Linux Bible
The industry gold standard in Linux guides, fully updated In the newly updated eleventh edition of the Linux Bible, veteran Linux author and trainer Christopher Negus walks you through the latest and most popular Linux distributions, including Red Hat Enterprise 9, Ubuntu 24 LTS, and Fedora 41. Whether you're a brand new or power user, you'll learn hands-on ways to become skilled at the world's most important operating system. This edition expands coverage of Linux in cloud environments, such as the AWS cloud, and on-premises environments (with enhanced data center management features). You'll learn techniques for managing storage, users, and security, while familiarizing yourself with administrative techniques using the clear explanations and step-by-step instructions that this series is known for. Also inside: Get Linux up and running quickly and efficiently Master basic operations and tackle more advanced tasks Start using Git to draw on and contribute to the massive open source software world Configure a PXE server and install Linux automatically by booting from NICs and pulling pre-built images Understand the latest tools that make administering Linux servers and networks much simpler Linux Bible, 11th Edition is the single, comprehensive resource you need to get you on track in a flash. Grab your copy today.
System Programming in Linux
Learn to write real Linux software--not just run it. Most programmers never learn how Linux really works. Why? Because system programming is rarely taught, and the tools can be intimidating without the right guidance. As a result, many developers stick to high-level languages and frameworks--writing code that runs on Linux without understanding how it interacts with Linux. In today's world, that's not enough to stand out. Especially as more companies turn to AI to write their software, the question becomes: How do you stay relevant in an AI-driven world? You learn how things really work. If you've ever wondered how processes are created, how memory and files are managed, or how programs communicate in a Unix environment, System Programming in Linux will make it all make sense. This is a hands-on guide to writing software that interfaces directly with the Linux operating system. You'll go beyond shell commands and abstractions to understand what the kernel is doing--and how to leverage it through your own code. Rather than telling you how to solve each problem, Professor Stewart N. Weiss guides you through the process of discovering the solution yourself. Start with the core concepts of Unix and Linux, then work your way up to advanced topics like process control, signals, interprocess communication, threading, and non-blocking I/O. Each chapter includes conceptual diagrams, annotated source code, and practical projects to help you immediately apply what you've learned. You'll explore topics such as: The structure of Unix and Linux operating systems--and why it mattersUsing system calls to create and manage processesThe mechanics of signals, timers, and interprocess communicationUsing synchronization tools to write multithreaded programsInteracting with filesystems, devices, and terminalsBuilding text-based user interfaces using ncursesDeveloping programs that are robust, efficient, and portableAt Hunter College, Professor Weiss built the course this book is based on, and he has helped thousands of students go from confusion to confidence in his over 40 years of teaching programming. His clear, conversational style; technical depth; and focus on real-world application make this one of the most approachable and powerful system programming books available. As Linux continues to dominate development, server, and embedded environments, understanding the system behind your software isn't just helpful; it's essential. Whether you're a student, developer, or sysadmin, this book gives you the tools to work directly with Linux and the insight to understand what's really happening under the hood.
Mastering Swift 6 - Seventh Edition
Become proficient in Swift 6 using advanced techniques and modern programming practices to effortlessly build high-performance applicationsKey Features: - Perfect your application development capabilities using the latest features of Swift 6.2- Learn advanced techniques like concurrency, memory management, Generics, and Swift Testing- Apply best practices in Swift to write clean, scalable, and maintainable code- Purchase of the print or Kindle book includes a free PDF eBookBook Description: This seventh edition of Mastering Swift 6 is your ultimate guide to harnessing the full power of Swift. Whether you're aiming to optimize the performance of your applications or looking to explore the exciting new features in Swift 6.2, this book has you covered. The author distills his 28 years of experience in the Engineering and IT fields to help you dive deep into advanced concepts and techniques, such as concurrency, memory management, and Generics, all essential for creating high-performance applications.The chapters take you on a flexible journey, covering Swift 6.2's newest features alongside advanced programming topics such as reflection, concurrency, and Generics. Packed with best practices, testing strategies, and modern programming techniques, this book equips you with the skills to develop scalable, high-performance applications with confidence.Whether you're looking to stay competitive or simply want to excel in Swift 6, this book provides the tools and knowledge you need to succeed.What You Will Learn: - Optimize your application's performance to meet the demands of the modern user- Develop readable, well-structured code by utilizing Swift development strategies- Use reflection with the Mirror API to observe your application's execution at runtime- Conquer advanced topics, such as concurrency, memory management, and generics- Find out how to use result builders and how to create custom operators in Swift- Effectively test your Swift code with the all-new Swift Testing frameworkWho this book is for: This book is for developers who have a fundamental grasp of the Swift language and aspire to take their development skills to the next level by learning about the advanced topics and techniques of the Swift language. All examples are compatible with Linux, in addition to the MacOS, iOS, iPadOS, VisionOS, and WatchOS platforms, unless otherwise noted.Table of Contents- The Evolution of Swift- Closures and Result Builders- Protocols and Protocol Extensions- Generics- Value and Reference Types- Enumerations- Reflection- Error Handling and Availability- Regular Expressions- Custom Subscripting- Property Observers and Wrappers- Dynamic Member Lookup and Key Paths- Grand Central Dispatch- Structured Concurrency- Memory Management- Advanced and Custom Operators- Access Controls- Swift Testing- Object-Oriented Programming- Protocol-Oriented Programming- Functional Programming with Swift
Android Studio Narwhal Essentials - Java Edition
This book, fully updated for Android Studio Narwhal Feature Drop, teaches you how to develop Android-based applications using Java.Beginning with the basics, the book outlines how to set up an Android development and testing environment, followed by an overview of areas such as tool windows, the code editor, and the Layout Editor tool. An introduction to the architecture of Android is followed by an in-depth look at the design of Android applications and user interfaces using the Android Studio environment.Chapters also cover the Android Architecture Components, including view models, lifecycle management, Room database access, content providers, the Database Inspector, app navigation, live data, and data binding.Topics such as intents, touchscreen handling, gesture recognition, and the integration of artificial intelligence into Android apps are also included.The concepts of material design are also covered in detail, including the use of floating action buttons, Snackbars, tabbed interfaces, card views, and collapsing toolbars.Other key features of Android Studio and Android are also covered in detail, including the Layout Editor, the ConstraintLayout and ConstraintSet classes, view binding, constraint chains, barriers, and direct reply notifications. Chapters also cover advanced features of Android Studio, such as Gradle build configuration, in-app billing, and submitting apps to the Google Play Developer Console.Assuming you already have some Java programming experience, are ready to download Android Studio and the Android SDK, have access to a Windows, Mac, or Linux system, and have ideas for some apps to develop, you are ready to get started.
