Browse Results

Showing 10,351 through 10,375 of 61,611 results

Century 21™ Computer Applications and Keyboarding, Comprehensive, Lessons 1-150

by Jack P. Hoggatt Jon A. Shank

Provide students with the best in keyboarding education from the proven keyboarding leader--now stronger than ever! This latest edition helps to prepare students for a lifetime of keyboarding success with a complete family of proven solutions updated for a new decade of business challenges. Students tap into the latest keyboarding technology, learn to master computer applications, and increase communication skills with the proven presentation from this best-selling text. Trust the leader who has taught more than 85 million to type--now bringing 100 years of publishing experience and a century of innovations together in a complete line of keyboarding solutions for you.

Century 21™ Computer Keyboarding: Essentials, Lessons 1-75

by Jack P. Hoggatt Jon A. Shank

Century 21 Computer Keyboarding gives you what you are looking for in a one semester course on new key learning, document formatting and word processing. This text is a combination of 50 lessons of key learning/ technique mastery and 25 lessons on word processing/document formatting.

Century 21™ Plus: Computer Applications with Document Formatting

by Karl Barksdale Jack Hoggatt Jon Shank

NIMAC-sourced textbook

Century 21® Computer Applications and Keyboarding, Comprehensive, Lessons 1-170

by Jack P. Hoggatt Jon A. Shank

Provide your students with the best in keyboarding education from the proven keyboarding leader--now stronger than ever! This latest edition of CENTURY 21 COMPUTER APPLICATIONS AND KEYBOARDING helps students prepare for a lifetime of keyboarding success with innovative solutions updated to reflect today's business challenges. Students tap into the latest keyboarding technology, learn to master computer applications using Microsoft Office 2007, and increase communication skills with relevant activities throughout this best-selling text. Trust the leader who has taught more than 85 million people to type--bringing 100 years of publishing experience and a century of innovations together in a complete line of keyboarding solutions.

Century 21® Computer Applications and Keyboarding, Comprehensive, Lessons 1-170

by Jack P. Hoggatt Jon A. Shank

Provide your students with the best in keyboarding education from the proven keyboarding leader--now stronger than ever! This latest edition of CENTURY 21 COMPUTER APPLICATIONS AND KEYBOARDING helps students prepare for a lifetime of keyboarding success with innovative solutions updated to reflect today's business challenges. Students tap into the latest keyboarding technology, learn to master computer applications using Microsoft Office 2007, and increase communication skills with relevant activities throughout this best-selling text. Trust the leader who has taught more than 85 million people to type--bringing 100 years of publishing experience and a century of innovations together in a complete line of keyboarding solutions.

Century 21® Computer Keyboarding, Essentials, Lessons 1-80

by Jack P. Hoggatt Jon A. Shank

CENTURY 21 COMPUTER KEYBOARDING provides everything you need for in a one-semester course covering new-key learning, document formatting, and word processing. This latest edition helps students prepare for a lifetime of keyboarding success with innovative solutions updated to reflect today's business challenges. Trust the leader who has taught more than 85 million people to type--bringing 100 years of publishing experience and a century of innovations together in a complete line of keyboarding solutions. <P> <i>Advisory: Bookshare has learned that this book offers only partial accessibility. We have kept it in the collection because it is useful for some of our members. To explore further access options with us, please contact us through the Book Quality link on the right sidebar. Benetech is actively working on projects to improve accessibility issues such as these. </i>

Century 21® Computer Skills and Applications, Lessons 1–90

by Jack P. Hoggatt Jon A. Shank James R. Smith

Provide your students with the best in keyboarding education from the proven keyboarding leader--now stronger than ever! This latest edition of CENTURY 21 COMPUTER SKILLS AND APPLICATIONS helps students prepare for a lifetime of keyboarding and computer success with innovative solutions updated to reflect today's business challenges. Students tap into the latest keyboarding technology, learn to master computer applications using Microsoft Office 2010/2013, and increase communication skills with relevant activities throughout this best-selling text. Trust the leader who has taught more than 85 million people to type--bringing 100 years of publishing experience and a century of innovations together in a complete line of keyboarding solutions.

