Among the many configuration management tools available, Ansible has some distinct advantages--it's minimal in nature, you don't need to install anything on your nodes, and it has an easy learning curve. With this updated second edition, you'll learn how to be productive with this tool quickly, whet..
Design a complete Voice over IP (VoIP) or traditional PBX system with Asterisk, even if you have only basic telecommunications knowledge. This bestselling guide makes it easy, with a detailed roadmap that shows you how to install and configure this open source software, whether you're upgrading your..
The only official study guide for the new CCSP exam CCSP (ISC)2 Certified Cloud Security Professional Official Study Guide is your ultimate resource for the CCSP exam. As the only official study guide reviewed and endorsed by (ISC)2, this guide helps you prepare faster and smarter with the Sybex stu..
Fully up-to-date coverage of every topic on the CEH v9 certification examThoroughly revised for current exam objectives, this integrated self-study system offers complete coverage of the EC Council's Certified Ethical Hacker v9 exam. Inside, IT security expert Matt Walker discusses all of the tools,..
A helpful guide on all things Cisco Do you wish that the complex topics of routers, switches, and networking could be presented in a simple, understandable presentation? With Cisco Networking All-in-One For Dummies, they are This expansive reference is packed with all the information you need to le..
Start a career in networking Cisco Networking Essentials, 2nd Edition provides the latest for those beginning a career in networking. This book provides the fundamentals of networking and leads you through the concepts, processes, and skills you need to master fundamental networking concepts. Thinki..
Cisco routers and switches are the cornerstones of many networks. But when things break, repairs can intimidate even the most competent administrator. Luckily, just knowing the ``in case of emergency`` basics will take you far. Just like the original, this second edition of the highly acclaimed Cisc..
Most of the information available on cloud computing is either highly technical, with details that are irrelevant to non-technologists, or pure marketing hype, in which the cloud is simply a selling point. This book, however, explains the cloud from the user's viewpoint -- the business user's in par..
If you're considering the use of cloud native applications and microservices, you also need an infrastructure with the same elasticity and scalability of the applications they're running. This practical guide shows you how to design and maintain infrastructure capable of managing the full lifecycle ..
The smart way to learn Microsoft SharePoint 2013--one step at a time Experience learning made easy--and quickly teach yourself how to boost team collaboration with SharePoint 2013. With Step by Step, you set the pace--building and practicing the skills you need, just when you need them Customiz..
Are the machines in your office living isolated lives? Do you have a few computers at home that you want to connect to each other and the Internet? The best way to share files on a group of computers is to create a network. But how do you do that? Network Know-How is your guide to connecting your ma..
Traditional intrusion detection and logfile analysis are no longer enough to protect today's complex networks. In this practical guide, security researcher Michael Collins shows you several techniques and tools for collecting and analyzing network traffic datasets. You'll understand how your network..
Pick up where certification exams leave off. With this practical, in-depth guide to the entire network infrastructure, you'll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA. Network Warrior takes you step by step through the world..
Master the Fundamentals of Oracle Database 12c Filled with easy-to-follow tutorials, this Oracle Press guide provides detailed coverage of core database concepts, the role of the administrator, and enterprise database capabilities. Oracle Database 12c: Install, Configure & Maintain Like a Profession..
OpenPGP is the most widely used email encryption standard in the world. It is based on PGP (Pretty Good Privacy) as originally developed by Phil Zimmermann. The OpenPGP protocol defines standard formats for encrypted messages, signatures, and certificates for exchanging public keys.PGP & GPG is an e..
Do you have a nagging feeling that your monitoring could be improved, but you just aren't sure how? This is the book for you. Monitoring Monitoring explains what makes your monitoring less than stellar, and provides a practical approach to designing and implementing a monitoring strategy, from the a..
Complete Study Essentials for the SSCP TheSSCP (ISC)2 Systems Security Certified Practitioner Official Study Guide and SSCP CBK Kit is your all-in-one resource for preparing for the official exam. This (ISC)2 approved bundle provides you with both the Official Study Guide and the fourth edition of t..
Sams Teach Yourself TCP/IP in 24 Hours, Sixth Edition is a practical guide to the simple yet illusive protocol system that powers the Internet. A step-by-step approach reveals how the protocols of the TCP/IP stack really work and explores the rich array of services available on the Internet today. Y..
This complete guide to setting up and running a TCP/IP network is essential for network administrators, and invaluable for users of home systems that access the Internet. The book starts with the fundamentals -- what protocols do and how they work, how addresses and routing are used to move data thr..
Wireshark is the world's most popular network analyzer tool with over 1 million downloads per month. As the Founder of Wireshark University, Laura Chappell is undoubtedly one of the best Wireshark instructors around. In this updated book, Laura offers step-by-step instructions on the key functions a..
A new generation of cloud-based collaboration and productivity tools promise to help companies work together more effectively, while driving down costs. But wide-ranging choices and enormous hype make it difficult to choose the best solutions for your company. In Working in the Cloud, Jason R. Rich ..
Perimeter defenses guarding your network aren't as secure as you might think. Hosts behind the firewall have no defenses of their own, so when a host in the ``trusted`` zone is breached, access to your data center is not far behind. This practical book introduces you to the zero trust model, a metho..