Browse Results

Showing 17,226 through 17,250 of 61,857 results

Detection of Intrusions and Malware, and Vulnerability Assessment: 13th International Conference, DIMVA 2016, San Sebastián, Spain, July 7-8, 2016, Proceedings (Lecture Notes in Computer Science #9721)

by Juan Caballero, Urko Zurutuza and Ricardo J. Rodríguez

This book constitutes the refereed proceedings of the 13th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2016, held in San Sebastián, Spain, in July 2016. The 19 revised full papers and 2 extended abstracts presented were carefully reviewed and selected from 66 submissions. They present the state of the art in intrusion detection, malware analysis, and vulnerability assessment, dealing with novel ideas, techniques, and applications in important areas of computer security including vulnerability detection, attack prevention, web security, malware detection and classification, authentication, data leakage prevention, and countering evasive techniques such as obfuscation.

Detection of Intrusions and Malware, and Vulnerability Assessment: 15th International Conference, DIMVA 2018, Saclay, France, June 28–29, 2018, Proceedings (Lecture Notes in Computer Science #10885)

by Gregory Blanc Cristiano Giuffrida Sébastien Bardin

This book constitutes the refereed proceedings of the 15th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2018, held in Saclay, France, in June 2018. The 17 revised full papers and 1 short paper included in this book were carefully reviewed and selected from 59 submissions. They present topics such as malware analysis; mobile and embedded security; attacks; detection and containment; web and browser security; and reverse engineering.

Detection of Intrusions and Malware, and Vulnerability Assessment: 16th International Conference, DIMVA 2019, Gothenburg, Sweden, June 19–20, 2019, Proceedings (Lecture Notes in Computer Science #11543)

by Magnus Almgren Roberto Perdisci Clémentine Maurice Giorgio Giacinto

This book constitutes the proceedings of the 16th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2019, held in Gothenburg, Sweden, in June 2019.The 23 full papers presented in this volume were carefully reviewed and selected from 80 submissions. The contributions were organized in topical sections named: wild wild web; cyber-physical systems; malware; software security and binary analysis; network security; and attack mitigation.

Detection of Intrusions and Malware, and Vulnerability Assessment: 17th International Conference, DIMVA 2020, Lisbon, Portugal, June 24–26, 2020, Proceedings (Lecture Notes in Computer Science #12223)

by Clémentine Maurice Nuno Neves Leyla Bilge Gianluca Stringhini

This book constitutes the proceedings of the 17th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2020, held in Lisbon, Portugal, in June 2020.* The 13 full papers presented in this volume were carefully reviewed and selected from 45 submissions. The contributions were organized in topical sections named: vulnerability discovery and analysis; attacks; web security; and detection and containment. ​*The conference was held virtually due to the COVID-19 pandemic.

Detection of Intrusions and Malware, and Vulnerability Assessment: 18th International Conference, DIMVA 2021, Virtual Event, July 14–16, 2021, Proceedings (Lecture Notes in Computer Science #12756)

by Nuno Neves Leyla Bilge Lorenzo Cavallaro Giancarlo Pellegrino

This book constitutes the proceedings of the 18th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2021, held virtually in July 2021.The 18 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 65 submissions. DIMVA serves as a premier forum for advancing the state of the art in intrusion detection, malware detection, and vulnerability assessment. Each year, DIMVA brings together international experts from academia, industry, and government to present and discuss novel research in these areas.Chapter “SPECULARIZER: Detecting Speculative Execution Attacks via Performance Tracing” is available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Detection of Intrusions and Malware, and Vulnerability Assessment: 19th International Conference, DIMVA 2022, Cagliari, Italy, June 29 –July 1, 2022, Proceedings (Lecture Notes in Computer Science #13358)

by Giorgio Giacinto Lorenzo Cavallaro Giancarlo Pellegrino Daniel Gruss

This book constitutes the proceedings of the 19th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2022, held in Cagliari, Italy, in June – July 2021. The 10 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 39 submissions.

Detection of Intrusions and Malware, and Vulnerability Assessment: 20th International Conference, DIMVA 2023, Hamburg, Germany, July 12–14, 2023, Proceedings (Lecture Notes in Computer Science #13959)

by Federico Maggi Daniel Gruss Mathias Fischer Michele Carminati

This book constitutes the proceedings of the 20th International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2023, held in Hamburg, Germany, in July 2023. The 12 full papers and 1 short paper presented in this volume were carefully reviewed and selected from 43 submissions. The papers are organized in thematical sections named: Side Channels Attacks; Security and Machine Learning; Cyber Physical System Security; Security Issues when Dealing with Users; Analysis of Vulnerable Code; Flow Integrity and Security.