Century 21® Jr., Input Technologies & Computer Applications

by Jack P. Hoggatt Jon A. Shank Karl Barksdale

Looking for a solution to get your students started in the computer world? This introductory text, CENTURY 21, JR. INPUT TECHNOLOGIES AND COMPUTER APPLICATIONS, 2e is the perfect companion for navigation of computer basics, file management, the Internet, keyboarding, handwriting recognition, speech recognition, tablet PCs, word processing, desktop publishing, spreadsheets, presentations, databases, HTML programming, and Web pages. CENTURY 21, JR. provides step-by-step guidance, with engaging activities labeled as Learn, Practice, and Apply. Units are divided into easy-to-manage chapters and projects will help students learn the features of Microsoft Office 2007.

Century 21® Jr.: Computer Applications With Keyboarding (Century 21 Keyboarding Ser.)

by Jack P. Hoggatt Jon A. Shank Jr. James R. Smith

NIMAC-sourced textbook

Century 21® Jr.: Computer Applications with Keyboarding

by Jack P. Hoggatt Jon A. Shank James R. Smith

Just getting started in the computer world? This introductory text, CENTURY 21(tm), JR. COMPUTER APPLICATIONS WITH KEYBOARDING, 3E is the perfect companion for navigation of computer basics, file management, the Internet, keyboarding, word processing, desktop publishing, spreadsheets, presentations, and databases. CENTURY 21, JR. provides step-by-step guidance, with engaging activities. Units are divided into easy-to-manage chapters and projects will help students learn the features of Microsoft Office 2013 and 365.

Ceph Cookbook

by Karan Singh

Over 100 effective recipes to help you design, implement, and manage the software-defined and massively scalable Ceph storage system About This Book * Implement a Ceph cluster successfully and gain deep insights into its best practices * Harness the abilities of experienced storage administrators and architects, and run your own software-defined storage system * This comprehensive, step-by-step guide will show you how to build and manage Ceph storage in production environment Who This Book Is For This book is aimed at storage and cloud system engineers, system administrators, and technical architects who are interested in building software-defined storage solutions to power their cloud and virtual infrastructure. If you have basic knowledge of GNU/Linux and storage systems, with no experience of software defined storage solutions and Ceph, but eager to learn this book is for you. What You Will Learn * Understand, install, configure, and manage the Ceph storage system * Get to grips with performance tuning and benchmarking, and gain practical tips to run Ceph in production * Integrate Ceph with OpenStack Cinder, Glance, and nova components * Deep dive into Ceph object storage, including s3, swift, and keystone integration * Build a Dropbox-like file sync and share service and Ceph federated gateway setup * Gain hands-on experience with Calamari and VSM for cluster monitoring * Familiarize yourself with Ceph operations such as maintenance, monitoring, and troubleshooting * Understand advanced topics including erasure coding, CRUSH map, cache pool, and system maintenance In Detail Ceph is a unified, distributed storage system designed for excellent performance, reliability, and scalability. This cutting-edge technology has been transforming the storage industry, and is evolving rapidly as a leader in software-defined storage space, extending full support to cloud platforms such as Openstack and Cloudstack, including virtualization platforms. It is the most popular storage backend for Openstack, public, and private clouds, so is the first choice for a storage solution. Ceph is backed by RedHat and is developed by a thriving open source community of individual developers as well as several companies across the globe. This book takes you from a basic knowledge of Ceph to an expert understanding of the most advanced features, walking you through building up a production-grade Ceph storage cluster and helping you develop all the skills you need to plan, deploy, and effectively manage your Ceph cluster. Beginning with the basics, you'll create a Ceph cluster, followed by block, object, and file storage provisioning. Next, you'll get a step-by-step tutorial on integrating it with OpenStack and building a Dropbox-like object storage solution. We'll also take a look at federated architecture and CephFS, and you'll dive into Calamari and VSM for monitoring the Ceph environment. You'll develop expert knowledge on troubleshooting and benchmarking your Ceph storage cluster. Finally, you'll get to grips with the best practices to operate Ceph in a production environment. Style and approach This step-by-step guide is filled with practical tutorials, making complex scenarios easy to understand.

