EBookClubs

Read Books & Download eBooks Full Online

EBookClubs

Read Books & Download eBooks Full Online

Book Discovery Tool Cookbook

Download or read book Discovery Tool Cookbook written by Nancy Fawley and published by . This book was released on 2016 with total page 137 pages. Available in PDF, EPUB and Kindle. Book excerpt: "This volume is a collection designed by instruction librarians to promote critical thinking and engaged learning. It provides teaching librarians detailed, ready-to-use, and easily adaptable lesson ideas to help students understand and be transformed by information literacy threshold concepts. The lessons in this book, created by teaching librarians across the country, are categorized according to the six information literacy frames identified in the ACRL Framework for Information Literacy in Higher Education (2015). This volume offers concrete and specific ways of teaching the threshold concepts that are central to the ACRL Framework and is suitable for all types of academic libraries, high school libraries, as well as a pedagogical tool for library and information schools."--Page 4 de la couverture.

Book Zabbix Cookbook

    Book Details:
  • Author : Patrik Uytterhoeven
  • Publisher : Packt Publishing Ltd
  • Release : 2015-03-20
  • ISBN : 1784392251
  • Pages : 260 pages

Download or read book Zabbix Cookbook written by Patrik Uytterhoeven and published by Packt Publishing Ltd. This book was released on 2015-03-20 with total page 260 pages. Available in PDF, EPUB and Kindle. Book excerpt: If you have some experience with Zabbix and wish to take your infrastructure to the next level, then this book is for you. Before you start with Zabbix, or monitoring in general, it is best to have some basic Linux knowledge and a good understanding of snmp, virtualization, and scripting.

Book The Teaching with Primary Sources Cookbook

Download or read book The Teaching with Primary Sources Cookbook written by Julie M. Porterfield and published by American Library Association. This book was released on 2021-05-19 with total page 127 pages. Available in PDF, EPUB and Kindle. Book excerpt: This collection brings together the work of archivists, librarians, museum professionals, and other educators who evoke the power of primary sources to teach information literacy skills to a variety of audiences.

Book Network Scanning Cookbook

Download or read book Network Scanning Cookbook written by Sairam Jetty and published by Packt Publishing Ltd. This book was released on 2018-09-29 with total page 298 pages. Available in PDF, EPUB and Kindle. Book excerpt: Discover network vulnerabilities and threats to design effective network security strategies Key FeaturesPlunge into scanning techniques using the most popular toolsEffective vulnerability assessment techniques to safeguard network infrastructureExplore the Nmap Scripting Engine (NSE) and the features used for port and vulnerability scanningBook Description Network scanning is a discipline of network security that identifies active hosts on networks and determining whether there are any vulnerabilities that could be exploited. Nessus and Nmap are among the top tools that enable you to scan your network for vulnerabilities and open ports, which can be used as back doors into a network. Network Scanning Cookbook contains recipes for configuring these tools in your infrastructure that get you started with scanning ports, services, and devices in your network. As you progress through the chapters, you will learn how to carry out various key scanning tasks, such as firewall detection, OS detection, and access management, and will look at problems related to vulnerability scanning and exploitation in the network. The book also contains recipes for assessing remote services and the security risks that they bring to a network infrastructure. By the end of the book, you will be familiar with industry-grade tools for network scanning, and techniques for vulnerability scanning and network protection. What you will learnInstall and configure Nmap and Nessus in your network infrastructurePerform host discovery to identify network devicesExplore best practices for vulnerability scanning and risk assessmentUnderstand network enumeration with Nessus and NmapCarry out configuration audit using Nessus for various platformsWrite custom Nessus and Nmap scripts on your ownWho this book is for If you’re a network engineer or information security professional wanting to protect your networks and perform advanced scanning and remediation for your network infrastructure, this book is for you.

Book Discovery Tools  The Next Generation of Library Research

Download or read book Discovery Tools The Next Generation of Library Research written by John S. Spencer and published by Routledge. This book was released on 2016-03-16 with total page 293 pages. Available in PDF, EPUB and Kindle. Book excerpt: Discovery tools are now becoming more common in the academic library landscape, and more products are now available from vendors. While librarians are advocating and promoting their use by students and faculty, they are also evaluating their searching capabilities, their usefulness, and on-going maintenance requirements. This work is geared to librarians considering the implementation of a discovery tool. As a result, it addresses the selection and implementation of such a tool, its relationship to information literacy and catalog maintenance, usability testing, and assessment. Issues such as database and catalog searching and the quality of searching queries are also addressed. A comprehensive review of the literature serves as a valuable resource. Librarians will appreciate the highly practical nature of the volume as it is enriched by a number of varied case studies. This book was published as a special triple issue of College & Undergraduate Libraries.

