Narrow your search
Listing 1 - 4 of 4
Sort by

Book
Mastering Ansible - Fourth Edition : Automate Configuration Management and Overcome Deployment Challenges with Ansible.
Authors: ---
ISBN: 9781801813075 Year: 2021 Publisher: Birmingham : Packt Publishing, Limited,

Loading...
Export citation

Choose an application

Bookmark

Abstract

Key FeaturesCompletely revised and updated for Ansible 4.0 and beyondTackle complex automation challenges with the newly added features in AnsibleLearn about the rapidly expanding field of network automation using Ansible, with the help of practical examples for configuring network devicesBook DescriptionAnsible is a modern, YAML-based automation tool (built on top of Python, one of the world’s most popular programming languages) with a massive and ever-growing user base. Its popularity and Python underpinnings make it essential learning for all in the DevOps space. This fourth edition of Mastering Ansible provides complete coverage of Ansible automation, from the design and architecture of the tool and basic automation with playbooks to writing and debugging your own Python-based extensions. You'll learn how to build automation workflows with Ansible’s extensive built-in library of collections, modules, and plugins. You'll then look at extending the modules and plugins with Python-based code and even build your own collections — ultimately learning how to give back to the Ansible community. By the end of this Ansible book, you'll be confident in all aspects of Ansible automation, from the fundamentals of playbook design to getting under the hood and extending and adapting Ansible to solve new automation challenges.What you will learnGain an in-depth understanding of how Ansible works under the hoodGet to grips with Ansible collections and how they are changing and shaping the future of AnsibleFully automate the Ansible playbook executions with encrypted dataUse blocks to construct failure recovery or cleanupExplore the playbook debugger and Ansible consoleTroubleshoot unexpected behavior effectivelyWork with cloud infrastructure providers and container systemsWho this book is forIf you are an Ansible developer or operator who has a detailed understanding of its core elements and applications but are now looking to enhance your skills in applying automation using Ansible, this book is for you. Prior experience working with core system administration tasks on Linux and basic familiarity with concepts such as cloud computing, containers, network devices, and fundamentals of a high-level programming language will help you make the most of this book.

Traffic management for high-speed networks
Authors: --- ---
ISBN: 0309057981 9780585084734 9786610191383 1280191384 0309590736 0585084734 9780585084732 6610191387 9780309057981 Year: 1997 Publisher: Washington, D.C. National Academy Press


Book
Optimizing ieee 802.11i resource and security essentials : for mobile and stationary devices
Authors: --- --- ---
ISBN: 0128022221 012802223X 132248077X 9780128022238 9780128022221 Year: 2014 Publisher: Waltham, Massachusetts : Syngress,

Loading...
Export citation

Choose an application

Bookmark

Abstract

In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with the required security. Two modes for 802.11i for two different groups of devices is suggested and evaluated with the current encryption method for AES-CCMP to compare the performance. Almost every organization in today's world relies on wireless networks to transmit information, and much of that information should be kept secure. Banking, healthcare, and the military are all vital industries that rely on wireless security for a huge section of their operations. Security experts of today and tomorrow will learn a lot from Optimizing IEE 802.11i Resources and Security Essentials, and it can be used for master level in computer science, information security, wireless network security and cryptography. The research in this book covers how to best balance security concerns with limited resources available on wireless devices as well as how to optimize security resources on higher-end non-mobile devices


Book
Learning PowerShell
Author:
ISBN: 1501506617 1501506676 9781501506680 1501506684 9781501506673 9781501506611 9781501515323 1501515322 Year: 2017 Publisher: Boston Berlin

Loading...
Export citation

Choose an application

Bookmark

Abstract

Learning PowerShell is a custom-built, handcrafted, painstakingly curated book designed to get you from total PowerShell newbie to confident PowerShell user in as little as four weeks. This book assumes no prior knowledge, perfect for non-developers and GUI addicts who recognize that PowerShell is the future but need a good bit of handholding to achieve mastery. It is also a simple guide for the hundreds of thousands of PowerShell users who have not attained the level of PowerShell knowledge that they really need. With Learning PowerShell at your side, you will see that you don't have to be a developer to use PowerShell and you don't need to be a scripting wizard to derive value from integrating PowerShell into your daily administrative activities. The book is a learning resource that covers every topic worth discussing for a PowerShell beginner, with a depth of explanation unparalleled by any book currently on the market. With this book, you don't have to have a lot of time to learn the language and you can begin applying what you master almost immediately. Even skeptics of PowerShell, and command lines in general, will come away with a renewed sense of respect for the language and ideas on how to put it to use.

Listing 1 - 4 of 4
Sort by