Container Security

O'Reilly - Security Conference 2016 - Amsterdam, Netherlands (Full Course)  eBooks & eLearning

Posted by ParRus at March 31, 2017
O'Reilly - Security Conference 2016 - Amsterdam, Netherlands (Full Course)

O'Reilly - Security Conference 2016 - Amsterdam, Netherlands
WEBRip | English | MP4 | 1280 x 720 | AVC ~1500 kbps | 25 fps
AAC | 128 Kbps | 44.1 KHz | 2 channels | 30:52:44 | 15.29 GB
Genre: Video Tutorial / Networking & Security

Security 2016 Amsterdam was O’Reilly Media’s first ever security conference in Europe. It gathered more than 65 of the top IT security experts from Europe, Silicon Valley, and the rest of the world to offer practical guidance on fending off the malware, spear-phishers, and DDoS attacks plaguing websites and the IoT everywhere. Containing specialized content on Euro-centric concerns like GDPR compliance, this video compilation offers a complete recording of every 40-minute session, 3.5-hour tutorial, and keynote delivered at the conference.

CoreOS in Action: Running Applications on Container Linux  eBooks & eLearning

Posted by First1 at May 27, 2017
CoreOS in Action: Running Applications on Container Linux

CoreOS in Action: Running Applications on Container Linux by Matt Bailey
English | May 31st, 2017 | ISBN: 1617293741 | 202 Pages | True PDF | 4.86 MB

CoreOS in Action is a clear tutorial for deploying container-based systems on CoreOS Container Linux. Inside, you'll follow along with examples that teach you to set up CoreOS on both private and cloud systems, and to practice common sense monitoring and upgrade techniques with real code. You'll also explore important container-aware application designs, including microservices, web, and Big Data examples with real-world use cases to put your learning into perspective.

Jetico BestCrypt Container Encryption 9.03.1.1 Multilingual  Software

Posted by big1ne at Feb. 19, 2017
Jetico BestCrypt Container Encryption 9.03.1.1 Multilingual

Jetico BestCrypt Container Encryption 9.03.1.1 Multilingual | 23.6 MB

BestCrypt Container Encryption provides painless encryption to store any selected files or folders on: Active computers, Shared workstations, Removable storage, Network storage. Encrypted containers work like virtual drives – intuitively easy with transparent use and access to files. File encryption by Jetico delivers cross-platform compatibility: BestCrypt container files may be moved to any computer or storage media, working seamlessly between Windows, Mac OS and Linux.

Jetico BestCrypt Container Encryption 9.03.1  Software

Posted by big1ne at Oct. 1, 2016
Jetico BestCrypt Container Encryption 9.03.1

Jetico BestCrypt Container Encryption 9.03.1 Multilingual | 23.6 MB

BestCrypt Container Encryption provides painless encryption to store any selected files or folders on: Active computers, Shared workstations, Removable storage, Network storage. Encrypted containers work like virtual drives – intuitively easy with transparent use and access to files. File encryption by Jetico delivers cross-platform compatibility: BestCrypt container files may be moved to any computer or storage media, working seamlessly between Windows, Mac OS and Linux.

Jetico BestCrypt Container Encryption 9.03  Software

Posted by big1ne at Sept. 21, 2016
Jetico BestCrypt Container Encryption 9.03

Jetico BestCrypt Container Encryption 9.03 Multilingual | 23.6 MB

BestCrypt Container Encryption provides painless encryption to store any selected files or folders on: Active computers, Shared workstations, Removable storage, Network storage. Encrypted containers work like virtual drives – intuitively easy with transparent use and access to files. File encryption by Jetico delivers cross-platform compatibility: BestCrypt container files may be moved to any computer or storage media, working seamlessly between Windows, Mac OS and Linux.

Country Gardens - 101 Container Gardens 2016  Magazines

Posted by crazy-slim at May 10, 2016
Country Gardens - 101 Container Gardens 2016

101 Container Gardens
English | 100 pages | True PDF | 81 MB

Securing Docker  eBooks & eLearning

Posted by AlenMiler at April 25, 2016
Securing Docker

Securing Docker by Scott Gallagher
English | Mar. 30, 2016 | ISBN: 1785888854 | 126 Pages | AZW3/MOBI/EPUB/PDF (conv) | 8 MB

With the rising integration and adoption of Docker containers, there is a growing need to ensure their security.

Container Gardening 2014  Magazines

Posted by AvaxGenius at Jan. 22, 2016
Container Gardening 2014

Container Gardening 2014
English | PDF | 132 Pages | 38.43 MB

This comprehensive, easy-to-use bookazine makes growing your dream garden as simple as 1-2-3. Beautifully illustrated, step-by-step “recipes” make planning your container garden a breeze, while “ingredient” lists take the hassle out of shopping. You’ll get all the information you need to create lavish arrangements—including how to choose the right soil and containers and how to care for your garden on a daily basis.

Locks, Safes and Security: An International Police Reference (2 volume set) [Repost]  eBooks & eLearning

Posted by Nice_smile) at Sept. 26, 2015
Locks, Safes and Security: An International Police Reference (2 volume set) [Repost]

Locks, Safes and Security: An International Police Reference (2 volume set) by Marc Weber Tobias
English | Dec. 1, 2000 | ISBN: 0398070792 | 1440 Pages | PDF | 1.58 MB

This new second edition, many years in the making, provides the reader with the information that is needed to understand both traditional mechanisms as well as the most modern and sophisticated security technology incorporated into locks and how to bypass them.

Pluralsight - Enterprise Strength Mobile Device Security (2015)  eBooks & eLearning

Posted by house23 at July 9, 2015
Pluralsight - Enterprise Strength Mobile Device Security (2015)

Pluralsight - Enterprise Strength Mobile Device Security (2015)
MP4 | AVC 367kbps | English | 1024x768 | 15fps | 5h 03mins | AAC stereo 119kbps | 963 MB
Genre: Video Training

Mobile devices have changed the way we use IT-services fundamentally over the last few years, but from a business perspective these consumer-focused devices carry substantial risks and are open to many security threats. This course creates awareness of the many common security threats for businesses in mobile scenarios, and delivers pragmatic approaches to secure your enterprise.