Hands-On MLOps on Azure
A practical guide to building, deploying, automating, monitoring, and scaling ML and LLM solutions in productionKey Features: - Build reproducible ML pipelines with Azure ML CLI and GitHub Actions- Automate ML workflows end to end, including deployment and monitoring- Apply LLMOps principles to deploy and manage generative AI responsibly across clouds- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Effective machine learning (ML) now demands not just building models but deploying and managing them at scale. Written by a seasoned senior software engineer with high-level expertise in both MLOps and LLMOps, Hands-On MLOps on Azure equips ML practitioners, DevOps engineers, and cloud professionals with the skills to automate, monitor, and scale ML systems across environments.The book begins with MLOps fundamentals and their roots in DevOps, exploring training workflows, model versioning, and reproducibility using pipelines. You'll implement CI/CD with GitHub Actions and the Azure ML CLI, automate deployments, and manage governance and alerting for enterprise use. The author draws on their production ML experience to provide you with actionable guidance and real-world examples. A dedicated section on LLMOps covers operationalizing large language models (LLMs) such as GPT-4 using RAG patterns, evaluation techniques, and responsible AI practices. You'll also work with case studies across Azure, AWS, and GCP that offer practical context for multi-cloud operations.Whether you're building pipelines, packaging models, or deploying LLMs, this guide delivers end-to-end strategy to build robust, scalable systems. By the end of this book, you'll be ready to design, deploy, and maintain enterprise-grade ML solutions with confidence.What You Will Learn: - Understand the DevOps to MLOps transition- Build reproducible, reusable pipelines using the Azure ML CLI- Set up CI/CD for training and deployment workflows- Monitor ML applications and detect model/data drift- Capture and secure governance and lineage data- Operationalize LLMs using RAG and prompt flows- Apply MLOps across Azure, AWS, and GCP use casesWho this book is for: This book is for DevOps and Cloud engineers and SREs interested in or responsible for managing the lifecycle of machine learning models. Professionals who are already familiar with their ML workloads and want to improve their practices, or those who are new to MLOps and want to learn how to effectively manage machine learning models in this environment, will find this book beneficial. The book is also useful for technical decision-makers and project managers looking to understand the process and benefits of MLOps.Table of Contents- Understanding DevOps to MLOps- Training and Experimentation- Reproducible and Reusable ML- Model Management (Registration and Packaging)- Model Deployment: Batch Scoring and Real-Time Web Services- Capturing and Securing Governance Data for MLOps- Monitoring the ML Model- Notification and Alerting in MLOps- Automating the ML Lifecycle with ML Pipelines and GitHub Workflows- Using Models in Real-world Applications- Exploring Next-Gen MLOps
Exam Ref Dp-300 Administering Microsoft Azure SQL Solutions
Prepare for Microsoft Exam DP-300 and demonstrate your real-world foundational knowledge of Azure database administration using a variety of methods and tools to perform and automate day-to-day operations, including use of Transact-SQL (T-SQL) and other tools for administrative management purposes. Designed for database administrators, solution architects, data scientists, and other data professionals, this Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the Microsoft Certified: Azure Database Administrator Associate level. Focus on the expertise measured by these objectives: Plan and implement data platform resources Implement a secure environment Monitor, configure, and optimize database resources Configure and manage automation of tasks Plan and configure a high availability and disaster recovery (HA/DR) environment This Microsoft Exam Ref: Organizes its coverage by the Skills Measured list published for the exam Features strategic, what-if scenarios to challenge you Assumes you have subject matter expertise in building database solutions that are designed to support multiple workloads built with SQL Server on-premises and Azure SQL About the Exam Exam PD-300 focuses on core knowledge for implementing and managing the operational aspects of cloud-native and hybrid data platform solutions built on SQL Server and Azure SQL services, using a variety of methods and tools to perform and automate day-to-day operations, including applying knowledge of using Transact-SQL (T-SQL) and other tools for administrative management purposes. About Microsoft Certification Passing this exam fulfills your requirements for the Microsoft Certified: Azure Database Administrator Associate certification, demonstrating your ability to administer a SQL Server database infrastructure for cloud, on-premises, and hybrid relational databases using the Microsoft PaaS relational database offerings. See full details at: microsoft.com/learn
Reverse Engineering Armv8-A Systems
Explore reverse engineering in Armv8-A-based Arm devices, develop the skills to analyze binaries, and leverage cutting-edge security hardening features through hands-on techniques and expert insightsKey Features: - Master key aspects of Armv8-A, including register, exception handling, and TrustZone- Build new reversing skills for kernel binaries, such as *.ko and vmlinux, for firmware analysis- Understand Armv8-A's latest security features- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Unlock the secrets hidden in binary code without needing the source! Written by a Linux kernel engineer and author with over 14 years of industry experience, this book lays a solid foundation in reverse engineering and takes you from curious analyst to expert. You'll master advanced techniques to dissect kernel binaries, including kernel module files, vmlinux, and vmcore, giving you the power to analyze systems at their core.This practical, three-part journey starts with the essentials of reverse engineering, introducing the key features of Armv8-A processors and the ELF file format. The second part walks you through the reverse-engineering process, from Arm environment setup to using static and dynamic analysis tools, including innovative methods for analyzing kernel binaries and the powerful debugging tool uftrace. The final part covers security, exploring TrustZone and the latest security techniques to safeguard Arm devices at the hardware level.By the end of this reverse engineering book, you'll have comprehensive Armv8-A expertise and the practical skills to analyze any binary with confidence while leveraging advanced security features to harden your systems.What You Will Learn: - Understand the organization of Arm assembly instructions- Disassemble assembly code without using C code- Work with reverse engineering tools, such as GDB and binary utility- Apply reversing techniques for both user space and kernel binaries- Get to grips with static and dynamic binary analysis processes- Get a solid understanding of the powerful debugging tool, uftrace- Analyze TrustZone and the advanced security features provided by Armv8-AWho this book is for: This book is for professionals and enthusiasts interested in reverse engineering and debugging on Armv8-A-based devices. It is especially useful for system software engineers, security consultants, and ethical hackers expanding their binary analysis expertise. To get the most out of this book, you should have a basic understanding of the C programming language. Familiarity with computer architecture, Linux systems, and security concepts will be a definite advantage.Table of Contents- Learning Fundamentals of Arm Architecture- Understanding the ELF Binary Format- Manipulating Data with Arm Data Processing Instructions- Reading and Writing with Memory Access Instructions- Controlling Execution with Flow Control Instructions- Introducing Reverse Engineering- Setting Up a Practice Environment with an Arm Device- Unpacking the Kernel with Linux Fundamentals- Understanding Basic Static Analysis- Going Deeper with Advanced Static Analysis- Analyzing Program Behavior with Basic Dynamic Analysis- Expert Techniques in Advanced Dynamic Analysis- Tracing Execution with uftrace- Securing Execution with Armv8-A TrustZone- Building Defenses with Key Security Features of Armv8-A
Windows 11 for SЕniors
���� WINDOWS 11 FOR SENIORS The Most Complete Easy-to-Follow Guide to Master Your New PC. Unlock All Its Features with Step-by-Step Illustrated Instructions and Useful Tips and Tricks By Gary Watts���� New to Windows 11? This book was made for YOU.Whether you've just bought a new computer or upgraded from Windows 10, this easy Windows 11 guide for seniors and beginners will help you feel confident and in control from the very first click.Written in plain English and packed with step-by-step tutorials, clear screenshots, and helpful tips, this book is the ultimate companion to learning Windows 11-no tech skills required.���� Ideal for Seniors and Technophobes AlikeThis Windows 11 manual has been specifically designed to help older adults, first-time users, and anyone who feels overwhelmed by new technology.You'll learn how to: ✅ Install and set up Windows 11 (even on unsupported devices)✅ Use the Start menu, Taskbar, and Widgets with ease✅ Personalize your desktop, themes, and display settings✅ Connect printers, smartphones, USB devices, and dual monitors✅ Safely browse the web and send emails with Microsoft Mail or Gmail✅ Install essential apps like Chrome, WhatsApp, Zoom, and antivirus software✅ Organize files, folders, and photos✅ Play music, watch videos, and access the Microsoft Store✅ Troubleshoot common problems like crashes, freezes, and connection issues����️ Designed for Visual LearnersLarge text and clear layoutEasy navigation by topicGlossary of basic tech termsReal screenshots for every key process
