leading people and managing work in the digital age.

DKK 476.00
1

Mastering Microsoft Teams - D'arce Hess - Bog - APress - Plusbog.dk

Mastering Microsoft Teams - D'arce Hess - Bog - APress - Plusbog.dk

Do you need to learn how to use Microsoft Teams? Are you questioning how to drive user adoption, govern content, and manage access for your Teams deployment? Either way, the second edition of this bestseller is your one-stop-shop to learning everything you need to know to find success with Microsoft Teams. Microsoft''s popular chat-based collaboration software has many rich features that enable teams to be more efficient, and save valuable time and resources. However, as with all software, there is a learning curve and pitfalls that should be avoided. Begin by learning the core components and use cases for Teams. From there, the authors guide you through ideas to create governance and adoption plans that make sense for your organization or customer. Wrap up with an understanding of features and services in progress, and a roadmap to the future of the product. What You Will Learn - Implement, use, and manage Microsoft Teams - Understand how Teams drives productivity and engagement by combining the functionality of Microsoft 365 Groups, SharePoint, OneDrive, Outlook, and other services in one location - Govern, explain, and use Teams in your organization - Use Teams in a structured way to reduce users'' time spent in meetings - Know the pitfalls to avoid that may create challenges in your usage of Teams - Become familiar with the functionality and components of Teams via walk-throughs, including opportunities for automating business processes in Teams - See how educators and students can use Teams to improve remote learning - Be aware of business productivity in a remote world with Microsoft Viva Who This Book Is For Anyone who wants to learn Microsoft Teams. To get the most out of the book, a basic understanding of Microsoft 365 and a subscription, including a Microsoft Teams license, is useful.

DKK 391.00
1

Salt Open - Andrew Mallett - Bog - APress - Plusbog.dk

Salt Open - Andrew Mallett - Bog - APress - Plusbog.dk

There is a rapid growth of automation in server rooms and data centers. The days of having many administrators running around busily configuring and maintaining servers are gone and have been replaced with droves of Salt-Minions; agents beavering away on the target nodes ensuring the configuration is as specified. This book covers Salt Open (also known as SaltStack Open) from the ground up and shows you how to work with two Linux distributions. You'll see how Salt Open is duplicated with ArubaOS and IOS networking devices, which can be configured without the underlying OS. As you step through the configuration options, you'll learn how to run remote execution modules from the CLI before looking at stateful configuration using SLS files. Moving on, you'll learn how to configure the systems where you also need to monitor your devices and that is when reactors and beacons come into play. Creating beacons to alert the server when thresholds are exceeded, you will be able to create reactors to mitigate the issues identified by the beacons. By the end of this book, you will be able to deploy Salt to your servers and network infrastructure. You will be able to install the Salt-Master and Salt-Minion, executing commands from both the Master and the Minion. The networking devices you need to manage will be controlled through the Salt_Proxy Minions that you have configured. Finally, you will be able to load-balance connections to the master with Salt-Syndic. What You'll LearnInstall Salt Services on Ubuntu and CentOS based systemsWork with remote execution modulesFormat YAML files correctlyProvide defined configuration using state filesUse Salt-Proxy to configure network devicesAutomate the configuration of Linux servers and networking devicesAdd value for both the server and network automation teamWho This Book Is ForSystem administrators experienced in Linux administration, who desire to expand their horizons into the world of automation, moving from scripts to states.

