1 - 20
Next
- Khan, Ashraf, author.
- Birmingham, UK : Packt Publishing, 2017.
- Description
- Book — 1 online resource (1 volume) : illustrations
- Summary
-
Over 60 recipes to install, configure, and manage your IIS 10.0 About This Book * Provide a secure, easy-to-manage extensible platform for hosting your websites * Leverage IIS 10.0 in order to deploy web site in seconds * Integrate Windows and Nano Server 2016 and automate it with PowerShell * Recipes to Manage and monitor your IIS 10.0 Who This Book Is For If you are an administrator or web developer with a basic (or no) knowledge of Microsoft IIS and want to set up your own web server, then this is the book for you. What You Will Learn * Integrate IIS 10.0 on Windows server 2016 * Host multiple websites and Wildcard Host on IIS 10.0 * Deploy and administrate IIS 10.0 on Nano Server. * IIS administration with Powershell. * Manage and troubleshoot IIS 10.0 In Detail This book will start with customizing your IIS 10 to various platforms/OS and tune it according to your business requirements. Moving on, we will focus on the functionalities of core fundamentals and perform practical scenarios in order to maximize the use of a reliable web server. Going further we will be covering topics like IIS 10 architecture, IIS modules, hosting web server platforms, virtual directories along with web site deployment, ports, enhanced security. We will also cover new features of IIS 10 like integration with Windows Server 2016 and Nano Server, HTTP/2, PowerShell 5 cmdlets etc . Towards the end, we will cover troubleshooting & diagnostic techniques of IIS 10. By the end of this book you will be well versed with maximizing the reliability of your webserver and will have immense knowledge in using IIS 10 effectively Style and approach A set of exciting recipes on using Microsoft IIS 10.0 effectively..
(source: Nielsen Book Data)
- Brash, Ron, author.
- Birmingham, UK : Packt Publishing, 2018.
- Description
- Book — 1 online resource (1 volume) : illustrations
- Summary
-
- Table of Contents Crash Course in Bash Acting Like a Typewriter and File Explorer Understanding and Gaining File System Mastery Making a Script Behave Like a Daemon Scripts for System Administration Tasks Scripts for Power Users Writing Bash to Win and Profit Advanced Scripting Techniques.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Brito, Gabriel M. de.
- London : ISTE ; Hoboken, NJ : Wiley, 2013.
- Description
- Book — 1 online resource.
- Summary
-
- INTRODUCTION ix
- CHAPTER 1. CONTENT DISTRIBUTION ON THE INTERNET 1 1.1. End-to-end concept and limitations 2 1.2. Multicast communication 4 1.3. Peer-to-peer systems 5 1.4. Content distribution networks 6 1.5. Publish/subscribe systems 9
- CHAPTER 2. INFORMATION-CENTRIC NETWORKS 13 2.1. Content naming 13 2.1.1. Flat naming 14 2.1.2. Hierarchical naming 16 2.1.3. Attribute-based names 17 2.2. Content or name-based routing 18 2.2.1. Non-hierarchical routing 19 2.2.2. Hierarchical routing 20 2.3. Content caching 22
- CHAPTER 3. MAIN ICN ARCHITECTURES 23 3.1. Content-based networking/combined broadcast and content-based 23 3.2. Data-oriented network architecture 26 3.3. Content-centric networking/named-data networking 29 3.4. Publish-subscribe Internet routing paradigm/publish-subscribe Internet technologies 33 3.5. Content-centric inter-network architecture 37 3.6. Other architectures 40 3.7. General comparison 41
- CHAPTER 4. CHALLENGES 43 4.1. Naming 43 4.2. Routing 52 4.3. Caching 58 4.3.1. Analytical models for networks of caches 60 4.3.2. Content replacement policies 62 4.3.3. Content storage policies 65 4.4. Security 69 4.5. Mobility support in ICN 73 4.6. Applications 78 4.6.1. Real-time applications 78 4.6.2. Vehicular networks 80 4.6.3. Autonomous driving 81 4.6.4. Other applications 82
- CHAPTER 5. PRACTICAL ISSUES 83 5.1. Economic models 83 5.2. Content routers 88 CONCLUSION 97 ACKNOWLEDGMENT 99 BIBLIOGRAPHY 101 INDEX 119.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Ivanov, Konstantin, author.
- Birmingham, UK : Packt Publishing, 2017.
- Description
- Book — 1 online resource (1 volume) : illustrations
- Summary
-
Get acquainted with the world of LXC About This Book * Get the most practical and up-to-date resource on LXC and take full advantage of what Linux containers can offer in the day-to-day operations of large-scale applications * Learn how to deploy and administer various workloads such as web applications inside LXC * Save your organization time and money by building robust and secure containers and by speeding the deployment process of your software Who This Book Is For This book is for Linux engineers and software developers who are looking to deploy applications in a fast, secure, and scalable way for use in testing and production. What You Will Learn * Deep dive into the foundations of Linux containers with kernel namespaces and cgroups * Install, configure, and administer Linux containers with LXC and libvirt * Begin writing applications using Python libvirt bindings * Take an in-depth look at container networking * Set up monitoring and security with LXC * Build and deploy a highly available application with LXC in the cloud In Detail In recent years, containers have gained wide adoption by businesses running a variety of application loads. This became possible largely due to the advent of kernel namespaces and better resource management with control groups (cgroups). Linux containers (LXC) are a direct implementation of those kernel features that provide operating system level virtualization without the overhead of a hypervisor layer. This book starts by introducing the foundational concepts behind the implementation of LXC, then moves into the practical aspects of installing and configuring LXC containers. Moving on, you will explore container networking, security, and backups. You will also learn how to deploy LXC with technologies like Open Stack and Vagrant. By the end of the book, you will have a solid grasp of how LXC is implemented and how to run production applications in a highly available and scalable way. Style and approach A practical guide that introduces the core technologies behind Linux containers and provides a deep dive into installation, configuration, and operations of LXC.
(source: Nielsen Book Data)
- Khan, Ashraf, author.
- Birmingham, UK : Packt Publishing, 2017.
