Mastering Microsoft Defender for Office 365
Unlock the full potential of Microsoft Defender for Office 365 with this comprehensive guide, covering its advanced capabilities and effective implementation strategiesKey Features: - Integrate Microsoft Defender for Office 365 fits into your organization's security strategy- Implement, operationalize, and troubleshoot Microsoft Defender for Office 365 to align with your organization's requirements- Implement advanced hunting, automation, and integration for effective security operations- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Navigate the "security Wild West" with Microsoft Defender for Office 365, your shield against the complex and rapidly evolving cyber threats. Written by a cybersecurity veteran with 25 years of experience, including combating nation-state adversaries and organized cybercrime gangs, this book offers unparalleled insights into modern digital security challenges by helping you secure your organization's email and communication systems and promoting a safer digital environment by staying ahead of evolving threats and fostering user awareness.This book introduces you to a myriad of security threats and challenges organizations encounter and delves into the day-to-day use of Defender for Office 365, offering insights for proactively managing security threats, investigating alerts, and effective remediation. You'll explore advanced strategies such as leveraging threat intelligence to reduce false alerts, customizing reports, conducting attack simulation, and automating investigation and remediation. To ensure complete protection, you'll learn to integrate Defender for Office 365 with other security tools and APIs.By the end of this book, you'll have gained a comprehensive understanding of Defender for Office 365 and its crucial role in fortifying your organization's cybersecurity posture.What You Will Learn: - Plan a rollout and configure a Defender for Office 365 deployment strategy- Continuously optimize your security configuration to strengthen your organization's security posture- Leverage advanced hunting and automation for proactive security- Implement email authentication and anti-phishing measures- Conduct attack simulations and security awareness training to educate users in threat recognition and response- Customize and automate reports to enhance decision-making- Troubleshoot common issues to minimize impactWho this book is for: This book is a must-read for IT consultants, business decision-makers, system administrators, system and security engineers, and anyone looking to establish robust and intricate security measures for office productivity tools to preemptively tackle prevalent threats such as phishing, business email compromise, and malware attacks. Basic knowledge of cybersecurity fundamentals and familiarity with Microsoft Office 365 environments will assist with understanding the concepts covered.Table of Contents- The Security Wild West- Basic Components of Defender for Office 365- Basic Checks and Balances- Basics of Configuration- Common Troubleshooting- Message Quarantine Procedures- Strengthening Email Security- Catching What Passed the Initial Controls- Incidents and Security Operations- Magnifying the Unseen - Threat Intelligence and Reports- Integration and Artificial Intelligence- User Awareness and Education
The Metaverse for Learning and Education
Accompanying The Metaverse: A Critical Introduction in CRC Press' new The Metaverse Series, this book explores the ways in which the Metaverse can be used for education and learning, as well as how it is different from virtual reality (VR) application development. For example, institutions and tutors can make use of the Metaverse space to represent themselves in it or create their own content and share experiences, whilst students can access a wider range of material, learn within appropriate settings and create content to support their own and others' learning.Key Features: - Provides practical advice from the authors' collective three decades of work and experience in VR and Metaverse learning and education.- Examines different approaches to learning that are relevant in a VR and Metaverse context, including theoretical and practical approaches to pedagogy.- Suggests different approaches to learning that might be used and explores learning in practice in the metaverse - from early versions such as computer-supported collaborative learning and action learning through to more recent practices such as games and gamification and the use of problem-based learning in virtual worlds.- Examines a number of advantages of learning in the metaverse such as the opportunity to be inclusive towards different approaches to learning, the value of affordances, peer-to-peer learning and genres of participation.This book is aimed primarily at practitioners in the learning and education field, and those who set policy and commission work. It may also be of interest to parents, managers, other interested professionals, students, researchers and lay readers.
Learning Kali Linux
With hundreds of tools preinstalled, the Kali Linux distribution makes it easier for security professionals to get started with security testing quickly. But with more than 600 tools in its arsenal, Kali Linux can also be overwhelming. The new edition of this practical book covers updates to the tools, including enhanced coverage of forensics and reverse engineering. Author Ric Messier also goes beyond strict security testing by adding coverage on performing forensic analysis, including disk and memory forensics, as well as some basic malware analysis. Explore the breadth of tools available on Kali Linux Understand the value of security testing and examine the testing types available Learn the basics of penetration testing through the entire attack lifecycle Install Kali Linux on multiple systems, both physical and virtual Discover how to use different security-focused tools Structure a security test around Kali Linux tools Extend Kali tools to create advanced attack techniques Use Kali Linux to generate reports once testing is complete
Conquer the Command Line
Sometimes only words will do. Graphical user interfaces (GUIs) were a great advance, creating an easy route into computers for non-technical users. But for complex tasks, GUIs can block off choices and require a circuitous route even for simple tasks.Enter the command line: the blinking cursor many thought had faded away in the 1990s. For getting instructions from user to computer -- in a clear, quick, and unambiguous form -- nothing beats the command line. It never disappeared on UNIX and Linux systems, and thanks to Raspberry Pi OS, a new generation is discovering how it simplifies complex tasks and lets you carry out simple ones instantly.Build essential skills, including: Read and write text filesFind and install softwareManage removable storageUse Secure Shell (SSH) for remote accessWrite disk images to SD cardsBrowse the web from the command lineIf you're not comfortable when faced with the $ prompt, don't panic! In this fully updated book, we'll quickly make you feel at home and get you familiar with the terminal on Raspberry Pi (or any Mac and Linux computer). Updated for the latest Raspberry Pi software, this book has everything you need to get started.
