Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
Intel Trusted Execution Technology for Server Platforms
Intel Trusted Execution Technology (Intel TXT) is a new security technology that started appearing on Intel server platforms in 2010. This book explains Intel Trusted Execution Technology for Servers, its purpose, application, advantages, and limitations. This book guides the server administrator / datacenter manager in enabling the technology as w...
The SysAdmin Handbook
Over the past two years, Simple-Talk has published articles on a variety of SysAdmin topics, from Exchange to Virtualization, and including everything from Powershell to Unified Messaging. We have brought the best of these articles together to form The SysAdmin Handbook. With over fifty articles packed into this book, it will be an essential refere...
How To Manage Remote Servers with Ansible
This book is designed to introduce you to using Ansible to manage your servers. You'll learn how to install and configure Ansible on a control node, and then how to use it to configure and run commands on remote servers. You'll also learn how to collect tasks into complete Playbooks to automate server setup from start to finish. The to...
Managing Distributed Cloud Applications and Infrastructure
The emergence of the Internet of Things (IoT), combined with greater heterogeneity not only online in cloud computing architectures but across the cloud-to-edge continuum, is introducing new challenges for managing applications and infrastructure across this continuum. The scale and complexity is simply so complex that it is no longer realistic for...
A Practical Guide to TPM 2.0
A Practical Guide to TPM 2.0: Using the Trusted Platform Module in the New Age of Security is a straight-forward primer for developers. It shows security and TPM concepts, demonstrating their use in real applications that the reader can try out. Simply put, this book is designed to empower and excite the programming community to go out and do co...
Building the Infrastructure for Cloud Security
For cloud users and providers alike, security is an everyday concern, yet there are very few books covering cloud security as a main subject. This book will help address this information gap from an Information Technology solution and usage-centric view of cloud infrastructure security. The book highlights the fundamental technology components nece...
Fundamentals of Azure
Microsoft Azure is Microsoft's cloud computing platform, providing a wide variety of services you can use without purchasing and provisioning your own hardware. Azure enables the rapid development of solutions and provides the resources to accomplish tasks that may not be feasible in an on-premises environment. Azure's compute, storage, n...
Building a Virtualized Network Solution
Network Virtualization "provides virtual networks to virtual machines similar to how server virtualization provides virtual machines to the operating system. Network Virtualization decouples virtual networks from the physical network infrastructure and removes the constraints and limitations of VLANs and hierarchical IP address assignment from...
Migrating to Cloud-Native Application Architectures
Adoption of cloud-native application architectures is helping many organizations transform their IT into a force for true agility in the marketplace. This report defines the unique characteristics of cloud-native application architectures such as microservices and twelve-factor applications. Author Matt Stine also examines the cultural, organiza...
Measuring the Business Value of Cloud Computing
The importance of demonstrating the value achieved from IT investments is long established in the Computer Science (CS) and Information Systems (IS) literature. However, emerging technologies such as the ever-changing complex area of cloud computing present new challenges and opportunities for demonstrating how IT investments lead to business value...
Greedy Algorithms
Each chapter comprises a separate study on some optimization problem giving both an introductory look into the theory the problem comes from and some new developments invented by author(s). Usually some elementary knowledge is assumed, yet all the required facts are quoted mostly in examples, remarks or theorems....
Ansible Succinctly
Ansible is an open-source software, automation engine, and automation language mainly used in software configuration management, infrastructure provisioning, configuration management, application deployment, and orchestration. The core Ansible is written in Python and can be used on Unix-like machines or Microsoft Windows. In Ansible Succinctly, Zo...
Load Balancing in the Cloud
Use of redundant servers has long been a solution for meeting sudden spikes in demand, machine failures, and outages. Cloud services greatly reduce the cost and hassle of provisioning redundant equipment and load balancers and give you the ability to deal with separate network, application, and client-side loads. But today there are many options to...