- Description
- Book — 1 online resource (1 volume) : illustrations
- Summary
-
Over 60 recipes to install, configure, and manage your IIS 10.0 About This Book * Provide a secure, easy-to-manage extensible platform for hosting your websites * Leverage IIS 10.0 in order to deploy web site in seconds * Integrate Windows and Nano Server 2016 and automate it with PowerShell * Recipes to Manage and monitor your IIS 10.0 Who This Book Is For If you are an administrator or web developer with a basic (or no) knowledge of Microsoft IIS and want to set up your own web server, then this is the book for you. What You Will Learn * Integrate IIS 10.0 on Windows server 2016 * Host multiple websites and Wildcard Host on IIS 10.0 * Deploy and administrate IIS 10.0 on Nano Server. * IIS administration with Powershell. * Manage and troubleshoot IIS 10.0 In Detail This book will start with customizing your IIS 10 to various platforms/OS and tune it according to your business requirements. Moving on, we will focus on the functionalities of core fundamentals and perform practical scenarios in order to maximize the use of a reliable web server. Going further we will be covering topics like IIS 10 architecture, IIS modules, hosting web server platforms, virtual directories along with web site deployment, ports, enhanced security. We will also cover new features of IIS 10 like integration with Windows Server 2016 and Nano Server, HTTP/2, PowerShell 5 cmdlets etc . Towards the end, we will cover troubleshooting & diagnostic techniques of IIS 10. By the end of this book you will be well versed with maximizing the reliability of your webserver and will have immense knowledge in using IIS 10 effectively Style and approach A set of exciting recipes on using Microsoft IIS 10.0 effectively..
(source: Nielsen Book Data)
6. Principles of big data [electronic resource] : preparing, sharing, and analyzing complex information [2013]
- Berman, Jules J.
- Amsterdam : Elsevier, Morgan Kaufmann, [2013]
- Description
- Book — 1 online resource (pages cm.)
- Summary
-
- 1. Big Data Moves to the Center of the Universe
- 2. Measurement
- 3. Annotation
- 4. Identification, De-identification, and Re-identification
- 5. Ontologies and Semantics: How information is endowed with meaning
- 6. Standards and their Versions
- 7. Legacy Data
- 8. Hypothesis Testing
- 9. Prediction
- 10. Software
- 11. Complexity
- 12. Vulnerabilities
- 13. Legalities
- 14. Social and Ethical Issues.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Kyan, Matthew.
- Hoboken, New Jersey : John Wiley & Sons Inc., [2014]
- Description
- Book — 1 online resource.
- Summary
-
- Acknowledgments xi 1 Introduction 1 1.1 Part I: The Self-Organizing Method 1 1.2 Part II: Dynamic Self-Organization for Image Filtering andMultimedia Retrieval 2 1.3 Part III: Dynamic Self-Organization for Image Segmentationand Visualization 5 1.4 Future Directions 7 2 Unsupervised Learning 9 2.1 Introduction 9 2.2 Unsupervised Clustering 9 2.3 Distance Metrics for Unsupervised Clustering 11 2.4 Unsupervised Learning Approaches 13 2.4.1 Partitioning and Cluster Membership 13 2.4.2 Iterative Mean-Squared Error Approaches 15 2.4.3 Mixture Decomposition Approaches 17 2.4.4 Agglomerative Hierarchical Approaches 18 2.4.5 Graph-Theoretic Approaches 20 2.4.6 Evolutionary Approaches 20 2.4.7 Neural Network Approaches 21 2.5 Assessing Cluster Quality and Validity 21 2.5.1 Cost Function Based Cluster Validity Indices 22 2.5.2 Density-Based Cluster Validity Indices 23 2.5.3 Geometric-Based Cluster Validity Indices 24 3 Self-Organization 27 3.1 Introduction 27 3.2 Principles of Self-Organization 27 3.2.1 Synaptic Self-Amplification and Competition 27 3.2.2 Cooperation 28 3.2.3 Knowledge Through Redundancy 29 3.3 Fundamental Architectures 29 3.3.1 Adaptive Resonance Theory 29 3.3.2 Self-Organizing Map 37 3.4 Other Fixed Architectures for Self-Organization 43 3.4.1 Neural Gas 44 3.4.2 Hierarchical Feature Map 45 3.5 Emerging Architectures for Self-Organization 46 3.5.1 Dynamic Hierarchical Architectures 47 3.5.2 Nonstationary Architectures 48 3.5.3 Hybrid Architectures 50 3.6 Conclusion 50 4 Self-Organizing Tree Map 53 4.1 Introduction 53 4.2 Architecture 54 4.3 Competitive Learning 55 4.4 Algorithm 57 4.5 Evolution 61 4.5.1 Dynamic Topology 61 4.5.2 Classification Capability 64 4.6 Practical Considerations, Extensions, and Refinements 68 4.6.1 The Hierarchical Control Function 68 4.6.2 Learning, Timing, and Convergence 71 4.6.3 Feature Normalization 73 4.6.4 Stop Criteria 73 4.7 Conclusions 74 5 Self-Organization in Impulse Noise Removal 75 5.1 Introduction 75 5.2 Review of Traditional Median-Type Filters 76 5.3 The Noise-Exclusive Adaptive Filtering 82 5.3.1 Feature Selection and Impulse Detection 82 5.3.2 Noise Removal Filters 84 5.4 Experimental Results 86 5.5 Detection-Guided Restoration and Real-Time Processing 99 5.5.1 Introduction 99 5.5.2 Iterative Filtering 101 5.5.3 Recursive Filtering 104 5.5.4 Real-Time Processing