DKK 406.00
1

Privileged Attack Vectors - Morey J. Haber - Bog - APress - Plusbog.dk

Privileged Attack Vectors - Morey J. Haber - Bog - APress - Plusbog.dk

See how privileges, insecure passwords, administrative rights, and remote access can be combined as an attack vector to breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if , but when, your organization will be breached. Threat actors target the path of least resistance: users and their privileges. In decades past, an entire enterprise might be sufficiently managed through just a handful of credentials. Today''s environmental complexity has seen an explosion of privileged credentials for many different account types such as domain and local administrators, operating systems (Windows, Unix, Linux, macOS, etc.), directory services, databases, applications, cloud instances, networking hardware, Internet of Things (IoT), social media, and so many more. When unmanaged, these privileged credentials pose a significant threat from external hackers and insider threats. We are experiencing an expanding universe of privileged accounts almost everywhere. There is no one solution or strategy to provide the protection you need against all vectors and stages of an attack. And while some new and innovative products will help protect against or detect against a privilege attack, they are not guaranteed to stop 100% of malicious activity. The volume and frequency of privilege-based attacks continues to increase and test the limits of existing security controls and solution implementations. Privileged Attack Vectors details the risks associated with poor privilege management, the techniques that threat actors leverage, and the defensive measures that organizations should adopt to protect against an incident, protect against lateral movement, and improve the ability to detect malicious activity due to the inappropriate usage of privileged credentials. This revised and expanded second edition covers new attack vectors, has updated definitions for privileged access management (PAM), new strategies for defense, tested empirical steps for a successful implementation, and includes new disciplines for least privilege endpoint management and privileged remote access. What You Will Learn - Know how identities, accounts, credentials, passwords, and exploits can be leveraged to escalate privileges during an attack - Implement defensive and monitoring strategies to mitigate privilege threats and risk - Understand a 10-step universal privilege management implementation plan to guide you through a successful privilege access management journey - Develop a comprehensive model for documenting risk, compliance, and reporting based on privilege session activity Who This Book Is For Security management professionals, new security professionals, and auditors looking to understand and solve privilege access management problems

DKK 604.00
1

DevOps in Python - Moshe Zadka - Bog - APress - Plusbog.dk

The Personal Finance Guide for Tech Professionals - Tom Taulli - Bog - APress - Plusbog.dk

Beginning Ethical Hacking with Kali Linux - Sanjib Sinha - Bog - APress - Plusbog.dk

Beginning Ethical Hacking with Kali Linux - Sanjib Sinha - Bog - APress - Plusbog.dk

Get started in white-hat ethical hacking using Kali Linux. This book starts off by giving you an overview of security trends, where you will learn the OSI security architecture. This will form the foundation for the rest of Beginning Ethical Hacking with Kali Linux . With the theory out of the way, you''ll move on to an introduction to VirtualBox, networking, and common Linux commands, followed by the step-by-step procedure to build your own web server and acquire the skill to be anonymous . When you have finished the examples in the first part of your book, you will have all you need to carry out safe and ethical hacking experiments. After an introduction to Kali Linux, you will carry out your first penetration tests with Python and code raw binary packets for use in those tests. You will learn how to find secret directories on a target system, use a TCP client in Python, and scan ports using NMAP. Along the way you will discover effective ways to collect important information, track email, and use important tools such as DMITRY and Maltego, as well as take a look at the five phases of penetration testing. The coverage of vulnerability analysis includes sniffing and spoofing, why ARP poisoning is a threat, how SniffJoke prevents poisoning, how to analyze protocols with Wireshark, and using sniffing packets with Scapy. The next part of the book shows you detecting SQL injection vulnerabilities, using sqlmap, and applying brute force or password attacks. Besides learning these tools, you will see how to use OpenVas, Nikto, Vega, and Burp Suite. The book will explain the information assurance model and the hacking framework Metasploit, taking you through important commands, exploit and payload basics. Moving on to hashes and passwords you will learn password testing and hacking techniques with John the Ripper and Rainbow. You will then dive into classic and modern encryption techniques where you will learn the conventional cryptosystem. In the final chapter you will acquire the skill of exploiting remote Windows and Linux systems and you will learn how to own a target completely. What You Will Learn - Master common Linux commands and networking techniques - Build your own Kali web server and learn to be anonymous - Carry out penetration testing using Python - Detect sniffing attacks and SQL injection vulnerabilities - Learn tools such as SniffJoke, Wireshark, Scapy, sqlmap, OpenVas, Nikto, and Burp Suite - Use Metasploit with Kali Linux - Exploit remote Windows and Linux systems Who This Book Is For Developers new to ethical hacking with a basic understanding of Linux programming.