Ubuntu 24.04 LTS Desktop
This book covers the Ubuntu 24.04 LTS (Noble Numbat) release, focusing on applications and administrative tools. The emphasis here is on what users will face when using Ubuntu, covering topics like installation, applications, software management, the Ubuntu desktops (GNOME, MATE, and KDE), shell commands, network connections, and system administration tasks. Ubuntu 24.04 LTS introduces several new features, as well as numerous smaller modifications. It is a long-term support release. The Ubuntu desktop, which uses GNOME, is examined in detail, along with Snap and APT package management. The Ubuntu desktop uses a Dock and an Activities overview to manage access to applications and devices. In addition, Ubuntu 24.04 LTS desktop is based on GNOME 46, with several desktop configuration tools and the Settings dialog. In addition, features such as workspaces, extensions, and the GNOME Files file manager, are covered. The Kubuntu desktop, which uses KDE, provides a different interface using plasma containers to support panels, menus, activities, configuration tools, and widgets. Ubuntu MATE is based on the traditional GNOME 2 desktop, buy with alternative menus, panel layouts, and a dock.Part 1 focuses on getting started, covering Ubuntu information and resources, using Ubuntu Live USB/DVD drives, installing and setting up Ubuntu, upgrading Ubuntu, basic use of the desktop interface, and connecting to wired and wireless networks. Repositories and their use are covered in detail, along with the Snap system for managing Snap packages. Ubuntu Snap package management with the App Center and the snap command, as well as APT package management with Gnome Software, the Synaptic Package Manager, and the apt and apt-get commands.Part 2 focuses in on office, multimedia, mail, Internet, and social media applications such as the Evolution and Thunderbird email applications, the Videos media player, the Rhythmbox music player, and the LibreOffice office suite. The section includes coverage of the sound settings, Firefox Web browser, and FTP applications.Part 3 covers the Ubuntu, Kubuntu, and Ubuntu MATE in detail. It also covers other Ubuntu flavors including Xubuntu, Lubuntu, Ubuntu Cinnamon, and Ubuntu Unity desktops. The Ubuntu desktop features a Dock, Activities overview, Applications overview, and a new System menu with Quick Setting buttons. The Kubuntu desktop is examined which is based on the KDE desktop with features such as widgets, activities, panels, menus, desktop effects, and the Discover software manager. Ubuntu MATE provides an the traditional GNOME 2 panels, but with alternative menus and panel layouts. It also provides a dock. All the desktops are different, but all access and install software from the Ubuntu APT software repositories and the Ubuntu Snap Store. All are also official Ubuntu Flavors, different desktops but the same compatible software, most of which can run on any of the flavors. The BASH shell interface is also explored, with its command editing, folder navigation, and file operations.Part 4 deals with administration topics, first discussing system tools like the GNOME system monitor, the Disk Usage Analyzer, Seahorse, and Disk Utility. Then a detailed chapter on Ubuntu system administration tools is presented, covering tasks such as managing users and file systems, Bluetooth setup, network folder sharing, backups, and printing. The network connections chapter covers a variety of network tasks, including manual configuration of wired and wireless connections, and firewalls (the Gufw and FirewallD applications).
Linux
Linux: The Ultimate Beginners Guide to Linux Operating SystemLinux: The Ultimate Beginners Guide to Linux Operating System is a quick-reference guide that will walk you through installation, configuration, and usage of the Linux OS.If you are new to this operating system, this book will allow you to get complete instructions on how you can quickly use Linux on your computer, learn how to operate programs and browse the internet, and use shortcuts that will allow you to navigate through the operating system with ease.This book is designed in such a way that you do not have to read all the chapters subsequently - you can jump from one chapter or section to another, depending on what topic you need to look up.Here are some of the things that you can get out of this book: -Get Linux up and running -Master basic functions and operations -Accomplish more advanced tasks-Get updated regarding changes to Linux server system management-Become acquainted with the Linux file system and processes-Set up your network, add connections, and surf the web-Make use of the Linux command lineOrder your copy now!
Mastering Vim - Second Edition
Build applications with advanced movement, text operations, and IDE capabilities in Vim 9.0 and NeovimKey Features: - Develop proficiency in Vim and Vimscript for efficient text editing- Integrate Vim into your daily development workflow and customize it to suit your preferences- Learn through examples in Python code, explore scenarios with version control, and focus on the build/test flow- Purchase of the print or Kindle book includes a free PDF eBookBook Description: Discover what makes Vim one of the most popular text editors in the world, renowned for its blend of efficiency, customization, extensibility, and portability. With Mastering Vim, you'll come to appreciate its extensive plugin system and seamless integration with various tools, which enable Vim to provide developers with an extensible and customizable development environment for programmers.This comprehensive guide to Vim will help you become more efficient at editing text: be it prose or code. Starting from the basics, advanced movement, and text operations, you'll learn how Vim can be used as a full-fledged IDE. You'll then progress to refactoring, debugging, building, testing, version control, plugins, and Vimscript through practical guidance. This second edition comes packed with fully revamped examples that are both engaging and easy to understand, complemented by drawings and diagrams that help to visualize the concepts covered in the book. Updated to cover Vim 9, this edition includes updated installation and troubleshooting instructions, along with examples in Vim9script.By the end of this Vim book, you'll be well-versed in Vim and have the skills you need to build a complete application using this popular text editor.What You Will Learn: - Become more efficient at navigating and editing text- Install and update Vim on Linux, Mac, Windows, and ChromeOS machines- Identify which plugins you need and how to keep them organized- Explore and tailor Vim configurations to fit your needs- Write scripts to complement your workflow using Vimscript- Learn that Vim is better than EmacsWho this book is for: This book is for software developers interested in using Vim in their workflow. Anyone new to Vim and looking to gain in-depth knowledge will find this guide useful. Basic familiarity with Python programming is beneficial but not necessary to get started.Table of Contents- Getting Started- Advanced Editing and Navigation- Follow the Leader Plugin Management- Understanding Structured Text- Build, Test, and Execute- Refactoring Code with Regex and Macros- Making Vim Your Own- Transcending the Mundane with Vimscript- Where to Go from Here
Solving IT Service Management
Stress, frustration, disappointment... are these feelings part of your work day? Today's business environment may be quite tough at times; this is especially true in the IT environment. New technologies, new procedures and an incomprehensive bureaucracy may be more than challenging. You have need to deal with support teams distributed all around the world and try to make things work in a professional way, all of this while respecting a tight budget.This book will give you some interesting ideas on how to manage IT services in the modern business world, regardless if you are an IT service manager, company director or even just trying to better position yourself in IT. It goes beyond talking about the importance of applying procedures. It shows how to apply them while using common sense and applying them to your own business needs. It also talks about some basic IT principles that will help you better control you IT environment.
