Bookshelf
Data Analysis and Classification
-
How to prepare for the OCI Architect Associate certification
Author of 'Oracle Cloud Infrastructure Architect Associate All-in-One Exam Guide' Roopesh Ramklass shares his expert advice on OCI concepts and certification in this Q&A. Continue Reading
-
How to implement asynchronous replication in Apache Pulsar
David Kjerrumgaard explains how asynchronous replication works in Apache Pulsar for those still learning to use this platform as part of their data backup strategy. Continue Reading
-
Apache Pulsar vs. Kafka and other data processing technologies
David Kjerrumgaard looks at how the distributed messaging platform Apache Pulsar handles storage compared to Apache Kafka and other data processing technologies. Continue Reading
-
How improving your math skills can help in programming
Paul Orland explores how enhancing one's programming skills can be done through studying up on mathematics and better understanding how the two remain linked. Continue Reading
-
Why customer-centric design is crucial for CX
In her book, '100 Things Every Designer Needs to Know About People,' Susan Weinschenk talks about why it is important for companies to know their audience to better design for them. Continue Reading
-
Practice Certified Ethical Hacker exam questions
Preparing for your Certified Ethical Hacker certification? Assess your knowledge of topics on the CEH exam with these practice test questions. Continue Reading
-
Ethical hacker career path advice: Getting started
Matt Walker, author of a Certified Ethical Hacker exam guide and practice exam book, offers advice to career hopefuls on the profession, CEH certification and more. Continue Reading
-
Quiz on MongoDB 4 new features and database updates
Check out this excerpt from the new book Learn MongoDB 4.x from Packt Publishing, then quiz yourself on new updates and features to the database. Continue Reading
-
Learn how to start using Docker on Windows Server 2019
Getting started with Windows containers requires an understanding of basic concepts and how to work with Docker Engine. Orin Thomas' book covers the topics admins need to know. Continue Reading
-
How to pass the AWS Certified Security - Specialty exam
Author of 'AWS Certified Security - Specialty Exam Guide' Stuart Scott shares insights on how to prepare for the exam and reap the professional benefits of certification. Continue Reading
-
Practice AWS Certified Security - Specialty exam questions
Explore the security and compliance capabilities of the AWS Config service to prepare for the wide-ranging AWS Certified Security - Specialty certification exam. Continue Reading
-
How does bureaucracy affect business? It's complicated
In his new book, 'The (Delicate) Art of Bureaucracy,' Mark Schwartz, enterprise strategist at AWS and former government bureaucrat, reveals how IT leaders can use bureaucracy to their advantage. Continue Reading
-
A look inside the official Cisco DEVASC 200-901 guidebook
In this book excerpt, readers can explore the Cisco DEVASC 200-901 official guide and get a flavor of one of Cisco's newest exams and its blend of networking and software topics. Continue Reading
-
Is Cisco DevNet worth it? Experts say yes, it's the future
Any IT professional who's heard the hype for Cisco's newest certification track may wonder, 'Is Cisco DevNet worth it?' Some experts say it's the future. Find out more in this Q&A. Continue Reading
-
7 practice questions for Cisco 200-901 DevNet Associate exam
Ready for Cisco's introductory DevNet exam, DEVASC 200-901? Start your Cisco DevNet Associate training with this practice quiz directly from the official exam guidebook. Continue Reading
-
Why understanding data structures is so important to coders
Jay Wengrow talks about how his new book on data structures and algorithms and considerations for making your choices as efficient as possible. Continue Reading
-
How to use Slack and Fluentd to demonstrate social output
Phil Wilkins provides step-by-step instructions on how DevOps teams can enable Slack to capture log events from the open source data collection tool Fluentd. Continue Reading
-
A basic design pattern for image recognition
Learn how a design pattern based on convolutional neural networks can be adapted to create a visual graphics generator model for image recognition. Continue Reading
-
Brain teasers and other fun tips for learning Python
Learn about some interesting ways Python coders can grow their skills in the language and the importance of connecting and learning from others in the community. Continue Reading
-
How listening to the voice of the customer benefits businesses