DKK 604.00
1

ASP.NET MVC with Entity Framework and CSS - Lee Naylor - Bog - APress - Plusbog.dk

Robot Building for Beginners, Third Edition - David Cook - Bog - APress - Plusbog.dk

Beginning Jakarta EE - Peter Spath - Bog - APress - Plusbog.dk

Arduino Applied - Neil Cameron - Bog - APress - Plusbog.dk

The IoT Hacker's Handbook - Aditya Gupta - Bog - APress - Plusbog.dk

The IoT Hacker's Handbook - Aditya Gupta - Bog - APress - Plusbog.dk

Take a practioner''s approach in analyzing the Internet of Things (IoT) devices and the security issues facing an IoT architecture. You''ll review the architecture''s central components, from hardware communication interfaces, such as UARTand SPI, to radio protocols, such as BLE or ZigBee. You''ll also learn to assess a device physically by opening it, looking at the PCB, and identifying the chipsets and interfaces. You''ll then use that information to gain entry to the device or to perform other actions, such as dumping encryption keys and firmware. As the IoT rises to one of the most popular tech trends, manufactures need to take necessary steps to secure devices and protect them from attackers. The IoT Hacker''s Handbook breaks down the Internet of Things, exploits it, and reveals how these devices can be built securely. What You''ll Learn - Perform a threat model of a real-world IoT device and locate all possible attacker entry points - Use reverse engineering of firmware binaries to identify security issues - Analyze,assess, and identify security issues in exploited ARM and MIPS based binaries - Sniff, capture, and exploit radio communication protocols, such as Bluetooth Low Energy (BLE), and ZigBee Who This Book is For Those interested in learning about IoT security, such as pentesters working in different domains, embedded device developers, or IT people wanting to move to an Internet of Things security role.

DKK 476.00
1

Progressive Web Apps with Angular - Majid Hajian - Bog - APress - Plusbog.dk

Progressive Web Apps with Angular - Majid Hajian - Bog - APress - Plusbog.dk

Harness the power of Angular to build fast, high performance progressive web apps that work offline. Learn exactly how to create an Angular Progressive Web App (PWA) from scratch, how you can use different tools to audit and improve it, and leverage Angular CLI or Workbox to turn your app into a PWA. Using browser APIs - including the Credential Management, Payment Request, Geolocation, Web Bluetooth, WebUSB and Generic Sensors APIs - you can unleash the potential of PWAs and build applications that enhance user experience. Angular''s game-changing built-in features, including the Angular service worker module, can be leveraged to construct responsive and reliable PWAs that can look and feel just like native mobile apps. You''ll learn how to boost your app speed, how to increase user engagement using push notifications, and how to implement offline storage and different caching APIs in Angular. You''ll even see how to convert an existing Angular app into a PWA. Whether you''re new to building PWAs, or want to learn how to use Angular to improve your app development, Progressive Web Apps with Angular provides the know-how to build and deploy an Angular PWA. What Readers Will Learn - Build an Angular app that looks and feels just like a native mobile app - Audit and improve an Angular PWA with different tools - Increase user engagement by using push notifications - Offline storage and different caching APIs in Angular - Implement modern technologies into an Angular PWA Who This Book Is For Developers with basic knowledge of HTML, JavaScript and Angular

DKK 604.00
1

Web-Based Projects that Rock the Class - Christos Karayiannis - Bog - APress - Plusbog.dk

Web-Based Projects that Rock the Class - Christos Karayiannis - Bog - APress - Plusbog.dk

Explore the modern concepts of client-server web applications. This book includes examples that are simple to comprehend building apps that are not much different from real-world applications. Each chapter develops a different subject, explaining the concept from A to Z, and provides a project with complete source code and configuration steps. Chapters also include thorough coverage of the subject described and the full source code is provided with a consistently updated repo on GitHub, accounting for the frequent changes made to language versions. The chapter apps use HTML, JavaScript, AJAX, CSS, PHP, MySQL, Apache, Lighttpd, SSL/TLS, DDNS, Shell Programming, Sockets programming, tools such as Wireshark, and remote online tools for testing. As you master each topic sequentially you''ll fully understand the inner workings of the client-server apps and become confident in creating your own web-based apps. Whether you want to work on the web for fun, for school, or for work, Web-Based Projects that Rock the Class is a great place to start. What You''ll Learn - Use HTML, JavaScript, CSS, PHP, AJAX and MySQL for web projects - Set up and handle two different web servers Apache and Lighttpd - Obtain DNS and DDNS domain names - Apply the SSL/TLS protocols for HTTPS connections - Test remotely with online tools your web app - then create similar tools Who This Book Is For College and university students, and individuals interested in web programming. Ideally you will have basic experience in requesting a web page from the browser and understanding online services like e-shops, basic-level experience with Linux, knowledge of basic-level programming language principles, and basic knowledge of what a database is.