Solving IT Service Management
Stress, frustration, disappointment... are these feelings part of your work day? Today's business environment may be quite tough at times; this is especially true in the IT environment. New technologies, new procedures and an incomprehensive bureaucracy may be more than challenging. You have need to deal with support teams distributed all around the world and try to make things work in a professional way, all of this while respecting a tight budget.This book will give you some interesting ideas on how to manage IT services in the modern business world, regardless if you are an IT service manager, company director or even just trying to better position yourself in IT. It goes beyond talking about the importance of applying procedures. It shows how to apply them while using common sense and applying them to your own business needs. It also talks about some basic IT principles that will help you better control you IT environment.
The Future of Wireless
Wireless dreams of a future with both blazing speed and rock-solid signal. Here's how we're getting there: High-Frequency Highways: Imagine wider lanes on a highway. Higher frequencies offer more data capacity, like smoother, faster traffic flow for your downloads. Smarter Signal Management: Picture a conductor directing an orchestra. Advanced techniques will steer signals around obstacles, ensuring a clear connection even in crowded spaces. Small Cells to the Rescue: Think of mini cell towers sprinkled throughout. These "small cells" densify the network, eliminating dead zones and boosting signal strength. It's not just about raw power. By combining high frequencies, smart management, and a network of mini cells, the future of wireless promises lightning speed without sacrificing that crucial signal strength. It's a win-win for everyone.
Database in SQL Server Software
Azure SQL Database is a fully managed relational database with built-in intelligence that supports autonomous features such as performance tuning and threat alerts. Microsoft performs patching and updating of the code base and manages the underlying infrastructure for you. This saves time and resources. With SQL Server's high compatibility, you can also migrate your databases to SQL Database Managed Instance without changing your applications. SQL Database Managed Instance offers the broadest native virtual network support and the broadest SQL Server engine compatibility so you can migrate your SQL Server databases to SQL Database Managed Instance without changing your applications. It combines the advanced SQL Server programming surface area with the financial and operational benefits of an intelligent, fully managed service. Managed Instance is your best destination when migrating a large number of existing SQL Server databases from on-premises or virtual machines to SQL Database.
Combinatorics of Permutations
The new edition of this award-winning, graduate textbook is upated throughout. Including mostly enumerative combinatorics, yet there are algebraic, analytic, and topological parts as well, and many applications. The author continues to reveal the usefulness of the subject for both students and researchers.
Thriving in Android Development Using Kotlin
Build a range of Android applications including a messaging app, a photo editor, and a video streaming platform while learning how to address common real-world issues such as authentication, connecting to synchronous and asynchronous remote sources, rendering complex UIs with Jetpack Compose, and moreKey Features: - Understand complex concepts in a coherent way by solving challenging real-world problems and developing three practical projects- Use the latest features of libraries in Jetpack Compose, Room, CameraX, ExoPlayer, and more- Leverage best practices for UI creation, app structure, data handling, and lifecycle management- Purchase of the print or Kindle book includes a free PDF eBookBook Description: With resources on Android and Kotlin abound, it's difficult to find content that focuses on resolving common challenges faced by app developers. This book by Gema Socorro Rodr穩guez - a Google Developer Expert for Android with over 15 years of experience and a proven track record as an effective instructor - is designed to bridge the gap between theory and real-world application. It equips you with the skills to tackle everyday problems in Android development through hands-on projects. Under Gema's expert guidance, you'll build three sophisticated Android projects. You'll start your development journey by building a WhatsApp-like application, learning how to process asynchronous messages reactively, render them using Jetpack Compose, and advance to creating and uploading a backup of these messages. Next, you'll channel your creativity into Packtagram, an Instagram-inspired app that offers advanced photo-editing capabilities using the latest CameraX libraries. Your final project will be a Netflix-style app, integrating video playback functionality with ExoPlayer for both foreground and background operations, and implementing device casting features. By the end of this book, you'll have crafted three fully functional, multi-platform projects and gained the confidence to solve the most common challenges in Android development.What You Will Learn: - Create complex UIs with Jetpack Compose- Structure and modularize apps with a focus on further scaling- Connect your app to synchronous and asynchronous remote sources- Store and cache information and manage the lifecycle of this data- Execute periodic tasks using WorkManager- Capture and edit photos and videos using CameraX- Authenticate your users securely- Play videos in the foreground and background and cast them to other devicesWho this book is for: If you're a mid-level Android engineer, this book is for you as it will not only teach you how to solve issues that occur in real-world apps but also benefit you in your day-to-day work. This book will also help junior engineers who want to get exposed to complex problems and explore best practices to solve them. A basic understanding of Android and Kotlin concepts such as views, activities, lifecycle, and Kotlin coroutines will be useful to get the most out of this book.Table of Contents- Building the UI for Your Messaging App- Setting Up WhatsPackt's Messaging Abilities- Backing Up Your WhatsPackt Messages- Building the Packtagram UI- Creating a Photo Editor Using CameraX- Adding Video and Editing Functionality to Packtagram- Starting a Video Streaming App and Adding Authentication- Adding Media Playback to Packtflix with ExoPlayer- Extending Video Playback in Your Packtflix App
Kali Linux for Ethical Hacking
Master Kali Linux and become an ethical hackerDESCRIPTION This book is a comprehensive guide for anyone aspiring to become a penetration tester or ethical hacker using Kali Linux. It starts from scratch, explaining the installation and setup of Kali Linux, and progresses to advanced topics such as network scanning, vulnerability assessment, and exploitation techniques.Readers will learn information gathering with OSINT and Nmap to map networks. Understand vulnerability assessment using Nessus, OpenVAS, and Metasploit for exploitation and privilege escalation. Learn persistence methods and data exfiltration. Explore wireless network security with Aircrack-ng and best practices for Wi-Fi security. Identify web vulnerabilities using Burp Suite. Automate tasks with Bash scripting, and tackle real-world penetration testing scenarios, including red team vs blue team exercises.By the end, readers will have a solid understanding of penetration testing methodologies and be prepared to tackle real-world security challenges.KEY FEATURES ● Beginner-friendly step-by-step instruction.● Hands-on labs and practical exercises.● Covers essential tools and techniques.WHAT YOU WILL LEARN● Install and configure Kali Linux.● Perform network scanning and enumeration.● Identify and exploit vulnerabilities.● Conduct penetration tests using Kali Linux.● Implement security best practices.● Understand ethical hacking principles.WHO THIS BOOK IS FORWhether you are a beginner or an experienced IT professional looking to transition into cybersecurity, this book offers valuable insights and skills to enhance your career.
