Tags
Language
Tags
April 2024
Su Mo Tu We Th Fr Sa
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 1 2 3 4

Linkerd: Up and Running: A Guide to Operationalizing a Kubernetes-native Service Mesh

Posted By: First1
Linkerd: Up and Running: A Guide to Operationalizing a Kubernetes-native Service Mesh

Linkerd: Up and Running: A Guide to Operationalizing a Kubernetes-native Service Mesh by Jason Morgan, Flynn
English | May 28th, 2024 | ISBN: 1098142314 | 150 pages | True EPUB | 6.71 MB

With the massive adoption of microservices, operators and developers face far more complexity in their applications today. Service meshes can help you manage this problem by providing a unified control plane to secure, manage, and monitor your entire network. This practical guide shows you how the Linkerd service mesh enables cloud-native developers—including platform and site reliability engineers—to solve the thorny issue of running distributed applications in Kubernetes.

Software Supply Chain Security: Securing the End-to-end Supply Chain for Software, Firmware, and Hardware

Posted By: First1
Software Supply Chain Security: Securing the End-to-end Supply Chain for Software, Firmware, and Hardware

Software Supply Chain Security: Securing the End-to-end Supply Chain for Software, Firmware, and Hardware by Cassie Crossley
English | March 19th, 2024 | ISBN: 1098133706 | 243 pages | True PDF | 5.25 MB

Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as software supply chain security, goes well beyond the software development process.

Stepping Through Cybersecurity Risk Management: A Systems Thinking Approach

Posted By: First1
Stepping Through Cybersecurity Risk Management: A Systems Thinking Approach

Stepping Through Cybersecurity Risk Management: A Systems Thinking Approach by Jennifer L. Bayuk
English | March 26th, 2024 | ISBN: 1394213956 | 335 pages | True PDF | 9.67 MB

Stepping Through Cybersecurity Risk Management

Ransomware and Cyber Extortion: Response and Prevention

Posted By: First1
Ransomware and Cyber Extortion: Response and Prevention

Ransomware and Cyber Extortion: Response and Prevention by Sherri Davidoff, Matt Durrin, Karen Sprenger
English | October 31st, 2022 | ISBN: 0137450338 | 342 pages | True PDF | 2.26 MB

Protect Your Organization from Devastating Ransomware and Cyber Extortion Attacks

Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us

Posted By: First1
Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us

Cybersecurity Myths and Misconceptions: Avoiding the Hazards and Pitfalls that Derail Us by Josiah Dykstra, Leigh Metcalf, Eugene H. Spafford
English | January 23rd, 2023 | ISBN: 0137929234 | 419 pages | True PDF | 7.53 MB

175+ Cybersecurity Misconceptions and the Myth-Busting Skills You Need to Correct Them

Security in Computing, 6th Edition

Posted By: First1
Security in Computing, 6th Edition

Security in Computing, 6th Edition by Shari Lawrence Pfleeger, Charles Pfleeger, Lizzie Coles-Kemp
English | August 5th, 2023 | ISBN: 0137891210 | 1029 pages | True PDF | 12.64 MB

"A useful aid to understanding today's headlines as well as Israel's recent past." –Kirkus Review

The AI Revolution in Networking, Cybersecurity, and Emerging Technologies

Posted By: First1
The AI Revolution in Networking, Cybersecurity, and Emerging Technologies

The AI Revolution in Networking, Cybersecurity, and Emerging Technologies by Omar Santos, Samer Salam, Hazim Dahir
English | February 23rd, 2024 | ISBN: 0138293694 | 224 pages | True EPUB | 6.71 MB

The AI Revolution is Here. Discover its Dynamic Applications in Networking, Cybersecurity, and More.

Beyond the Algorithm: AI, Security, Privacy, and Ethics

Posted By: First1
Beyond the Algorithm: AI, Security, Privacy, and Ethics

Beyond the Algorithm: AI, Security, Privacy, and Ethics by Omar Santos, Petar Radanliev
English | February 9th, 2024 | ISBN: 0138268452 | 337 pages | True PDF | 2.35 MB

This book is a comprehensive, cutting-edge guide designed to educate readers on the essentials of artificial intelligence (AI) and machine learning (ML), while emphasizing the crucial aspects of security, ethics, and privacy. The book aims to equip AI practitioners, IT professionals, data scientists, security experts, policy-makers, and students with the knowledge and tools needed to develop, deploy, and manage AI and ML systems securely and responsibly.

