Solving Cyber Risk

Solving Cyber Risk

The non-technical handbook for cyber security risk management Solving Cyber Risk distills a decade of research into a practical framework for cyber security. Blending statistical data and cost information with research into the culture, psychology, and business models of the hacker community, this book provides business executives, policy-makers, and individuals with…

Nagios, 2nd Edition

Nagios, 2nd Edition

Good system administrators recognize problems long before anyone asks, “Hey, is the Internet down?” Nagios, an open source system and network monitoring tool, has emerged as the most popular solution for sys admins in organizations of all sizes. It’s robust but also complex, and Nagios: System and Network Monitoring,…

AWS System Administration

AWS System Administration

With platforms designed for rapid adaptation and failure recovery such as Amazon Web Services, cloud computing is more like programming than traditional system administration. Tools for automatic scaling and instance replacement allow even small DevOps teams to manage massively scalable application infrastructures—if team members drop their old views…

BizTalk Server 2016

BizTalk Server 2016

Gain an in depth view of optimizing the performance of BizTalk Server. This book provides best practices and techniques for improving development of high mission critical solutions.  You’ll see how the BizTalk Server engine works and how to proactively detect and remedy potential bottlenecks before they occur. The book…

Hardening Azure Applications, 2nd Edition

Hardening Azure Applications, 2nd Edition

Build large-scale, mission-critical hardened applications on the Azure cloud platform. This 2nd edition provides information on the newer features in Azure, such as Linux extensions and supporting Azure Services such as HDInsight and SQL Server on Linux. Updated with new applications Hardening Azure Applications also discusses Scale Sets (VMSS), a…

Linux Basics for Hackers

Linux Basics for Hackers

This practical, tutorial-style book uses the Kali Linux distribution to teach Linux basics with a focus on how hackers would use them. Topics include Linux command line basics, filesystems, networking, BASH basics, package management, logging, and the Linux kernel and drivers. If you’re getting started along the exciting…

Amazon Web Services in Action, 2nd Edition

Amazon Web Services in Action, 2nd Edition

Amazon Web Services in Action, Second Edition is a comprehensive introduction to computing, storing, and networking in the AWS cloud. You’ll find clear, relevant coverage of all the essential AWS services you to know, emphasizing best practices for security, high availability and scalability. Foreword by Ben Whaley, AWS community…

Azure in Action

Azure in Action

Azure in Action is a fast-paced tutorial intended for architects and developers looking to develop cloud-based applications on the Windows Azure Platform. Written by two of Microsoft’s leading Azure evangelists, it’s designed both for readers new to cloud concepts and for those familiar with cloud development but new to…

Deploying to OpenShift

Deploying to OpenShift

Get an in-depth tour of OpenShift, the container-based software deployment and management platform from Red Hat that provides a secure multi-tenant environment for the enterprise. This practical guide describes in detail how OpenShift, building on Kubernetes, enables you to automate the way you create, ship, and run applications…