UNIX-Based Operating Systems Robustness Evaluation
Robust operating systems are required for reliable computing. Techniques for robustness evaluation of operating systems not only enhance the understanding of the reliability of computer systems, but also provide valuable feed- back to system designers. This thesis presents results from robustness evaluation experiments on five UNIX-based operating systems, which include Digital Equipment's OSF/l, Hewlett Packard's HP-UX, Sun Microsystems' Solaris and SunOS, and Silicon Graphics' IRIX. Three sets of experiments were performed. The methodology for evaluation tested (1) the exception handling mechanism, (2) system resource management, and (3) system capacity under high workload stress. An exception generator was used to evaluate the exception handling mechanism of the operating systems. Results included exit status of the exception generator and the system state. Resource management techniques used by individual operating systems were tested using programs designed to usurp system resources such as physical memory and process slots. Finally, the workload stress testing evaluated the effect of the workload on system performance by running a synthetic workload and recording the response time of local and remote user requests. Moderate to severe performance degradations were observed on the systems under stress.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Modeling Adaptive Middleware and Its Applications to Military Tactical Datalinks
Open systems solutions and techniques have become the de facto standard for achieving interoperability between disparate, large-scale, legacy software systems. A key technology among open systems solutions and techniques is middleware. Middleware, in general, is used to isolate applications from dependencies introduced by hardware, operating systems, and other low-level aspects of system architectures. While middleware approaches are or will be integrated into operational military systems, many open questions exist about the appropriate areas to applying middleware. Adaptive middleware is middleware that provides an application with a run-time adaptation strategy, based upon system-level interfaces and properties. Adaptive middleware is an example of an active applied research area. Adaptive middleware is being developed and applied to meet the ever-increasing challenges set forth by the next generation of mission-critical distributed real-time and embedded (DRE) systems. The driving force behind many next-generation DRE systems is the establishment of QoS requirements typically associated with workloads that vary dynamically. The Weapon System Open Architecture (WSOA), an adaptive middleware platform developed by Boeing, is modeled as a part of this research to determine the scalability of the architecture. The WSOA adaptive middleware was previously flight-tested with one tactical node, and the test results represent the performance baseline the architecture. The WSOA adaptive middleware is modeled with 1, 2, 4, 8 and 16 tactical nodes. The results of the modeling and simulation is that the WSOA adaptive middleware can achieve the performance baseline achieved during the original flight-test, in the cases of 1, 2, and 4 tactical nodes. In addition, the results of the modeling and simulation also demonstrate that the WSOA adaptive middleware cannot achieve the original performance baseline, in the cases of 8 and 16 tactical nodes.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Linux Command Reference
Linux users, your go-to desktop reference is here! Find practical commands for the Linux tasks you perform, from managing files to working with graphics systems to programming with Bash. Commands are grouped by topic and listed alphabetically to help you quickly find what you're looking for, and options are listed for each entry to help you modify your commands. With detailed descriptions and practical examples, this guide doesn't just tell you which commands to use--it shows you how to use them, too! Highlights include: 1) Syntax references2) Keyboard shortcut references3) File system and network administration4) SELinux, AppArmor, iptables, and nft5) Package management, snap, and flatpack6) Printer, database, and server administration7) Cloud and virtualization: aws, docker, kvm, and virsh8) WLAN, Bluetooth, and other hardware9) System start/stop, init system, and GRUB10) acme.sh, certbot, and openssl certificates11) Windows integration with wsl
The Ultimate Ubuntu Handbook
Build your Ubuntu 24.04 skills with hands-on guidance from an Ubuntu Core developer, covering desktop usage, security best practices, containers, and development environment setupKey Features: - Master Ubuntu 24.04 through a structured learning path, from initial setup and customization to advanced development workflows- Avoid common mistakes with practical tips for ensuring stability, security, and clean configuration- Learn directly from an Ubuntu Core developer as he shares his insider knowledge and best practices- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Ubuntu 24.04 brings powerful new features, but most users barely scratch the surface of its potential. This book transforms you from a basic user into an Ubuntu power user by guiding you through setup, security, and development workflows step by step. Ken VanDine reveals insider knowledge and proven strategies that turn Ubuntu into a stable, secure, and productive development platform.Starting with Ubuntu's mission, release lifecycles, and what's new in 24.04, you'll learn how to install the system, customize your desktop, and use the command line to work more efficiently. The book shows you how to apply updates, activate Ubuntu Pro, configure firewalls, and secure data with full disk encryption before covering topics often overlooked by desktop users. Moving into advanced territory, this book covers container-based development using LXD, working with virtual machines through Multipass, and setting up Kubernetes with MicroK8s. Whether you're building cloud-native apps or data science projects, you'll benefit from reliable and repeatable Ubuntu workflows.Beyond the technical skills, you'll discover how to tap into Ubuntu's global community for ongoing support and opportunities to contribute. This book is ideal for both newcomers eager to accelerate their Linux journey and seasoned professionals seeking to maximize their Ubuntu expertise.What You Will Learn: - Understand Ubuntu's software lifecycles to keep your system updated and secure- Connect with Ubuntu communities to seek help and contribute to the ecosystem- Master the command line to improve flexibility and efficiency- Configure firewalls to manage network traffic securely- Protect your data with full disk encryption for comprehensive security- Differentiate between Snap and Debian packages to make informed software installation choices- Build and manage containerized environments with UbuntuWho this book is for: This book is for software engineers, DevOps professionals, data scientists, systems administrators, and tech enthusiasts who want to get hands-on with Ubuntu 24.04. Whether you're new to Linux or looking to improve your setup, this book shows you how to build a secure desktop, use the command line with confidence, and create clean, reliable development environments. A basic understanding of operating systems is helpful but not required.Table of Contents- Introduction to Ubuntu- What's New in Ubuntu 24.04?- Security and Transparency - The Advantages of Open Source Software- Getting Started with Ubuntu: A User's Guide- Using Your Ubuntu Desktop- Software Discovery: Finding and Installing Applications- Software Updates: Enhancing Security and Stability- Getting Help: The Ubuntu Community and Beyond- Ubuntu in the Enterprise and at Scale- Command-Line Tricks and Shortcuts: Boosting Your Efficiency- Introduction to Network Security- Understanding Firewalls- Safeguarding Information with Data Encryption(N.B. Please use the Read Sample option to see further chapters)
Modeling Adaptive Middleware and Its Applications to Military Tactical Datalinks
Open systems solutions and techniques have become the de facto standard for achieving interoperability between disparate, large-scale, legacy software systems. A key technology among open systems solutions and techniques is middleware. Middleware, in general, is used to isolate applications from dependencies introduced by hardware, operating systems, and other low-level aspects of system architectures. While middleware approaches are or will be integrated into operational military systems, many open questions exist about the appropriate areas to applying middleware. Adaptive middleware is middleware that provides an application with a run-time adaptation strategy, based upon system-level interfaces and properties. Adaptive middleware is an example of an active applied research area. Adaptive middleware is being developed and applied to meet the ever-increasing challenges set forth by the next generation of mission-critical distributed real-time and embedded (DRE) systems. The driving force behind many next-generation DRE systems is the establishment of QoS requirements typically associated with workloads that vary dynamically. The Weapon System Open Architecture (WSOA), an adaptive middleware platform developed by Boeing, is modeled as a part of this research to determine the scalability of the architecture. The WSOA adaptive middleware was previously flight-tested with one tactical node, and the test results represent the performance baseline the architecture. The WSOA adaptive middleware is modeled with 1, 2, 4, 8 and 16 tactical nodes. The results of the modeling and simulation is that the WSOA adaptive middleware can achieve the performance baseline achieved during the original flight-test, in the cases of 1, 2, and 4 tactical nodes. In addition, the results of the modeling and simulation also demonstrate that the WSOA adaptive middleware cannot achieve the original performance baseline, in the cases of 8 and 16 tactical nodes.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Android Studio Narwhal Essentials - Compose Edition