Book Web Scale Discovery Services

Download or read book Web Scale Discovery Services written by Roberto Raieli and published by Chandos Publishing. This book was released on 2022-03-24 with total page 230 pages. Available in PDF, EPUB and Kindle. Book excerpt: Web-Scale Discovery Services: Principles, Applications, Discovery Tools and Development Hypotheses summarizes and presents the state-of-the-art in WSDS. The title promotes a middle-way between finding the best tool for each particular need and the search for the most reliable systems. The title identifies basic theoretical problems and offers practical solutions for librarians. The volume offers a summary of ideas from around the world, giving a new perspective that is backed up by strong theory. Offering a vision for libraries, this book also allows archivists, museum specialists, computer scientists, commercial operators and interested users to deepen their culture and information literacy. The great number of information sources now available and the changing habits of web users has led to the development of Web Scale Discovery Services (WSDS). The goal of these systems and techniques is to make catalogues, databases, institutional repositories, Open Access archives and other databases searchable and discoverable through a single point of access. The diffusion of systems and connections between data disseminated by libraries and published by other institutions poses a challenge to understanding discovery in the modern library. Lays out the state-of-the-art in WSDS for contemporary libraries and institutions Presents an innovative take on information retrieval and digital document management Grounds thinking on a bibliographic basis, combining academic, practical and commercial aspects Offers a perspective on how WSDS and discovery tools are seen and used internationally Provides a version of culture and information literacy of relevance to a broad-range of cultural specialists

Book NGINX Cookbook

    Book Details:
  • Author : Derek DeJonghe
  • Publisher : "O'Reilly Media, Inc."
  • Release : 2024-01-29
  • ISBN : 1098158393
  • Pages : 184 pages

Download or read book NGINX Cookbook written by Derek DeJonghe and published by "O'Reilly Media, Inc.". This book was released on 2024-01-29 with total page 184 pages. Available in PDF, EPUB and Kindle. Book excerpt: NGINX is one of the most widely used web servers available today, in part because of itscapabilities as a load balancer and reverse proxy server for HTTP and other network protocols. This revised cookbook provides easy-to-follow examples of real-world problems in application delivery. Practical recipes help you set up and use either the open source or commercial offering to solve problems in various use cases. For professionals who understand modern web architectures, such as n-tier or microservice designs and common web protocols such as TCP and HTTP, these recipes provide proven solutions for security and software load balancing and for monitoring and maintaining NGINX's application delivery platform. You'll also explore advanced features of both NGINX and NGINX Plus, the free and licensed versions of this server. You'll find recipes for: High-performance load balancing with HTTP, TCP, and UDP Securing access through encrypted traffic, secure links, HTTP authentication subrequests, and more Deploying NGINX to Google, AWS, and Azure cloud Setting up and configuring NGINX Controller Installing and configuring the NGINX App Protect module Enabling WAF through Controller ADC NGINX Instance Manager, Service Mesh, and the njs module

Book Binary Analysis Cookbook

Download or read book Binary Analysis Cookbook written by Michael Born and published by Packt Publishing Ltd. This book was released on 2019-09-20 with total page 388 pages. Available in PDF, EPUB and Kindle. Book excerpt: Explore open-source Linux tools and advanced binary analysis techniques to analyze malware, identify vulnerabilities in code, and mitigate information security risks Key FeaturesAdopt a methodological approach to binary ELF analysis on LinuxLearn how to disassemble binaries and understand disassembled codeDiscover how and when to patch a malicious binary during analysisBook Description Binary analysis is the process of examining a binary program to determine information security actions. It is a complex, constantly evolving, and challenging topic that crosses over into several domains of information technology and security. This binary analysis book is designed to help you get started with the basics, before gradually advancing to challenging topics. Using a recipe-based approach, this book guides you through building a lab of virtual machines and installing tools to analyze binaries effectively. You'll begin by learning about the IA32 and ELF32 as well as IA64 and ELF64 specifications. The book will then guide you in developing a methodology and exploring a variety of tools for Linux binary analysis. As you advance, you'll learn how to analyze malicious 32-bit and 64-bit binaries and identify vulnerabilities. You'll even examine obfuscation and anti-analysis techniques, analyze polymorphed malicious binaries, and get a high-level overview of dynamic taint analysis and binary instrumentation concepts. By the end of the book, you'll have gained comprehensive insights into binary analysis concepts and have developed the foundational skills to confidently delve into the realm of binary analysis. What you will learnTraverse the IA32, IA64, and ELF specificationsExplore Linux tools to disassemble ELF binariesIdentify vulnerabilities in 32-bit and 64-bit binariesDiscover actionable solutions to overcome the limitations in analyzing ELF binariesInterpret the output of Linux tools to identify security risks in binariesUnderstand how dynamic taint analysis worksWho this book is for This book is for anyone looking to learn how to dissect ELF binaries using open-source tools available in Linux. If you’re a Linux system administrator or information security professional, you’ll find this guide useful. Basic knowledge of Linux, familiarity with virtualization technologies and the working of network sockets, and experience in basic Python or Bash scripting will assist you with understanding the concepts in this book