of Impulse Corrupted TV Pictures105 5.5.5 Analysis of the Processing Time 109 5.6 Conclusions 115 6 Self-Organization in Image Retrieval 119 6.1 Retrieval of Visual Information 120 6.2 Visual Feature Descriptor 122 6.2.1 Color Histogram and Color Moment Descriptors 122 6.2.2 Wavelet Moment and Gabor Texture Descriptors 123 6.2.3 Fourier and Moment-based Shape Descriptors 125 6.2.4 Feature Normalization and Selection 127 6.3 User-Assisted Retrieval 130 6.3.1 Radial Basis Function Method 132 6.4 Self-Organization for Pseudo Relevance Feedback 136 6.5 Directed Self-Organization 140 6.5.1 Algorithm 142 6.6 Optimizing Self-Organization for Retrieval 146 6.6.1 Genetic Principles 147 6.6.2 System Architecture 149 6.6.3 Genetic Algorithm for Feature Weight Detection 150 6.7 Retrieval Performance 153 6.7.1 Directed Self-Organization 153 6.7.2 Genetic Algorithm Weight Detection 155 6.8 Summary 157 7 The Self-Organizing Hierarchical Variance Map 159 7.1 An Intuitive Basis 160 7.2 Model Formulation and Breakdown 162 7.2.1 Topology Extraction via Competitive Hebbian Learning163 7.2.2 Local Variance via Hebbian Maximal Eigenfilters 165 7.2.3 Global and Local Variance Interplay for Map Growth andTermination 170 7.3 Algorithm 173 7.3.1 Initialization, Continuation, and Presentation 173 7.3.2 Updating Network Parameters 175 7.3.3 Vigilance Evaluation and Map Growth 175 7.3.4 Topology Adaptation 176 7.3.5 Node Adaptation 177 7.3.6 Optional Tuning Stage 177 7.4 Simulations and Evaluation 177 7.4.1 Observations of Evolution and Partitioning 178 7.4.2 Visual Comparisons with Popular Mean-Squared ErrorArchitectures 181 7.4.3 Visual Comparison Against Growing Neural Gas 183 7.4.4 Comparing Hierarchical with Tree-Based Methods 183 7.5 Tests on Self-Determination and the Optional Tuning Stage187 7.6 Cluster Validity Analysis on Synthetic and UCI Data 187 7.6.1 Performance vs. Popular Clustering Methods 190 7.6.2 IRIS Dataset 192 7.6.3 WINE Dataset 195 7.7 Summary 195 8 Microbiological Image Analysis Using Self-Organization197 8.1 Image Analysis in the Biosciences 197 8.1.1 Segmentation: The Common Denominator 198 8.1.2 Semi-supervised versus Unsupervised Analysis 199 8.1.3 Confocal Microscopy and Its Modalities 200 8.2 Image Analysis Tasks Considered 202 8.2.1 Visualising Chromosomes During Mitosis 202 8.2.2 Segmenting Heterogeneous Biofilms 204 8.3 Microbiological Image Segmentation 205 8.3.1 Effects of Feature Space Definition 207 8.3.2 Fixed Weighting of Feature Space 209 8.3.3 Dynamic Feature Fusion During Learning 213 8.4 Image Segmentation Using Hierarchical Self-Organization215 8.4.1 Gray-Level Segmentation of Chromosomes 215 8.4.2 Automated Multilevel Thresholding of Biofilm 220 8.4.3 Multidimensional Feature Segmentation 221 8.5 Harvesting Topologies to Facilitate Visualization 226 8.5.1 Topology Aware Opacity and Gray-Level Assignment 227 8.5.2 Visualization of Chromosomes During Mitosis 228 8.6 Summary 233 9 Closing Remarks and Future Directions 237 9.1 Summary of Main Findings 237 9.1.1 Dynamic Self-Organization: Effective Models for EfficientFeature Space Parsing 237 9.1.2 Improved Stability, Integrity, and Efficiency 238 9.1.3 Adaptive Topologies Promote Consistency and UncoverRelationships 239 9.1.4 Online Selection of Class Number 239 9.1.5 Topologies Represent a Useful Backbone for Visualizationor Analysis 240 9.2 Future Directions 240 9.2.1 Dynamic Navigation for Information Repositories 241 9.2.2 Interactive Knowledge-Assisted Visualization 243 9.2.3 Temporal Data Analysis Using Trajectories 245 Appendix A 249 A.1 Global and Local Consistency Error 249 References 251 Index 269.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Kyan, Matthew.
- Hoboken, New Jersey : John Wiley & Sons Inc., [2014]
- Description
- Book — 1 online resource.
- Summary
-
- Acknowledgments xi 1 Introduction 1 1.1 Part I: The Self-Organizing Method 1 1.2 Part II: Dynamic Self-Organization for Image Filtering andMultimedia Retrieval 2 1.3 Part III: Dynamic Self-Organization for Image Segmentationand Visualization 5 1.4 Future Directions 7 2 Unsupervised Learning 9 2.1 Introduction 9 2.2 Unsupervised Clustering 9 2.3 Distance Metrics for Unsupervised Clustering 11 2.4 Unsupervised Learning Approaches 13 2.4.1 Partitioning and Cluster Membership 13 2.4.2 Iterative Mean-Squared Error Approaches 15 2.4.3 Mixture Decomposition Approaches 17 2.4.4 Agglomerative Hierarchical Approaches 18 2.4.5 Graph-Theoretic Approaches 20 2.4.6 Evolutionary Approaches 20 2.4.7 Neural Network Approaches 21 2.5 Assessing Cluster Quality and Validity 21 2.5.1 Cost Function Based Cluster Validity Indices 22 2.5.2 Density-Based Cluster Validity Indices 23 2.5.3 Geometric-Based Cluster Validity Indices 24 3 Self-Organization 27 3.1 Introduction 27 3.2 Principles of Self-Organization 27 3.2.1 Synaptic Self-Amplification and Competition 27 3.2.2 Cooperation 28 3.2.3 Knowledge Through Redundancy 29 3.3 Fundamental Architectures 29 3.3.1 Adaptive Resonance Theory 