”Code Worlds
"Code Worlds: Exploring the Frontier of Operating Systems" delves into the intricate universe of operating systems, unraveling their evolution, core principles, and contemporary advancements. With a comprehensive exploration of foundational concepts such as kernel architecture, memory management, and process control, this book lays the groundwork for understanding the complex interplay of software and hardware that underpins modern computing.
Exam Ref Az-104 Microsoft Azure Administrator
Prepare for Microsoft Exam AZ-104 and demonstrate your real-world mastery and knowledge of Microsoft Azure administration. Designed for working Azure administrators, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified Solutions Associate level. Focus on the expertise measured by these objectives: Manage Azure identities and governance Implement and manage storage Deploy and manage Azure compute resources Implement and manage virtual networking Monitor and maintain Azure resources This Microsoft Exam Ref: Organizes its coverage by the Skills Measured list published for the exam Features strategic, what-if scenarios to challenge you Assumes you want to validate and demonstrate your command of managing Microsoft Azure cloud environments About the Exam Exam AZ-104 focuses on knowledge needed to manage Microsoft Entra ID, RBAC, subscriptions, and governance; manage storage accounts and Azure Storage data; configure Azure files and blob storage; configure VMs for high availability and scalability; automate VM deployment and configuration; create and configure VMs, containers, and Web Apps; implement, manage, secure, monitor, and troubleshoot virtual networking; configure name resolution and load balancing; integrate on-premises networks; monitor resources with Azure Monitor; implement backup and recovery. About Microsoft Certification Passing this exam fulfills your requirements for the Microsoft Certified: Azure Administrator Associate credential, demonstrating your readiness to implement, manage, and monitor identity, governance, storage, compute, and virtual networks in a cloud environment, and to provision, size, monitor, and adjust resources as appropriate. See full details at: microsoft.com/learn
”Revolutionizing Code
"Revolutionizing Code: The Linux Saga" delves into the captivating narrative of Linux, tracing its inception from a humble idea to a global phenomenon that reshaped the landscape of computing. Through meticulous research and insightful analysis, this book explores the architectural innovations, community collaborations, and enterprise adoption that propelled Linux into prominence. From its grassroots origins to its pivotal role in powering modern computing infrastructures, Linux stands as a testament to the power of open-source principles and collaborative development.
Kubernetes Anti-Patterns
Discover practical insights for mastering Kubernetes problem-solving and efficient ecosystem managementKey Features- Learn to recognize common Kubernetes anti-patterns with the guidance of a community expert- Discover actionable strategies and best practices to address anti-patterns- Explore methods for fostering a culture of continuous improvement in Kubernetes- Purchase of the print or Kindle book includes a free PDF eBookBook DescriptionAs the popularity of Kubernetes continues to grow, it's essential to understand and navigate the potential challenges of scalability, resource optimization, troubleshooting, and security. Kubernetes Anti-Patterns offers vital insights and strategies tailored to the current needs of practitioners and enthusiasts navigating the complexities of Kubernetes. Penned by an AWS-certified solutions architect with 16+ years of experience, this book will teach you the essential Kubernetes anti-patterns, their types, causes, and consequences. You'll find practical solutions for each of the challenges and uncover real-world examples and case studies to enhance your Kubernetes expertise. Beyond technical details, you'll delve into optimization, proactive assessment, and prevention strategies, ensuring your Kubernetes endeavors are marked by success and efficiency. Experienced or beginner, this book will equip you with the right knowledge to deploy and maintain a robust Kubernetes environment. By the end of this book, you'll gain a holistic understanding of Kubernetes anti-patterns and develop the expertise to identify and address issues in various Kubernetes contexts. This knowledge will enable you to optimize your container orchestration environments and ensure the reliability, scalability, and security of your applications. What you will learn- Get to grips with the nature and characteristics of Kubernetes anti-patterns- Find out how to achieve stable Kubernetes deployments- Extract insights from real-world use cases for informed decision-making- Cultivate a proactive mindset for anticipating and preventing potential problems- Optimize Kubernetes deployments for improved efficiency and performance- Discover actionable strategies for continuous improvement in your Kubernetes workflowWho this book is forKubernetes Anti-Patterns is for anyone who is actively working with or planning to work with Kubernetes in their professional roles. DevOps engineers, system administrators, software developers, IT managers, or any other professional responsible for container orchestration and deployment will find this book useful. A foundational understanding of Kubernetes concepts, terminology, and basic operations is assumed. Familiarity with key components like pods, services, deployments, and how Kubernetes manages containerized applications is required. Table of Contents- Introduction to Kubernetes Anti-Patterns- Recognizing Common Kubernetes Anti-Patterns- Causes and Consequences- Practical Solutions and Best Practices- Real-World Case Studies- Performance Optimization Techniques- Embracing Continuous Improvement in Kubernetes- Proactive Assessment and Prevention- Bringing It All Together
Bridging the Gap
