Browse Results

Showing 44,076 through 44,100 of 63,048 results

Plone 3 Theming

by Veda Williams

This book provides a holistic look at theming Plone sites as well as step-by-step instructions on how to create Plone themes. The book first briefly introduces the concepts and necessary tools and then moves on to describing the concepts needed for customizing templates in Plone. It also provides handy tips and tricks along the way to simplify the theming process. This book is targeted at professional web designers working with Plone who want to create their own unique look and feel for a Plone web site.

Plone 3 for Education

by Erik Rose

This book is written especially for time-constrained web teams. Every chapter is hands-on from start to finish, focusing on getting a value-adding site up fast. Necessary theory and tips on best practices are interspersed with the step-by-step instructions, broken out into sidebars so it informs your progress without impeding it. Also, every chapter is independent, dealing with a specific use case--for example, publishing video, creating forms, or representing assignment schedules and syllabi--so you can skip straight to what you need. Most chapters require no programming at all. The few where we dig deeper (for example, to build our own plug-in products) are replete with working code samples and explanations of what's going on. A rudimentary knowledge of the Python programming language is helpful in these but is not essential. Plone 3 for Education is for the makers of school web sites, from primary to university, from e-learning to public-facing, from tech-savvy teachers to seasoned software developers. A user-level familiarity with Plone is the only prerequisite; everything else is baked in.

Plone 3.3 Site Administration

by Alex Clark

This book is a step-by-step tutorial guide, explaining many common and fundamentally important Plone site administration tasks. This book is designed for site administrators, webmasters, or content editors managing a site with Plone. These users will not be new to Plone itself, but they will be new to the site administration tasks. The reader is also expected to know basic Python programming. This book caters to these users, and builds their confidence by helping them to get their Plone sites up, running, and customized with minimal peripheral knowledge.

Plug-and-Play Education: Knowledge and Learning in the Age of Platforms and Artificial Intelligence

by Carlo Perrotta

Plug-and-Play Education: Knowledge and Learning in the Age of Platforms and Artificial Intelligence documents and critiques how the education sector is changing with the advancement of ubiquitous edtech platforms and automation. As programmability and computation reengineer institutions towards efficiency and prediction, the perpetual collection of and access to digital data is creating complex opportunities and concerns. Drawing from research into secondary and higher education settings, this book examines the influence of digital “infrastructuring”, the automation of teaching and learning, and the very purpose of education in a context of growing platformisation and artificial intelligence integration. These theoretical, practical, and policy-oriented insights will offer educational technologists, designers, researchers, and policymakers a more inclusive, diverse, and open-ended perspective on the design and implementation of learning technologies.

Plug-and-Play Visual Subgraph Query Interfaces (Synthesis Lectures on Data Management)

by Sourav S. Bhowmick Byron Choi

This book details recent developments in the emerging area of plug-and-play (PnP) visual subgraph query interfaces (VQI). These PnP interfaces are grounded in the principles of human-computer interaction (HCI) and cognitive psychology to address long-standing limitations to bottom-up search capabilities in graph databases using traditional graph query languages, which often require domain experts and specialist programmers. This book explains how PnP interfaces go against the traditional mantra of VQI construction by taking a data-driven approach and giving end users the freedom to easily and quickly construct and maintain a VQI for any data sources without resorting to coding. The book walks readers through the intuitive PnP interface that uses templates where the underlying graph repository represents the socket and user-specified requirements represent the plug. Hence, a PnP interface enables an end user to change the socket (i.e., graph repository) or the plug (i.e., requirements) as necessary to automatically and effortlessly generate VQIs. The book argues that such a data-driven paradigm creates several benefits, including superior support for visual subgraph query construction, significant reduction in the manual cost of constructing and maintaining a VQI for any graph data source, and portability of the interface across diverse sources and querying applications. This book provides a comprehensive introduction to the notion of PnP interfaces, compares it to its classical manual counterpart, and reviews techniques for automatic construction and maintenance of these new interfaces. In synthesizing current research on plug-and-play visual subgraph query interface management, this book gives readers a snapshot of the state of the art in this topic as well as future research directions.