Ceph Cookbook - Second Edition

by Karan Singh Michael Hackett Vikhyat Umrao

Over 100 effective recipes to help you design, implement, and troubleshoot manage the software-defined and massively scalable Ceph storage system. About This Book • Implement a Ceph cluster successfully and learn to manage it. • Recipe based approach in learning the most efficient software defined storage system • Implement best practices on improving efficiency and security of your storage cluster • Learn to troubleshoot common issues experienced in a Ceph cluster Who This Book Is For This book is targeted at storage and cloud engineers, system administrators, or anyone who is interested in building software defined storage, to power your cloud or virtual infrastructure. If you have basic knowledge of GNU/Linux and storage systems, with no experience of software defined storage solutions and Ceph, but eager to learn then this book is for you What You Will Learn • Understand, install, configure, and manage the Ceph storage system • Get to grips with performance tuning and benchmarking, and learn practical tips to help run Ceph in production • Integrate Ceph with OpenStack Cinder, Glance, and Nova components • Deep dive into Ceph object storage, including S3, Swift, and Keystone integration • Configure a disaster recovery solution with a Ceph Multi-Site V2 gateway setup and RADOS Block Device mirroring • Gain hands-on experience with Ceph Metrics and VSM for cluster monitoring • Familiarize yourself with Ceph operations such as maintenance, monitoring, and troubleshooting • Understand advanced topics including erasure-coding, CRUSH map, cache pool, and general Ceph cluster maintenance In Detail Ceph is a unified distributed storage system designed for reliability and scalability. This technology has been transforming the software-defined storage industry and is evolving rapidly as a leader with its wide range of support for popular cloud platforms such as OpenStack, and CloudStack, and also for virtualized platforms. Ceph is backed by Red Hat and has been developed by community of developers which has gained immense traction in recent years. This book will guide you right from the basics of Ceph , such as creating blocks, object storage, and filesystem access, to advanced concepts such as cloud integration solutions. The book will also cover practical and easy to implement recipes on CephFS, RGW, and RBD with respect to the major stable release of Ceph Jewel. Towards the end of the book, recipes based on troubleshooting and best practices will help you get to grips with managing Ceph storage in a production environment. By the end of this book, you will have practical, hands-on experience of using Ceph efficiently for your storage requirements. Style and approach This step-by-step guide is filled with practical tutorials, making complex scenarios easy to understand.

Ceph: Design, implement, and manage software-defined storage solutions that provide excellent performance

by Karan Singh Michael Hackett Anthony D'Atri Vikhyat Umrao Nick Fisk

Get to grips with the unified, highly scalable distributed storage system and learn how to design and implement it. Key Features Explore Ceph's architecture in detail Implement a Ceph cluster successfully and gain deep insights into its best practices Leverage the advanced features of Ceph, including erasure coding, tiering, and BlueStore Book Description This Learning Path takes you through the basics of Ceph all the way to gaining in-depth understanding of its advanced features. You'll gather skills to plan, deploy, and manage your Ceph cluster. After an introduction to the Ceph architecture and its core projects, you'll be able to set up a Ceph cluster and learn how to monitor its health, improve its performance, and troubleshoot any issues. By following the step-by-step approach of this Learning Path, you'll learn how Ceph integrates with OpenStack, Glance, Manila, Swift, and Cinder. With knowledge of federated architecture and CephFS, you'll use Calamari and VSM to monitor the Ceph environment. In the upcoming chapters, you'll study the key areas of Ceph, including BlueStore, erasure coding, and cache tiering. More specifically, you'll discover what they can do for your storage system. In the concluding chapters, you will develop applications that use Librados and distributed computations with shared object classes, and see how Ceph and its supporting infrastructure can be optimized. By the end of this Learning Path, you'll have the practical knowledge of operating Ceph in a production environment. This Learning Path includes content from the following Packt products: Ceph Cookbook by Michael Hackett, Vikhyat Umrao and Karan Singh Mastering Ceph by Nick Fisk Learning Ceph, Second Edition by Anthony D'Atri, Vaibhav Bhembre and Karan Singh What you will learn Understand the benefits of using Ceph as a storage solution Combine Ceph with OpenStack, Cinder, Glance, and Nova components Set up a test cluster with Ansible and virtual machine with VirtualBox Develop solutions with Librados and shared object classes Configure BlueStore and see its interaction with other configurations Tune, monitor, and recover storage systems effectively Build an erasure-coded pool by selecting intelligent parameters Who this book is for If you are a developer, system administrator, storage professional, or cloud engineer who wants to understand how to deploy a Ceph cluster, this Learning Path is ideal for you. It will help you discover ways in which Ceph features can solve your data storage problems. Basic knowledge of storage systems and GNU/Linux will be beneficial.

