Take a look at our System Administration books. Shulph carries a great selection of System Administration books, and we are always adding more.
A concise walk-through of CentOS 7, starting from installation to securing it's environment. Key Features No previous Linux environment experience needed for reading this book Get comfortable with a popular and stable Red Hat Enterprise Linux distribution Most of the command line based concepts are explained with graphics Book Description Linux kernel development has been the worlds largest collaborative project to date. With this practical guide, you will learn Linux through one of its most popular and stable distributions. This book will introduce you to essential Linux skills using CentOS 7. It describes how a Linux system is organized, and will introduce you to key command-line concepts you can practice on your own. It will guide you in performing basic system administration tasks and day-to-day operations in a Linux environment. You will learn core system administration skills for managing a system running CentOS 7 or a similar operating system, such as RHEL 7, Scientific Linux, and Oracle Linux. You will be able to perform installation, establish network connectivity and user and process management, modify file permissions, manage text files using the command line, and implement basic security administration after covering this book. By the end of this book, you will have a solid understanding of working with Linux using the command line. What you will learn Understand file system hierarchy and essential command-line skills Use Vi editor, I/O redirections and how to work with common text manipulating tools Create, delete, modify user accounts and manage passwords and their aging policy Manage file ownership, permissions, and ACL Execute process management and monitoring on the command line Validate and manage network configuration using nmcli Manage remote logins using SSH and file transfer using SCP and Rsync Understand system logging, how to control system services with systemd and systemctl, and manage firewalId Who this book is for Any individual who wants to learn how to use Linux as server or desktop in his environment. Whether you are a developer, budding system administrator, or tech lover with no previous Linux administration background, you will be able to start your journey in Linux using CentOS 7 with this book.
Get to grips with the unified, highly scalable distributed storage system and learn how to design and implement it. Key Features Explore Ceph's architecture in detail Implement a Ceph cluster successfully and gain deep insights into its best practices Leverage the advanced features of Ceph, including erasure coding, tiering, and BlueStore Book Description This Learning Path takes you through the basics of Ceph all the way to gaining in-depth understanding of its advanced features. You'll gather skills to plan, deploy, and manage your Ceph cluster. After an introduction to the Ceph architecture and its core projects, you'll be able to set up a Ceph cluster and learn how to monitor its health, improve its performance, and troubleshoot any issues. By following the step-by-step approach of this Learning Path, you'll learn how Ceph integrates with OpenStack, Glance, Manila, Swift, and Cinder. With knowledge of federated architecture and CephFS, you'll use Calamari and VSM to monitor the Ceph environment. In the upcoming chapters, you'll study the key areas of Ceph, including BlueStore, erasure coding, and cache tiering. More specifically, you'll discover what they can do for your storage system. In the concluding chapters, you will develop applications that use Librados and distributed computations with shared object classes, and see how Ceph and its supporting infrastructure can be optimized. By the end of this Learning Path, you'll have the practical knowledge of operating Ceph in a production environment. This Learning Path includes content from the following Packt products: Ceph Cookbook by Michael Hackett, Vikhyat Umrao and Karan Singh Mastering Ceph by Nick Fisk Learning Ceph, Second Edition by Anthony D'Atri, Vaibhav Bhembre and Karan Singh What you will learn Understand the benefits of using Ceph as a storage solution Combine Ceph with OpenStack, Cinder, Glance, and Nova components Set up a test cluster with Ansible and virtual machine with VirtualBox Develop solutions with Librados and shared object classes Configure BlueStore and see its interaction with other configurations Tune, monitor, and recover storage systems effectively Build an erasure-coded pool by selecting intelligent parameters Who this book is for If you are a developer, system administrator, storage professional, or cloud engineer who wants to understand how to deploy a Ceph cluster, this Learning Path is ideal for you. It will help you discover ways in which Ceph features can solve your data storage problems. Basic knowledge of storage systems and GNU/Linux will be beneficial.