Book NGINX Cookbook

    Book Details:
  • Author : Tim Butler
  • Publisher : Packt Publishing Ltd
  • Release : 2017-08-31
  • ISBN : 1786469774
  • Pages : 265 pages

Download or read book NGINX Cookbook written by Tim Butler and published by Packt Publishing Ltd. This book was released on 2017-08-31 with total page 265 pages. Available in PDF, EPUB and Kindle. Book excerpt: A practical book on real-world NGINX deployments to get you up and running quickly. About This Book Be the first to immerse yourself in the NGINX 1.9x web server and explore the plethora of advanced features. Master the skills of load balancing TCP-based applications and implementing HTTP/2. A recipe-based approach book that provides you with up-to-date information on NGINX, allowing you to implement specific use cases immediately. Who This Book Is For This book is aimed at smaller-to-medium developers, who are just getting started with NGINX. It assumes they already understand the basics of how a web server works and how basic networking works. What You Will Learn Practical, real-world examples and recipes on how to use NGINX Common CMS deployments such as WordPress, Joomla and more NGINX configurations for frameworks such as Ruby on Rails, Django and more Detailed SSL recipes, including HTTP/2 Real world rewrite examples Basic web and TCP load balancing configuration Bandwidth management and connection limiting Detailed NGINX deployment scenarios with Docker Performance tuning and monitoring of your NGINX deployments OpenResty deployment guides Advanced deployments with NGINX Plus features In Detail NGINX Cookbook covers the basics of configuring NGINX as a web server for use with common web frameworks such as WordPress and Ruby on Rails, through to utilization as a reverse proxy. Designed as a go-to reference guide, this book will give you practical answers based on real-world deployments to get you up and running quickly. Recipes have also been provided for multiple SSL configurations, different logging scenarios, practical rewrites, and multiple load balancing scenarios. Advanced topics include covering bandwidth management, Docker container usage, performance tuning, OpenResty, and the NGINX Plus commercial features. By the time you've read this book, you will be able to adapt and use a wide variety of NGINX implementations to solve any problems you have.

Book Kali Linux Network Scanning Cookbook

Download or read book Kali Linux Network Scanning Cookbook written by Michael Hixon and published by Packt Publishing Ltd. This book was released on 2017-05-26 with total page 622 pages. Available in PDF, EPUB and Kindle. Book excerpt: Over 100 practical recipes that leverage custom scripts and integrated tools in Kali Linux to help you effectively master network scanning About This Book Learn the fundamentals behind commonly used scanning techniques Deploy powerful scanning tools that are integrated into the Kali Linux testing platform The practical recipes will help you automate menial tasks and build your own script library Who This Book Is For This book is for information security professionals and casual security enthusiasts alike. It provides foundational principles if you're a novice, but will also introduce scripting techniques and in-depth analysis if you're more advanced. Whether you are brand new to Kali Linux or a seasoned veteran, this book will help you both understand and ultimately master many of the most powerful and useful scanning techniques in the industry. It is assumed that you have some basic security testing experience. What You Will Learn Develop a network-testing environment to test scanning tools and techniques Understand the principles of network-scanning tools by building scripts and tools Identify distinct vulnerabilities in web apps and remote services and learn how they are exploited Perform comprehensive scans to identify listening on TCP and UDP sockets Get started with different Kali desktop environments--KDE, MATE, LXDE, and Xfce Use Sparta for information gathering, port scanning, fingerprinting, vulnerability scanning, and more Evaluate DoS threats and learn how common DoS attacks are performed Learn how to use Burp Suite to evaluate web applications In Detail With the ever-increasing amount of data flowing in today's world, information security has become vital to any application. This is where Kali Linux comes in. Kali Linux focuses mainly on security auditing and penetration testing. This step-by-step cookbook on network scanning trains you in important scanning concepts based on version 2016.2. It will enable you to conquer any network environment through a range of network scanning techniques and will also equip you to script your very own tools. Starting with the fundamentals of installing and managing Kali Linux, this book will help you map your target with a wide range of network scanning tasks, including discovery, port scanning, fingerprinting, and more. You will learn how to utilize the arsenal of tools available in Kali Linux to conquer any network environment. The book offers expanded coverage of the popular Burp Suite and has new and updated scripts for automating scanning and target exploitation. You will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed. You will cover the latest features of Kali Linux 2016.2, which includes the enhanced Sparta tool and many other exciting updates. This immersive guide will also encourage the creation of personally scripted tools and the skills required to create them. Style and approach This step-by-step guide is full of recipes that will help you use integrated scanning tools in Kali Linux and develop custom scripts to make new and unique tools of your own.