This book is a comprehensive guide to building Android applications using Android Studio Narwhal (2025.1.1), Jetpack Compose, and the Kotlin programming language. It is designed to provide the knowledge and skills you need to create modern Android apps using the latest development tools and frameworks.We begin with foundational steps, including setting up an Android Studio development environment, followed by a detailed introduction to Kotlin, the language underpinning Android development. This section covers core aspects of Kotlin, including data types, operators, control flow, functions, lambdas, and coroutines, establishing a solid foundation in object-oriented programming principles.Next, we cover Jetpack Compose, Google's innovative toolkit for building native user interfaces, including an in-depth look at Compose components and layout structures, including rows, columns, boxes, flows, pagers, and lists. You'll also gain insights into Android project architecture and Android Studio's Compose development mode.Advanced topics are also covered, including state management, modifiers, and UI navigation. You will also learn how to create reusable layout components, implement biometric authentication for enhanced security, and accelerate development with Gemini AI.The guide also covers specialized techniques, including graphics rendering, animations, transitions, Kotlin Flows, and gesture handling. Practical data management solutions, including view models, Room database access, live data, and the Database Inspector, are explored in detail. For developers interested in monetization, this guide also includes a dedicated section on implementing in-app billing.The concluding chapters provide a comprehensive overview of app packaging and the publication process on the Google Play Store.Throughout the book, each concept is reinforced with hands-on tutorials and downloadable source code. Additionally, over 50 online quizzes are available to test your knowledge and understanding.
UNIX-Based Operating Systems Robustness Evaluation
Robust operating systems are required for reliable computing. Techniques for robustness evaluation of operating systems not only enhance the understanding of the reliability of computer systems, but also provide valuable feed- back to system designers. This thesis presents results from robustness evaluation experiments on five UNIX-based operating systems, which include Digital Equipment's OSF/l, Hewlett Packard's HP-UX, Sun Microsystems' Solaris and SunOS, and Silicon Graphics' IRIX. Three sets of experiments were performed. The methodology for evaluation tested (1) the exception handling mechanism, (2) system resource management, and (3) system capacity under high workload stress. An exception generator was used to evaluate the exception handling mechanism of the operating systems. Results included exit status of the exception generator and the system state. Resource management techniques used by individual operating systems were tested using programs designed to usurp system resources such as physical memory and process slots. Finally, the workload stress testing evaluated the effect of the workload on system performance by running a synthetic workload and recording the response time of local and remote user requests. Moderate to severe performance degradations were observed on the systems under stress.This work has been selected by scholars as being culturally important, and is part of the knowledge base of civilization as we know it. This work was reproduced from the original artifact, and remains as true to the original work as possible. Therefore, you will see the original copyright references, library stamps (as most of these works have been housed in our most important libraries around the world), and other notations in the work.This work is in the public domain in the United States of America, and possibly other nations. Within the United States, you may freely copy and distribute this work, as no entity (individual or corporate) has a copyright on the body of the work.As a reproduction of a historical artifact, this work may contain missing or blurred pages, poor pictures, errant marks, etc. Scholars believe, and we concur, that this work is important enough to be preserved, reproduced, and made generally available to the public. We appreciate your support of the preservation process, and thank you for being an important part of keeping this knowledge alive and relevant.
Linux Clues
Linux runs GUI applications like the suite of LibreOffice tools to help with almost any endeavour.Linux also provides users with a productive Terminal interface where we use commands with mnemonic (easy to remember) names in an interactive and programmable environment where possibility has no limit other than our imagination.Discover clues and examples you can run on your Linux computer. The more you absorb the sooner you can get Linux to help do your computing tasks with ease.
Jetpack Compose 1.8 Essentials
This book is a comprehensive guide to building Android apps using Jetpack Compose 1.8, Android Studio, Material Design 3, and the Kotlin programming language.The book begins with the setup of the Android Studio development environment, followed by an introduction to Kotlin, covering data types, operators, control flow, functions, lambdas, and coroutines.With this foundation established, the focus shifts to Jetpack Compose, Google's modern toolkit for creating native user interfaces. An in-depth exploration of Compose components and layout structures is provided, including rows, columns, boxes, flows, pagers, and lists. Additional topics include Android project architecture and the Compose development tools available in Android Studio.Key concepts such as state management, modifiers, and navigation components are examined in detail. Additional chapters demonstrate how to create reusable layout components, implement biometric authentication for security, and integrate Gemini AI features into your apps.Further coverage includes screen navigation, graphics rendering, animations, transitions, and gesture handling. Data management strategies involving view models, Room databases, live data, and the Database Inspector are also discussed.Each topic includes step-by-step tutorials, downloadable source code, and access to over 55 online quizzes designed to reinforce key concepts.With a basic understanding of programming, Android Studio installed, and access to a Windows, Mac, or Linux system, getting started is just a step away.
Principles of Deformation Measurement and Non-destructive Testing
Shearography, one of the most up-to-date scientific and technological achievements, is a powerful measurement method capable of measuring micro-strains, stress distributions, strain distributions, etc. with high accuracy, and has been studied worldwide. Especially with the rapid development of computers and solid-state imaging sensors, shearography is becoming a more important tool in the measurement of microstrain. And shearography is widely used worldwide today due to its simplicity of optical systems, low measurement environmental requirements and the advantages of using inexpensive semiconductor lasers.This book describes the principles of shearography in industrial applications.Non-destructive testing is a term that means the technique of detecting internal defects without damaging the object being tested, and its requirements, including the aerospace and precision industries, are increasing with each passing day. Shearography is a powerful tool for non-destructive testing as a method for measuring micro-strains with high accuracy. Starting from this starting point, this book is written for the purpose of giving the Knowledge of the principle of shearography and its applications.
Insightful Decision-Making
This book provides a comprehensive introduction to the dynamic field of data analytics, exploring its historical evolution, core concepts, and modern applications. Beginning with the early roots of statistical analysis and progressing through the rise of computing and relational databases, it charts the emergence of Business Intelligence and the transformative impact of the digital revolution and Big Data. It highlights how data science has expanded the landscape, incorporating artificial intelligence and machine learning to uncover insights from complex datasets. The book then delves into the foundational components of data analytics, from data collection and cleaning to exploratory analysis, statistical techniques, and advanced machine learning methods. Designed for readers seeking to understand how raw data is transformed into actionable knowledge, this work underscores the strategic role data analytics plays across industries in an increasingly data-driven world.