29 3.3.2 Self-Organizing Map 37 3.4 Other Fixed Architectures for Self-Organization 43 3.4.1 Neural Gas 44 3.4.2 Hierarchical Feature Map 45 3.5 Emerging Architectures for Self-Organization 46 3.5.1 Dynamic Hierarchical Architectures 47 3.5.2 Nonstationary Architectures 48 3.5.3 Hybrid Architectures 50 3.6 Conclusion 50 4 Self-Organizing Tree Map 53 4.1 Introduction 53 4.2 Architecture 54 4.3 Competitive Learning 55 4.4 Algorithm 57 4.5 Evolution 61 4.5.1 Dynamic Topology 61 4.5.2 Classification Capability 64 4.6 Practical Considerations, Extensions, and Refinements 68 4.6.1 The Hierarchical Control Function 68 4.6.2 Learning, Timing, and Convergence 71 4.6.3 Feature Normalization 73 4.6.4 Stop Criteria 73 4.7 Conclusions 74 5 Self-Organization in Impulse Noise Removal 75 5.1 Introduction 75 5.2 Review of Traditional Median-Type Filters 76 5.3 The Noise-Exclusive Adaptive Filtering 82 5.3.1 Feature Selection and Impulse Detection 82 5.3.2 Noise Removal Filters 84 5.4 Experimental Results 86 5.5 Detection-Guided Restoration and Real-Time Processing 99 5.5.1 Introduction 99 5.5.2 Iterative Filtering 101 5.5.3 Recursive Filtering 104 5.5.4 Real-Time Processing of Impulse Corrupted TV Pictures105 5.5.5 Analysis of the Processing Time 109 5.6 Conclusions 115 6 Self-Organization in Image Retrieval 119 6.1 Retrieval of Visual Information 120 6.2 Visual Feature Descriptor 122 6.2.1 Color Histogram and Color Moment Descriptors 122 6.2.2 Wavelet Moment and Gabor Texture Descriptors 123 6.2.3 Fourier and Moment-based Shape Descriptors 125 6.2.4 Feature Normalization and Selection 127 6.3 User-Assisted Retrieval 130 6.3.1 Radial Basis Function Method 132 6.4 Self-Organization for Pseudo Relevance Feedback 136 6.5 Directed Self-Organization 140 6.5.1 Algorithm 142 6.6 Optimizing Self-Organization for Retrieval 146 6.6.1 Genetic Principles 147 6.6.2 System Architecture 149 6.6.3 Genetic Algorithm for Feature Weight Detection 150 6.7 Retrieval Performance 153 6.7.1 Directed Self-Organization 153 6.7.2 Genetic Algorithm Weight Detection 155 6.8 Summary 157 7 The Self-Organizing Hierarchical Variance Map 159 7.1 An Intuitive Basis 160 7.2 Model Formulation and Breakdown 162 7.2.1 Topology Extraction via Competitive Hebbian Learning163 7.2.2 Local Variance via Hebbian Maximal Eigenfilters 165 7.2.3 Global and Local Variance Interplay for Map Growth andTermination 170 7.3 Algorithm 173 7.3.1 Initialization, Continuation, and Presentation 173 7.3.2 Updating Network Parameters 175 7.3.3 Vigilance Evaluation and Map Growth 175 7.3.4 Topology Adaptation 176 7.3.5 Node Adaptation 177 7.3.6 Optional Tuning Stage 177 7.4 Simulations and Evaluation 177 7.4.1 Observations of Evolution and Partitioning 178 7.4.2 Visual Comparisons with Popular Mean-Squared ErrorArchitectures 181 7.4.3 Visual Comparison Against Growing Neural Gas 183 7.4.4 Comparing Hierarchical with Tree-Based Methods 183 7.5 Tests on Self-Determination and the Optional Tuning Stage187 7.6 Cluster Validity Analysis on Synthetic and UCI Data 187 7.6.1 Performance vs. Popular Clustering Methods 190 7.6.2 IRIS Dataset 192 7.6.3 WINE Dataset 195 7.7 Summary 195 8 Microbiological Image Analysis Using Self-Organization197 8.1 Image Analysis in the Biosciences 197 8.1.1 Segmentation: The Common Denominator 198 8.1.2 Semi-supervised versus Unsupervised Analysis 199 8.1.3 Confocal Microscopy and Its Modalities 200 8.2 Image Analysis Tasks Considered 202 8.2.1 Visualising Chromosomes During Mitosis 202 8.2.2 Segmenting Heterogeneous Biofilms 204 8.3 Microbiological Image Segmentation 205 8.3.1 Effects of Feature Space Definition 207 8.3.2 Fixed Weighting of Feature Space 209 8.3.3 Dynamic Feature Fusion During Learning 213 8.4 Image Segmentation Using Hierarchical Self-Organization215 8.4.1 Gray-Level Segmentation of Chromosomes 215 8.4.2 Automated Multilevel Thresholding of Biofilm 220 8.4.3 Multidimensional Feature Segmentation 221 8.5 Harvesting Topologies to Facilitate Visualization 226 8.5.1 Topology Aware Opacity and Gray-Level Assignment 227 8.5.2 Visualization of Chromosomes During Mitosis 228 8.6 Summary 233 9 Closing Remarks and Future Directions 237 9.1 Summary of Main Findings 237 9.1.1 Dynamic Self-Organization: Effective Models for EfficientFeature Space Parsing 237 9.1.2 Improved Stability, Integrity, and Efficiency 238 9.1.3 Adaptive Topologies Promote Consistency and UncoverRelationships 239 9.1.4 Online Selection of Class Number 239 9.1.5 Topologies Represent a Useful Backbone for Visualizationor Analysis 240 9.2 Future Directions 240 9.2.1 Dynamic Navigation for Information Repositories 241 9.2.2 Interactive Knowledge-Assisted Visualization 243 9.2.3 Temporal Data Analysis Using Trajectories 245 Appendix A 249 A.1 Global and Local Consistency Error 249 References 251 Index 269.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Gregory, Peter, author.
- 1st edition. - McGraw-Hill, 2020.
- Description
- Book — 1 online resource (304 pages) Digital: text file.