Pluggable Authentication Modules: The Definitive Guide to PAM for Linux SysAdmins and C Developers

by Kenneth Geisshirt

This book provides a practical approach to UNIX/Linux authentication. The design principles are explained thoroughly, then illustrated through the examination of popular modules. It is intended as a one-stop introduction and reference to PAM. This book is for experienced system administrators and developers working with multiple Linux/UNIX servers or with both UNIX and Windows servers. It assumes a good level of admin knowledge, and that developers are competent in C development on UNIX-based systems.

Plugged In: Cybersecurity in the Modern Age

by University of Florida Jon Silman

The University of Florida has an ambitious goal: to harness the power of its faculty, staff, students, and alumni to solve some of society’s most pressing problems and to become a resource for the state of Florida, the nation, and the world. Cybersecurity is the most pressing issue of our increasingly interconnected and networked lives. Recent estimates predict that worldwide the number of connected devices—everything from computers and mobile phones to traffic cameras and pacemakers—will reach 50 billion by 2050. That number is staggering, and so are the vulnerabilities. Networked devices like smart power grids and TVs need to be easily accessible, but they also need to be secure. The more access points a device like a self-driving car has, the more susceptible points adversaries, cyber terrorists or hackers, can attack. Yet device manufacturers mostly favor usability, and security is all too often sacrificed. At the University of Florida some of the brightest minds in cybersecurity related fields have teamed together to form the Florida Institute for Cybersecurity Research. From industry, academe, and government, members of the FICS Research collaborate and bring together expertise in all aspects of cybersecurity and assurance, including hardware, network, mobile, big data, the internet of things (IOT), applied cryptography, social sciences, law, and more. In Plugged In, we meet the men and women at the Florida Institute for Cybersecurity Research who have devoted their careers to studying and staying one step ahead of the bad guys. The stories chronicled in GATORBYTES span all colleges and units across the UF campus. They detail the far-reaching impact of UF’s research, technologies, and innovations—and the UF faculty members dedicated to them. Gatorbytes describe how UF is continuing to build on its strengths and extend the reach of its efforts so that it can help even more people in even more places.

PoC or GTFO

by Manul Laphroaig

<p>This highly anticipated print collection gathers articles published in the much-loved International Journal of Proof-of-Concept or Get The Fuck Out.PoC||GTFO follows in the tradition of Phrack and Uninformed by publishing on the subjects of offensive security research, reverse engineering, and file format internals. <p>Until now, the journal has only been available online or printed and distributed for free at hacker conferences worldwide. <p>Consistent with the journal's quirky, biblical style, this book comes with all the trimmings: a leatherette cover, ribbon bookmark, bible paper, and gilt-edged pages. <p>The book features more than 80 technical essays from numerous famous hackers, authors of classics like "Reliable Code Execution on a Tamagotchi," "ELFs are Dorky, Elves are Cool," "Burning a Phone," "Forget Not the Humble Timing Attack," and "A Sermon on Hacker Privilege." Twenty-four full-color pages by Ange Albertini illustrate many of the clever tricks described in the text.

PoC or GTFO, Volume 2

by Manul Laphroaig

PoC or GTFO, Volume 2 follows-up the wildly popular first volume with issues 9-13 of the eponymous hacker zine. Contributions range from humorous poems to deeply technical essays.The International Journal of Proof-of-Concept or Get The Fuck Out is a celebrated magazine of reverse engineering, retro-computing, and systems internals. This second collected volume holds all of the articles from releases nine to thirteen.Learn how to patch the firmware of a handheld amateur radio, then emulate that radio's proprietary audio code under Linux. How to slow the Windows kernel when exploiting a race condition and how to make a PDF file taht is also an Android app, an audio file, or a Gameboy speedrun. How to hack a Wacom pen table with voltage glitching, then hack it again by pure software to read RDID tags from its surface. How to disassemble every last byte of an Atari game and how to bypass every classic form of copy protection on Apple ][.But above all else, beyond the nifty tricks and silly songs, this book exists to remind you what a clever engineer can build from a box of parts with a bit of free time. Not to show you what others have done, but to show you how they did it so that you can do the same.