Ansible
If you want to keep your servers in order, Ansible is the tool of choice! In this practical guide, you'll learn how to use Ansible to automate server configuration, software deployment, and more. Start by installing Ansible and setting up your initial inventory management process. Then, follow step-by-step instructions for system orchestration, from the basics of playbooks and tasks to using Ansible with Docker. With expert tips and best practices for testing, debugging, and more, this is your all-in-one guide to automating with Ansible! Highlights include: 1) Basic setup 2) Inventory management3) Ad-hoc commands and patterns4) YAML5) Playbooks, tasks, and plays6) Modularization7) Roles8) Includes9) Module library10) Web interfaces11) Docker12) Custom collections and modules
Ubuntu System Administration Guide
Ubuntu, a powerful and versatile Linux operating system, is the cornerstone for countless personal desktops, robust servers, and cutting-edge cloud deployments. The Ubuntu System Administration Guide provides a rapid yet comprehensive journey, equipping you with the practical skills to confidently navigate and master this essential ecosystem, from basic commands to advanced infrastructure.This book systematically builds your expertise, starting with Ubuntu's ecosystem, installation, and desktop configuration, including diverse window managers and essential networking like VPNs. You will then cover virtualization with KVM and Vagrant, followed by modern containerization using Docker and local Kubernetes (Minikube). The book transitions to server mastery, covering various installation methods, robust health checks, and advanced server networking, including firewalls and VPN servers. It progresses to professional server virtualization with KVM and the deployment of full Kubernetes clusters. Finally, you will learn to set up web servers, deploy diverse applications, and automate tasks with powerful CI/CD pipelines, embodying DevOps practices.Upon completing this practical guide, you will possess a profound understanding of Ubuntu, gaining both beginner-friendly competence and professional-level skills in system administration, modern application deployment, and automation, ready to tackle real-world challenges.WHAT YOU WILL LEARN● Learn Ubuntu installation, desktop configuration, and network security essentials.● Implement desktop virtualization (KVM, Vagrant) and local containerization (Docker, Minikube).● Deploy Ubuntu Server on metal, cloud, and configure advanced networking.● Build production Kubernetes clusters, including master, workers, and services.● Automate server deployments and service delivery via CI/CD pipelines.● Troubleshoot server logs, implement security HIDS, and set up alerts.WHO THIS BOOK IS FORThis book is perfect for aspiring system administrators, developers, DevOps engineers, and IT professionals. Readers should have basic computer literacy and a desire to learn, as it guides them from fundamental Ubuntu concepts to advanced server and cloud-native practices.
Scalability By Design
In a world where digital systems power global innovation, scalability is no longer optional it is foundational. Scalability by Design is a definitive guide for engineers, architects, and tech leaders who want to build systems that grow seamlessly under demand, from fledgling startups to enterprise platforms.This book distills years of real-world experience into actionable principles for designing resilient, high-performance systems. It moves beyond theory and quick fixes, offering a disciplined, design-first approach to scalability. Whether modernizing a monolith, architecting cloud-native solutions, or optimizing APIs for millions of requests, this book provides the frameworks and mindset shifts needed to future-proof your work.Scalability by Design challenges the reactive mindset that treats scalability as an afterthought. Instead, it emphasizes intentional engineering anticipating bottlenecks, balancing trade-offs, and embedding flexibility into every layer of your system. Through practical strategies and case studies, this book equips you to architect systems that evolve gracefully under pressure, avoid costly pitfalls, and align technical decisions with long-term business goals.This is not just about survival. Scalability by Design is your blueprint for building systems that thrive at scale. Welcome to the art of engineering for tomorrow, today.
Linux Basics for Hackers, 2nd Edition
A revised introduction to the Linux operating system for beginning hackers and penetration testers. If you're just getting started along the exciting path of hacking, cybersecurity, and pentesting, Linux Basics for Hackers is an excellent introduction. With Kali Linux, an operating system designed for digital forensics and penetration testing, you'll learn the basics of using Linux and acquire the tools and techniques you'll need to take control of a Linux environment. First, you'll learn how to install Kali on a virtual machine and get an introduction to basic Linux concepts. Next, you'll tackle broader Linux topics like manipulating text, controlling file and directory permissions, and managing user environment variables. You'll then focus on foundational hacking concepts like security and anonymity and learn scripting skills with bash and Python. Practical tutorials and exercises throughout will reinforce and test your skills as you learn how to: Cover your tracks by changing your network information and manipulating the journalctl logging utilityWrite a tool to scan for network connections, and connect and listen to wireless networksKeep your internet activity stealthy using Tor, proxy servers, VPNs, and encrypted emailWrite a bash script to find potential attack targets over a range of IP addressesUse and abuse services like MySQL, the Apache web server, and OpenSSHBuild your own hacking tools, such as remote spy cameras and password crackersNew to this edition: This second edition has been updated to address recent changes to Kali and Linux, including a more secure approach to root privileges, updates to Bluetooth and Linux logging functions, and a new chapter with advice on AI in cybersecurity. Hacking is complex, and there is no single way in. Why not start at the beginning with Linux Basics for Hackers?
Kotlin 2.0 Crash Course
If you're looking to write responsive Android and web applications using Kotlin 2.0, this book's got you covered with some great examples. In the early chapters, you'll dive into the basics of variables, data types, and control structures like if-else, when, while, and do-while.There's a chapter on functions that'll teach you to write reusable code, use higher-order functions, and adopt lambda expressions to streamline operations in the project. As you move into object-oriented constructs, you'll learn to define classes, primary and secondary constructors, inheritance, interfaces, and encapsulation practices that keep internal task details safe and modular. Then, we'll dive into collection handling, where we'll use lists, arrays, sets, and maps along with some handy code that'll filter, transform, and iterate through tasks. In the state management section, you'll see how immutable snapshots and mutable services work together using observers to sync components in real time. The chapters on functional programming will walk you through chaining, mapping, and flattening data pipelines. The error handling and type casting chapters will show you how to catch and log exceptions, apply safe casts, and recover from unexpected conditions without crashing.If one wants to get really into JSON serialization, it's possible to learn how to parse JSON into Kotlin objects, serialize tasks back into JSON, and use libraries like kotlinx.serialization or Moshi for nested structures. Finally, Ktor integration teaches you to initialize a coroutine-based server, define routes, install middleware, secure endpoints with authentication, and test your components thoroughly. This book won't turn you into a Kotlin master overnight, but it'll give you the confidence and hands-on experience you need to build real-world Android and web apps with Kotlin 2.0 right from the start.Key LearningsBuild strong foundation in Kotlin 2.0 syntax to write clear, concise code.Absorb strong designing principles including classes, constructors, inheritance, and encapsulation for robust design.Gain practical mastery in using lists, arrays, sets, and maps to store, filter, and transform the data efficiently.Strong hold on coroutine-based state management and observer patterns for responsive, synchronized application behavior.Develop fluency in functional programming alongwith lambdas to process data pipelines succinctly.Perform JSON parsing and serialization using kotlinx.serialization, Moshi, and Jackson.Practical implementation of Ktor's routing, plugins, middleware, and testing for web server development.Streamlined testing and debugging workflow, combining in-memory tests, logging, and profiling to catch issues.Table of ContentUp and Running with Kotlin 2.0Variables, Data Types, and Basic OperationsControl Structures and Program FlowFunctions and Modular Programming TechniquesObject-Oriented Constructs and Class DesignCollection Handling and Iteration PatternsManaging Application State and BehaviorFunctional Programming with LambdasError Handling and Type CastingHandling JSON and Data SerializationDesigning RESTful APIBuilding Web Server with Ktor
macOS Tahoe for Dummies
Get up to speed on the latest macOS updates and features macOS Tahoe For Dummies is your up-to-date guide to the operating system that brings your Mac computer to life. Experienced macOS expert and educator Guy Hart-Davis walks you through a comprehensive set of instructions for navigating your Mac's features and capabilities. Whether you've just jumped on the Mac bandwagon or you're a long-time Apple user, you'll benefit from the step-by-step walkthroughs of how to organize your files and photos, connect with friends using Messages and FaceTime, and securing your data against external threats and accidental loss. Navigate the new Liquid Glass interface and organize files and media Listen to music, watch movies, and enjoy your photos Use powerful macOS system tools Troubleshoot common issues that macOS users run into and learn how to get support Protect yourself against hackers, phishing attacks, and other dangers macOS Tahoe For Dummies is the essential guide for new and experienced Mac users looking to get the most out of their macOS-powered computer and take advantage of the latest features and updates Apple has packed into macOS Tahoe.