Begin a successful career in cybersecurity operations by achieving Cisco Certified CyberOps Associate 200-201 certificationKey FeaturesReceive expert guidance on how to kickstart your career in the cybersecurity industryGain hands-on experience while studying for the Cisco Certified CyberOps Associate certification examWork through practical labs and exercises mapped directly to the exam objectivesBook DescriptionAchieving the Cisco Certified CyberOps Associate 200-201 certification helps you to kickstart your career in cybersecurity operations. This book offers up-to-date coverage of 200-201 exam resources to fully equip you to pass on your first attempt. The book covers the essentials of network security concepts and shows you how to perform security threat monitoring. You'll begin by gaining an in-depth understanding of cryptography and exploring the methodology for performing both host and network-based intrusion analysis. Next, you'll learn about the importance of implementing security management and incident response strategies in an enterprise organization. As you advance, you'll see why implementing defenses is necessary by taking an in-depth approach, and then perform security monitoring and packet analysis on a network. You'll also discover the need for computer forensics and get to grips with the components used to identify network intrusions. Finally, the book will not only help you to learn the theory but also enable you to gain much-needed practical experience for the cybersecurity industry. By the end of this Cisco cybersecurity book, you'll have covered everything you need to pass the Cisco Certified CyberOps Associate 200-201 certification exam, and have a handy, on-the-job desktop reference guide.What you will learnIncorporate security into your architecture to prevent attacksDiscover how to implement and prepare secure designsIdentify access control models for digital assetsIdentify point of entry, determine scope, contain threats, and remediateFind out how to perform malware analysis and interpretationImplement security technologies to detect and analyze threatsWho this book is forThis book is for students who want to pursue a career in cybersecurity operations, threat detection and analysis, and incident response. IT professionals, network security engineers, security operations center (SOC) engineers, and cybersecurity analysts looking for a career boost and those looking to get certified in Cisco cybersecurity technologies and break into the cybersecurity industry will also benefit from this book. No prior knowledge of IT networking and cybersecurity industries is needed.
Leverage OpenTelemetry's API, libraries, tools and the collector to produce and collect telemetry along with using open-source tools to analyze distributed traces, check metrics and logs, and gain insights into application healthKey FeaturesGet to grips with OpenTelemetry, an open-source cloud-native software observability standardUse vendor-neutral tools to instrument applications to produce better telemetry and improve observabilityUnderstand how telemetry data can be correlated and interpreted to understand distributed systemsBook DescriptionCloud-Native Observability with OpenTelemetry is a guide to helping you look for answers to questions about your applications. This book teaches you how to produce telemetry from your applications using an open standard to retain control of data. OpenTelemetry provides the tools necessary for you to gain visibility into the performance of your services. It allows you to instrument your application code through vendor-neutral APIs, libraries and tools.By reading Cloud-Native Observability with OpenTelemetry, you'll learn about the concepts and signals of OpenTelemetry - traces, metrics, and logs. You'll practice producing telemetry for these signals by configuring and instrumenting a distributed cloud-native application using the OpenTelemetry API. The book also guides you through deploying the collector, as well as telemetry backends necessary to help you understand what to do with the data once it's emitted. You'll look at various examples of how to identify application performance issues through telemetry. By analyzing telemetry, you'll also be able to better understand how an observable application can improve the software development life cycle.By the end of this book, you'll be well-versed with OpenTelemetry, be able to instrument services using the OpenTelemetry API to produce distributed traces, metrics and logs, and more.What you will learnUnderstand the core concepts of OpenTelemetryExplore concepts in distributed tracing, metrics, and loggingDiscover the APIs and SDKs necessary to instrument an application using OpenTelemetryExplore what auto-instrumentation is and how it can help accelerate application instrumentationConfigure and deploy the OpenTelemetry CollectorGet to grips with how different open-source backends can be used to analyze telemetry dataUnderstand how to correlate telemetry in common scenarios to get to the root cause of a problemWho this book is forThis book is for software engineers, library authors, and systems operators looking to better understand their infrastructure, services and applications by leveraging telemetry data like never before. Working knowledge of Python programming is assumed for the example applications that you'll be building and instrumenting using the OpenTelemetry API and SDK. Some familiarity with Go programming, Linux, and Docker is preferable to help you set up additional components in various examples throughout the book.
This is a practical certification guide covering all the exam topics in an easy-to-follow manner backed with self-assessment scenarios for better preparation. Key Features A step-by-step guide to give you a clear understanding of the Network+ Certification Learn about network architecture, protocols, security, and network troubleshooting Confidently ace the N10-007 exam with the help of practice tests Book Description CompTIA certified professionals have always had the upper hand in the information technology industry. This book will be your ideal guide to efficiently passing and achieving this certification. Learn from industry experts and implement their practices to resolve complex IT issues. This book revolves around networking concepts where readers will learn topics like network architecture, security, network monitoring, and troubleshooting. This book will not only prepare the readers conceptually but will also help them pass the N10-007 exam. This guide will also provide practice exercise after every chapter where readers can ensure their concepts are clear. By the end of this book, readers will leverage this guide and the included practice questions to boost their confidence in appearing for the actual certificate. What you will learn Explain the purpose of a variety of networking concepts and implement them appropriately Understand physical security and common attacks while securing wired and wireless networks Understand the fundamentals of IPv4 and IPv6 Determine and explain the appropriate cabling, device, and storage technologies Understand network troubleshooting methodology and appropriate tools to support connectivity and performance Use best practices to manage the network, determine policies, and ensure business continuity Who this book is for This book is ideal for readers wanting to pass the CompTIA Network+ certificate. Rookie network engineers and system administrators interested in enhancing their networking skills would also benefit from this book. No Prior knowledge on networking would be needed.