The AI Revolution in Networking, Cybersecurity, and Emerging Technologies

Posted By: First1
The AI Revolution in Networking, Cybersecurity, and Emerging Technologies

The AI Revolution in Networking, Cybersecurity, and Emerging Technologies by Omar Santos, Samer Salam, Hazim Dahir
English | February 23rd, 2024 | ISBN: 0138293694 | 221 pages | True PDF | 3.86 MB

The AI Revolution is Here. Discover its Dynamic Applications in Networking, Cybersecurity, and More.

Computer Networks, 6th Edition

Posted By: First1
Computer Networks, 6th Edition

Computer Networks, 6th Edition by Andrew S. Tanenbaum, David J. Wetherall, Nick Feamster
English | April 24th, 2020 | ISBN: 0136764053 | 945 pages | True PDF | 11.58 MB

For courses in Business Data Communication and Networking.

Software Supply Chain Security: Securing the End-to-end Supply Chain for Software, Firmware, and Hardware

Posted By: First1
Software Supply Chain Security: Securing the End-to-end Supply Chain for Software, Firmware, and Hardware

Software Supply Chain Security: Securing the End-to-end Supply Chain for Software, Firmware, and Hardware by Cassie Crossley
English | March 19th, 2024 | ISBN: 1098133706 | 200 pages | True EPUB | 5.69 MB

Trillions of lines of code help us in our lives, companies, and organizations. But just a single software cybersecurity vulnerability can stop entire companies from doing business and cause billions of dollars in revenue loss and business recovery. Securing the creation and deployment of software, also known as software supply chain security, goes well beyond the software development process.

Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing

Posted By: First1
Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing

Fighting Phishing: Everything You Can Do to Fight Social Engineering and Phishing by Roger A. Grimes
English | February 21st, 2024 | ISBN: 1394249209 | 448 pages | True EPUB | 38.15 MB

Keep valuable data safe from even the most sophisticated social engineering and phishing attacks

AWS Certified Advanced Networking Study Guide: Specialty (ANS-C01) Exam, 2nd Edition

Posted By: First1
AWS Certified Advanced Networking Study Guide: Specialty (ANS-C01) Exam, 2nd Edition

AWS Certified Advanced Networking Study Guide: Specialty (ANS-C01) Exam, 2nd Edition by Todd Montgomery
English | October 24th, 2023 | ISBN: 1394171854 | 592 pages | True EPUB | 27.62 MB

The latest edition of the official study guide for the AWS Advanced Networking certification specialty exam

Kubernetes Security and Observability: A Holistic Approach to Securing Containers and Cloud Native Applications

Posted By: First1
Kubernetes Security and Observability: A Holistic Approach to Securing Containers and Cloud Native Applications

Kubernetes Security and Observability: A Holistic Approach to Securing Containers and Cloud Native Applications by Brendan Creane, Amit Gupta
English | October 26th, 2021 | ISBN: 1098107101 | 195 pages | True PDF | 11.39 MB

Securing, observing, and troubleshooting containerized workloads on Kubernetes can be daunting. It requires a range of considerations, from infrastructure choices and cluster configuration to deployment controls and runtime and network security. With this practical book, you'll learn how to adopt a holistic security and observability strategy for building and securing cloud native applications running on Kubernetes.

Identity-Native Infrastructure Access Management: Preventing Breaches by Eliminating Secrets and Adopting Zero Trust

Posted By: First1
Identity-Native Infrastructure Access Management: Preventing Breaches by Eliminating Secrets and Adopting Zero Trust

Identity-Native Infrastructure Access Management: Preventing Breaches by Eliminating Secrets and Adopting Zero Trust by Ev Kontsevoy, Sakshyam Shah, Peter Conrad
English | October 17th, 2023 | ISBN: 1098131894 | 154 pages | True EPUB (Retail Copy) | 3.14 MB

Traditional secret-based credentials can't scale to meet the complexity and size of cloud and on-premises infrastructure. Today's applications are spread across a diverse range of clouds and colocation facilities, as well as on-prem data centers. Each layer of this modern stack has its own attack vectors and protocols to consider.