in the system. Note that all these works rely on a trusted central server to coor-dinate the distributed learning process, which obviously becomes a single point of failure and can be subject to attacks. Only a couple of works like31 attempt to design decentralized multiparty learning systems. Note that only linear models are considered in31. To the best of our knowledge, secure decentralized multiparty learning with heterogeneous models remains an open and challenging problem. In this section, we propose a novel secure decentralized multiparty learning sys-tem by taking advantage of the blockchain technology, called BEMA. In particular, each party in a decentralized system broadcasts its local model, and meanwhile, processes the received (heard) models from other parties over his local dataset, and identifies the models that need to be calibrated. Following our designed pro-tocol, the party sends the calibration message to the corresponding parties. In so doing, the parties in the system do not need to share their whole dataset with other parties. In this system, we consider two types of Byzantine attacks in the system, which can occur in model broadcasting and model calibration processes. To pro-tect system security, we carefully design "off-chain sample mining" and "on-chain
Securing Cloud PCs and Azure Virtual Desktop
Enhance your security expertise in Microsoft virtual desktops by exploring the latest security controls and use cases to safeguard your Windows 365 and Azure Virtual Desktop infrastructureKey Features- Understand the importance of securing your endpoints and overcome security challenges- Learn about the latest Microsoft security controls for Windows 365 and AVD- Gain an understanding of securing virtual environments through various use cases- Purchase of the print or Kindle book includes a free PDF eBookBook DescriptionDo you want to effectively implement and maintain secure virtualized systems? This book will give you a comprehensive understanding of Microsoft virtual endpoints, from the fundamentals of Windows 365 and Azure Virtual Desktop to advanced security measures, enabling you to secure, manage, and optimize virtualized environments in line with contemporary cybersecurity challenges.You'll start with an introduction to Microsoft technologies, gaining a foundational understanding of their capabilities. Next, you'll delve into the importance of endpoint security, addressing the challenges faced by companies in safeguarding their digital perimeters. This book serves as a practical guide to securing virtual endpoints, covering topics such as network access, data leakage prevention, update management, threat detection, and access control configuration. As you progress, the book offers insights into the nuanced security measures required for Windows 365, Azure Virtual Desktop, and the broader Microsoft Azure infrastructure. The book concludes with real-world use cases, providing practical scenarios for deploying Windows 365 and Azure Virtual Desktop.By the end of this book, you'll be equipped with practical skills for implementing and evaluating robust endpoint security strategies.What you will learn- Become familiar with Windows 365 and Microsoft Azure Virtual Desktop as a solution- Uncover the security implications when company data is stored on an endpoint- Understand the security implications of multiple users on an endpoint- Get up to speed with network security and identity controls- Find out how to prevent data leakage on the endpoint- Understand various patching strategies and implementations- Discover when and how to use Windows 365 through use cases- Explore when and how to use Azure Virtual Desktop through use casesWho this book is forThis book caters to a diverse audience within the IT landscape. For IT directors and decision makers, it provides valuable insights into the security benefits of implementing virtual desktops, emphasizing the contribution to a more secure environment. IT consultants and engineers will find practical tools and guidance for securely managing Microsoft cloud-based virtual desktops. Security professionals will benefit from the expert knowledge and alignment with industry best practices, while students can deepen their understanding of securing AVD and W365.Table of Contents- Introducing Windows 365 and Azure Virtual Desktop- Importance of Securing Your Desktop- Modern Security Risks- Securing User Sessions- Preventing Data Leakage from Desktops- Update Management Strategies- Threat Detection and Prevention- Configuring Access Control- Securing Windows 365- Securing Azure Virtual Desktop- Securing Azure Infrastructure- Windows 365 Use Cases- Azure Virtual Desktop Use Cases
Mac Magic
"Mac Magic: A Wild Ride Through the Evolution of Software for Macintosh and MacOS" takes readers on a captivating journey through the history and development of Mac software, from the birth of Apple Inc. to the future of the Mac ecosystem. With a meticulous exploration of the iconic Macintosh hardware, groundbreaking software applications, and the complex dynamics between Apple and Microsoft, this book offers an in-depth look at the evolution of the Macintosh experience. Whether you're a Mac enthusiast, a technology history buff, or simply curious about the impact of Mac software on the world, "Mac Magic" is a must-read.
Linux Basics for SysAdmin
For students, aspiring IT specialists, and working professionals, "Linux Basics for SysAdmin" is a great starting point for learning the fundamentals of Linux, including the command line and all the tools and commands needed to manage enterprise systems.At first, you are introduced to the Linux environment, with a focus on browsing the filesystem, using basic commands, managing files and directories, and becoming acquainted with the shell. You'll also learn about package management and how to handle system startup and shutdown efficiently. After that, you'll learn all about system configuration files, 'systemd' for managing system services, crontab for job scheduling, and 'at' and 'batch' for automating processes.Afterwards, the book delves into topics such as dependency management, system hardware configuration, kernel upgrades, and device driver management, as well as package management with 'apt' and 'yum'. You'll also learn how to create and manage repositories, and install and setup virtual machines with VirtualBox. In the end, the book covers a wide range of topics, including creating and managing user accounts, editing user profiles, setting ownership and permissions for files, using ACLs, managing user sessions, configuring sudo for administrative tasks, implementing password policies, working with PAM, and managing group memberships.Key LearningsMaster essential Linux commands to efficiently navigate and manage the system's file structure.Learn to configure and manage system services with 'systemd' for streamlined service administration.Set up and manage virtual machines with VirtualBox to create isolated, reproducible development environments.Use Access Control Lists (ACLs) to fine-tune file permissions beyond the standard Unix model.Schedule and automate tasks using 'cron', 'at', and 'batch' to improve system efficiency and reliability.