Create a complete continuous delivery process using modern DevOps tools such as Docker, Jenkins, Kubernetes, Ansible, Terraform, and many moreKey FeaturesBuild reliable and secure applications using Docker containersCreate a highly available environment to scale Jenkins and your services using KubernetesAutomate your release process end-to-endBook DescriptionThis updated third edition of Continuous Delivery with Docker and Jenkins will explain the advantages of combining Jenkins and Docker to improve the continuous integration and delivery process of app development. You'll start by setting up a Docker server and configuring Jenkins on it. Next, you'll discover steps for building applications and microservices on Dockerfiles and integrating them with Jenkins using continuous delivery processes such as continuous integration, automated acceptance testing, configuration management, and Infrastructure as Code. Moving ahead, you'll learn how to ensure quick application deployment with Docker containers, along with scaling Jenkins using Kubernetes. Later, you'll explore how to deploy applications using Docker images and test them with Jenkins. Toward the concluding chapters, the book will focus on missing parts of the CD pipeline, such as the environments and infrastructure, application versioning, and non-functional testing. By the end of this continuous integration and continuous delivery book, you'll have gained the skills you need to enhance the DevOps workflow by integrating the functionalities of Docker and Jenkins.What you will learnGrasp Docker fundamentals and dockerize applications for the CD processUnderstand how to use Jenkins on-premises and in the cloudScale a pool of Docker servers using KubernetesWrite acceptance tests using CucumberRun tests in the Docker ecosystem using JenkinsProvision your servers and infrastructure using Ansible and TerraformPublish a built Docker image to a Docker registryDeploy cycles of Jenkins pipelines using community best practicesWho this book is forThe book is for DevOps engineers, system administrators, Docker professionals, or anyone who wants to explore the power of working with Docker and Jenkins together. No prior knowledge of DevOps is required to get started.
Create a complete Continuous Delivery process using modern DevOps tools such as Docker, Kubernetes, Jenkins, Docker Hub, Ansible, GitHub and many more. Key Features Build reliable and secure applications using Docker containers. Create a highly available environment to scale a Docker servers using Kubernetes Implement advance continuous delivery process by parallelizing the pipeline tasks Book Description Continuous Delivery with Docker and Jenkins, Second Edition will explain the advantages of combining Jenkins and Docker to improve the continuous integration and delivery process of an app development. It will start with setting up a Docker server and configuring Jenkins on it. It will then provide steps to build applications on Docker files and integrate them with Jenkins using continuous delivery processes such as continuous integration, automated acceptance testing, and configuration management. Moving on, you will learn how to ensure quick application deployment with Docker containers along with scaling Jenkins using Kubernetes. Next, you will get to know how to deploy applications using Docker images and testing them with Jenkins. Towards the end, the book will touch base with missing parts of the CD pipeline, which are the environments and infrastructure, application versioning, and nonfunctional testing. By the end of the book, you will be enhancing the DevOps workflow by integrating the functionalities of Docker and Jenkins. What you will learn Get to grips with docker fundamentals and how to dockerize an application for the CD process Learn how to use Jenkins on the Cloud environments Scale a pool of Docker servers using Kubernetes Create multi-container applications using Docker Compose Write acceptance tests using Cucumber and run them in the Docker ecosystem using Jenkins Publish a built Docker image to a Docker Registry and deploy cycles of Jenkins pipelines using community best practices Who this book is for The book targets DevOps engineers, system administrators, docker professionals or any stakeholders who would like to explore the power of working with Docker and Jenkins together. No prior knowledge of DevOps is required for this book.