Book Microservices Deployment Cookbook

Download or read book Microservices Deployment Cookbook written by Vikram Murugesan and published by Packt Publishing Ltd. This book was released on 2017-01-31 with total page 374 pages. Available in PDF, EPUB and Kindle. Book excerpt: Master over 60 recipes to help you deliver complete, scalable, microservice-based solutions and see the improved business results immediately About This Book Adopt microservices-based architecture and deploy it at scale Build your complete microservice architecture using different recipes for different solutions Identify specific tools for specific scenarios and deliver immediate business results, correlate use cases, and adopt them in your team and organization Who This Book Is For This book is for developers, ops, and DevOps professionals who would like to put microservices to work and improve products, services, and operations. Those looking to build and deploy microservices will find this book useful, as well as managers and people at CXO level looking to adopt microservices in their organization. Prior knowledge of Java is expected. No prior knowledge of microservices is assumed. What You Will Learn Build microservices using Spring Boot, Wildfly Swarm, Dropwizard, and SparkJava Containerize your microservice using Docker Deploy microservices using Mesos/Marathon and Kubernetes Implement service discovery and load balancing using Zookeeper, Consul, and Nginx Monitor microservices using Graphite and Grafana Write stream programs with Kafka Streams and Spark Aggregate and manage logs using Kafka Get introduced to DC/OS, Docker Swarm, and YARN In Detail This book will help any team or organization understand, deploy, and manage microservices at scale. It is driven by a sample application, helping you gradually build a complete microservice-based ecosystem. Rather than just focusing on writing a microservice, this book addresses various other microservice-related solutions: deployments, clustering, load balancing, logging, streaming, and monitoring. The initial chapters offer insights into how web and enterprise apps can be migrated to scalable microservices. Moving on, you'll see how to Dockerize your application so that it is ready to be shipped and deployed. We will look at how to deploy microservices on Mesos and Marathon and will also deploy microservices on Kubernetes. Next, you will implement service discovery and load balancing for your microservices. We'll also show you how to build asynchronous streaming systems using Kafka Streams and Apache Spark. Finally, we wind up by aggregating your logs in Kafka, creating your own metrics, and monitoring the metrics for the microservice. Style and approach This book follows a recipe-driven approach and shows you how to plug and play with all the various pieces, putting them together to build a complete scalable microservice ecosystem. You do not need to study the chapters in order, as you can directly refer to the content you need for your situation.

Book Postman Cookbook

    Book Details:
  • Author : Oliver James
  • Publisher : GitforGits
  • Release : 2024-02-29
  • ISBN : 8119177789
  • Pages : 180 pages