Detection of Intrusions and Malware, and Vulnerability Assessment: 21st International Conference, DIMVA 2024, Lausanne, Switzerland, July 17–19, 2024, Proceedings (Lecture Notes in Computer Science #14828)

by Federico Maggi Mathias Payer Michele Carminati Manuel Egele

This book constitutes the proceedings of the 21st International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2024, held in Lausanne, Switzerland, during July 17–19, 2024. The 22 full papers and 6 short paper presented in this volume were carefully reviewed and selected from 110 submissions. The papers are organized in thematical sections named: vulnerability detection and defense; malware and threats; mobile and web application security; AI for security; hardware and firmware security; cyber physical systems and IoT.

Detection of Intrusions and Malware, and Vulnerability Assessment: 22nd International Conference, DIMVA 2025, Graz, Austria, July 9–11, 2025, Proceedings, Part I (Lecture Notes in Computer Science #15747)

by Daniel Gruss Michele Carminati Manuel Egele Veelasha Moonsamy

The two-volume set LNCS 15747 and 15748 constitutes the refereed conference proceedings of the 12nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2025, held in Graz, Austria, during July 9–11, 2025. The 25 revised full papers and 11 posters are presented in these proceedings were carefully reviewed and selected from 103 submissions. The papers are organized in the following topical sections: Part I: Web Security; Vulnerability Detection; Side channels; and Obfuscation. Part II: AI/ML & Security; Android & Patches; OS & Network; and Resilient Systems.

Detection of Intrusions and Malware, and Vulnerability Assessment: 22nd International Conference, DIMVA 2025, Graz, Austria, July 9–11, 2025, Proceedings, Part II (Lecture Notes in Computer Science #15748)

by Daniel Gruss Michele Carminati Manuel Egele Veelasha Moonsamy

The two-volume set LNCS 15747 and 15748 constitutes the refereed conference proceedings of the 12nd International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, DIMVA 2025, held in Graz, Austria, during July 9–11, 2025. The 25 revised full papers and 11 posters are presented in these proceedings were carefully reviewed and selected from 103 submissions. The papers are organized in the following topical sections: Part I: Web Security; Vulnerability Detection; Side channels; and Obfuscation. Part II: AI/ML & Security; Android & Patches; OS & Network; and Resilient Systems.

Detection of Karst Voids at Deep Pile Foundation

by Zhenming Shi Ming Peng Liu Liu Shaojun Li Fengjuan Tao

Karst voids at pile locations can have a significant negative impact on the bearing capacity and overall safety of cast-in-place pile foundations. This book introduces a state-of-the-art detection system, comprising of specialized equipment, algorithms, and software, designed to identify karst voids during deep cast-in-place pile foundation construction. The system includes a unique multifrequency borehole sonic probe, a single borehole radar, two pile hole sonar probes, and a corresponding signal analysis method. Several field and synthetic tests have been conducted to detect karst voids during cast-in-place pile foundation construction, and the results demonstrate that this technology can offer detailed geological information for pile design and ensure the safety of foundation construction. The work presented in this book has received the First Prize for Technological Invention in Shanghai, China in 2022.

Determining Project Requirements: Mastering the BABOK and the CBAP Exam (Esi International Project Management Ser.)

by Hans Jonasson

Good requirements do not come from a tool, or from a customer interview. They come from a repeatable set of processes that take a project from the early idea stage through to the creation of an agreed-upon project and product scope between the customer and the developer.From enterprise analysis and planning requirements gathering to documentation,

Deterministic Extraction from Weak Random Sources

by Ariel Gabizon

A deterministic extractor is a function that extracts almost perfect random bits from a weak random source. In this research monograph the author constructs deterministic extractors for several types of sources. A basic theme in this work is a methodology of recycling randomness which enables increasing the output length of deterministic extractors to near optimal length. The author's main work examines deterministic extractors for bit-fixing sources, deterministic extractors for affine sources and polynomial sources over large fields, and increasing the output length of zero-error dispersers. This work will be of interest to researchers and graduate students in combinatorics and theoretical computer science.

