Seems you have not registered as a member of localhost.saystem.shop!

You may have to register before you can download all our books and magazines, click the sign up button below to create a free account.

Sign up

In Search of Bacchus
  • Language: en
  • Pages: 330

In Search of Bacchus

From the award-winning and critically acclaimed author of Judgment of Paris and To Cork or Not To Cork comes a delightful, entertaining, and informative exploration of the thriving world of wine tourism. George M. Taber set out on the wine lover's ultimate dream: a journey to the twelve most beautiful and fascinating wine-producing regions around the globe. In Search of Bacchus chronicles that experience: the gorgeous landscapes, conversations with winemakers, unforgettable meals, must-do activities, and of course, the taste of the wines. Here he offers suggestions for travelers, commentary on trends in the wine world, charming anecdotes, and recommendations of vintages available in the Unit...

DevOps and Containers Security
  • Language: en
  • Pages: 365

DevOps and Containers Security

Secure your applications and development environments with Docker and Kubernetes Ê DESCRIPTION Ê Through this book, we will introduce the DevOps tools ecosystem and the main containers orchestration tools through an introduction to some platforms such as Kubernetes, Docker Swarm, and OpenShift. Among other topics, both good practices will be addressed when constructing the Docker images as well as best security practices to be applied at the level of the host in which those containers are executed, from Docker's own daemon to the rest of the components that make up its technological stack. We will review the topics such as static analysis of vulnerabilities on Docker images, the signing of...

Mastering Python for Networking and Security
  • Language: en
  • Pages: 415

Mastering Python for Networking and Security

Master Python scripting to build a network and perform security operations Key Features Learn to handle cyber attacks with modern Python scripting Discover various Python libraries for building and securing your network Understand Python packages and libraries to secure your network infrastructure Book DescriptionIt’s becoming more and more apparent that security is a critical aspect of IT infrastructure. A data breach is a major security incident, usually carried out by just hacking a simple network line. Increasing your network’s security helps step up your defenses against cyber attacks. Meanwhile, Python is being used for increasingly advanced tasks, with the latest update introducin...

Learning Python Networking
  • Language: en
  • Pages: 479

Learning Python Networking

Achieve improved network programmability and automation by leveraging powerful network programming concepts, algorithms, and tools Key FeaturesDeal with remote network servers using SSH, FTP, SNMP and LDAP protocols.Design multi threaded and event-driven architectures for asynchronous servers programming.Leverage your Python programming skills to build powerful network applicationsBook Description Network programming has always been a demanding task. With full-featured and well-documented libraries all the way up the stack, Python makes network programming the enjoyable experience it should be. Starting with a walk through of today's major networking protocols, through this book, you'll lear...

Web Engineering
  • Language: en
  • Pages: 573

Web Engineering

The refereed proceedings of the International Conference on Web Engineering, ICWE 2003, held in Oviedo, Spain in July 2003. The 25 revised full papers and 73 short papers presented together with 2 invited papers were carefully reviewed and selected from 190 submissions. The papers are organized in topical sections on agents on the Web, e-commerce, e-learning, human-computer interaction, languages and tools, mobility and the Web, multimedia techniques and telecommunications, security, Web quality and testing, semantic Web, and Web applications development.

History of California
  • Language: en
  • Pages: 848

History of California

  • Type: Book
  • -
  • Published: 1884
  • -
  • Publisher: Unknown

This work examines California's history from 1520 to 1890. It also contains a ethnology of the state's population, economics, and politics.

Current Topics in Artificial Intelligence
  • Language: en
  • Pages: 703

Current Topics in Artificial Intelligence

This book constitutes the thoroughly refereed joint post-proceedings of the 10th Conference of the Spanish Association for Artificial Intelligence, CAEPIA 2003, and the 5th Conference on Technology Transfer, TTIA 2003, held in San Sebastián, Spain, in November 2003. The 66 revised full papers presented together with one invited paper were carefully selected during two rounds of reviewing and improvement from an initial total of 214 submissions. The papers span the entire spectrum of artificial intelligence and advanced applications in various fields.

The Taos Trappers
  • Language: en
  • Pages: 292

The Taos Trappers

In this comprehensive history, David J. Weber draws on Spanish, Mexican, and American sources to describe the development of the Taos trade and the early penetration of the area by French and American trappers. Within this borderlands region, colorful characters such as Ewing Young, Kit Carson, Peg-leg Smith, and the Robidoux brothers pioneered new trails to the Colorado Basin, the Gila River, and the Pacific and contributed to the wealth that flowed east along the Santa Fe Trail.

Directory of Personalities of the Cuban Government, Official Organizations, and Mass Organizations
  • Language: en
  • Pages: 1146

Directory of Personalities of the Cuban Government, Official Organizations, and Mass Organizations

  • Type: Book
  • -
  • Published: 1973
  • -
  • Publisher: Unknown

description not available right now.

Implementing DevSecOps with Docker and Kubernetes
  • Language: en
  • Pages: 394

Implementing DevSecOps with Docker and Kubernetes

Building and securely deploying container-based applications with Docker and Kubernetes using open source tools. KEY FEATURES ● Real-world examples of vulnerability analysis in Docker containers. ● Includes recommended practices for Kubernetes and Docker with real execution of commands. ● Includes essential monitoring tools for Docker containers and Kubernetes configuration. DESCRIPTION This book discusses many strategies that can be used by developers to improve their DevSecOps and container security skills. It is intended for those who are active in software development. After reading this book, readers will discover how Docker and Kubernetes work from a security perspective. The boo...