PoC or GTFO, Volume 3

by Manul Laphroaig

Volume 3 of the PoC || GTFO collection--read as Proof of Concept or Get the Fuck Out--continues the series of wildly popular collections of this hacker journal. Contributions range from humorous poems to deeply technical essays bound in the form of a bible.The International Journal of Proof-of-Concept or Get The Fuck Out is a celebrated collection of short essays on computer security, reverse engineering and retrocomputing topics by many of the world's most famous hackers. This third volume contains all articles from releases 14 to 18 in the form of an actual, bound bible.Topics include how to dump the ROM from one of the most secure Sega Genesis games ever created; how to create a PDF that is also a Git repository; how to extract the Game Boy Advance BIOS ROM; how to sniff Bluetooth Low Energy communications with the BCC Micro:Bit; how to conceal ZIP Files in NES Cartridges; how to remotely exploit a TetriNET Server; and more.The journal exists to remind us of what a clever engineer can build from a box of parts and a bit of free time. Not to showcase what others have done, but to explain how they did it so that readers can do these and other clever things themselves.

Pocket CIO – The Guide to Successful IT Asset Management: Get to grips with the fundamentals of IT Asset Management, Software Asset Management, and Software License Compliance Audits with this guide

by Phara McLachlan

Create and manage a clear working IT asset management strategy with this unique guideKey FeaturesA detailed IT Asset Management (ITAM) guidebook with real-world templates that can be converted into working ITAM documentsIncludes in-depth discussion on how risk management has changed and the possible solutions needed to address the new normalA step-by-step ITAM manual for newbies as well as seasoned ITAM veteransBook DescriptionThis book is a detailed IT Asset Management (ITAM) guidebook with real-world templates that can be converted into working ITAM documents. It is a step-by-step IT Asset Management manual for the newbies as well as the seasoned ITAM veterans, providing a unique insight into asset management. It discusses how risk management has changed over time and the possible solutions needed to address the new normal. This book is your perfect guide to create holistic IT Asset Management and Software Asset Management programs that close the risk gaps, increases productivity and results in cost efficiencies. It allows the IT Asset Managers, Software Asset Managers, and/or the full ITAM program team to take a deep dive by using the templates offered in the guidebook. You will be aware of the specific roles and responsibilities for every aspect of IT Asset Management, Software Asset Management, and Software License Compliance Audit Response. By the end of this book, you will be well aware of what IT and Software Asset Management is all about and the different steps, processes, and roles required to truly master it.What you will learnClose the hidden risk gaps created by IT assets (hardware and software)Create and manage a proactive ITAM and SAM program and policyA clear, concise explanation of what IT Asset Management and Software Asset Management is, the benefits, and resultsThe best ways to manage a software audit and how to be prepared for oneConsiderations for selecting the best technology for a specific company including what questions should be asked at the onsetIncreasing ITAM program and project success with change managementWho this book is forThis book is intended for CIOs, VPs and CTOs of mid to large-sized enterprises and organizations. If you are dealing with changes such as mergers, acquisitions, divestitures, new products or services, cyber security, mandated regulations, expansion, and much more, this book will help you too.

Pod Racer (Level Up)

by R. T. Martin

A11_4_ON3 is a gamer who likes to look out for himself—especially when it comes to winning. When he learns he's part of a four-player team with his former gaming crew, no one is happy to work together again. But their team must win this virtual reality racing game, or they'll be trapped inside the virtual world forever. Can he change his attitude for the sake of his team? Or will his self-centered playing be their downfall?

Podcast Journalism: The Promise and Perils of Audio Reporting

by David Dowling

Podcasting’s stratospheric rise has inspired a new breed of audio reporting. Offering immersive storytelling for a binge-listening audience as well as reaching previously underserved communities, podcasts have become journalism’s most rapidly growing digital genre, buoying a beleaguered news industry. Yet many concerns have been raised about this new medium, such as the potential for disinformation, the influence of sponsors on content, the dominance of a few publishers and platforms, and at-times questionable adherence to journalistic principles.David O. Dowling critically examines how podcasting and its evolving conventions are transforming reporting—and even reshaping journalism’s core functions and identity. He considers podcast reporting’s most influential achievements as well as its most consequential ethical and journalistic shortcomings, emphasizing the reciprocal influences between podcasting and traditional and digital journalism. Podcasting, both as a medium and a business, has benefited from the blurring of boundaries separating news from entertainment, editorial from advertising, and neutrality from subjectivity. The same qualities and forces that have allowed podcasting to bypass the limitations of traditional categories, expand the space of social and political discourse, and provide openings for marginalized voices have also permitted corporations to extend their reach and far-right firebrands to increase their influence. Equally attentive to the medium’s strengths and flaws, this is a vital book for all readers interested in how podcasting has changed journalism.