Cerebral Aneurysm Detection and Analysis: First Challenge, CADA 2020, Held in Conjunction with MICCAI 2020, Lima, Peru, October 8, 2020, Proceedings (Lecture Notes in Computer Science #12643)

by Anja Hennemuth Leonid Goubergrits Matthias Ivantsits Jan-Martin Kuhnigk

This book constitutes the First Cerebral Aneurysm Detection Challenge, CADA 2020, which was held in conjunction with the 23rd International Conference on Medical Image Computing and Computer-Assisted Intervention, MICCAI 2020, in October 2020. The conference was planned to take place in Lima, Peru, and took place virtually due to the COVID-19 pandemic. The 9 regular papers presented in this volume, together with an overview and one introduction paper, were carefully reviewed and selected for inclusion in the book. The papers were organized in topical sections as follows: cerebral aneurysm detection; cerebral aneurysm segmentation; and cerebral aneurysm rupture risk estimation.

Certifications of Critical Systems – The CECRIS Experience: The Cecris Experience (River Publishers Series In Information Science And Technology Ser.)

by Andrea Bondavalli Francesco Brancati

In recent years, a considerable amount of effort has been devoted, both in industry and academia, to the development, validation and verification of critical systems, i.e. those systems whose malfunctions or failures reach a critical level both in terms of risks to human life as well as having a large economic impact.Certifications of Critical Systems – The CECRIS Experience documents the main insights on Cost Effective Verification and Validation processes that were gained during work in the European Research Project CECRIS (acronym for Certification of Critical Systems). The objective of the research was to tackle the challenges of certification by focusing on those aspects that turn out to be more difficult/important for current and future critical systems industry: the effective use of methodologies, processes and tools.The CECRIS project took a step forward in the growing field of development, verification and validation and certification of critical systems. It focused on the more difficult/important aspects of critical system development, verification and validation and certification process. Starting from both the scientific and industrial state of the art methodologies for system development and the impact of their usage on the verification and validation and certification of critical systems, the project aimed at developing strategies and techniques supported by automatic or semi-automatic tools and methods for these activities, setting guidelines to support engineers during the planning of the verification and validation phases.

Certified Ethical Hacker (CEH) Foundation Guide

by Sagar Ajay Rahalkar

Prepare for the CEH training course and exam by gaining a solid foundation of knowledge of key fundamentals such as operating systems, databases, networking, programming, cloud, and virtualization. Based on this foundation, the book moves ahead with simple concepts from the hacking world. The Certified Ethical Hacker (CEH) Foundation Guide also takes you through various career paths available upon completion of the CEH course and also prepares you to face job interviews when applying as an ethical hacker.The book explains the concepts with the help of practical real-world scenarios and examples. You'll also work with hands-on exercises at the end of each chapter to get a feel of the subject. Thus this book would be a valuable resource to any individual planning to prepare for the CEH certification course.What You Will LearnGain the basics of hacking (apps, wireless devices, and mobile platforms)Discover useful aspects of databases and operating systems from a hacking perspectiveDevelop sharper programming and networking skills for the examExplore the penetration testing life cycle Bypass security appliances like IDS, IPS, and honeypotsGrasp the key concepts of cryptographyDiscover the career paths available after certificationRevise key interview questions for a certified ethical hackerWho This Book Is ForBeginners in the field of ethical hacking and information security, particularly those who are interested in the CEH course and certification.