- Summary
-
- Acknowledgments
- Introduction
- Chapter 1 Becoming a CISA
- Benefits of CISA Certification
- The CISA Certification Process
- Experience Requirements
- ISACA IS Standards
- The Certification Exam
- Exam Preparation
- Before the Exam
- Day of the Exam
- After the Exam
- Applying for CISA Certification
- Retaining Your CISA Certification
- CISA Exam Preparation Pointers
- Summary
- Chapter 2 IT Governance and Management
- Questions
- Quick Answer Key
- Answers
- Chapter 3 The Audit Process
- Questions
- Quick Answer Key
- Answers
- Chapter 4 IT Life Cycle Management
- Questions
- Quick Answer Key
- Answers
- Chapter 5 IT Service Management and Continuity
- Questions
- Quick Answer Key
- Answers
- Chapter 6 Information Asset Protection
- Questions
- Quick Answer Key
- Answers
- Appendix About the Online Content
- System Requirements
- Your Total Seminars Training Hub Account
- Privacy Notice
- Single User License Terms and Conditions
- TotalTester Online
- Technical Support.
- Ivanov, Konstantin, author.
- Birmingham, UK : Packt Publishing, 2017.
- Description
- Book — 1 online resource (1 volume) : illustrations
- Summary
-
Get acquainted with the world of LXC About This Book * Get the most practical and up-to-date resource on LXC and take full advantage of what Linux containers can offer in the day-to-day operations of large-scale applications * Learn how to deploy and administer various workloads such as web applications inside LXC * Save your organization time and money by building robust and secure containers and by speeding the deployment process of your software Who This Book Is For This book is for Linux engineers and software developers who are looking to deploy applications in a fast, secure, and scalable way for use in testing and production. What You Will Learn * Deep dive into the foundations of Linux containers with kernel namespaces and cgroups * Install, configure, and administer Linux containers with LXC and libvirt * Begin writing applications using Python libvirt bindings * Take an in-depth look at container networking * Set up monitoring and security with LXC * Build and deploy a highly available application with LXC in the cloud In Detail In recent years, containers have gained wide adoption by businesses running a variety of application loads. This became possible largely due to the advent of kernel namespaces and better resource management with control groups (cgroups). Linux containers (LXC) are a direct implementation of those kernel features that provide operating system level virtualization without the overhead of a hypervisor layer. This book starts by introducing the foundational concepts behind the implementation of LXC, then moves into the practical aspects of installing and configuring LXC containers. Moving on, you will explore container networking, security, and backups. You will also learn how to deploy LXC with technologies like Open Stack and Vagrant. By the end of the book, you will have a solid grasp of how LXC is implemented and how to run production applications in a highly available and scalable way. Style and approach A practical guide that introduces the core technologies behind Linux containers and provides a deep dive into installation, configuration, and operations of LXC.
(source: Nielsen Book Data)
- Lachance, Daniel, author.
- 2nd edition. - McGraw-Hill, 2020.
- Description
- Book — 1 online resource (208 pages) Digital: text file.
- Summary
-
- Cover --
- About the Author
- Title Page
- Copyright Page
- Dedication
- Contents at a Glance
- Contents
- Preface
- Acknowledgments
- Introduction
- Part I Cloud Computing Introduction
- 1 The Principles of Cloud Computing
- 2 The Business Side of Cloud Computing
- Part II Cloud Design Requirements
- 3 Cloud Planning
- 4 Compliance and the Cloud
- Part III Cloud Infrastructure
- 5 Cloud Storage Infrastructure
- 6 Cloud Network Infrastructure
- 7 Cloud Compute Infrastructure
- 8 Applications and Big Data in the Cloud
- 9 Cloud DevOps
- Part IV Securing the Cloud
- 10 Security and the Cloud
- 11 Managing Cloud Risk
- Part V Appendix and Glossary
- A About the Online Content
- Glossary
- Index.
- Xu, Chen, author.
- Heidelberg : Springer, 2015.
- Description
- Book — 1 online resource (xi, 97 pages) : illustrations Digital: text file; PDF.
- Summary
-
- Preface; Acknowledgments; Contents; 1 Introduction; 1.1 Application Scenarios; 1.2 The Research Significance and Challenges; 1.3 Implementation Framework; 1.4 Overview of the Book; References; 2 Literature and Research Review; 2.1 Metrics for Quality-Aware Scheduling; 2.1.1 QoS Metrics; 2.1.2 QoD Metrics; 2.2 Quality-Aware Scheduling in Data Management System; 2.2.1 Quality-Aware Scheduling in RTDBMS; 2.2.2 Quality-Aware Scheduling in DSMS; 2.2.3 Quality-Aware Scheduling in RDBMS; 2.2.4 Quality-Aware Scheduling in Key-Value Stores; 2.3 Summary; References; 3 Problem Overview.
- 3.1 Background Knowledge3.1.1 Data Organization; 3.1.2 Data Replication and Consistency; 3.1.3 User Queries; 3.1.4 System Updates: State-Transfer Versus Operation-Transfer; 3.2 Problem Statement; 3.2.1 QoS Penalty; 3.2.2 QoD Penalty; 3.2.3 Combined Penalty; 3.3 Summary; References; 4 Scheduling for State-Transfer Updates; 4.1 On-Demand (OD) Mechanism; 4.1.1 WSJF-OD; 4.2 Hybrid On-Demand (HOD) Mechanism; 4.2.1 WSJF-HOD; 4.3 Freshness/Tardiness (FIT) Mechanism; 4.3.1 WSJF-FIT; 4.4 Adaptive Freshness/Tardiness (AFIT) Mechanism; 4.4.1 Query Routing; 4.4.2 Query Selection; 4.4.3 WSJF-AFIT.
- 4.5 Popularity-Aware Mechanism4.5.1 Populairty-Aware WSJF-OD; 4.5.2 Populairty-Aware WSJF-HOD; 4.5.3 Popularity-Aware WSJF-FIT; 4.5.4 Popularity-Aware WSJF-AFIT; 4.6 Experimental Study; 4.6.1 Baseline Policies; 4.6.2 Parameter Setting; 4.6.3 Impact of Query Arrival Rate; 4.6.4 Impact of Update Cost; 4.6.5 Impact of Different QoS and QoD Preferences; 4.6.6 Impact of Popularity; 4.7 Summary; References; 5 Scheduling for Operation-Transfer Updates; 5.1 Hybrid On-Demand (HOD) Mechanism; 5.1.1 WSJF-HOD; 5.2 Freshness/Tardiness (FIT) Mechanism; 5.2.1 WSJF-FIT; 5.3 Popularity-Aware Mechanism.
