CGCircuit – Introduction to Volumes I – Dust Interaction

CGCircuit – Introduction to Volumes I – Dust Interaction
English | Tutorial | Size: 4.8GB


Welcome to Volume 1: Dust Interaction, the ultimate tutorial for creating stunning pyro simulations! In this lesson, we’ll go on an exciting adventure through the world of pyro effects, focusing specifically on dust and smoke simulations.

PluralSight – Kubernetes for Developers Integrating Volumes and Using Multi container Pods

PluralSight – Kubernetes for Developers Integrating Volumes and Using Multi container Pods-BOOKWARE-KNiSO
English | Size: 239.47 MB
Category: Tutorial


Release Notes: This course teaches vital skills for deploying applications to Kubernetes in production environments. In this course, Kubernetes for Developers: Integrating Volumes and Using Multi-container Pods, you’ll gain the ability to deploy and secure complex real-world applications on Kubernetes. First, you’ll learn how to integrate production-grade external storage volumes into real-world Kubernetes clusters. Next, you’ll discover the major multi-container Pod Patterns and gain hands-on experience implementing them and learning how they can augment and productionise your Kubernetes applications. Finally, you’ll explore Kubernetes authentication and authorization, and learn how to use Service Accounts and RBAC to control access to the Kubernetes API from the applications running on your clusters. When you’re finished with this course, you’ll have the skills and knowledge needed to securely deploy more complex applications to Kubernetes. Software required: Access to a Kubernetes cluster (easy options include Docker Desktop or Minikube on your laptop, or any of the major hosted cloud Kubernetes services)

Linux Academy – Managing and Troubleshooting Encrypted Volumes in Linux

Linux Academy – Managing and Troubleshooting Encrypted Volumes in Linux-APoLLo
English | Size: 153.84 MB
Category: Tutorial


This course compares the types of encryption available on Linux and explores when and how to use them. We will also discuss some best practices and how to securely delete data. Finally we’ll put this knowledge to work by creating and mounting different encrypted filesystems and troubleshooting common problems with each.