Podcast Master

by Ben Green

Senior multimedia producer at the Guardian, Ben Green, tells you everything you need to know about podcasting. Ben Green has been podcasting for over a decade. He has been responsible for several top podcasts, including Football Weekly, the UK's number one sports podcast,and the Guardian Guide to Running podcast.In Podcast Master, he provides a one-stop insider’s guide to everything you need to know about hosting, editing and producing online shows. It is packed with recommendations to help you get the right software and gear, advice on sponsorship and advertising, and tips on everything from platform selection to promotional artwork design.Green’s enthusiasm for the medium’s breadth and depth is infectious. With wit and verve, he takes us through the history of podcasting, shares his recommendations for the podcasts you should be listening to, and reveals proven techniques for reaching and building your audience.Whether you're broadcasting from your bedroom, or are a brand looking to enhance your profile, this authoritative, easy to follow and cutting-edge guide will give you the tools to start a podcast from scratch – or maximise your current one.

Podcasting For Dummies

by Tee Morris Chuck Tomasi

Produce a podcast like the pros More people than ever are turning to podcasts for on-demand, mobile entertainment and information. Podcasting For Dummies offers a fast and easy way to get the know-how you need to produce and distribute one of your very own. Written by a pair of podcasting pioneers, this book shares insight on the technology behind recording, editing, and sharing podcasts, along with tips and tricks on how to produce a pro-level podcast. Podcasting has enjoyed a recent boom thanks to a new crop of hit podcasts catching the ears of the public and media along with the continued growth of mobile and streaming devices as a source for entertainment. If you want to jump on the podcasting bandwagon, you've come to the right place! In this fully updated edition, would-be and experienced podcasters alike will get all the tech information, production insight, and promotional tips they need to either get a podcast off the ground or improve on an existing one. Get the gear you need Find your podcasting voice Find and build an audience Plan your podcast New tools have made it easier than ever to create a podcast—and this book shows you how.

Podcasting For Dummies

by Tee Morris Chuck Tomasi

Understand the do's and don'ts of podcasting Produce unique content that attracts listeners Build a studio that rivals pro podcasters How to talk your way to the top As more and more people turn to podcasts for entertainment, information, and education, the market for new players has never been bigger—or more competitive. And with corporations and A-list celebs moving in on the action, it's more important than ever to know how to stand out from the crowd. Written by two podcasting veterans, this book gives you everything you need to launch a podcast. Get the insider info on how to produce quality audio (and even video), keep your content fresh, find your voice, and build an audience. Inside... Building your podcasting studio Developing your podcast theme Conducting great interviews Recording and editing episodes Distributing your podcast Adding sponsorships Expanding your podcast consumption

Podcasting For Dummies

by Tee Morris Chuck Tomasi

Step up to the mic and unleash your inner host with Podcasting For Dummies Ever wonder what it takes to get your very own podcast up and running? How to get the gear you need, pick a great topic, secure fascinating guests, and assemble it all into a refined and irresistible product? Well wonder no more! Because Podcasting For Dummies has the essential guidance you need to get your brand-new podcast up and running. From selecting the right recording equipment to identifying an audience and pro-level production tips, you'll find all the killer info to help you get started on your next big idea. You'll also get: Software and hardware tips to create and produce a crystal-clear podcast Interview advice, whether you'll be seeing your guests in-person or over Zoom Strategies for choosing the perfect platform, finding sponsors, and advertising and marketing your new creation Pointers for setting up a streaming account and doing live podcasting like an expert With everyone from A-list brands to world-famous celebrities getting in on the podcast craze, it's time you took your turn on the mic. Grab Podcasting For Dummies today and turn up the volume on the practice that's transformed countless amateurs into household names!