DKK 332.00
1

Wireshark for Network Forensics - Nagendra Kumar Nainar - Bog - APress - Plusbog.dk

Wireshark for Network Forensics - Nagendra Kumar Nainar - Bog - APress - Plusbog.dk

With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view. You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn waysto identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same. The book further explains the capture and analysis of secure multimedia traffic, which constitutes around 70% of all overall internet traffic. Wireshark for Network Forensics provides a unique look at cloud and cloud-native architecture-based traffic capture in Kubernetes, Docker-based, AWS, and GCP environments. What You'll LearnReview Wireshark analysis and network forensicsStudy traffic capture and its analytics from mobile devicesAnalyze various access technology and cloud trafficWrite your own dissector for any new or proprietary packet formatsCapture secured application traffic for analysisWho This Book Is ForIT Professionals, Cloud Architects, Infrastructure Administrators, and Network/Cloud Operators

DKK 434.00
1

Mastering VMware Horizon 8 - Peter Von Oven - Bog - APress - Plusbog.dk

Mastering VMware Horizon 8 - Peter Von Oven - Bog - APress - Plusbog.dk

Learn all about designing, installing, configuring, and managing VMware Horizon, with a core focus on how to deliver virtual desktops using Horizon. This book allows you to follow the complete process for deploying VMware Horizon and covers the design, deployment, and management of solutions. You''ll start by reviewing remote solutions, from virtual desktops to published applications, including the benefits and what the different solutions deliver. Once through the high-level technology you''ll then look at the VMware Horizon solution focusing on the architecture and the components that make up the solution and how to design a production-ready environment. Other VMware EUC technologies that complement the core Horizon solution will also be incorporate into it. Armed with the knowledge of how to design a solution, you''ll move onto the installation phase and start to build a test lab environment. Once your lab is installed, you''ll move onto the configuration stage where you will understand how to build, configure, and optimize virtual desktops, and desktop pools ready for end-users to use. As part of this you will also look at delivering published applications with Horizon Apps. With resources built and configured you can optimize the end-user experience with Horizon clients. The final sections of the book will focus on the other complementary solutions introducing you to VMware App Volumes and VMware Dynamic Environment Manager before finishing with how to manage the solution where we will look at some advanced configuration options and troubleshooting techniques. What You Will Learn - See the core components of VMware Horizon and their functionality - Design and install a Horizon environment - Deliver the best end-user experience - Manage the deployed solution - Use VMware reference architectures to create real-life scenario examples - Review the minimum requirements for designing a solution Who This Book Is For VMware professionals, system integrators, IT professionals, and consultants.

DKK 495.00
1

Cloud Attack Vectors - Brian Chappell - Bog - APress - Plusbog.dk

Cloud Attack Vectors - Brian Chappell - Bog - APress - Plusbog.dk

Cyberattacks continue to increase in volume and sophistication, targeting everything owned, managed, and serviced from the cloud. Today, there is widespread consensus—it is not a matter of if, but rather when an organization will be breached. Threat actors typically target the path of least resistance. With the accelerating adoption of cloud technologies and remote work, the path of least resistance is shifting in substantive ways. In recent years, attackers have realigned their efforts, focusing on remaining undetected, monetization after exploitation, and publicly shaming organizations after a breach. New, innovative, and useful products continue to emerge and offer some cloud protection, but they also have distinct limitations. No single, standalone solution or strategy can effectively protect against all cloud attack vectors or identify all malicious activity. The simple fact is that the cloud is based on a company’s assets being offered as services. As a result, the best security any organization can achieve is to establish controls and procedures in conjunction with services that are licensed in the cloud. Cloud Attack Vectors details the risks associated with cloud deployments, the techniques threat actors leverage, the empirically-tested defensive measures organizations should adopt, and shows how to improve detection of malicious activity. What You’ll LearnKnow the key definitions pertaining to cloud technologies, threats, and cybersecurity solutionsUnderstand how entitlements, permissions, rights, identities, accounts, credentials, and exploits can be leveraged to breach a cloud environmentImplement defensive and monitoring strategies to mitigate cloud threats, including those unique to cloud and hybrid cloud environmentsDevelop a comprehensive model for documenting risk, compliance, and reporting based on your cloud implementation Who This Book Is ForNew security professionals, entry-level cloud security engineers, managers embarking on digital transformation, and auditors looking to understand security and compliance risks associated with the cloud