Download or read book Postman Cookbook written by Oliver James and published by GitforGits. This book was released on 2024-02-29 with total page 180 pages. Available in PDF, EPUB and Kindle. Book excerpt: For developers, programmers, and DevOps engineers venturing into the hard world of API development, the "Postman Cookbook" becomes a must-read. This short solutions book offers recipes and troubleshooting approaches to address typical API lifecycle management challenges. Using Postman's rich features, readers of all skill levels will learn how to create APIs that will improve workflows, increase productivity, and lead to operational success. The book covers a wide range of topics, from the fundamentals of web-based communication to more complex topics including protocol stacks, secure communication protocols, and the dynamics of WebSockets interactions. The following sections cover advanced subjects such as custom protocol handling, network troubleshooting, and proxy management, allowing readers to confidently solve complex networking challenges. This book covers more than simply the technical aspects of Kubernetes. It discusses the influence of security measures, maximizing performance, and successful scaling solutions. These features are critical for microservice architectures and cloud-native apps. This book teaches early developers and programmers the foundations of API testing and development, including networking and protocols. Upon completion of this book, readers will have a thorough understanding of API development with Postman. They will be able to confidently handle the problems of modern computing. Key Learnings Enable real-time API connectivity for dynamic apps using WebSockets capability. Protect API endpoints from security flaws by configuring SSL/TLS in Postman. Define, implement, and debug bespoke protocols to connect proprietary systems to Postman. Master the art of network optimization and troubleshooting using Postman to ensure your API runs smoothly. Use Postman's proxy management to safely access APIs in a variety of network settings. Test APIs in Kubernetes and improve the deployment and development of microservices. Exploit Postman's features for thorough API tracking, logging, and analysis of performance. Secure API access with Postman's advanced authentication flows—OAuth, JWT, and more. Table of Content 1. Up and Running with Postman 2. Designing Simple to Complex APIs 3. Advanced API Requests and Workflows 4. Testing and Securing APIs 5. Managing GraphQL and gRPC with Postman 6. Continuous Integration and Deployment (CI/CD) 7. API Scalability and Performance 8. Integration with Third-Party Services 9. Working with Kubernetes and Microservices 10. API Networking and Protocols

Book Go Programming Cookbook

    Book Details:
  • Author : Aaron Torres
  • Publisher : Packt Publishing Ltd
  • Release : 2019-07-19
  • ISBN : 1789804701
  • Pages : 427 pages

Download or read book Go Programming Cookbook written by Aaron Torres and published by Packt Publishing Ltd. This book was released on 2019-07-19 with total page 427 pages. Available in PDF, EPUB and Kindle. Book excerpt: Tackle the trickiest of problems in Go programming with this practical guide Key FeaturesDevelop applications for different domains using modern programming techniquesTackle common problems when it comes to parallelism, concurrency, and reactive programming in GoWork with ready-to-execute code based on the latest version of GoBook Description Go (or Golang) is a statically typed programming language developed at Google. Known for its vast standard library, it also provides features such as garbage collection, type safety, dynamic-typing capabilities, and additional built-in types. This book will serve as a reference while implementing Go features to build your own applications. This Go cookbook helps you put into practice the advanced concepts and libraries that Golang offers. The recipes in the book follow best practices such as documentation, testing, and vendoring with Go modules, as well as performing clean abstractions using interfaces. You'll learn how code works and the common pitfalls to watch out for. The book covers basic type and error handling, and then moves on to explore applications, such as websites, command-line tools, and filesystems, that interact with users. You'll even get to grips with parallelism, distributed systems, and performance tuning. By the end of the book, you'll be able to use open source code and concepts in Go programming to build enterprise-class applications without any hassle. What you will learnWork with third-party Go projects and modify them for your useWrite Go code using modern best practicesManage your dependencies with the new Go module systemSolve common problems encountered when dealing with backend systems or DevOpsExplore the Go standard library and its usesTest, profile, and fine-tune Go applicationsWho this book is for If you're a web developer, programmer, or enterprise developer looking for quick solutions to common and not-so-common problems in Go programming, this book is for you. Basic knowledge of the Go language is assumed.

Book The Tool Book

    Book Details:
  • Author : Phil Davy
  • Publisher : Penguin
  • Release : 2018-04-03
  • ISBN : 1465477675
  • Pages : 258 pages

Download or read book The Tool Book written by Phil Davy and published by Penguin. This book was released on 2018-04-03 with total page 258 pages. Available in PDF, EPUB and Kindle. Book excerpt: This user's guide to over 200 hand tools highlights how to use tools effectively, understand them better, and how to properly care for them. Salute generations of craftsmanship, ingenuity, and know-how with The Tool Book. Explore tools from every angle, with detailed patent drawings, exploded diagrams, and step-by-step illustrations of tools in action with the science behind the techniques. Gallery pages display different types of hammers, spades, or chisels, while expert advice tells you what to look for when choosing a tool, and how to use it and care for it best. Discover why each tool is perfect for the job, and why it deserves a prominent spot in your shed, workshop, studio, or makerspace. The perfect gift for craftsmen, makers and anyone with an interest in DIY.