Installing and Configuring Windows Server 2025
DESCRIPTION This book covers the installation and subsequent post-installation activities within the Windows Server 2025 framework, starting with an introduction to computer networks and Windows Server 2025, and delving into more advanced Windows Server 2025 operations as readers progress. This includes installing various roles and configuring client/server network services like AD DS, DNS, DHCP, WDS, PDS, WSUS, web server, Hyper-V, and other essential network services.Building upon these foundations, the book leverages real-world scenarios to deepen understanding of Windows Server 2025 fundamentals, providing adept solutions to intricate tasks. The book also addresses maintenance and troubleshooting responsibilities and explores new and advanced features such as on-premises server hotpatching with Azure Arc, next-generation Active Directory and SMB enhancements, improved storage performance with NVMe SSDs and better SAN integration, and robust in-place upgrades for streamlined version updates.Structured to initiate users into SysAdmin tasks for effectively managing Windows Server 2025, this book employs a systematic approach. The content is presented sequentially, accompanied by illustrative snapshots. Readers will swiftly carry out installation, role addition, feature configuration, and server setup within Windows Server 2025. The instructions, guided by clear and targeted graphics, systematically unveil the functionality, features, operations, and details of Windows Server 2025. WHAT YOU WILL LEARN● Understand Windows Server 2025 environment concepts and components.● Install Windows Server 2025 and complete essential post-installation tasks.● Master installation of key Windows Server 2025 roles like AD DS, DNS, DHCP, WDS, PDS, WSUS, web server, and Hyper-V.● Explore advanced topics: on-premises server hotpatching with Azure Arc, next-gen Active Directory and SMB enhancements, improved storage performance with NVMe SSDs, and better SAN integration.WHO THIS BOOK IS FORThis comprehensive book is suitable for all proficiency levels, including beginners, intermediate and advanced users. It serves as a valuable resource for junior and senior Windows Server 2025 system administrators, IT professionals, IT operations administrators in Azure, and other technology enthusiasts.
Windows 11 for Seniors in Easy Steps
Windows 11 for Seniors in easy steps, 2nd edition is the perfect guide to help you navigate Windows 11 at your own pace. It'll guide you through all the essentials you need to know. Confidently explore the desktop, Start menu and Quick Settings.Harness the power of AI with Copilot to find information and make life easy. Stay connected via Outlook and Teams. Personalize Windows and utilize Accessibility features to suit your needs. Get things done - shop online, book holidays, print photos, and manage household budgets. Keep your computer secure and working in tip-top condition! Packed with helpful tips and designed for seniors, this guide will help you get more from Windows 11 stress-free!
Microsoft Power Automate Cookbook
Despite recent advances in technology, software developers, enterprise users, and business technologists still spend much of their time performing repetitive and manual tasks. This cookbook shows you how to level up your automation skills with Power Automate to drive efficiency and productivity within your organization. Author Ahmad Najjar provides recipes to help you complete common tasks and solve a wide range of issues you'll encounter when working with Power Automate. This cookbook guides you through fundamental concepts as well as intermediate-to-advanced Power Automate activities--everything from understanding flow components to automating approvals, building business process flows, and integrating Power Automate with other applications and services. You'll also learn how Microsoft 365 services correlate and integrate with Power Automate. This cookbook shows you how to: Use Power Automate to create a standard workflow Integrate Power Automate with other applications and services Leverage other Power Platform tools with Power Automate Use Power Automate to work with files and build basic business process flows Send notifications and reminders using Power Automate Build robotic process automation flows using Power Automate Desktop Trigger workflows on demand Administer and govern Power Automate flows
Red Hat Certified Engineer (Rhce) Ansible Automation Study Guide
With the Ansible automation tool, developers and system administrators in the enterprise can automate the provisioning, configuration, and management of distributed and on-premises systems. This study guide prepares you for the Red Hat Certified Engineer (RHCE) certification exam, 90% of which covers Ansible. Alex Soto Bueno, director of developer experience at Red Hat, and Andrew Block, Distinguished Architect at Red Hat, walk you through all the material covered in the exam. You'll begin with foundational concepts that build on one another and then dive into specific exam topics. The performance-based exam requires a deep knowledge of Ansible systems and tasks under time pressure. This comprehensive guide is the ideal way to prepare. With this book, you will: Learn how Ansible can simplify your day-to-day operations Solve real-world Ansible problems in a hands-on command-line environment Learn how to install Ansible and set up managed environments Use ad hoc commands and include them in scripts as requested in the exam Prepare your Ansible configuration file and inventory file Install virtualization software Set up and prepare nodes, including SSH key-based authentication Install required Ansible packages And more
Exploring Windows 11 - 2025 Edition
Whether you're Upgrading from Windows 10, running Windows 11 on a standard desktop, a touchscreen device, or the latest ARM-powered Copilot+ PC, Exploring Windows 11: 2025 Edition is your comprehensive and up-to-date companion for Microsoft's latest operating system. Ideal for students, seniors, home users, tech enthusiasts, and anyone who wants to make the most of their Windows 11 device.Written by renowned tech author Kevin Wilson, this fully updated edition spans over 450 pages and covers the Windows 11 24H2 update with step-by-step instructions, full-color annotated screenshots, and access to a growing library of free companion video tutorials. Inside You'll Learn How To: Get Up and Running Quickly. Install or upgrade to Windows 11 from scratch with guided steps for setup, Microsoft account configuration, and initial device personalization.Master What's New in Version 24H2. Explore the latest features including Windows Copilot, Recall, Cocreator, AI Super Resolution, Live Captions with Translation, Click to Do, and Windows Studio Effects. Learn how to use enhanced Snap Layouts, the redesigned Quick Settings panel with an integrated volume mixer, and File Explorer's updated tabbed interface with native support for .ZIP, .7z, and .TAR archives. Also includes coverage of Copilot+ PCs and their NPU-powered AI enhancements.Customize Your System. Personalize the Start menu, taskbar, themes, widgets, notification center, and accessibility options to create a workspace that fits your preferences.Secure and Maintain Your PC. Learn about TPM and Secure Boot, configure Windows Hello for secure sign-in, manage antivirus and firewall settings, back up with OneDrive, set up parental controls, and use built-in recovery tools.Connect All Your Devices. Set up and manage Wi-Fi, Ethernet, mobile hotspots, Bluetooth accessories, printers, and integrate your phone using Phone Link for Android and iOS.Use Built-In and Store Apps Effectively. Get the most out of Windows 11 apps like Media Player, Photos, Clipchamp, Calculator, Paint, Clock, and the new Outlook. Install and manage third-party apps securely.Unlock Power Tools and Advanced Features. Explore File Explorer tabs, use Windows Subsystem for Linux (WSL), write and run PowerShell scripts, and monitor system performance with Task Manager.Follow Full-Color Visuals. Navigate each task easily with clearly annotated, high-resolution screenshots that show exactly what to do and where to click.Watch Companion Video Tutorials. Reinforce your learning with free online video walkthroughs that demonstrate key tasks from the book-ideal for visual learners and hands-on users.Get your copy today and start unlocking the full potential of your PC!