Deterministic Network Calculus: From Theory to Practical Implementation

by Anne Bouillard Marc Boyer Euriell Le Corronc

Deterministic network calculus is a theory based on the (min,plus) algebra. Its aim is to compute worst-case performance bounds in communication networks. Our goal is to provide a comprehensive view of this theory and its recent advances, from its theoretical foundations to its implementations. The book is divided into three parts. The first part focuses on the (min,plus) framework and its algorithmic aspects. The second part defines the network calculus model and analyzes one server in isolation. Different service and scheduling policies are discussed, particularly when data is packetized. The third part is about network analyses. Pay burst only once and pay multiplexing only once phenomena are exhibited, and different analyses are proposed and compared. This includes the linear programming approaches that compute tight performance bounds. Finally, some partial results on the stability are detailed.

Deterministic and Stochastic Optimal Control and Inverse Problems

by Baasansuren Jadamba

Inverse problems of identifying parameters and initial/boundary conditions in deterministic and stochastic partial differential equations constitute a vibrant and emerging research area that has found numerous applications. A related problem of paramount importance is the optimal control problem for stochastic differential equations. This edited volume comprises invited contributions from world-renowned researchers in the subject of control and inverse problems. There are several contributions on optimal control and inverse problems covering different aspects of the theory, numerical methods, and applications. Besides a unified presentation of the most recent and relevant developments, this volume also presents some survey articles to make the material self-contained. To maintain the highest level of scientific quality, all manuscripts have been thoroughly reviewed.

Deterministic, Stochastic, and Deep Learning Methods for Computational Electromagnetics

by Wei Cai

This book provides a well-balanced and comprehensive picture based on clear physics, solid mathematical formulation, and state-of-the-art useful numerical methods in deterministic, stochastic, deep neural network machine learning approaches for computer simulations of electromagnetic and transport processes in biology, microwave and optical wave devices, and nano-electronics. Computational research has become strongly influenced by interactions from many different areas including biology, physics, chemistry, engineering, etc. A multifaceted approach addressing the interconnection among mathematical algorithms and physical foundation and application is much needed to prepare graduate students and researchers in applied mathematics and sciences and engineering for innovative advanced computational research in many applications areas, such as biomolecular solvation in solvents, radar wave scattering, the interaction of lights with plasmonic materials, plasma physics, quantum dots, electronic structure, current flows in nano-electronics, and microchip designs, etc.

Deterring Cyber Warfare: Bolstering Strategic Stability in Cyberspace

by Brian M. Mazanec Bradley A. Thayer

While the deterrence of cyber attacks is one of the most important issues facing the United States and other nations, the application of deterrence theory to the cyber realm is problematic. This study introduces cyber warfare and reviews the challenges associated with deterring cyber attacks, offering key recommendations to aid the deterrence of major cyber attacks.

Detonado não-oficial de Super Smash Bros Wii U, Dicas, Truques, e Segredos do Jogo

by Michel Pinheiro Joshua Abbott

*Guia Não-Oficial* Guia de Estratégias e Dicas Avançadas. Este é o mais abrangente e o único guia detalhado que você vai encontrar online. Disponível para download instantâneo em seu celular, dispositivo de eBook ou em papel.

Deus Ex: Icarus Effect

by James Swallow

IT'S NOT THE END OF THE WORLD. BUT YOU CAN SEE IT FROM HERE. In the near future, with physical augmentation gaining ground and nano-cybernetics only years away, the dawn of limitless human evolution is just beyond the horizon, and a secret corporate cabal of ruthless men intends to make sure that humankind stays under its control. But two people on opposite sides of the world are starting to ask questions that could get them killed. Secret Service agent Anna Kelso has been suspended for investigating the shooting that claimed her partner's life. Anna suspects that the head of a bio-augmentation firm was the real target, and against orders she's turned up a few leads concerning a covert paramilitary force and a cadre of underground hackers. But the cover-up runs deep, and now there's a target on her back. Meanwhile, Ben Saxon, former SAS officer turned mercenary, joins a shadowy special ops outfit. They say they're a force for good, but Saxon quickly learns that the truth is not so clear-cut. So begins a dangerous quest to uncover a deadly secret that will take him from Moscow to London, D. C. to Geneva, and to the dark truth--if he lives that long. The year is 2027; in a world consumed by chaos and conspiracy, two people are set on a collision course with the most powerful and dangerous organization in history--and the fate of humanity hangs in the balance.