Podcasting For Dummies, 2nd Edition

by Tee Morris Chuck Tomasi Evo Terra

New tools have made it easier to create a podcast. The second edition of Podcasting For Dummies shows you how you can create and distribute your own online recordings using tools you already have. This edition also covers what you need to build a top-notch podcasting studio. Expert podcasters Tee Morris and Evo Terra are joined on this edition by a fellow podcasting guru, Chuck Tomasi, to walk you through recording, editing, posting, and promoting a podcast. Chapters cover: Choosing a topic that fits your expertise Writing an outline or script for your podcast Turning your existing computer into a desktop podcasting studio Picking the microphone, headphones, and audio editing software that best suit your needs Upgrading to pro-level podcasting equipment Conducting interviews and recording an interview subject who's not in the room with you Navigating the XML code you need to share your podcast Finding a place to host your podcast online Promoting your podcasts in the blogosphere, online discussion groups, and social networking sites Seeking out sponsors, advertising, and subscriptions to make your podcast pay Creating podcasts designed to promote a business

Podcasting Hacks

by Jack Herrington

Podcasting does for Internet audio listeners what TiVo does for television viewers--it puts you in charge of when you enjoy a program. Podcasting is a web-based broadcast medium that sends audio content (most commonly in the MP3 format) directly to an iPod or other digital audio player. You subscribe to audio feeds, receive new files automatically, and listen to them at your convenience. As you can imagine, podcasting is taking the "blogsphere" by storm. A podcast is a professional-quality Internet radio broadcast, and like blogging and HTML before it, this revolutionary new way of publishing to the Internet has become the new outlet for personal expression. If you've got Internet access and a copy of Podcasting Hacks, you can find out just how easy it is to listen to and create your own Internet audio programs. With Podcasting Hacks , Jack Herrington, a software engineer with 20 years of experience developing applications using a diverse set of languages and tools, delivers the ultimate how-to of podcasting for anyone looking to get the most out of this hot new medium. Since August 2004 (the month that iPodder.com editor Adam Curry considers the start of podcasting), audio blogging has exploded. Podcasts cover every conceivable topic, including sex, relationships, technology, religion, home brewing, recreational drugs, rock 'n roll, food, entertainment, politics, and much more. There were podcasts from the Democratic National Convention in Fall 2004, and some programs on Air America and NPR are also podcasts. Podcasting Hacks offers expert tips and tools for blogging out loud--for transmitting (and receiving) audio content worldwide with ease. This groundbreaking volume covers both entry-level and advanced topics perfect for aspiring and experienced podcasters. Herrington shows you how to get started, create quality sound, use the right software, develop a great show, distribute a podcast, and build an audience. More advanced topics include audio editing, podcasting on the go, and even videocasting.

Podcasting Marketing Strategy: A Complete Guide to Creating, Publishing and Monetizing a Successful Podcast

by Daniel Rowles Ciaran Rogers

Podcasting is a hugely persuasive yet under-utilized channel accessed by an affluent and influential demographic. In a crowded and noisy digital environment, it gives organizations, brand builders and marketers the unique opportunity to stand out and drive engagement with target audiences. It offers accurate and measurable levels of allegiance that can only be dreamed of on other digital channels. Podcasting Marketing Strategy is a complete guide to the podcast environment. It describes the importance of podcasting for businesses and explains why, uniquely, it has the highest level of consumer commitment than any other social media. Written by an award-winning author and his co-host of the global top ten iTunes podcast, The Digital Marketing Podcast, this book explains how podcasting can drive business results, advises on how to record, edit and advertise your content and provides a unique digital marketing toolkit. Supported by case studies from influential organizations around the globe, Podcasting Marketing Strategy is the definitive authority to making and publishing podcasts that deliver quantifiable results.