Developing Design Tools and Standards for Blast-Resistant Windows
Blast-resistant windows are no longer a futuristic concept, but a crucial security element. To ensure their effectiveness, Canada is developing design tools and standards. These tools empower architects and engineers with the knowledge to create windows that can withstand the immense pressure and debris of an explosion. Imagine software that simulates blast effects, allowing designers to test and refine window systems virtually. Standardized testing procedures will ensure consistent performance across different window designs. This meticulous approach is vital for critical infrastructure, government buildings, and even high-risk residential areas. By establishing clear design guidelines and rigorous testing methods, Canada is building a national shield. These windows won't just protect lives, they'll minimize structural damage, allowing for a faster recovery after an event. This initiative signifies a commitment to public safety and sets a valuable example for global security standards
DevOps Flow
DevOps Flow: Code to Production dives into the secrets of high-performing DevOps teams. You'll discover how to bridge the gap between development and operations, fostering a collaborative environment built on shared goals. This book explores the power of team synergy, unveiling how to break down silos and achieve lightning-fast software releases without sacrificing quality. Learn how DevOps extends Agile principles, streamlining your entire software delivery pipeline from code commit to production. Packed with practical strategies and real-world examples, DevOps Flow equips you to navigate the challenges of DevOps adoption and unlock the full potential of your development and operations teams.
Mastering PowerShell Scripting - Fifth Edition
Use PowerShell to save time and reduce the potential for human error by writing scripts that automate the execution of tasksPurchase of the print or Kindle book includes a free PDF eBook.Key Features- Explores PowerShell as a programming language- Take advantage of the features built into the PowerShell language in day-to-day automation- Automation of complex tasks, data manipulation, and environment securityBook DescriptionMastering PowerShell Scripting, Fifth Edition, can help you overcome any fears and become proficient in navigating PowerShell's capabilities. This edition includes new chapters on debugging, troubleshooting, and creating GUIs. You will learn about the latest features of PowerShell 7.3, including working with parameters, objects, and .NET classes. The book covers basic and advanced topics, such as asynchronous processing, desired state configuration, managing large amounts of data, interacting with other services, and working with regular expressions and Windows Management Instrument (WMI). Discover how to efficiently use PowerShell's automation features and error-handling techniques for more complex scripts and filters.Starting with foundational knowledge, this extensive guide progresses to advanced concepts like using complex scripts and filters, asynchronous processing, desired state configuration, debugging, and error-handling techniques. You will learn how to effectively handle large data sets and interact with external services using PowerShell 7.3. Additionally, you'll discover how to fully utilize PowerShell's automation capabilities, including parsing data, manipulating regular expressions, and working with WMI using various methods.What you will learn- Create scripts that can be run on different systems- PowerShell is highly extensible and can integrate with other programming languages- Discover the powerful command-line interface that enables users to perform various operations with ease- Create reusable scripts and functions in PowerShell- Utilize PowerShell for various purposes, including system administration, automation, and data processing- Integrate PowerShell with other technologies such as .NET, COM, and WMI- Work with common data formats such as XML, JSON, and CSV in PowerShell- Create custom PowerShell modules and cmdlets to extend its functionalityWho this book is forThis book is for system administrators who want to automate and speed up their processes using PowerShell and Windows PowerShell. You'll need to know the basics of operating systems, but beginners with no prior experience with PowerShell will have no trouble following along.Table of Contents- Introduction to PowerShell- Modules- Variables, Arrays, and Hashtables- Working with Objects in PowerShell- Operators- Conditional Statements and Loops- Working with .NET- Strings, Numbers, and Dates- Regular Expressions- Files, Folders, and the Registry- Windows Management Instrumentation- Working with HTML, XML, and JSON- Web Requests and Web Services- Remoting and Remote Management- Asynchronous Processing- Graphical user interfaces- Scripts, Functions, and Script Blocks- Parameters, Validation, and Dynamic Parameters- Classes and Enumerations- Building Modules- Testing- Error Handling- Debugging
Bridging Paradox with Interfaces
The fluid flow paradox exposes a surprising truth: fluids can resist or even aid motion. We expect objects in fluids to encounter drag, a force slowing them down. However, the paradox reveals conditions where fluids do the opposite. Imagine an object gliding through water. At specific speeds, the fluid's adjacent layers cling and pull the object, reducing drag. This "lift force" explains the graceful movement of dolphins or the design of airplane wings. Understanding this paradox has revolutionized fields like engineering. Ship hulls are designed to minimize drag, while self-cleaning surfaces exploit fluid manipulation. Research continues, exploring applications in microfluidics and even blood flow within our bodies. Fluids, seemingly straightforward, harbor a complex dance of motion. Unveiling this paradox unlocks a world of possibilities, shaping our understanding of everything from vast oceans to the intricate workings of life.
Operating System 2
Simultaneous processing (or concurrent processes, parallel activities) is an essential feature of operating systems. This simultaneity can be observed at the hardware level (central processors, channels, peripherals, etc.), from which the software level is established. Its importance lies in the objectives assumed by the functions of an operational operating system, in order to make the most of hardware possibilities, in particular the increase in processing power. This power, which we are constantly striving to increase by various means (hardware/software), is at the root of the overriding objective of achieving optimum response times.