DevOps Adoption Strategies: Embracing DevOps through effective culture, people, and processes

by Martyn Coupland

Gain in-depth insight into DevOps relative to your field of expertise and implement effective DevOps culture and processes within your organizationKey FeaturesPacked with step-by-step explanations and practical examples to help you get started with DevOpsDevelop the skills and knowledge you need to tackle the deployment of DevOps toolsDiscover technology trends such as FinOps and DevSecOps to get more value from DevOpsBook DescriptionDevOps is a set of best practices enabling operations and development teams to work together to produce higher-quality work and, among other things, quicker releases. This book helps you to understand the fundamentals needed to get started with DevOps, and prepares you to start deploying technical tools confidently. You will start by learning the key steps for implementing successful DevOps transformations. The book will help you to understand how aspects of culture, people, and process are all connected, and that without any one of these elements DevOps is unlikely to be successful. As you make progress, you will discover how to measure and quantify the success of DevOps in your organization, along with exploring the pros and cons of the main tooling involved in DevOps. In the concluding chapters, you will learn about the latest trends in DevOps and find out how the tooling changes when you work with these specialties. By the end of this DevOps book, you will have gained a clear understanding of the connection between culture, people, and processes within DevOps, and learned why all three are critically important.What you will learnUnderstand the importance of culture in DevOpsBuild, foster, and develop a successful DevOps cultureDiscover how to implement a successful DevOps frameworkMeasure and define the success of DevOps transformationGet to grips with techniques for continuous feedback and iterate process changesDiscover the tooling used in different stages of the DevOps life cycleWho this book is forThis book is for IT professionals such as support engineers and systems engineers and developers looking to learn DevOps and for those going through DevOps transformation. General knowledge of IT and business processes will be helpful. You'll also find this book useful if you are in a business or service role within technology such as service delivery management. Basic familiarity with DevOps and transformational methods such as value streams and process are needed to get the most out of this book.

DevOps Automation Cookbook

by Michael Duffy

Over 120 recipes covering key automation techniques through code management and virtualization offered by modern Infrastructure as a Service About This Book * Use some of the powerful tools that have emerged to enable systems administrators and developers to take control and automate the management, monitoring, and creation of complex infrastructures * Covers some of the most exciting technologies available to DevOps engineers, and demonstrates multiple techniques for using them * A hands-on guide filled with clear examples and multiple methodologies to demonstrate the various DevOps tools available Who This Book Is For If you are a systems administrator or developer who is keen to employ DevOps techniques to help with the day-to-day complications of managing complex infrastructures, then this book is for you. No prior knowledge of DevOps tools is required. What You Will Learn * Manage, use, and work with code in the Git version management system * Manage the life cycle of hosts, from creation to on-going management, using Puppet Razor * Create hosts automatically using a simple combination of TFTP, DHCP, and pre-seeds * Implement virtual hosts using the ubiquitous VMware ESXi hypervisor * Control configuration using the powerful and popular Ansible configuration management system * Develop powerful, consistent, and portable containers using Docker * Track trends, discover data, and monitor key systems using InfluxDB, syslog, and Sensu * Deal efficiently with powerful cloud infrastructures using the Amazon AWS Infrastructure as a Service and the Heroku Platform as a Service In Detail There has been a recent explosion in tools that allow you to redefine the delivery of infrastructure and applications, using a combination of automation and testing to deliver continuous deployment. DevOps has garnered interest from every quarter, and is rapidly being recognized as a radical shift, as large as the Agile movement for the delivery of software. This book takes a collection of some of the coolest software available today and shows you how to use it to create impressive changes to the way you deliver applications and software. It tackles the plethora of tools that are now available to enable organizations to take advantage of the automation, monitoring, and configuration management techniques that define a DevOps-driven infrastructure. Starting off with the fundamental command-line tools that every DevOps enthusiast must know, this book will guide you through the implementation of the Ansible tool to help you facilitate automation and perform diverse tasks. You will explore how to build hosts automatically with the creation of Apt mirrors and interactive pre-seeds, which are of the utmost importance for Ubuntu automation. You will also delve into the concept of virtualization and creating and manipulating guests with ESXi. Following this, you will venture into the application of Docker; learn how to install, run, network, and restore Docker containers; and also learn how to build containers in Jenkins and deploy apps using a combination of Ansible, Docker, and Jenkins. You will also discover how to filter data with Grafana and the usage of InfluxDB along with unconventional log management. Finally, you will get acquainted with cloud infrastructure, employing the Heroku and Amazon AWS platforms. By tackling real-world issues, this book will guide you through a huge variety of tools, giving new users the ability to get up and running and offering advanced users some interesting recipes that may help with existing issues. Style and approach This book has an easy-to-follow approach to both introducing the wide range of available DevOps tools and working with them. Each recipe is lavishly sprinkled with example code and uses clear instructions to easily allow you to see how you can both implement the solutions, and more importantly, tailor them to your unique needs.