Karen Mangia's book, 'Listen Up! How to Tune In to Customers and Turn Down the Noise' talks about the importance of listening to the voice of the customer in the business world. Continue Reading
-
Get greater protection with IoT security advances in authentication
In this book excerpt, discover why and how authentication offers one of the most crucial security measures any engineer must plan in an IoT deployment. Continue Reading
-
The role of SD-WAN templates before and during deployment
SD-WAN deployments require knowledge of network design and trust in software to take over some network maintenance duties. This is where SD-WAN templates come into play. Continue Reading
-
Learn to onboard, provision devices in Cisco's SD-WAN book
Here's a look inside Cisco's SD-WAN book, which details design and deployment for network teams looking to deploy SD-WAN and insights for SD-WAN certification hopefuls. Continue Reading
-
6 practice questions for SD-WAN certification training
Before you start SD-WAN certification training, try this quiz from Cisco's official SD-WAN guidebook, which covers onboarding and provisioning devices, as well as SD-WAN templates. Continue Reading
-
Zero-trust network policies should reflect varied threats
Role-based access systems create enormous pools of responsibility for administrators. Explore how to eliminate these insecure pools of trust with zero-trust network policies. Continue Reading
-
Zero-trust methodology's popularity a double-edged sword
The authors of 'Zero Trust Networks' discuss how the zero-trust methodology's popularity produces both vendor hype and renewed attention to critical areas of security weakness. Continue Reading
-
How to implement Scrum the right way
Not sure where to start with Scrum? Check out a book that covers Scrum implementation from pre-development work through retrospectives, and details the frameworks to scale Scrum. Continue Reading
-
The Ghidra Book interview with co-author Kara Nance
Ghidra has had a huge impact on the reverse-engineering community. Kara Nance, co-author of The Ghidra Book, discusses this impact as the open source tool has evolved. Continue Reading
-
Book details API design best practices
APIs are designed for people you've never met to solve problems you didn't know existed. With that in mind, how do you design and build them well? Continue Reading
-
Synthetic data in healthcare advances patient analytics
Learn how synthetic data in healthcare can be beneficial across the board. Plus, get a sneak peek at a new book on synthetic data generation from O'Reilly Media. Continue Reading
-
Explore self-sovereign identity use cases and benefits
The future of digital identity may look a lot like how we identify ourselves in real life. Learn more about self-sovereign identity use cases and features in this excerpt. Continue Reading
-
How self-sovereign identity principles suit the modern world
There are several core self-sovereign identity principles to consider before the concept can benefit the enterprise. Learn about the implications of SSI advancements in this Q&A. Continue Reading
-
Integrating AI and blockchain technologies in the enterprise
In his new book, Ganesh Prasad Kumble explores the impact of AI on blockchain applications and the value the combination of the two technologies can bring to the enterprise. Continue Reading
-
An inside look at the CCSP cloud security cert
Get insights into the Certified Cloud Security Professional cert, cloud infrastructure and platform benefits and risks, and more from the author of a CCSP exam guide. Continue Reading
-
Telecommunications book highlights spectrum, fiber cabling
5G touts faster download speeds and new application types, but other major 5G changes will be in spectrum and fixed wireless. Learn more in this telecommunications book excerpt. Continue Reading
-
Multimedia data and 5G drive network transformation
Emerging networking trends and touted innovations always showcase faster speeds and new use cases. Yet, new challenges keep pace, too, such as security and privacy issues. Continue Reading
-
Explore the foundations of artificial neural network modeling
Dive into Giuseppe Bonaccorso's recent book 'Mastering Machine Learning Algorithms' with a chapter excerpt on modeling neural networks. Continue Reading
-
Securing Active Directory also involves good backup practices
The 'Active Directory Administration Cookbook' covers what admins can do in advance to bring the identity and access management platform back online after an attack. Continue Reading
-
CISSP practice exam questions and answers
Test your knowledge and preparedness for the CISSP exam with 16 questions taken directly from the latest 'CISSP All-in-One Exam Guide' from McGraw Hill. Continue Reading
-
'Secure by Design' principles include failures, exceptions