- 5.3.1 Popularity-Aware WSJF-HOD5.3.2 Popularity-Aware WSJF-FIT; 5.4 Experimental Study; 5.4.1 Parameter Setting; 5.4.2 Impact of Update Arrival Rate; 5.4.3 Impact of Popularity and Approximation; 5.5 Summary; References; 6 AQUAS: A Quality-Aware Scheduler; 6.1 System Overview; 6.1.1 System Goals; 6.1.2 System Design; 6.2 System Performance; 6.2.1 Benchmark; 6.2.2 Evaluation Result; 6.3 A Demonstration on MicroBlogging Application; 6.3.1 Timeline Queries in AQUAS; 6.3.2 A Case Study; 6.4 Summary; References; 7 Conclusion and Future Work; 7.1 Conclusion; 7.2 Future Work; References.
- Bhattacharya, Arnab (Computer scientist)
- Boca Raton, Florida : CRC Press, [2015]
- Description
- Book — 1 online resource Digital: data file.
- Summary
-
- Basics Database Queries Basic Setting Exact Search Similarity Search Join Errors
- Low-Dimensional Index Structures Hashing Static Hashing Dynamic Hashing Locality Sensitive Hashing (LSH) Multi-Dimensional Hashing Space-Filling Curves
- Memory-Based Index Structures Index Structures Binary Search Tree (BST) Quadtree K-D-Tree Range Tree Voronoi Diagram Tries Suffix Tree Bitmap Index
- Disk-Based Index Structures Hierarchical Structures B-Tree and B+-Tree K-D-B-Tree General Framework R-Tree R*-Tree R+-Tree Hilbert R-Tree SS-Tree SR-Tree P-Tree Bulk-Loading
- Distances Distance Functions Metric Spaces Lp Norm Quadratic Form Distance Cosine Similarity Statistical Distance Measures Distances between Sets of Objects Earth Mover's Distance Edit Distance
- Distance-Based Structures Triangular Inequality VP-Tree GH-Tree GNAT M-Tree SA-Tree AESA Linear AESA (LAESA) AESA for Vector Spaces
- High-Dimensional Spaces Curse of Dimensionality Analysis of Search for High-Dimensional Data Expected Nearest Neighbor Distance Expected Number of Page Accesses Curse of Dimensionality
- High-Dimensionality Structures X-Tree Pyramid Technique IMinMax VA-File A-Tree IQ-Tree
- Data Reduction Techniques Dimensionality Reduction Techniques Properties Useful for Similarity Search Quality Measures Embedding Singular Value Decomposition (SVD) Principal Component Analysis (PCA) Multi-Dimensional Scaling (MDS) IsoMap FastMap Embedding Methods Bounds on Distortion
- Data Representation Techniques Discrete Fourier Transform (DFT) Discrete Cosine Transform (DCT) Discrete Wavelet Transform (DWT) V-Optimal Histogram
- Appendices A Memory and Disk Accesses Memory Access Disks Flash
- B Distances of Bounding Boxes Distance of a Point from a Rectangle Distance of a Point from a Sphere Distance of a Sphere from a Rectangle Distance of a Sphere from a Sphere Distance of a Rectangle from a Rectangle
- C Vectors and Matrices Vector Spaces Matrices Properties of Matrices Dimensionality
- D Probability and Statistics Random Variable Probability Distribution Statistical Parameters.
- (source: Nielsen Book Data)
- Basics. Low-Dimensional Index Structures. Disk-Based Index Structures. Distances. High-Dimensional Spaces. Data Reduction Techniques. Appendices.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
Fundamentals of Database Indexing and Searching presents well-known database searching and indexing techniques. It focuses on similarity search queries, showing how to use distance functions to measure the notion of dissimilarity.After defining database queries and similarity search queries, the book organizes the most common and representative ind.
(source: Nielsen Book Data)
- Hoog, Andrew.
- Waltham, MA : Syngress, c2011.
- Description
- Book — 1 online resource (xix, 372 p.) : ill.
- Summary
-
- Chapter 1. Android and Mobile Forensics
- Chapter 2. Android Hardware Platforms
- Chapter 3. Android Software Development Kit and Android Debug Bridge
- Chapter 4. Android File Systems and Data Structures
- Chapter 5. Android Device, Data and App Security
- Chapter 6. Android Forensic Techniques
- Chapter 7. Android Application and Forensic Analysis.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Dannen, Chris, author.
- Brooklyn, NY : Apress, 2017.
- Description
- Book — 1 online resource Digital: text file; PDF.
- Summary
-
- 1. Bridging the Blockchain Knowledge Gap
- 2. The Mist Browser
- 3. The EVM
- 4. Solidity Programming
- 5. Smart Contacts and Tokens
- 6. Mining Ether
- 7. Cryptoeconomics Survey
- 8. Dapp Deployment
- 9. Creating Private Chains
- 10. Use Cases
- 11. Advanced Concepts.
- (source: Nielsen Book Data)
(source: Nielsen Book Data) Written by a technology journalist trained in breaking down technical concepts into easy-to-understand prose, this book updates you on the last three years of progress since Bitcoin became popular ئ and then situates Ethereum in a world pioneered by Bitcoin. -- Edited summary from book.
16. Learning PowerShell [2017]
- Hassell, Jonathan.
- Boston ; Berlin : De [2017]
- Description
- Book — 1 online resource (215 pages) Digital: text file; PDF.
- Summary
-
- Frontmatter
- Acknowledgements
- Contents
- 1. Getting Started and Setting Up
- 2. The Basics of PowerShell
- 3. The PowerShell Pipeline
- 4. PowerShell Providers, Modules, and Snap-ins
- 5. The Complete Beginner's Guide to Objects
- 6. Filtering and Limiting
- 7. Creating Simple Scripts
- 8. More Work with Objects
- 9. To the Many, To the Few -- PowerShell Remoting
- 10. Useful PowerShell Tools
- 11. Using PowerShell to Manage Office 365
- 12. Desired State Configuration
- 13. Common Administrative Tasks with PowerShell
- Appendix X: Quick Cheat Sheet of PowerShell Verbs
- Index.