Certified Ethical Hacker (CEH) Preparation Guide: Lesson-Based Review of Ethical Hacking and Penetration Testing

by Ahmed Sheikh

Know the basic principles of ethical hacking. This book is designed to provide you with the knowledge, tactics, and tools needed to prepare for the Certified Ethical Hacker(CEH) exam—a qualification that tests the cybersecurity professional’s baseline knowledge of security threats, risks, and countermeasures through lectures and hands-on labs. You will review the organized certified hacking mechanism along with: stealthy network re-con; passive traffic detection; privilege escalation, vulnerability recognition, remote access, spoofing; impersonation, brute force threats, and cross-site scripting. The book covers policies for penetration testing and requirements for documentation. This book uses a unique “lesson” format with objectives and instruction to succinctly review each major topic, including: footprinting and reconnaissance and scanning networks, system hacking, sniffers and social engineering, session hijacking, Trojans and backdoor viruses and worms, hacking webservers, SQL injection, buffer overflow, evading IDS, firewalls, and honeypots, and much more. What You Will learn Understand the concepts associated with FootprintingPerform active and passive reconnaissanceIdentify enumeration countermeasuresBe familiar with virus types, virus detection methods, and virus countermeasuresKnow the proper order of steps used to conduct a session hijacking attackIdentify defensive strategies against SQL injection attacksAnalyze internal and external network traffic using an intrusion detection system Who This Book Is For Security professionals looking to get this credential, including systems administrators, network administrators, security administrators, junior IT auditors/penetration testers, security specialists, security consultants, security engineers, and more

Certified Ethical Hacker (CEH) v11 312-50 Exam Guide: Keep up to date with ethical hacking trends and hone your skills with hands-on activities

by Christopher Rees Dale Meredith

Develop foundational skills in ethical hacking and penetration testing while getting ready to pass the certification examKey FeaturesLearn how to look at technology from the standpoint of an attackerUnderstand the methods that attackers use to infiltrate networksPrepare to take and pass the exam in one attempt with the help of hands-on examples and mock testsBook DescriptionWith cyber threats continually evolving, understanding the trends and using the tools deployed by attackers to determine vulnerabilities in your system can help secure your applications, networks, and devices. To outmatch attacks, developing an attacker's mindset is a necessary skill, which you can hone with the help of this cybersecurity book.This study guide takes a step-by-step approach to helping you cover all the exam objectives using plenty of examples and hands-on activities. You'll start by gaining insights into the different elements of InfoSec and a thorough understanding of ethical hacking terms and concepts. You'll then learn about various vectors, including network-based vectors, software-based vectors, mobile devices, wireless networks, and IoT devices. The book also explores attacks on emerging technologies such as the cloud, IoT, web apps, and servers and examines prominent tools and techniques used by hackers. Finally, you'll be ready to take mock tests, which will help you test your understanding of all the topics covered in the book.By the end of this book, you'll have obtained the information necessary to take the 312-50 exam and become a CEH v11 certified ethical hacker.What you will learnGet to grips with information security and ethical hackingUndertake footprinting and reconnaissance to gain primary information about a potential targetPerform vulnerability analysis as a means of gaining visibility of known security weaknessesBecome familiar with the tools and techniques used by an attacker to hack into a target systemDiscover how network sniffing works and ways to keep your information secureExplore the social engineering techniques attackers use to compromise systemsWho this book is forThis ethical hacking book is for security professionals, site admins, developers, auditors, security officers, analysts, security consultants, and network engineers. Basic networking knowledge (Network+) and at least two years of experience working within the InfoSec domain are expected.

Certified Function Point Specialist Examination Guide

by David Garmus Janet Russac Royce Edwards

The Certified Function Point Specialist Examination Guide provides a complete and authoritative review of the rules and guidelines prescribed in the release of version 4.3 of the Function Point Counting Practices Manual (CPM). Providing a fundamental understanding of the IFPUG Functional Size Measurement method, this is the ideal study guide for th

Certified Information Security Manager Exam Prep Guide: Aligned with the latest edition of the CISM Review Manual to help you pass the exam with confidence