Using design principles with built-in security, along with properly defining exceptions, can help developers not only build safe code, but do so while meeting deadlines. Continue Reading
-
Exception handling best practices call for secure code design
Making software secure by design requires tremendous consideration about how failures are handled. Learn more from these exception handling examples. Continue Reading
-
Hands-on guide to S3 bucket penetration testing
Attention AWS pen testers: The trick to understanding the indicators of AWS S3 bucket vulnerabilities is setting up an insecure bucket. Learn how in this actionable guide. Continue Reading
-
How to handle Amazon S3 bucket pen testing complexity
Security researcher Benjamin Caudill shares details from his book, 'Hands-On AWS Penetration Testing with Kali Linux,' and advice on Amazon S3 bucket pen testing for ethical hackers. Continue Reading
-
Examine the future of AI for IoT to achieve business success
Taking advantage of emerging trends, such as AI and IoT, is key to business success. Start by exploring the direction these two technologies will take according to experts. Continue Reading
-
What IT pros can expect from 5G core network architecture
5G is the first 'G' in the cloud, which means its network architecture can enable functions, services and capabilities past cellular generations couldn't. Here's what to expect. Continue Reading
-
Follow Google's lead with programming style guides
Code style guides shield developers from dangerous programming approaches and confusion. Here's how Google cultivates style guides, and why you should too. Continue Reading
-
Python exploratory data analysis and why it's important
Exploratory data analysis is a key step to building the best models to gain insight from your data. Read on to see how Python can be a useful tool in this process. Continue Reading
-
Why structural change in an organization is key
In her book 'Dynamic Reteaming,' Heidi Helfand dives into the importance of reteaming and provides strategies organizations can use to ensure it's done effectively in the workplace. Continue Reading
-
If software architects' soft skills fail, so does the business
Mark Richards and Neal Ford, authors of 'Fundamentals of Software Architecture,' share real-life examples of why architects must communicate well, and explain how to do it. Continue Reading
-
Important resources in a data scientist education
There are plenty of resources for data science learning for people entering the field all the way up to managers. Read on for key resources and an excerpt from a new book on data science skills. Continue Reading
-
How cyber warfare laws limit risk on a digital battleground
Retired Navy cryptologist implores enterprises to build key cyber warfare laws into their infosec strategy to improve survivability on the digital battleground in his new book. Continue Reading
-
The future of cyber warfare requires infosec's attention
The future of cyber warfare places enterprise security and survivability in the crosshairs. Learn more about cyber warfare threats and capabilities and how infosec can prepare. Continue Reading
-
Evolution of WLAN technology improves data rates, security
WLAN technology has evolved dramatically -- most notably, in terms of network speeds and security. Innovations in Wi-Fi 6 show that the WLAN evolution isn't slowing, either. Continue Reading
-
Surprising insight on the data governance process
Many enterprise data governance processes have been around for a while. Read on for ways a modern approach can be beneficial, and preview a new book that can update your strategy. Continue Reading
-
Why network configuration templates are useful in automation
If a network team automates network configuration templates, it can save time and eliminate redundant activities in order to focus more on data collection and analysis. Continue Reading
-
An automation-first approach enables network predictability
For an organization to prioritize network automation, it needs an automation-first approach. This strategy involves understanding automation workflows and enabling proper training. Continue Reading
-
10 signs your D&I program is failing
In this excerpt from Unleashed: The Unapologetic Leader's Guide to Empowering Everyone Around You, co-authors Frances Frei and Anne Morriss discuss diversity and inclusion program issues. Continue Reading
-
Microsoft Teams meetings tutorial offers best practices
In this Microsoft Teams meetings tutorial, learn the features and functionalities of virtual meetings and live events, from customizing meeting requests to sharing content. Continue Reading
-
Why is innovative leadership essential in the workplace?