(source: Nielsen Book Data)
17. Introduction to computer data representation [2013]
- Fenwick, P. B. C., author.
- Sharjah, U.A.E. : Bentham Science Publishers, [2013?]
- Description
- Book — 1 online resource
- Summary
-
- Cover; Title; EUL; Dedication; Contents; Foreword; Preface; Introduction; Chapter 01; Chapter 02; Chapter 03; Chapter 04; Chapter 05; Chapter 06; Chapter 07; Chapter 08; Chapter 09; Chapter 10; Chapter 11; Chapter 12; Bibliography; Index.
18. Asterisk hacking : toolkit and liveCD [2007]
- Jackson, Benjamin.
- Burlington, MA : Syngress, ©2007.
- Description
- Book — 1 online resource (xii, 253 pages) : illustrations
- Summary
-
- What is Asterisk and why do you need it? Installing Asterisk Add-ons and Modules Scripting Asterisk Hardware Ninjutsu Protocols, say what? Asterisk Underground Lock it down! Reach out and touch someone: The future of Asterisk Hacking.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
19. AWS Administration Cookbook [2017]
- Chan, Lucas.
- Birmingham : Packt Publishing, 2017.
- Description
- Book — 1 online resource (383 pages)
- Summary
-
- Cover; Copyright; Credits; About the Authors; About the Reviewer; www.PacktPub.com; Customer Feedback; Table of Contents; Preface;
- Chapter 1: AWS Fundamentals; Introduction; Creating an account; Regions and Availability Zones; The AWS web console; CloudFormation templates; Infrastructure as Code; Visibility; Consistency; Troubleshooting; Scale; Costs; DevOps; Server configuration; IaC on AWS; CloudFormation; What is CloudFormation?; Why is CloudFormation important?; The layer cake; CloudFormation templates; YAML versus JSON; A closer look at CloudFormation templates; Parameters; Resources.
- OutputsMappings; Dependencies and ordering; Functions; Fn::Join; Fn::Sub; Conditionals; Permissions and service roles; Custom resources; Cross-stack references; Updating resources; Change sets; Other things to know; Name collisions; Rollback; Limits; Circular dependencies; DSLs and generators; Credentials; Stack policies; The command-line interface tool; Installation; Upgrade; Configuration; Default profile; Named profiles; Environment variables; Instance roles; Usage; Commands; Subcommands; Options; Output; JSON; Table; Text; Querying; Generate CLI skeleton; Input; Output; Pagination.
- AutocompleteRelated tools; jq;
- Chapter 2: Managing AWS Accounts; Introduction; Setting up a master account; How to do it ... ; How it works ... ; There's more ... ; Multi-factor authentication; Using the CLI; See also; Creating a member account; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Accessing the member account; Service control policies; Root credentials; Deleting accounts; See also; Inviting an account; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Removing accounts; Consolidated billing; See also; Managing your accounts; Getting ready.
- How to do it ... Getting the root ID for your organization; Creating an OU; Getting the ID of an OU; Adding an account to an OU; Removing an account from an OU; Deleting an OU; How it works ... ; There's more ... ; See also; Adding a service control policy; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also;
- Chapter 3: Storage and Content Delivery; Introduction; Storage; Elastic Block Store; Elastic File System; Simple Storage Service; Glacier; Content delivery; Hosting a static website; How to do it ... ; Creating S3 buckets and hosting content; Creating a hosted zone.
- Creating DNS recordsUploading website content; How it works ... ; There's more ... ; Delegating your domain to AWS; Cross-origin resource sharing ; Caching a website; Getting ready; About dynamic content; Configuring CloudFront distributions; How to do it ... ; Working with network storage; Getting ready; How to do it ... ; How it works ... ; There's more ... ; Backing up data for compliance; How to do it ... ; How it works ... ;
- Chapter 4: Using AWS Compute; Introduction; Creating a key pair; Getting ready; How to do it ... ; How it works ... ; Launching an instance; Getting ready; How to do it ...
(source: Nielsen Book Data)
20. Mastering VMware NSX for VSphere [2020]
- Sena Sosa, Elver.
- Indianapolis : Sybex, 2020.