DKK 476.00
1

Cisco ACI: Zero to Hero - Jan Janovic - Bog - APress - Plusbog.dk

Cisco ACI: Zero to Hero - Jan Janovic - Bog - APress - Plusbog.dk

It doesn’t matter if you are completely new to Cisco ACI or you already have some experience with the technology, this book will guide you through the whole implementation lifecycle and provide you with a comprehensive toolset to become confident in any ACI-related task. In the beginning, it’s very important to build strong fundamental knowledge about Cisco ACI components. We'll go through underlay networking based on Nexus 9000 switches and describe the APIC controller cluster acting as the management plane of ACI. By building Access Policies, you'll see how to optimally connect servers, storage, routers, switches, or L4-L7 service devices to ACI. Then we'll properly design and implement Logical Application Policies. You will understand all the fabric forwarding behavior when using different ACI settings and architectures while getting a toolset on how to verify and troubleshoot eventual problems. This book also covers external L2 and L3 connectivity in ACI,more advanced features like integration with virtualization hypervisors and Kubernetes, service chaining of L4-L7 devices using Service Graphs, or practical approach to using REST API automation based on Python and Ansible/Terraform. Cisco ACI: Zero to Hero can additionally be used as a valuable source of theoretical and practical knowledge for all candidates preparing for CCIE DC v3.0 Written or Lab exams. What You'll LearnUnderstand network evolution and Cisco ACI components Underlay ACI networking based on Nexus 9000 switches, APIC controllers, and Application Policy ModelIntegrate ACI with virtualization hypervisors and KubernetesDynamically and seamlessly include L4-L7 service devices in communication between ACI endpoints Build ACI Anywhere: ACI Multi-Tier, Stretched Fabric, Multi-POD, Multi-Site, and Remote LeafUtilize ACI REST API with Python, related Cobra SDK, Ansible or Terraform, to develop automation and scripts on top of the ACI platformWho This Book Is ForNetwork engineers, architects, network developers, administrators or NOC technicians.

DKK 519.00
1

Build Mobile Apps with SwiftUI and Firebase - Sullivan De Carli - Bog - APress - Plusbog.dk

Build Mobile Apps with SwiftUI and Firebase - Sullivan De Carli - Bog - APress - Plusbog.dk

Create a mobile app for Apple platforms using SwiftUI in conjunction with Google''s Firebase backend to post and retrieve data, authenticate users, and store data securely. You''ll use SwiftUI to create an engaging and aesthetically appealing user interface that meets the expectations of iOS users while leveraging the power of Google''s Firebase to securely and seamlessly work with your backend data. With an intro to Xcode and SwiftUI, followed by tutorials on how build an app with Firestore, Firebase Storage, and the Authenticate framework, you''ll find everything you need to build a complete iOS application . You''ll begin with an introduction to Firebase and an overview of how to use Xcode and write code in SwiftUI. Then dive into two real-life projects where you''ll build a note application and a social media application. With these projects, you''ll see how to post, read, edit, and delete data using Firestore. You''ll also upload large assets, such as pictures, to Firebase Storage, and we will also authenticate users with email and Sign in with Apple. On the backend, you''ll learn how to structure our data, secure it, and also use third-party extensions to enhance the user experience. Build Mobile Apps with SwiftUI and Firebase offers the skills and knowledge necessary to develop apps that are both fun and functional for the user while also providing a robust backend that integrates with your app and stores data securely. Use SwiftUI and Firebase to build something your users will love! What You''ll Learn - Authenticate users on your app - Secure a remote database and manage data easily - Enhance user experience with extensions Who This Book Is For iOS developers who are beginning their journey with both SwiftUI, to build user interfaces, and the Google Firebase backend.

DKK 519.00
1