Listing 1 - 4 of 4 |
Sort by
|
Choose an application
Key FeaturesCompletely revised and updated for Ansible 4.0 and beyondTackle complex automation challenges with the newly added features in AnsibleLearn about the rapidly expanding field of network automation using Ansible, with the help of practical examples for configuring network devicesBook DescriptionAnsible is a modern, YAML-based automation tool (built on top of Python, one of the world’s most popular programming languages) with a massive and ever-growing user base. Its popularity and Python underpinnings make it essential learning for all in the DevOps space. This fourth edition of Mastering Ansible provides complete coverage of Ansible automation, from the design and architecture of the tool and basic automation with playbooks to writing and debugging your own Python-based extensions. You'll learn how to build automation workflows with Ansible’s extensive built-in library of collections, modules, and plugins. You'll then look at extending the modules and plugins with Python-based code and even build your own collections — ultimately learning how to give back to the Ansible community. By the end of this Ansible book, you'll be confident in all aspects of Ansible automation, from the fundamentals of playbook design to getting under the hood and extending and adapting Ansible to solve new automation challenges.What you will learnGain an in-depth understanding of how Ansible works under the hoodGet to grips with Ansible collections and how they are changing and shaping the future of AnsibleFully automate the Ansible playbook executions with encrypted dataUse blocks to construct failure recovery or cleanupExplore the playbook debugger and Ansible consoleTroubleshoot unexpected behavior effectivelyWork with cloud infrastructure providers and container systemsWho this book is forIf you are an Ansible developer or operator who has a detailed understanding of its core elements and applications but are now looking to enhance your skills in applying automation using Ansible, this book is for you. Prior experience working with core system administration tasks on Linux and basic familiarity with concepts such as cloud computing, containers, network devices, and fundamentals of a high-level programming language will help you make the most of this book.
Choose an application
COMPUTERS --- Networking / General --- Data transmission systems --- Telecommunication --- Telecommunications --- Electrical & Computer Engineering --- Engineering & Applied Sciences --- Traffic --- Management --- Data transmission systems. --- Management. --- Data communication systems --- Transmission of data --- Digital communications --- Electronic data processing --- Electronic systems --- Information theory --- Telecommunication systems
Choose an application
In the past decade, the number of wireless devices has grown exponentially. Decades ago, all systems were wired computer systems. Wireless technology was not accessible in mobile and portable devices until in recent years, and has followed a variety of methods for encryption and resource management. The purpose of the research in Optimizing IEE 802.11i Resources and Security Essentials is to determine the issues of the performance in current encryption methods in AES-CCMP in different types of devices and handle it so that an optimized resource usage would be achieved with the required security. Two modes for 802.11i for two different groups of devices is suggested and evaluated with the current encryption method for AES-CCMP to compare the performance. Almost every organization in today's world relies on wireless networks to transmit information, and much of that information should be kept secure. Banking, healthcare, and the military are all vital industries that rely on wireless security for a huge section of their operations. Security experts of today and tomorrow will learn a lot from Optimizing IEE 802.11i Resources and Security Essentials, and it can be used for master level in computer science, information security, wireless network security and cryptography. The research in this book covers how to best balance security concerns with limited resources available on wireless devices as well as how to optimize security resources on higher-end non-mobile devices
COMPUTERS --- Networking / General --- Engineering & Applied Sciences --- Computer Science --- Computer security --- Study and teaching. --- Computer privacy --- Computer system security --- Computer systems --- Computers --- Cyber security --- Cybersecurity --- Electronic digital computers --- Protection of computer systems --- Security of computer systems --- Data protection --- Security systems --- Hacking --- Protection --- Security measures
Choose an application
Learning PowerShell is a custom-built, handcrafted, painstakingly curated book designed to get you from total PowerShell newbie to confident PowerShell user in as little as four weeks. This book assumes no prior knowledge, perfect for non-developers and GUI addicts who recognize that PowerShell is the future but need a good bit of handholding to achieve mastery. It is also a simple guide for the hundreds of thousands of PowerShell users who have not attained the level of PowerShell knowledge that they really need. With Learning PowerShell at your side, you will see that you don't have to be a developer to use PowerShell and you don't need to be a scripting wizard to derive value from integrating PowerShell into your daily administrative activities. The book is a learning resource that covers every topic worth discussing for a PowerShell beginner, with a depth of explanation unparalleled by any book currently on the market. With this book, you don't have to have a lot of time to learn the language and you can begin applying what you master almost immediately. Even skeptics of PowerShell, and command lines in general, will come away with a renewed sense of respect for the language and ideas on how to put it to use.
Windows PowerShell (Computer program language) --- Command languages (Computer science) --- Scripting languages (Computer science) --- (Produktform)Electronic book text --- (Zielgruppe)Fachpublikum/ Wissenschaft --- (BISAC Subject Heading)COM046040 --- (BISAC Subject Heading)COM088020: COM088020 COMPUTERS / System Administration / Windows Administration --- (BISAC Subject Heading)COM051000: COM051000 COMPUTERS / Programming / General --- (BISAC Subject Heading)COM032000: COM032000 COMPUTERS / Information Technology --- (BISAC Subject Heading)BUS083000: BUS083000 BUSINESS & ECONOMICS / Information Management --- (BISAC Subject Heading)COM043000: COM043000 COMPUTERS / Networking / General --- (BISAC Subject Heading)COM051380: COM051380 COMPUTERS / Programming / Microsoft --- PowerShell, Command Line, Scripting, Windows Script, Macro, Office Script --- (VLB-WN)9634 --- (Produktrabattgruppe)PN: nicht rabattbeschränkt/Sortimentstitel --- E-books --- Command Line. --- Macro. --- Office Script. --- PowerShell. --- Scripting. --- Windows Script.
Listing 1 - 4 of 4 |
Sort by
|