Mark McClain, co-founder and CEO of SailPoint, discusses how he became an innovative leader in business today and how it helped create a collaborative environment in the workplace. Continue Reading
-
VPC security best practices and how to implement them in AWS
To best secure network access, AWS administrators need to create rules for network resources. Learn how to implement Amazon VPC security best practices in this book excerpt. Continue Reading
-
Overcome AWS security vulnerabilities with VPCs, IAM
Securing network access in AWS requires the right rules to be in place. Learn more about Virtual Private Clouds and how implementing them can prevent common cloud security attacks. Continue Reading
-
SailPoint CEO drives leadership values in the workplace
Sometimes, it's not just about the technology. In his book, Mark McClain dives into the importance of generating a people-centered culture where values are core to organizational success. Continue Reading
-
What matters most in an Agile organizational structure
Forcing an Agile approach onto team members causes more problems than it solves. 'Doing Agile Right' distills real-world experience into advice -- including when to delay change. Continue Reading
-
Learn Kubernetes step by step with this interactive book
SearchITOperations spoke with author Zach Arnold about what IT pros can expect from The Kubernetes Workshop, an interactive book that progressively builds readers' knowledge of container orchestration. Continue Reading
-
Benefits of a data catalog and why you need one
Data catalogs help across enterprises, from breaking down data silos to ensuring data privacy. A new book from Technics Publications explains the benefits of data catalogs. Continue Reading
-
Use these CCSK practice questions to prep for the exam
Virtualization and container security are key topics in the Certificate of Cloud Security Knowledge credential. Test your knowledge with these CCSK practice questions. Continue Reading
-
CCSK cert guide author's insights into cloud security credential
The author of a Certificate of Cloud Security Knowledge exam guide offers insights into certifications, top considerations for those pursuing the CCSK and more. Continue Reading
-
Creating agile conversations in digital transformation initiatives
Douglas Squirrel and Jeffrey Fredrick, authors of the book 'Agile Conversations,' dive into the significance of improved conversations while undergoing digital transformations. Continue Reading
-
Building customer relationships is central to loyalty
Raghu Kalé's book, Loyalty and Sacrifice, discusses what it means for businesses to build relationships and create true customer loyalty -- going beyond repeat sales. Continue Reading
-
Edge computing book introduces edge laws and techniques
In this book excerpt, discover the three laws of edge computing, as well as how to use edge computing techniques to solve common IT problems within organizations. Continue Reading
-
The what, why and how of the Spring Security architecture
Like any framework, Spring Security requires writing less code to implement the desired functionality. Learn how to implement the Spring Security architecture in this book excerpt. Continue Reading
-
Why developers need to know the Spring Security framework
The Spring Security framework is a reliable way for Java developers to secure applications. However, proper implementation is critical to prevent the most common vulnerabilities. Continue Reading
-
Network automation book shares recipes for success
In this network automation book excerpt, discover how automation frameworks NAPALM and Ansible can provide network teams with vendor-agnostic network management capabilities. Continue Reading
-
Network pros need NAPALM, Ansible network automation skills
Network pros need network automation skills in NAPALM and Ansible because the two modules together can enhance multivendor environments and streamline network management tasks. Continue Reading
-
Dive into the quantum computing qubit with IBM's Bob Sutor
The quantum computing industry is entering a new era. IBM's Bob Sutor discusses the technology's importance and how his latest book can help readers better understand the qubit. Continue Reading
-
How IT can build an agile business partnership
Gene Kim, award-winning researcher, author and founder of IT Revolution, discusses why IT leaders need to involve their colleagues in the journey towards an agile business. Continue Reading
-
CISA exam preparation requires learning ethics, standards, new vocab
The CISA certification is proof of an auditor's knowledge and skills. However, the exam isn't easy and requires some heavy learning -- especially when it comes to vocabulary. Continue Reading
-
CISA practice questions to prep for the exam
Ready to take the Certified Information Systems Auditor exam? Use these CISA practice questions to test your knowledge of the audit process job practice domain. Continue Reading
-
Discover key OpenStack deployment methods for networks
In this book excerpt, explore best practices for OpenStack deployment methods, and glean expert advice on how to achieve an efficient OpenStack network deployment. Continue Reading