Memory Dump Analysis Anthology
This book is a supplemental volume of selected articles with 68 full-color illustrations from Memory Dump Analysis Anthology (Diagnomicon): revised, edited, cross-referenced and thematically organized volumes of selected DumpAnalysis.org blog posts about modern crash dump analysis and debugging written in August 2006 - June 2009 for software engineers developing and maintaining products on Windows platforms, quality assurance engineers testing software on Windows platforms, technical support and escalation engineers dealing with complex software issues, security and defect researchers, computer scientists and philosophers. Unique in its breadth, depth, and scope, it offers unprecedented insight into the world of Windows software and draws profound scientific and metaphysical implications. The revised edition includes corrections from the revised anthology volumes.
Memory Dump Analysis Anthology
This book is a supplemental volume of selected articles with 170 full color illustrations from Memory Dump Analysis Anthology: revised, edited, cross-referenced and thematically organized volumes of selected DumpAnalysis.org blog posts about debugging, modern crash dump and software trace analysis, conceptual physicalist and memory space art, speculative metaphysics of memory dump worldview (memoidealism) written in July 2009 - October 2010 for software engineers developing and maintaining products on Windows platforms, quality assurance engineers testing software on Windows platforms, technical support and escalation engineers dealing with complex software issues, security and defect researchers, reverse engineers and malware analysts, computer security and cyber warfare intelligence professionals, computer scientists, conceptual digital artists and philosophers. Unique in its breadth, depth, and scope, it offers unprecedented insight into the world of software behavior and draws profound engineering, scientific, artistic, and metaphysical implications.
Memory Dump Analysis Anthology, Volume 16
This reference volume consists of revised, edited, cross-referenced, and thematically organized selected articles from Software Diagnostics Institute (DumpAnalysis.org + TraceAnalysis.org) and Software Diagnostics Library (former Crash Dump Analysis blog, DumpAnalysis.org/blog) about software diagnostics, root cause analysis, debugging, crash and hang dump analysis, software trace and log analysis written from 15 April 2023 to 14 April 2024 for software engineers developing and maintaining products on Windows platforms, quality assurance engineers testing software, technical support, DevOps and DevSecOps, escalation and site reliability engineers dealing with complex software issues, security and vulnerability researchers, reverse engineers, malware and memory forensics analysts. This volume is fully cross-referenced with volumes 1 - 15 and features: - 17 new crash dump analysis patterns- 13 new software trace and log analysis patterns- New defect mechanism pattern- Introduction to Lov language- Lists of recommended booksThe primary audience for Memory Dump Analysis Anthology reference volumes (Diagnomicon) is software engineers developing and maintaining products on Windows platforms, technical support, escalation, and site reliability engineers dealing with complex software issues, quality assurance engineers testing software, security and vulnerability researchers, reverse engineers, malware and memory forensics analysts.
Debugging.TV Frames
Debugging TV and Frames was a series in which each episode featured some facet of debugging, memory dump, and software trace analysis on Windows, Mac OS X, and Android platforms in 8 slides in 8 minutes, including a live WinDbg (Windows) or GDB demonstration (Mac OS X, Linux) plus an extra 8 minutes to ask questions. This full-color book commemorates the 10th anniversary of Debugging.TV Frames, a "show" that ran for several years. It collects slides from 44 episodes for easy reference with removed old ads (at that time, it proposed !Ad WinDbg command). The digital edition is free for download from debugging.tv, including the original presentations, recordings, and additional materials.
Memory Dump Analysis Anthology, Volume 7
Contains revised, edited, cross-referenced, and thematically organized selected articles from Software Diagnostics Institute (DumpAnalysis.org + TraceAnalysis.org) and Software Diagnostics Library (former Crash Dump Analysis blog, DumpAnalysis.org/blog) about software diagnostics, debugging, crash dump analysis, software trace and log analysis, malware analysis and memory forensics written in November 2011 - May 2014 for software engineers developing and maintaining products on Windows (WinDbg) and Mac OS X (GDB) platforms, quality assurance engineers testing software, technical support and escalation engineers dealing with complex software issues, security researchers, malware analysts, reverse engineers, and memory forensics analysts. The seventh volume features: - 66 new crash dump analysis patterns - 46 new software log and trace analysis patterns - 18 core memory dump analysis patterns for Mac OS X and GDB - 10 malware analysis patterns - Additional unified debugging pattern - Additional user interface problem analysis pattern - Additional pattern classification including memory and log acquisition patterns - Additional .NET memory analysis patterns - Introduction to software problem description patterns - Introduction to software diagnostics patterns - Introduction to general abnormal structure and behavior patterns - Introduction to software disruption patterns - Introduction to static code analysis patterns - Introduction to network trace analysis patterns - Introduction to software diagnostics report schemes - Introduction to elementary software diagnostics patterns - Introduction to patterns of software diagnostics architecture - Introduction to patterns of disassembly, reconstruction and reversing - Introduction to vulnerability analysis patterns - Fully cross-referenced with Volume 1, Volume 2, Volume 3, Volume 4, Volume 5, and Volume 6.
Learning eBPF
DESCRIPTION Unlock the power of eBPF, the revolutionary Linux kernel technology transforming observability, networking, and security. This book serves as your comprehensive resource to master this cutting-edge technology, whether you are a beginner exploring its potential or a seasoned professional seeking in-depth knowledge.Embark on a structured learning journey, starting with classic BPF (cBPF) and its evolution to modern eBPF, grasping its architecture and core programming primitives like the BPF syscall and various program/attachment types. Discover practical development using key eBPF programming libraries such as libbpf and bpftrace, and learn to write your first program. Explore BPF portability with CO-RE and efficient eBPF deployment. Uncover potent applications in eBPF observability (kprobes, tracepoints), eBPF networking (XDP, socket filters), and eBPF security. Finally, delve into key eBPF open-source projects like Cilium and Falco.By the end of this definitive guide, you will possess a robust understanding of eBPF, equipped with the practical skills to develop, deploy, and leverage its immense capabilities across diverse domains, making you a proficient practitioner in this transformative field.WHAT YOU WILL LEARN● cBPF history, eBPF architecture, core primitives, and deployment.● eBPF programming, portability, observability, networking, and security.● BPF evolution, eBPF internals, practical application, and ecosystem.● Kernel probing, packet manipulation, and secure eBPF development.● eBPF tools, libraries, deployment strategies, and open-source projects.● Tracing kernel/user space, network filtering/modification, and security enforcement.WHO THIS BOOK IS FORWhether you are a software developer, network engineer, security professional, or systems administrator, this book provides the knowledge to leverage eBPF for enhanced system observability, advanced networking, and security enforcement in your environment.