PowerShell for Penetration Testing
A practical guide to vulnerability assessment and mitigation with PowerShell Key FeaturesLeverage PowerShell's unique capabilities at every stage of the Cyber Kill Chain, maximizing your effectivenessPerform network enumeration techniques and exploit weaknesses with PowerShell's built-in and custom toolsLearn how to conduct penetration testing on Microsoft Azure and AWS environmentsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionPowerShell for Penetration Testing is a comprehensive guide designed to equip you with the essential skills you need for conducting effective penetration tests using PowerShell.You'll start by laying a solid foundation by familiarizing yourself with the core concepts of penetration testing and PowerShell scripting. In this part, you'll get up to speed with the fundamental scripting principles and their applications across various platforms. You'll then explore network enumeration, port scanning, exploitation of web services, databases, and more using PowerShell tools. Hands-on exercises throughout the book will solidify your understanding of concepts and techniques. Extending the scope to cloud computing environments, particularly MS Azure and AWS, this book will guide you through conducting penetration tests in cloud settings, covering governance, reconnaissance, and networking intricacies. In the final part, post-exploitation techniques, including command-and-control structures and privilege escalation using PowerShell, will be explored. This section encompasses post-exploitation activities on both Microsoft Windows and Linux systems.By the end of this book, you'll have covered concise explanations, real-world examples, and exercises that will help you seamlessly perform penetration testing techniques using PowerShell.What you will learnGet up to speed with basic and intermediate scripting techniques in PowerShellAutomate penetration tasks, build custom scripts, and conquer multiple platformsExplore techniques to identify and exploit vulnerabilities in network services using PowerShellAccess and manipulate web-based applications and services with PowerShellFind out how to leverage PowerShell for Active Directory and LDAP enumeration and exploitationConduct effective pentests on cloud environments using PowerShell's cloud modulesWho this book is forThis book is for aspiring and intermediate pentesters as well as other cybersecurity professionals looking to advance their knowledge. Anyone interested in PowerShell scripting for penetration testing will also find this book helpful. A basic understanding of IT systems and some programming experience will help you get the most out of this book.Table of ContentsIntroduction to Penetration TestingProgramming Principles in Power ShellNetwork Services and DNSNetwork Enumeration and Port ScanningThe WEB, REST and SOAPSMB, Active Directory, LDAP, and KerberosDatabases: MySQL, PostgreSQL and MSSQLEmail Services: Exchange, SMTP, IMAP, and POPPowerShell and FTP, SFTP, SSH and TFTPBrute Forcing in PowerShellPowerShell and Remote Control and AdministrationUsing PowerShell in AzureUsing PowerShell in AWSCommand and ControlPost-Exploitation in Microsoft WindowsPost-Exploitation in Microsoft Linux
The Ultimate Kali Linux Book - Third Edition
Excel in penetration testing by delving into the latest ethical hacking tools and techniques from scratchPurchase of the print or Kindle book includes a free eBook in PDF format.Key Features- Learn to think like an adversary to strengthen your cyber defences- Execute sophisticated real-life penetration tests, uncovering vulnerabilities in enterprise networks that go beyond the surface level- Securely manipulate environments using Kali Linux, ensuring you're fully equipped to safeguard your systems against real-world threatsBook DescriptionEmbark on an exciting journey into the world of Kali Linux - the central hub for advanced penetration testing. Honing your pentesting skills and exploiting vulnerabilities or conducting advanced penetration tests on wired and wireless enterprise networks, Kali Linux empowers cybersecurity professionals.In its latest third edition, this book goes further to guide you on how to setup your labs and explains breaches using enterprise networks. This book is designed for newcomers and those curious about penetration testing, this guide is your fast track to learning pentesting with Kali Linux 2024.x. Think of this book as your stepping stone into real-world situations that guides you through lab setups and core penetration testing concepts. As you progress in the book you'll explore the toolkit of vulnerability assessment tools in Kali Linux, where gathering information takes the spotlight. You'll learn how to find target systems, uncover device security issues, exploit network weaknesses, control operations, and even test web applications.The journey ends with understanding complex web application testing techniques, along with industry best practices. As you finish this captivating exploration of the Kali Linux book, you'll be ready to tackle advanced enterprise network testing - with newfound skills and confidence.What you will learn- Establish a firm foundation in ethical hacking- Install and configure Kali Linux 2024.1- Build a penetration testing lab environment and perform vulnerability assessments- Understand the various approaches a penetration tester can undertake for an assessment- Gathering information from Open Source Intelligence (OSINT) data sources- Use Nmap to discover security weakness on a target system on a network- Implement advanced wireless pentesting techniques- Become well-versed with exploiting vulnerable web applicationsWho this book is forThis pentesting book is for students, trainers, cybersecurity professionals, cyber enthusiasts, network security professionals, ethical hackers, penetration testers, and security engineers. If you do not have any prior knowledge and are looking to become an expert in penetration testing using the Kali Linux, then this book is for you.Table of Contents- Introduction to Ethical Hacking- Building a penetration testing lab- Setting up for Advanced Penetration Testing Techniques- Passive Reconnaissace- Exploring Open Source Intelligence- Active Reconnaissance- Performing Vulnerability Assessments- Understanding Network Penetration Testing- Performing Network Penetration Testing- Post-Exploitation Techniques- Delving into Command and Control Tactics- Working with Active Directory Attacks- Advanced Active Directory Attacks- Advanced Wireless Penetration Testing- Social Engineering Attacks- Understanding Website Application Security- Advanced Website Penetration Testing- Best Practices for the Real World- Appendix
RHCSA Exam Pass
