Learn, prepare, and practice for Red Hat RHCSA 9 (EX200) exam success with this Cert Guide from Pearson IT Certification, a leader in IT Certification learning.
The World's Easiest Perl 5 Tutorial-Updated for Today's Applications and "e;Modern Perl"e; Best Practices "e;When I look at my bookshelf, I see eleven books on Perl programming.
Review topics ranging from Intel x64 assembly language instructions and writing programs in assembly language, to pointers, live debugging, and static binary analysis of compiled C and C++ code.
A must-have Kubernetes book to learn key concepts for succeeding in any production environment, be it a greenfield Kubernetes environment or your cloud-native journeyKey FeaturesAdvance in your Kubernetes journey with guidance from a seasoned k8s practitioner and trainerDiscover best practices for implementing Kubernetes in any production environmentGo beyond the basics and work with Kubernetes applications in every environmentBook DescriptionKubernetes is a trending topic among engineers, CTOs, CIOs, and other technically sound professionals.
Learn the tricks of simple procedural generation and how various genres, such as racing simulators, platformers, and roguelikes, can all benefit from these techniques.
Gain insights into the different challenges that can be solved using Go, with a focus on containers, Linux, security, networking, user interfaces and other relevant cloud based topics.
Completely updated for this exciting third edition, Beginning Ubuntu for Windows and Mac Users will help you start your journey into Free and Open Source Software with Ubuntu 22.
Explore Automated Market Makers (AMMs), the underlying protocols used by decentralized exchanges (DEX) to allow users to perform trades of cryptocurrencies in a decentralized way with no middlemen.
Immerse yourself in the architecture of an Angular application, starting with an introduction to TypeScript and ES6, and progressing to modules and components used to build complex applications.
Immerse yourself in the architecture of an Angular application, starting with an introduction to TypeScript and ES6, and progressing to modules and components used to build complex applications.
Take a systematic approach at identifying intrusions that range from the most basic to the most sophisticated, using Wireshark, an open source protocol analyzer.
The Latest Linux Security SolutionsThis authoritative guide will help you secure your Linux network--whether you use Linux as a desktop OS, for Internet services, for telecommunications, or for wireless services.
Take Full Advantage of the Oracle Solaris 11 Management FeaturesManage a highly scalable, cloud-based computing platform and deliver unmatched performance levels at every layer of your IT stack.
Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's securityKey FeaturesFamiliarize yourself with the most common web vulnerabilitiesConduct a preliminary assessment of attack surfaces and run exploits in your labExplore new tools in the Kali Linux ecosystem for web penetration testingBook DescriptionWeb applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure.
Master shell basics and Unix tools and discover easy commands to perform complex tasks with speedKey FeaturesLearn why the Bash shell is widely used on Linux and iOSExplore advanced shell concepts, such as pipes and redirectionUnderstand how to use Unix command-line tools as building blocks for different tasksBook DescriptionThe most basic interface to a computer-the command line-remains the most flexible and powerful way of processing data and performing and automating various day-to-day tasks.
Kali Linux: a complete pentesting toolkit facilitating smooth backtracking for working hackersAbout This BookConduct network testing, surveillance, pen testing and forensics on MS Windows using Kali LinuxFootprint, monitor, and audit your network and investigate any ongoing infestationsCustomize Kali Linux with this professional guide so it becomes your pen testing toolkitWho This Book Is ForIf you are a working ethical hacker who is looking to expand the offensive skillset with a thorough understanding of Kali Linux, then this is the book for you.
Explore the latest ethical hacking tools and techniques in Kali Linux 2019 to perform penetration testing from scratchKey FeaturesGet up and running with Kali Linux 2019.
Get up to date with the finer points of Ubuntu Server using this comprehensive guideAbout This BookGet well-versed with newly-added features in Ubuntu 16.
A practical handbook that will help you bridge the gap between Windows and Linux to develop apps that leverage the best features across both ecosystems with seamless interoperabilityKey FeaturesConfigure and control WSL to suit your needs and preferencesDiscover tips for working seamlessly between Windows and WSL Linux distrosLearn how to work effectively with containers in WSL, as well as how to containerize your development environments with Visual Studio Code to isolate your dependenciesBook DescriptionWindows Subsystem for Linux (WSL) allows you to run native Linux tools alongside traditional Windows applications.
Change the way your organization deploys software at scale with this fast-paced guide to the world of DockerAbout This BookCut through the noise and in simple terms learn to package your applications and test, ship, and scale your containersFind and build images and successfully run your programs within containersBuild, deploy, and test your Docker containers and put them to work in productionWho This Book Is ForThis book is for IT professionals, system administrators, and DevOps professionals or anyone looking to quickly develop and deploy software to production at scale.
Learn software engineering from scratch, from installing and setting up your development environment, to navigating a terminal and building a model command line operating system, all using the Scala programming language as a medium.
Quickly obtain solutions to common Java image processing problems, learn best practices, and understand everything OpenCV has to offer for image processing.