Book Cisco IOS Cookbook

    Book Details:
  • Author : Kevin Dooley
  • Publisher : "O'Reilly Media, Inc."
  • Release : 2007
  • ISBN : 0596527225
  • Pages : 1239 pages

Download or read book Cisco IOS Cookbook written by Kevin Dooley and published by "O'Reilly Media, Inc.". This book was released on 2007 with total page 1239 pages. Available in PDF, EPUB and Kindle. Book excerpt: Thoroughly revised and expanded, this second edition adds sections on MPLS, Security, IPv6, and IP Mobility and presents solutions to the most common configuration problems.

Book ChatGPT for Cybersecurity Cookbook

Download or read book ChatGPT for Cybersecurity Cookbook written by Clint Bodungen and published by Packt Publishing Ltd. This book was released on 2024-03-29 with total page 372 pages. Available in PDF, EPUB and Kindle. Book excerpt: Master ChatGPT and the OpenAI API and harness the power of cutting-edge generative AI and large language models to revolutionize the way you perform penetration testing, threat detection, and risk assessment. Key Features Enhance your skills by leveraging ChatGPT to generate complex commands, write code, and create tools Automate penetration testing, risk assessment, and threat detection tasks using the OpenAI API and Python programming Revolutionize your approach to cybersecurity with an AI-powered toolkit Purchase of the print or Kindle book includes a free PDF eBook Book DescriptionAre you ready to unleash the potential of AI-driven cybersecurity? This cookbook takes you on a journey toward enhancing your cybersecurity skills, whether you’re a novice or a seasoned professional. By leveraging cutting-edge generative AI and large language models such as ChatGPT, you'll gain a competitive advantage in the ever-evolving cybersecurity landscape. ChatGPT for Cybersecurity Cookbook shows you how to automate and optimize various cybersecurity tasks, including penetration testing, vulnerability assessments, risk assessment, and threat detection. Each recipe demonstrates step by step how to utilize ChatGPT and the OpenAI API to generate complex commands, write code, and even create complete tools. You’ll discover how AI-powered cybersecurity can revolutionize your approach to security, providing you with new strategies and techniques for tackling challenges. As you progress, you’ll dive into detailed recipes covering attack vector automation, vulnerability scanning, GPT-assisted code analysis, and more. By learning to harness the power of generative AI, you'll not only expand your skillset but also increase your efficiency. By the end of this cybersecurity book, you’ll have the confidence and knowledge you need to stay ahead of the curve, mastering the latest generative AI tools and techniques in cybersecurity.What you will learn Master ChatGPT prompt engineering for complex cybersecurity tasks Use the OpenAI API to enhance and automate penetration testing Implement artificial intelligence-driven vulnerability assessments and risk analyses Automate threat detection with the OpenAI API Develop custom AI-enhanced cybersecurity tools and scripts Perform AI-powered cybersecurity training and exercises Optimize cybersecurity workflows using generative AI-powered techniques Who this book is for This book is for cybersecurity professionals, IT experts, and enthusiasts looking to harness the power of ChatGPT and the OpenAI API in their cybersecurity operations. Whether you're a red teamer, blue teamer, or security researcher, this book will help you revolutionize your approach to cybersecurity with generative AI-powered techniques. A basic understanding of cybersecurity concepts along with familiarity in Python programming is expected. Experience with command-line tools and basic knowledge of networking concepts and web technologies is also required.

Book Docker Cookbook

    Book Details:
  • Author : Sébastien Goasguen
  • Publisher : "O'Reilly Media, Inc."
  • Release : 2015-11-04
  • ISBN : 1491919760
  • Pages : 362 pages

Download or read book Docker Cookbook written by Sébastien Goasguen and published by "O'Reilly Media, Inc.". This book was released on 2015-11-04 with total page 362 pages. Available in PDF, EPUB and Kindle. Book excerpt: Whether you’re deploying applications on premise or in the cloud, this cookbook provides developers, operators, and IT professionals with more than 130 proven recipes for working with Docker. With these practical solutions, experienced developers with no previous knowledge of Docker will be able to package and deploy distributed applications within a couple of chapters. IT professionals will be able to solve everyday problems, as well as create, run, share, and deploy Docker images. Operators will quickly be able to adopt the tools that will change the way they work. The recipes in this book will help you: Manage containers, mount data volumes, and link containers Create and share container images Network containers across single or multiple hosts Tackle advanced topics such as Docker configuration and development Deploy multi-container applications on a distributed cluster with Kubernetes Use a new generation of operating systems optimized for Docker Learn tools for application deployment, continuous integration, service discovery, and orchestration Access a Docker host on Amazon AWS, Google GCE, and Microsoft Azure Monitor containers and explore different application use cases