DevOps Bootcamp

by Mitesh Soni

Sharpen your DevOps knowledge with DevOps Bootcamp About This Book • Improve your organization's performance to ensure smooth production of software and services. • Learn how Continuous Integration and Continuous Delivery practices can be utilized to cultivate the DevOps culture. • A fast-paced guide filled with illustrations and best practices to help you consistently ship quality software. Who This Book Is For The book is aimed at IT Developers and Operations—administrators who want to quickly learn and implement the DevOps culture in their organization. What You Will Learn • Static Code Analysis using SOnarqube • Configure a Maven-based JEE Web Application • Perform Continuous Integration using Jenkins and VSTS • Install and configure Docker • Converge a Chef node using a Chef workstation • Accomplish Continuous Delivery in Microsoft Azure VM and Microsoft Azure App Services (Azure Web Apps) using Jenkins • Perform Load Testing using Apache JMeter • Build and Release Automation using Visual Studio Team Services • Monitor Cloud-based resources In Detail DevOps Bootcamp delivers practical learning modules in manageable chunks. Each chunk is delivered in a day, and each day is a productive one. Each day builds your competency in DevOps. You will be able to take the task you learn every day and apply it to cultivate the DevOps culture. Each chapter presents core concepts and key takeaways about a topic in DevOps and provides a series of hands-on exercises. You will not only learn the importance of basic concepts or practices of DevOps but also how to use different tools to automate application lifecycle management. We will start off by building the foundation of the DevOps concepts. On day two, we will perform Continuous Integration using Jenkins and VSTS both by configuring Maven-based JEE Web Application?. We will also integrate Jenkins and Sonar qube for Static Code Analysis. Further, on day three, we will focus on Docker containers where we will install and configure Docker and also create a Tomcat Container to deploy our Java based web application. On day four, we will create and configure the environment for application deployment in AWS and Microsoft Azure Cloud for which we will use Infrastructure as a Service and Open Source Configuration Management tool Chef. For day five, our focus would be on Continuous Delivery. We will automate application deployment in Docker container using Jenkins Plugin, AWS EC2 using Script, AWS Elastic Beanstalk using Jenkins Plugin, Microsoft Azure VM using script, and Microsoft Azure App Services Using Jenkins. We will also configure Continuous Delivery using VSTS. We will then learn the concept of Automated Testing on day six using Apache JMeter and URL-based tests in VSTS. Further, on day seven, we will explore various ways to automate application lifecycle management using orchestration. We will see how Pipeline can be created in Jenkins and VSTS, so the moment Continuous? Integration is completed successfully, Continuous Delivery will start and application will be deployed. On the final day, our focus would be on Security access to Jenkins and Monitoring of CI resources, and cloud-based resources in AWS and Microsoft Azure Platform as a Service. Style and Approach This book is all about fast and intensive learning. This means we don't waste time in helping readers get started. The new content is basically about filling in with highly-effective examples to build new things, solving problems in newer and unseen ways, and solving real-world examples.

DevOps Culture and Practice with OpenShift: Deliver continuous business value through people, processes, and technology