-
Business culture is key in OpenStack network requirements
Network teams should expect a shift in their day-to-day routines if their organization embraces OpenStack. However, if the business culture is flexible, changes will be positive. Continue Reading
-
Understand the role of infrastructure as code in DevOps
Infrastructure as code plays a prominent role in enterprise DevOps shops. Use this chapter excerpt to understand why -- and to learn the basics of some common IaC tools. Continue Reading
-
Security testing web applications and systems in the modern enterprise
Security testing web apps with little budget and poor documentation is difficult. Ric Messier discusses building a security testing lab in the DevSecOps, cloud and automation age. Continue Reading
-
Software security testing and software stress testing basics
In this excerpt from Ric Messier's book, learn why software security testing and stress testing are critical components of an enterprise infosec program. Continue Reading
-
Try 10 practice questions for the CCNP, CCIE ENCOR 350-401
This practice quiz for CCNP and CCIE ENCOR 350-401 explores what readers must know about IP routing essentials -- including BGP and OSPF -- from the new certification guidebook. Continue Reading
-
How Cisco certification changes alter CCNP and CCIE tracks
Here's what to expect from the colossal Cisco certification changes to the CCNP and CCIE tracks that aim to increase material relevance and benefit network engineers' daily lives. Continue Reading
-
Prepare for CCNP, CCIE ENCOR 350-401 with this guide preview
Here's an excerpt from the new 'CCNP and CCIE ENCOR 350-401 Official Cert Guide' that provides the key IP routing essentials network engineers require for their job roles. Continue Reading
-
Learn 5 defensive programming techniques from experts
How do you become a good programmer? Accept that you have bad programming habits. The authors of 'The Pragmatic Programmer' share tips for defensive code creation. Continue Reading
-
A look inside 'CCNA 200-301 Official Cert Guide, Volume 2'
Network security is a crucial skills area for network engineers, and the CCNA 200-301 reflects this. Here's a chapter excerpt on network security from the new guide. Continue Reading
-
Traditional, emerging topics unite in the new CCNA exam
As of Feb. 24, all eyes are on the CCNA 200-301 exam -- Cisco's latest update to the CCNA track. Here's a look at what's on the exam and how it compares to previous CCNA exams. Continue Reading
-
Cryptography basics: Symmetric key encryption algorithms
Scrambling plaintext into ciphertext is essential to ensure data cannot be read or used by the wrong people. Learn the basics of symmetric key encryption algorithms here. Continue Reading
-
'Computer Security Fundamentals:' Quantum security to certifications
New topics, from security engineering to quantum computing, are covered in 'Computer Security Fundamentals,' but the book's author suggests readers review some basic topics, too. Continue Reading
-
CISM practice questions to prep for the exam
Risk management is at the core of being a security manager. Practice your risk management knowledge with these CISM practice questions. Continue Reading
-
The who, what, why -- and challenges -- of CISM certification
Think you're ready for the CISM certification exam? Peter Gregory, author of CISM: Certified Information Security Manager Practice Exams, has some pointers for you. Continue Reading
-
Data breach risk factors, response model, reporting and more
Dig into five data breach risk factors, and learn how the DRAMA data breach response model can help enterprises counter breaches in a timely and efficient manner. Continue Reading
-
The ins and outs of cyber insurance coverage
Cyber insurance coverage can help companies successfully navigate the aftereffects of a data breach. However, choosing a policy in the first place can be confusing. Continue Reading
-
How to build a neural network from the ground floor
Deep learning is powering the development of AI. To build your own neural network, start by understanding the basics: how neural networks learn, correlate and stack with data. Continue Reading
-
AWS SysOps certification exam guide outlines admin responsibility
In this book excerpt from "AWS Certified SysOps Administrator Associate All-in-One Exam Guide," review the best practices for OS and application security on AWS. Continue Reading
-
Benefits of using Azure Security Center for security assessments
Author Yuri Diogenes discusses how Azure Security Center helps admins achieve full cloud visibility, conduct security assessments and prevent potential breaches. Continue Reading
-
Use Azure Security Center to conduct a security posture assessment
In this excerpt from Chapter 4 of Microsoft Azure Security Center, the authors outline how to use the software to determine and improve your enterprise's cloud security posture. Continue Reading
-
Mark Schwartz dives into risk management in War and Peace and IT
Get an inside look into Mark Schwartz's new book, War and Peace and IT, with a chapter excerpt on risk and opportunity, as well as a Q&A with the author. Continue Reading