This book provides a comprehensive approach to manage PostgreSQL cluster databases on Amazon Web Services and Azure Web Services on the cloud, as well as in Docker and container environments on a Red Hat operating system.
Unix Shell Programming is a tutorial aimed at helping Unix and Linux users get optimal performance out of their operating out of their operating system.
Discover best practices and troubleshooting solutions when working on ROSKey FeaturesDevelop complex robotic applications using ROS to interface robot manipulators and mobile robotsGain insight into autonomous navigation in mobile robots and motion planning in robot manipulatorsDiscover best practices and troubleshooting solutionsBook DescriptionIn this day and age, robotics has been gaining a lot of traction in various industries where consistency and perfection matter.
For more than twenty years, serious C programmers have relied on one book for practical, in-depth knowledge of the programming interfaces that drive the UNIX and Linux kernels: W.
For more than twenty years, serious C programmers have relied on one book for practical, in-depth knowledge of the programming interfaces that drive the UNIX and Linux kernels: W.
Using the open source Asterisk platform, you can deploy a state-of-the-art VoIP PBX on a low-cost PC or server for a fraction of the cost of conventional PBX systems.
Increasingly, business leaders are either looking to start a new developer program at their company or looking to increase the impact of their existing DevRel program.
Learn, prepare, and practice for Red Hat RHCSA 9 (EX200) exam success with this Cert Guide from Pearson IT Certification, a leader in IT Certification learning.
The World's Easiest Perl 5 Tutorial-Updated for Today's Applications and "e;Modern Perl"e; Best Practices "e;When I look at my bookshelf, I see eleven books on Perl programming.
Review topics ranging from Intel x64 assembly language instructions and writing programs in assembly language, to pointers, live debugging, and static binary analysis of compiled C and C++ code.
Learn the tricks of simple procedural generation and how various genres, such as racing simulators, platformers, and roguelikes, can all benefit from these techniques.
Gain insights into the different challenges that can be solved using Go, with a focus on containers, Linux, security, networking, user interfaces and other relevant cloud based topics.
Completely updated for this exciting third edition, Beginning Ubuntu for Windows and Mac Users will help you start your journey into Free and Open Source Software with Ubuntu 22.
Explore Automated Market Makers (AMMs), the underlying protocols used by decentralized exchanges (DEX) to allow users to perform trades of cryptocurrencies in a decentralized way with no middlemen.
Immerse yourself in the architecture of an Angular application, starting with an introduction to TypeScript and ES6, and progressing to modules and components used to build complex applications.
Immerse yourself in the architecture of an Angular application, starting with an introduction to TypeScript and ES6, and progressing to modules and components used to build complex applications.
Take a systematic approach at identifying intrusions that range from the most basic to the most sophisticated, using Wireshark, an open source protocol analyzer.
The Latest Linux Security SolutionsThis authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services.
Take Full Advantage of the Oracle Solaris 11 Management FeaturesManage a highly scalable, cloud-based computing platform and deliver unmatched performance levels at every layer of your IT stack.
Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's securityKey FeaturesFamiliarize yourself with the most common web vulnerabilitiesConduct a preliminary assessment of attack surfaces and run exploits in your labExplore new tools in the Kali Linux ecosystem for web penetration testingBook DescriptionWeb applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure.
Master shell basics and Unix tools and discover easy commands to perform complex tasks with speedKey FeaturesLearn why the Bash shell is widely used on Linux and iOSExplore advanced shell concepts, such as pipes and redirectionUnderstand how to use Unix command-line tools as building blocks for different tasksBook DescriptionThe most basic interface to a computer-the command line-remains the most flexible and powerful way of processing data and performing and automating various day-to-day tasks.
Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackersAbout This BookConduct network testing, surveillance, pen testing and forensics on MS Windows using Kali LinuxFootprint, monitor, and audit your network and investigate any ongoing infestationsCustomize Kali Linux with this professional guide so it becomes your pen testing toolkitWho This Book Is ForIf you are a working ethical hacker who is looking to expand the offensive skillset with a thorough understanding of Kali Linux, then this is the book for you.
Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing from scratchKey FeaturesGet up and running with Kali Linux 2019.
Get up to date with the finer points of Ubuntu Server using this comprehensive guideAbout This BookGet well-versed with newly-added features in Ubuntu 16.