Build your real-world cryptography knowledge, from understanding the fundamentals to implementing the most popular modern-day algorithms to excel in your cybersecurity careerKey FeaturesLearn modern algorithms such as zero-knowledge, elliptic curves, and quantum cryptographyExplore vulnerability and new logical attacks on the most-used algorithmsUnderstand the practical implementation of algorithms and protocols in cybersecurity applicationsBook DescriptionCryptography Algorithms is designed to help you get up and running with modern cryptography algorithms. You'll not only explore old and modern security practices but also discover practical examples of implementing them effectively.The book starts with an overview of cryptography, exploring key concepts including popular classical symmetric and asymmetric algorithms, protocol standards, and more. You'll also cover everything from building crypto codes to breaking them. In addition to this, the book will help you to understand the difference between various types of digital signatures. As you advance, you will become well-versed with the new-age cryptography algorithms and protocols such as public and private key cryptography, zero-knowledge protocols, elliptic curves, quantum cryptography, and homomorphic encryption. Finally, you'll be able to apply the knowledge you've gained with the help of practical examples and use cases.By the end of this cryptography book, you will be well-versed with modern cryptography and be able to effectively apply it to security applications.What you will learnUnderstand key cryptography concepts, algorithms, protocols, and standardsBreak some of the most popular cryptographic algorithmsBuild and implement algorithms efficientlyGain insights into new methods of attack on RSA and asymmetric encryptionExplore new schemes and protocols for blockchain and cryptocurrencyDiscover pioneering quantum cryptography algorithmsPerform attacks on zero-knowledge protocol and elliptic curvesExplore new algorithms invented by the author in the field of asymmetric, zero-knowledge, and cryptocurrencyWho this book is forThis hands-on cryptography book is for IT professionals, cybersecurity enthusiasts, or anyone who wants to develop their skills in modern cryptography and build a successful cybersecurity career. Working knowledge of beginner-level algebra and finite fields theory is required.
Implement DevOps for Salesforce and explore its features Key Features Learn DevOps principles and techniques for enterprise operations in Salesforce Implement Continuous Integration and Continuous Delivery using tools such as Jenkins and Ant script Use the Force.com Migration Tool and Git to achieve versioning in Salesforce Book Description Salesforce is one of the top CRM tools used these days, and with its immense functionalities and features, it eases the functioning of an enterprise in various areas of sales, marketing, and finance, among others. Deploying Salesforce applications is a tricky event, and it can get quite taxing for admins and consultants. This book addresses all the problems that you might encounter while trying to deploy your applications and shows you how to resort to DevOps to take these challenges head on. Beginning with an overview of the development and delivery process of a Salesforce app, DevOps for Salesforce covers various types of sandboxing and helps you understand when to choose which type. You will then see how different it is to deploy with Salesforce as compared to deploying with another app. You will learn how to leverage a migration tool and automate deployment using the latest and most popular tools in the ecosystem. This book explores topics such as version control and DevOps techniques such as Continuous Integration, Continuous Delivery, and testing. Finally, the book will conclude by showing you how to track bugs in your application changes using monitoring tools and how to quantify your productivity and ROI. By the end of the book, you will have acquired skills to create, test, and effectively deploy your applications by leveraging the features of DevOps. What you will learn Implement DevOps for Salesforce and understand the benefits it offers Abstract the features of Force.com MigrationTool to migrate and retrieve metadata Develop your own CI/CD Pipeline for Salesforce project Use Qualitia to perform scriptless automation for Continuous Testing Track application changes using Bugzilla Apply Salesforce best practices to implement DevOps Who this book is for If you are a Salesforce developer, consultant, or manager who wants to learn DevOps tools and set up pipelines for small as well as large Salesforce projects, this book is for you.
Set up complete CI and CD pipelines for your serverless applications using DevOps principles Key Features Understand various services for designing serverless architecture Build CD pipelines using various cloud providers for your serverless applications Implement DevOps best practices when building serverless applications Book Description Serverless applications are becoming very popular among developers and are generating a buzz in the tech market. Many organizations struggle with the effective implementation of DevOps with serverless applications. DevOps for Serverless Applications takes you through different DevOps-related scenarios to give you a solid foundation in serverless deployment. You will start by understanding the concepts of serverless architecture and development, and why they are important. Then, you will get to grips with the DevOps ideology and gain an understanding of how it fits into the Serverless Framework. You'll cover deployment framework building and deployment with CI and CD pipelines for serverless applications. You will also explore log management and issue reporting in the serverless environment. In the concluding chapters, you will learn important security tips and best practices for secure pipeline management. By the end of this book, you will be in a position to effectively build a complete CI and CD delivery pipeline with log management for serverless applications. What you will learn Explore serverless fundamentals and effectively combine them with DevOps Set up CI and CD with AWS Lambda and other popular Serverless service providers with the help of the Serverless Framework Perform monitoring and logging with serverless applications Set up a dynamic dashboard for different service providers Discover best practices for applying DevOps to serverless architecture Understand use cases for different serverless architectures Who this book is for DevOps for Serverless Applications is for DevOps engineers, architects, or anyone interested in understanding the DevOps ideology in the serverless world. You will learn to use DevOps with serverless and apply continuous integration, continuous delivery, testing, logging, and monitoring with serverless.