by Hemang Doshi

Pass the Certified Information Security Manager (CISM) exam and implement your organization's security strategy with easeKey FeaturesPass the CISM exam confidently with this step-by-step guideExplore practical solutions that validate your knowledge and expertise in managing enterprise information security teamsEnhance your cybersecurity skills with practice questions and mock testsBook DescriptionWith cyber threats on the rise, IT professionals are now choosing cybersecurity as the next step to boost their career, and holding the relevant certification can prove to be a game-changer in this competitive market. CISM is one of the top-paying and most sought-after certifications by employers.This CISM Certification Guide comprises comprehensive self-study exam content for those who want to achieve CISM certification on the first attempt. This book is a great resource for information security leaders with a pragmatic approach to challenges related to real-world case scenarios. You'll learn about the practical aspects of information security governance and information security risk management. As you advance through the chapters, you'll get to grips with information security program development and management. The book will also help you to gain a clear understanding of the procedural aspects of information security incident management.By the end of this CISM exam book, you'll have covered everything needed to pass the CISM certification exam and have a handy, on-the-job desktop reference guide.What you will learnUnderstand core exam objectives to pass the CISM exam with confidenceCreate and manage your organization's information security policies and procedures with easeBroaden your knowledge of the organization's security strategy designingManage information risk to an acceptable level based on risk appetite in order to meet organizational goals and objectivesFind out how to monitor and control incident management proceduresDiscover how to monitor activity relating to data classification and data accessWho this book is forIf you are an aspiring information security manager, IT auditor, chief information security officer (CISO), or risk management professional who wants to achieve certification in information security, then this book is for you. A minimum of two years' experience in the field of information technology is needed to make the most of this book. Experience in IT audit, information security, or related fields will be helpful.

Certified Information Security Manager Exam Prep Guide: Gain the confidence to pass the CISM exam using test-oriented study material, 2nd Edition

by Hemang Doshi

Master information security fundamentals with comprehensive explanations of concepts.Purchase of the book unlocks access to web-based tools like practice questions, flashcards, and more to take your CISM prep to the next level.Purchase of the print or Kindle book includes a free eBook in PDF format.Key FeaturesUse this comprehensive resource to prepare for ISACA's CISM certificationUnlock free online tools including interactive practice questions, exam tips, and flashcards to effectively prepare for the CISM examUnderstand the theory behind information security program development and managementBook DescriptionCISM is a globally recognized and much sought-after certification in the field of IT security. This second edition of the Certified Information Security Manager Exam Prep Guide is up to date with complete coverage of the exam content through comprehensive and exam-oriented explanations of core concepts. Written in a clear, succinct manner, this book covers all four domains of the CISM Review Manual.With this book, you'll unlock access to a powerful exam-prep platform which includes interactive practice questions, exam tips, and flashcards. The platform perfectly complements the book and even lets you bring your questions directly to the author.This mixed learning approach of exploring key concepts through the book and applying them to answer practice questions online is designed to help build your confidence in acing the CISM certification.By the end of this book, you'll have everything you need to succeed in your information security career and pass the CISM certification exam with this handy, on-the-job desktop reference guide.What you will learnUnderstand core exam objectives to prepare for the CISM exam with confidenceGet to grips with detailed procedural guidelines for effective information security incident managementExecute information security governance in an efficient mannerStrengthen your preparation for the CISM exam using interactive flashcards and practice questionsConceptualize complex topics through diagrams and examplesFind out how to integrate governance, risk management, and compliance functionsWho this book is forIf you're an IT professional, IT security officer, or risk management executive looking to upgrade your career by passing the CISM exam, this book is for you. Basic familiarity with information security concepts is required to make the most of this book.

Certified Kubernetes Administrator (CKA) Exam Guide: Validate your knowledge of Kubernetes and implement it in a real-life production environment

by Brendan Burns Melony Qin Mark Whitby Alessandro Vozza

Develop a deep understanding of Kubernetes and the cloud native ecosystem, and pass the CKA exam with confidence with this end-to-end study guideKey FeaturesGet to grips with the core concepts of Kubernetes API primitivesDeploy, configure, manage, and troubleshoot Kubernetes clustersCement your credibility in the job market by becoming a Certified Kubernetes AdministratorBook DescriptionKubernetes is the most popular container orchestration tool in the industry. The Kubernetes Administrator certification will help you establish your credibility and enable you to efficiently support the business growth of individual organizations with the help of this open source platform. The book begins by introducing you to Kubernetes architecture and the core concepts of Kubernetes. You'll then get to grips with the main Kubernetes API primitives, before diving into cluster installation, configuration, and management. Moving ahead, you'll explore different approaches while maintaining the Kubernetes cluster, perform upgrades for the Kubernetes cluster, as well as backup and restore etcd. As you advance, you'll deploy and manage workloads on Kubernetes and work with storage for Kubernetes stateful workloads with the help of practical scenarios. You'll also delve into managing the security of Kubernetes applications and understand how different components in Kubernetes communicate with each other and with other applications. The concluding chapters will show you how to troubleshoot cluster- and application-level logging and monitoring, cluster components, and applications in Kubernetes. By the end of this Kubernetes book, you'll be fully prepared to pass the CKA exam and gain practical knowledge that can be applied in your day-to-day work.What you will learnUnderstand the fundamentals of Kubernetes and its toolsGet hands-on experience in installing and configuring Kubernetes clustersManage Kubernetes clusters and deployed workloads with easeGet up and running with Kubernetes networking and storageManage the security of applications deployed on KubernetesFind out how to monitor, log, and troubleshoot Kubernetes clusters and apps among othersWho this book is forThis book is for application developers, DevOps engineers, data engineers, and cloud architects who want to pass the CKA exam and certify their Kubernetes Administrator skills in the market. Basic knowledge of Kubernetes is recommended to get the most out of this book.