Podcasting and Education: Concepts, Communities and Case Studies

by Carola Boehm Tim Canfer Camilo Salazar

Podcasting and Education: Concepts, Communities and Case Studies provides both theoretical frameworks and real-life examples to support readers in the use of podcasting as a medium in education.This edited collection brings together the collective experience of educators from around the world who use podcasting in their pedagogical toolset, providing a rich, diverse collection of practical insights for educating through podcasting. Readers will be able to gain a deeper understanding of the diversity of opportunities for embedding audio into the classroom, learn from practitioners and educators who have been using podcasting in education for years, and gather ideas from inspirational case studies that represent models which can be adapted, adopted, or amended to suit a variety of contexts.This book will be of interest to both educators and podcasters with an interest in facilitating learning journeys in day-to-day settings, educational classrooms, and academia, as well as instructors of all kinds, including those teaching audio, media production, and journalism.

Podcasts in der Unternehmenskommunikation: Wie Sie mit strategischen Audioformaten Ihre Zielgruppen erreichen (essentials)

by Stephan Schreyer

Dieses Buch gibt einen schnellen Überblick über das Thema Podcast. Wie muss das Thema Podcast strategisch angegangen werden, damit es nachhaltig einen Mehrwert für ein Unternehmen bietet? Sind Podcasts nur ein Hype oder können sie sinnvoller Teil des Kommunikations- und Marketingmixes eines Unternehmens sein? Podcasts sind der aktuelle Trend in der Kommunikation und im Marketing. Täglich kommen unzählige neue Formate auf den Markt. Die hohe Smartphonedichte, ein verändertes Mediennutzungsverhalten, bessere mobile Datenverfügbarkeit und große Player wie Audible und Spotify haben geholfen, das klassische „Hörspiel“ in moderner Form aus der Versenkung zu holen. Dieses essential hilft dabei, strategisch eigene Podcastmaßnahmen für das Unternehmen zu entwickeln.

Podman for DevOps: Containerization reimagined with Podman and its companion tools

by Alessandro Arrichiello Gianni Salinetti Brent J. Baude

Build, deploy, and manage containers with the next-generation engine and toolsKey FeaturesDiscover key differences between Docker and PodmanBuild brand new container images with Buildah, the Podman companionLearn how to manage and integrate containers securely in your existing infrastructureBook DescriptionAs containers have become the new de facto standard for packaging applications and their dependencies, understanding how to implement, build, and manage them is now an essential skill for developers, system administrators, and SRE/operations teams. Podman and its companion tools Buildah and Skopeo make a great toolset to boost the development, execution, and management of containerized applications.Starting with the basic concepts of containerization and its underlying technology, this book will help you get your first container up and running with Podman. You'll explore the complete toolkit and go over the development of new containers, their lifecycle management, troubleshooting, and security aspects. Together with Podman, the book illustrates Buildah and Skopeo to complete the tools ecosystem and cover the complete workflow for building, releasing, and managing optimized container images. Podman for DevOps provides a comprehensive view of the full-stack container technology and its relationship with the operating system foundations, along with crucial topics such as networking, monitoring, and integration with systemd, docker-compose, and Kubernetes.By the end of this DevOps book, you'll have developed the skills needed to build and package your applications inside containers as well as to deploy, manage, and integrate them with system services.What you will learnUnderstand Podman's daemonless approach as a container engineRun, manage, and secure containers with PodmanDiscover the strategies, concepts, and command-line options for using Buildah to build containers from scratchManage OCI images with SkopeoTroubleshoot runtime, build, and isolation issuesIntegrate Podman containers with existing networking and system servicesWho this book is forThe book is for cloud developers looking to learn how to build and package applications inside containers and system administrators who want to deploy, manage, and integrate them with system services and orchestration solutions. This book provides a detailed comparison between Docker and Podman to aid you in learning Podman quickly.

Podman in Action: Secure, rootless containers for Kubernetes, microservices, and more