Accelerated Linux Debugging 4D
The full transcript of Software Diagnostics Services training with more than 20 step-by-step exercises using WSL and Hyper-V environments, notes, and source code of specially created modeling applications in C, C++, and Rust. Learn live local and remote debugging techniques in the kernel, user process, and managed spaces using WinDbg, GDB, LLDB, rr, and KDB, KGDB debuggers. The unique and innovative course teaches unified debugging patterns applied to real problems from complex software environments. A necessary x64 and ARM64 review is also included.Prerequisites: Working knowledge of one of these languages: C, C++, Rust. Operating system internals and assembly language concepts are explained when necessary.Audience: Software engineers, software maintenance engineers, escalation engineers, SRE, DevOps and DevSecOps, cloud engineers, security and vulnerability researchers, malware and memory forensics analysts who want to learn live memory inspection techniques.
Accelerated Rust Windows Memory Dump Analysis
The book contains the full Software Diagnostics Services training transcript and 10 step-by-step exercises and covers dozens of crash dump analysis patterns from the x64 process and complete (physical) memory dumps. Learn how to analyze Rust application crashes and freezes, navigate through memory dump space, and diagnose heap corruption, memory leaks, CPU spikes, blocked threads, deadlocks, wait chains, and much more with the WinDbg debugger. The training uses a unique and innovative pattern-oriented analysis approach developed by the Software Diagnostics Institute to speed up the learning curve, and it is structurally based on the latest 6th revised edition of the bestselling Accelerated Windows Memory Dump Analysis book with the focus on safe and unsafe Rust code and its interfacing with the Windows OS. The training is useful whether you come to Rust from C and C++ or interpreted languages like Python, and facilitates memory thinking when programming in Rust.Prerequisites: Basic Windows troubleshooting and working knowledge of Rust.Audience: Software technical support and escalation engineers, system administrators, security and vulnerability researchers, reverse engineers, malware and memory forensics analysts, DevSecOps and SRE, software developers, system programmers, and quality assurance engineers.
Mastering Docker from Scratch to Scale
Mastering Docker from Scratch to Scale is the ultimate hands-on guide for mastering Docker in real-world, production-grade environments. Whether you're a beginner or an experienced DevOps engineer, this book walks you through the complete Docker lifecycle - from fundamentals to orchestration, security, and enterprise deployment.Learn to build, scale, and secure Docker containers with real-world labs, CI/CD pipelines, and step-by-step guidance. This is more than just theory - it's a production playbook for modern DevSecOps teams.Inside the Book: Docker installation, images, volumes, and networking fundamentalsMastery of Docker Compose and advanced multi-container setupsSwarm clustering, rootless containers, and container hardeningSecure CI/CD pipelines using GitHub Actions + DockerHubMonitoring with Grafana, Loki, Suricata, and advanced logging15+ case studies: DevSecOps, Blockchain, SRE, Cloud-native patternsFull DCA (Docker Certified Associate) exam domain alignmentBonus: DockerHub automation, Podman/Buildah comparisons, and cloud-ready optimizationsWho It's For: DevOps, SREs, and Platform EngineersCloud and Cybersecurity ProfessionalsDevelopers adopting containers and automationStudents preparing for Docker or DCA certificationTechnical leaders implementing secure DevOps pipelinesAuthored by Sudipta Biswas, a CISO and DevSecOps architect with 20 years of experience, this book distills enterprise-scale containerization into actionable insights, code samples, and downloadable labs.Whether you're starting from scratch or optimizing at scale - this is the Docker guide you've been waiting for.
Advanced Windows Memory Dump Analysis with Data Structures
The full transcript of the Software Diagnostics Services training course with 16 step-by-step exercises, notes, and selected questions and answers. Learn how to navigate through memory dump space and Windows data structures to diagnose, troubleshoot, and debug complex software incidents. The training uses a unique and innovative pattern-oriented analysis approach to speed up the learning curve. It consists of practical step-by-step exercises using WinDbg to diagnose structural and behavioral patterns in the 64-bit kernel and complete (physical) memory dumps. Additional topics include memory search, kernel linked list navigation, practical WinDbg scripting, registry, system variables and objects, device drivers, and I/O. Prerequisites are basic and intermediate level Windows memory dump analysis: the ability to list processors, processes, threads, modules, apply symbols, walk through stack traces and raw stack data, diagnose patterns such as heap corruption, CPU spike, memory leaks, access violation, wait chains, and deadlocks. If you are uncomfortable with prerequisites, the Accelerated Windows Memory Dump Analysis training book is recommended before purchasing and reading this course. Audience: Software technical support and escalation engineers, system administrators, security researchers, reverse engineers, malware and memory forensics analysts, software developers, and quality assurance engineers. The fifth edition uses the latest WinDbg, includes the relevant Unified Modeling Language tutorial, revised and extended existing exercises, and adds an exercise that demonstrates the use of a Generative AI LLM assistant.
Accelerated Windows Debugging 4D
The full transcript of Software Diagnostics Services training with 16 step-by-step exercises, notes, and source code of specially created modeling applications. Learn live local and remote debugging techniques in the kernel, user process, and managed .NET spaces using the WinDbg debugger. The unique and innovative course teaches unified debugging patterns applied to real problems from complex software environments. The fourth edition was fully reworked and updated to use the latest WinDbg, added x64 disassembly review and Rust language to the existing and improved C/C++ and C# exercises.Prerequisites: Working knowledge of one of these languages: C, C++, C#, Rust. Operating system internals and assembly language concepts are explained when necessary.Audience: Software engineers, software maintenance engineers, escalation engineers, security and vulnerability researchers, malware and memory forensics analysts who want to learn live memory inspection techniques.
Theoretical Software Diagnostics
Contains reprinted articles in full color (including more than 230 figures) from 16 volumes of Memory Dump Analysis Anthology (Diagnomicon) related to pattern-oriented software diagnostics with additional comments showing the historical development of this autonomous and distinctive discipline over the last 18 years. In addition to 15 new articles, the fourth edition includes updated threads of thinking, a list of mathematical concepts, and notes' references, and was completely remastered.
Accelerated Windows API for Software Diagnostics
The book contains the full transcript of Software Diagnostics Services training with 10 hands-on exercises on various topics related to Windows API.Knowledge of Windows API is necessary for: DevelopmentMalware analysisVulnerability analysis and exploitationReversingDiagnosticsDebuggingMemory forensicsCrash and hang analysisSecure codingStatic code analysisTrace and log analysisThe training uses a unique and innovative pattern-oriented analysis approach and provides: OverviewClassificationPatternsInternalsDevelopment examplesAnalysis examplesThe second edition includes the relevant x64 disassembly overview and additional topics.