- Description
- Book — 1 online resource (323 pages)
- Summary
-
- Introduction xvii
- Chapter 1 Abstracting Network and Security 1 Networks: 1990s 1 Colocation 2 Workload-to-Server Ratio 3 Inefficient Resource Allocation 3 The Long Road to Provisioning 3 Data Centers Come of Age 4 Data Center Workloads 4 Workloads Won't Stay Put 5 VMware 6 Virtualization 6 What is Happening in There? 6 Portability 8 Virtualize Away 8 Extending Virtualization to Storage 9 Virtual Networking and Security 9 NSX to the Rescue 10 The Bottom Line 13
- Chapter 2 NSX Architecture and Requirements 15 NSX Network Virtualization 16 Planes of Operation 16 NSX Manager Role and Function 18 ESXi Hosts 19 vCenter Server 20 vSphere Distributed Switch 21 NSX VIBs 23 Competitive Advantage: IOChain 24 IOChain Security Features 24 NSX Controllers 25 NSX Controller Clustering 26 NSX Controller Roles 26 NSX Edge 28 ESG Sizing 30 NSX Role-Based Access Control 30 Overlay and Underlay Networks 32 Replication Modes for Traffic Going to Multiple Destinations 34 The Bottom Line 36
- Chapter 3 Preparing NSX 39 NSX Manager Prerequisites 39 Open Ports and Name Resolution 40 Minimum Resource Requirements for NSX Data Center Appliances 40 vSphere HA and DRS 41 IP Addressing and Port Groups 43 Installing the Client Integration Plug-in 44 Installing NSX Manager 44 Associating NSX Manager to vCenter 46 Adding AD/LDAP to NSX 47 Linking Multiple NSX Managers Together (Cross- vCenter NSX) 51 Multi-site Consistency with Universal Components 51 Primary and Secondary NSX Managers 53 Preparing ESXi Clusters for NSX 54 Creating a Universal Transport Zone on the Primary NSX Manager 56 vSphere Distributed Switches Membership 57 Adding Secondary NSX Managers 58 The Bottom Line 59
- Chapter 4 Distributed Logical Switch 61 vSphere Standard Switch (vSS) 62 Traffic Shaping 63 Understanding Port Groups 64 NIC Teaming 65 Ensuring Security 66 Virtual Distributed Switch (vDS) 67 Virtual eXtensible LANs (VXLANs) 68 Employing Logical Switches 71 Three Tables That Store VNI Information 73 Collecting VNI Information 74 Centralized MAC Table 75 VTEP Table 76 We Might as Well Talk about ARP Now 79 Filling In the L2 and L3 Headers 79 Switch Security Module 81 Understanding Broadcast, Unknown Unicast, and Multicast 83 Layer 2 Flooding 83 Replication Modes 83 Deploying Logical Switches 84 Creating a Logical Switch 85 The Bottom Line 85
- Chapter 5 Marrying VLANs and VXLANs 87 Shotgun Wedding: Layer 2 Bridge 87 Architecture 88 Challenges 89 Deployment 90 Under the Hood 102 Layer 2 VPN 102 NSX Native L2 Bridging 103 Hardware Switches to the Rescue 103 Hardware VTEPs 103 Deployment 104 Under the Hood 104 The Bottom Line 105
- Chapter 6 Distributed Logical Router 107 Distributed Logical Router (DLR) 107 Control Plane Smarts 108 Logical Router Control Virtual Machine 108 Understanding DLR Efficiency 111 Another Concept to Consider 115 Let's Get Smart about Routing 117 OSPF 119 Border Gateway Protocol (BGP) 120 Oh Yeah, Statics Too 123 Deploying Distributed Logical Routers 125 The Bottom Line 134
- Chapter 7 NFV: Routing with NSX Edges 137 Network Function Virtualization: NSX Has It Too 137 This is Nice: Edge HA A 138 Adding HA 139 Let's Do Routing Like We Always Do 140 Deploying the Edge Services Gateway 144 Configuring BGP 151 Configuring OSPF 154 Configuring Static Routes 155 Routing with the DLR and ESG 156 Using CLI Commands 156 Default Behaviors to Be Aware Of 157 Equal Cost Multi-Path Routing157 The Bottom Line 160
- Chapter 8 More NVF: NSX Edge Services Gateway 163 ESG Network Placement 163 Network Address Translation 164 Configuring Source NAT 166 Configuring Destination NAT 166 Configuring SNAT on the ESG 167 Configuring DNAT on the ESG 169 ESG Load Balancer 171 Configuring an ESG Load Balancer 173 Layer 2 VPN (If You Must) 178 Secure Sockets Layer Virtual Private Network 179 Split Tunneling 180 Configuring SSL VPN 180 Internet Protocol Security VPN 187 Understanding NAT Traversal 188 Configuring IPsec Site-to-Site VPN with the ESG 188 Round Up of Other Services 190 DHCP Service 191 Configuring the ESG as a DHCP Server 192 DHCP Relay 194 Configuring the DLR for DHCP Relay 196 DNS Relay 198 Configuring DNS Relay on the ESG 199 The Bottom Line 200
- Chapter 9 NSX Security, the Money Maker 203 Traditional Router ACL Firewall 203 I Told You about the IOChain 204 Slot 2: Distributed Firewall 206 Under the Hood 207 Adding DFW Rules 210 Segregating Firewall Rules 214 IP Discovery 215 Gratuitous ARP Used in ARP Poisoning Attacks 216 Why is My Traffic Getting Blocked? 218 Great, Now It's Being Allowed 219 Identity Firewall: Rules Based on Who Logs In 220 Distributing Firewall Rules to Each ESXi Host: What's Happening? 220 The Bottom Line 222
- Chapter 10 Service Composer and Third-Party Appliances 223 Security Groups 224 Dynamic Inclusion 225 Static Inclusion 226 Static Exclusion 226 Defining a Security Group through Static Inclusion 227 Defining a Security Group through Dynamic Inclusion 229 Customizing a Security Group with Static Exclusion 231 Defining a Security Group Using Security Tags 231 Adding to DFW Rules 233 Service Insertion 236 IOChain, the Gift that Keeps on Giving 236 Layer 7 Stuff: Network Introspection 236 Guest Introspection 237 Service Insertion Providers 238 Security Policies 239 Creating Policies 239 Enforcing Policies 243 The Bottom Line 245
- Chapter 11 vRealize Automation and REST APIs 247 vRealize Automation Features 247 vRA Editions 249 Integrating vRA and NSX 250 vRealize Automation Endpoints 250 Associating NSX Manager with vRealize Automation 252 Network Profiles 253 vRA External, Routed, and NAT Network Profiles 255 Reservations 258 vRealize Orchestrator Workflows 261 Creating a Blueprint for One Machine261 Adding NSX Workflow to a Blueprint 264 Creating a Request Service in the vRA Catalog 265 Configuring an Entitlement 268 Deploying a Blueprint that Consumes NSX Services 271 REST APIs 273 NSX REST API GET Request 275 NSX REST API POST Request 275 NSX REST API DELETE Request 276 The Bottom Line 277 Appendix The Bottom Line 279
- Chapter 1: Abstracting Network and Security 279
- Chapter 2: NSX Architecture and Requirements 280
- Chapter 3: Preparing NSX 280
- Chapter 4: Distributed Logical Switch 281
- Chapter 5: Marrying VLANs and VXLANs 283
- Chapter 6: Distributed Logical Router 284
- Chapter 7: NFV: Routing with NSX Edges 286
- Chapter 8: More NVF: NSX Edge Services Gateway 287
- Chapter 9: NSX Security, the Money Maker 289
- Chapter 10: Service Composer and Third-Party Appliances 290
- Chapter 11: vRealize Automation and REST APIs 291 Index 293.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.