Computer ScienceScience & MathematicsEconomics & FinanceBusiness & ManagementPolitics & GovernmentHistoryPhilosophy
From Containers to Kubernetes with Node.js
This book is designed as an introduction to containers and Kubernetes by way of Node.js. Containers are the basis for distributed, repeatable workflows with orchestrators such as Kubernetes, and they allow developers and operators to develop applications consistently across environments and deploy in a repeatable and predictable fashion. The exa...
Game Hacking Academy
Hacking games requires a unique combination of reversing, memory management, networking, and security skills. Even as ethical hacking has exploded in popularity, game hacking still occupies a very small niche in the wider security community. While it may not have the same headline appeal as a Chrome 0day or a massive data leak, the unique feeling o...
Managing Cloud Native Data on Kubernetes
Is Kubernetes ready for stateful workloads? This open source system has become the primary platform for deploying and managing cloud native applications. But because it was originally designed for stateless workloads, working with data on Kubernetes has been challenging. If you want to avoid the inefficiencies and duplicative costs of having separa...
Troubleshooting Configuration Manager
As the authors of this book, we have tried provide you with insights and tips on troubleshooting System Center 2012 Configuration Manager drawn from our insider knowledge and real-world field experience. While most of you who are Configuration Manager administrators are fairly comfortable with the product and can perform common management tasks, ma...

1 2