by Mike Hepburn Noel O'Connor Tim Beattie Donal Spring

A practical guide to making the best use of the OpenShift container platform based on the real-life experiences, practices, and culture within Red Hat Open Innovation LabsKey FeaturesLearn how modern software companies deliver business outcomes that matter by focusing on DevOps culture and practicesAdapt Open Innovation Labs culture and foundational practices from the Open Practice LibraryImplement a metrics-driven approach to application, platform, and product, understanding what to measure and how to learn and pivotBook DescriptionDevOps Culture and Practice with OpenShift features many different real-world practices - some people-related, some process-related, some technology-related - to facilitate successful DevOps, and in turn OpenShift, adoption within your organization. It introduces many DevOps concepts and tools to connect culture and practice through a continuous loop of discovery, pivots, and delivery underpinned by a foundation of collaboration and software engineering.Containers and container-centric application lifecycle management are now an industry standard, and OpenShift has a leading position in a flourishing market of enterprise Kubernetes-based product offerings. DevOps Culture and Practice with OpenShift provides a roadmap for building empowered product teams within your organization.This guide brings together lean, agile, design thinking, DevOps, culture, facilitation, and hands-on technical enablement all in one book. Through a combination of real-world stories, a practical case study, facilitation guides, and technical implementation details, DevOps Culture and Practice with OpenShift provides tools and techniques to build a DevOps culture within your organization on Red Hat's OpenShift Container Platform.What you will learnImplement successful DevOps practices and in turn OpenShift within your organizationDeal with segregation of duties in a continuous delivery worldUnderstand automation and its significance through an application-centric viewManage continuous deployment strategies, such as A/B, rolling, canary, and blue-greenLeverage OpenShift's Jenkins capability to execute continuous integration pipelinesManage and separate configuration from static runtime softwareMaster communication and collaboration enabling delivery of superior software products at scale through continuous discovery and continuous deliveryWho this book is forThis book is for anyone with an interest in DevOps practices with OpenShift or other Kubernetes platforms.This DevOps book gives software architects, developers, and infra-ops engineers a practical understanding of OpenShift, how to use it efficiently for the effective deployment of application architectures, and how to collaborate with users and stakeholders to deliver business-impacting outcomes.

DevOps For Dummies

by Emily Freeman

Develop faster with DevOps DevOps embraces a culture of unifying the creation and distribution of technology in a way that allows for faster release cycles and more resource-efficient product updating. DevOps For Dummies provides a guidebook for those on the development or operations side in need of a primer on this way of working. Inside, DevOps evangelist Emily Freeman provides a roadmap for adopting the management and technology tools, as well as the culture changes, needed to dive head-first into DevOps. Identify your organization’s needs Create a DevOps framework Change your organizational structure Manage projects in the DevOps world DevOps For Dummies is essential reading for developers and operations professionals in the early stages of DevOps adoption.

DevOps Paradox: The truth about DevOps by the people on the front line

by Viktor Farcic

Discover DevOps secrets from leading experts. Viktor Farcic interviews DevOps industries voices including Mike Kail, Greg Bledsoe, Jeff Sussna, James Turnbull, Kohsuke Kawaguchi, Liz Keogh, and more. Key Features Leading DevOps experts share their insights into modern DevOps practice Engage with the real-world challenges of putting DevOps to work Strengthen your DevOps practices now and prepare for future DevOps trends Book Description DevOps promises to break down silos, uniting organizations to deliver high quality output in a cross-functional way. In reality it often results in confusion and new silos: pockets of DevOps practitioners fight the status quo, senior decision-makers demand DevOps paint jobs without committing to true change. Even a clear definition of what DevOps is remains elusive. In DevOps Paradox, top DevOps consultants, industry leaders, and founders reveal their own approaches to all aspects of DevOps implementation and operation. Surround yourself with expert DevOps advisors. Viktor Farcic draws on experts from across the industry to discuss how to introduce DevOps to chaotic organizations, align incentives between teams, and make use of the latest tools and techniques. With each expert offering their own opinions on what DevOps is and how to make it work, you will be able to form your own informed view of the importance and value of DevOps as we enter a new decade. If you want to see how real DevOps experts address the challenges and resolve the paradoxes, this book is for you. What you will learn Expert opinions on: Introducing DevOps into real-world, chaotic business environments Deciding between adopting cutting edge tools or sticking with tried-and-tested methods Initiating necessary business change without positional power Managing and overcoming fear of change in DevOps implementations Anticipating future trends in DevOps and how to prepare for them Getting the most from Kubernetes, Docker, Puppet, Chef, and Ansible Creating the right incentives for DevOps success across an organization The impact of new techniques, such as Lambda, serverless, and schedulers, on DevOps practice Who this book is for Anybody interested in DevOps will gain a lot from this book. If you want to get beyond the simplistic ideals and engage with the deep challenges of putting DevOps to work in the real world, this book is for you.

Refine Search

Showing 17,226 through 17,250 of 61,857 results