Certified Kubernetes Administrator (CKA) Study Guide: In-Depth Guidance and Practice

by Benjamin Muschko

The ability to administer and monitor a Kubernetes cluster is in high demand today. To meet this need, the Cloud Native Computing Foundation developed a certification exam to establish an administrator's credibility and value in the job market to confidently work in a Kubernetes environment.The Certified Kubernetes Administrator (CKA) certification exam is different from the typical multiple-choice format of other professional certifications. Instead, the CKA is a performance-based exam that requires deep knowledge of the tasks under immense time pressure.This study guide walks you through all the topics covered to fully prepare you for the exam. Author Benjamin Muschko also shares his personal experience with preparing for all aspects of the exam.Learn when and how to apply Kubernetes concepts to administer and troubleshoot a production-grade clusterUnderstand the objectives, abilities, and tips and tricks needed to pass the CKA examExplore the ins and outs of the kubectl command-line toolDemonstrate competency to perform the responsibilities of a Kubernetes administratorSolve real-world Kubernetes problems in a hands-on command-line environmentEffectively navigate and solve questions during the CKA exam

Certified Kubernetes Application Developer (CKAD) Study Guide: In-Depth Guidance and Practice

by Benjamin Muschko

Developers with the ability to operate, troubleshoot, and monitor applications in Kubernetes are in high demand today. To meet this need, the Cloud Native Computing Foundation created a certification exam to establish a developer's credibility and value in the job market for work in a Kubernetes environment.The Certified Kubernetes Application Developer (CKAD) exam format is different from the typical multiple-choice format of other certifications. Instead, the CKAD is performance-based and requires deep knowledge under immense time pressure.Updated to reflect revisions to the official curriculum made in September 2022, this revised study guide takes you through all the topics you need to fully prepare for the exam. Author Benjamin Muschko also shares his personal experience and tips.Learn when and how to apply Kubernetes's concepts to manage an applicationUnderstand the objectives, abilities, tips, and tricks needed to pass the CKAD examExplore the ins and outs of the kubectl command-line toolSolve real-world Kubernetes problems in a hands-on command-line environmentNavigate and solve questions during the CKAD examNew topics include: Deployment strategies, the Helm package manager, resources that extend Kubernetes (CRD), building container images, and more

Certified Kubernetes Application Developer (CKAD) Study Guide: In-depth Guidance And Practice

by Benjamin Muschko

Developers with the ability to operate, troubleshoot, and monitor applications in Kubernetes are in high demand today. To meet this need, the Cloud Native Computing Foundation created a certification exam to establish a developer's credibility and value in the job market to work in a Kubernetes environment.The Certified Kubernetes Application Developer (CKAD) exam is different from the typical multiple-choice format of other certifications. Instead, the CKAD is a performance-based exam that requires deep knowledge of the tasks under immense time pressure.This study guide walks you through all the topics you need to fully prepare for the exam. Author Benjamin Muschko also shares his personal experience with preparing for all aspects of the exam.Learn when and how to apply Kubernetes concepts to manage an applicationUnderstand the objectives, abilities, tips, and tricks needed to pass the CKAD examExplore the ins and outs of the kubectl command-line toolDemonstrate competency for performing the responsibilities of a Kubernetes application developerSolve real-world Kubernetes problems in a hands-on command-line environmentNavigate and solve questions during the CKAD exam

Refine Search

Showing 10,351 through 10,375 of 61,611 results