by Daniel Walsh

The next generation of containers is here. Learn Podman directly from its creator, discover its exceptional security features, and start managing rootless containers that integrate easily into your systems. In Podman in Action you will learn how to: Build and run containers in rootless mode Develop and manage pods Use SystemD to oversee a container&’s lifecycle Work with the Podman service via Python Keep your containers confined using Podman security features Manage containerized applications on edge devices Podman in Action shows you how to deploy containerized applications on Linux, Windows, and MacOS systems using Podman. Written by Daniel Walsh, who leads the Red Hat Podman team, this book teaches you how to securely manage the entire application lifecycle without human intervention. You&’ll quickly get to grips with Podman&’s unique advantages over Docker, and learn how easy it is to migrate your Docker-based infrastructure. It also demonstrates how, with Podman, you can easily convert containerized applications into Kubernetes-based microservices. About the technology It&’s time to upgrade your container engine! The Podman container manager delivers flexible image layer control, seamless Kubernetes compatibility, and rootless containers that can be created, run, and managed by users without admin rights. Plus, its OCI-compliant support for the Docker API lets you shift existing containers to Podman without breaking your scripts or changing the way you work. About the book Podman in Action introduces the Podman container manager. The easy-to-follow explanations and examples give you a clear view of what containers are, how they work, and how to manage them using Podman&’s powerful features. You&’ll get a deep look at the Linux components Podman uses and even learn more about Docker along the way. You&’ll especially appreciate author Dan Walsh&’s unique insights into container security. What's inside Develop and manage pods Key security concepts including SELinux and SECCOMP Use systemd to oversee a container&’s lifecycle Keep your containers confined using Podman security Manage containerized applications on edge devices Install and run Podman on MacOS and Windows About the reader For developers or system administrators experienced with Linux and Docker. About the author Daniel Walsh is a senior distinguished engineer at Red Hat, and leads the team that created Podman. Table of Contents PART 1 FOUNDATIONS 1 Podman: A next-generation container engine 2 Command line 3 Volumes 4 Pods PART 2 DESIGN 5 Customization and configuration files 6 Rootless containers PART 3 ADVANCED TOPICS 7 Integration with systemd 8 Working with Kubernetes 9 Podman as a service PART 4 CONTAINER SECURITY 10 Security container isolation 11 Additional security considerations

Podstawy ochrony komputerów

by Rick Lehtinen G. T. Gangemi Sr. Deborah Russell

Zadbaj o bezpiecze?stwo swojego komputera Poznaj zagro?enia, na jakie nara?ony jest komputer Naucz si? kontrolowa? dost?p do komputera Stosuj techniki zapewniajšce bezpiecze?stwo w sieci Czy mój komputer na pewno jest bezpieczny? Wiele osób zadaje sobie to pytanie dopiero w momencie, kiedy system zaczyna zachowywa? si? w podejrzany sposób. Okazuje si? wówczas, ?e skaner wykrywa dziesištki, a nawet setki wirusów, programy zaczynajš dzia?a? nieprawid?owo, a z dysku ginš wa?ne dane. Pó? biedy, je?li jest to tylko domowy komputer z prywatnymi plikami. Du?o gorsze skutki mo?e mie? w?amanie do firmowej bazy danych lub przechwycenie poufnej komunikacji. Ksiš?ka "Podstawy ochrony komputerów" to wszechstronne wprowadzenie do najwa?niejszych zagadnie? dotyczšcych bezpiecze?stwa danych i sprz?tu. Czytajšc jš, poznasz zagro?enia, jakie czyhajš na u?ytkowników komputerów, ale tak?e skuteczne techniki ochrony. Nauczysz si? kontrolowa? dost?p do danych, prowadzi? efektywnš polityk? zabezpiecze?, wykrywa? i usuwa? wirusy oraz zapobiega? przenikaniu ich do systemu. Dowiesz si?, jak zapewni? bezpiecze?stwo komputera w sieci oraz jak u?ywa? szyfrowania do przesy?ania poufnych informacji. Przeczytasz te? o najnowszych technikach zabezpieczenia bazujšcego na danych biometrycznych (wzorze siatkówki czy odciskach palców) oraz ochronie sieci bezprzewodowych. Niebezpiecze?stwa gro?šce u?ytkownikom komputerów Kontrolowanie dost?pu do komputera Walka z wirusami Prowadzenie skutecznej polityki zabezpiecze? Bezpieczne korzystanie z sieci Szyfrowanie poufnych danych Komunikacja bez ryzyka Zabezpieczenia biometryczne Tworzenie bezpiecznych sieci bezprzewodowych Stosuj skuteczne zabezpieczenia i zapewnij maksymalne bezpiecze?stwo swojemu komputerowi!

Refine Search

Showing 44,076 through 44,100 of 63,048 results