���� Are you ready to level up your Linux skills and become a Red Hat Certified System Administrator (RHCSA)? ���� Introducing the ultimate study companion: the "RHCSA Exam Pass" book bundle! ����With four comprehensive volumes packed with everything you need to know, this bundle is your ticket to RHCSA success. �������� Book 1: Foundations of Linux Administration Get started on your journey with a solid understanding of Linux fundamentals. From navigating the file system to mastering basic shell scripting, this book lays the groundwork for your RHCSA certification.���� Book 2: Advanced System Configuration and Management Take your skills to the next level with advanced system configuration techniques. Learn how to manage services, optimize disk partitioning, configure firewalls, and more. �������� Book 3: Network Administration and Security Unlock the secrets of network administration and security in a Red Hat environment. From DNS and DHCP to VPNs and security measures, this book has you covered. �������� Book 4: Performance Tuning and Troubleshooting Techniques Become a master troubleshooter with expert guidance on performance tuning and problem-solving. Learn how to optimize system performance, analyze logs, and tackle common issues like a pro. ����️Whether you're a seasoned IT professional or just starting your Linux journey, the "RHCSA Exam Pass" bundle has something for everyone. ����Don't miss out on this opportunity to become RHCSA certified and unlock exciting career prospects. Get your copy today and join the ranks of elite Linux administrators! ����]��������]����
Ultimate Linux Network Security for Enterprises
"Level Up Your Security Skills with Linux Expertise!"Book DescriptionThe Ultimate Linux Network Security for Enterprises is your essential companion to mastering advanced cybersecurity techniques tailored for Linux systems.The book provides a comprehensive exploration of Linux network security, equipping you with the skills and knowledge needed to defend against evolving cyber threats. Through hands-on exercises, real-world scenarios, and industry best practices, this book empowers you to fortify your organization's networks with confidence. Discover practical insights and techniques that transcend theoretical knowledge, enabling you to apply effective cybersecurity strategies in your job role.From understanding fundamental concepts to implementing robust security measures, each chapter provides invaluable insights into securing Linux-based networks. Whether you are tasked with conducting vulnerability assessments, designing incident response plans, or implementing intrusion detection systems, this book equips you with the tools and expertise to excel in your cybersecurity endeavors. By the end of this book, you will gain the expertise needed to stay ahead of emerging threats and safeguard your organization's digital assets.Table of Contents1. Exploring Linux Network Security Fundamentals2. Creating a Secure Lab Environment3. Access Control Mechanism in Linux4. Implementing Firewalls And Packet Filtering5. Mastering Cryptography for Network Security6. Intrusion Detection System and Intrusion Prevention System7. Conducting Vulnerability Assessment with Linux8. Creating Effective Disaster Recovery Strategies9. Robust Security Incident Response Plan10. Best Practices for Linux Network Security Professionals Index
Redhat Enterprise Linux 9 for Beginners
Today, Linux is used everywhere, which means the demand for Linux administrators is high. This book is organized to help readers develop the essential skills to become competent Linux administrators. This book provides extensive materials that will deliver beginners vast knowledge in the Linux domain. It begins with the fundamentals of Linux systems and moves ahead to discussing advanced topics. To help the readers gain competitive knowledge, RHEL9 is used throughout this book. This book helps the readers learn useful Linux commands to efficiently manage Linux servers. It also delivers extensive knowledge of shell scripting required to automate most of the regular admin-related tasks. Security of the data and the server as a whole is another important aspect that this book describes. Besides, this book also explains advanced topics such as cloud, web servers, performance tuning, etc., in a practical way that will truly be very helpful for beginners to start their professional career in this domain.
Foundations of Operating Systems
Delve into the intricate world of Operating Systems with this comprehensive guide, spanning from the foundational principles to cutting-edge trends shaping the future of computing. The journey begins with an exploration of the essence of Operating Systems, defining their role as the bridge between hardware and software, tracing their rich historical evolution from early batch processing systems to the diverse landscape of modern OSes, and dissecting the various types of Operating Systems tailored to different computing environments. Moving deeper, we uncover the underlying structure of Operating Systems, unraveling the mysteries of the Kernel, User Interface, and System Calls that form the backbone of system operation. Next, we venture into the realm of Process Management, delving into the intricacies of process concepts, scheduling algorithms, and inter-process communication mechanisms crucial for orchestrating concurrent tasks. As we navigate through Memory Management, we unravel the complexities of memory hierarchy, virtual memory systems, and memory allocation techniques like paging and segmentation.
Free Opensource Office Suite Software Apps For Windows 11 OS Hardcover Ver
In the book "Free Opensource Office Suite Software Apps for Windows 11 OS," readers are introduced to a comprehensive guide on leveraging the power of open-source office software. This informative and user-friendly book explores a range of free software applications that can enhance productivity, creativity, and collaboration on the Windows 11 operating system. From word processing to spreadsheet management and presentation design, this book offers valuable insights and step-by-step instructions for harnessing the full potential of these powerful tools. Discover the world of open-source office suites and revolutionize your work experience today.
Linux
Understand Linux like the back of your hand by following the teachings in this book!For some time now, there has been a rising misconception that Linux is harder to use than other operating systems, with some vendors even suggesting that the OS is only suitable for users only with an interest for open source programming.If you've encountered any problems working with Linux, and have come here to try and learn the software, there's one thing you have to understand first. This operating system is not the problem. The only issue is that it's different; different from the other operating systems you've perhaps used your entire life- just like north Americans learn to drive on the right side of the road and the UK and elsewhere, learn to drive on the left.With this guide, I will dispel the notion that working with Linux is hard by teaching you step by step everything you need to learn about this OS, particularly the use of the command line, and also how to use that knowledge to become a master of LinuxYou'll see that not only is Linux easy to use, it's also the best OS we have today. So, if you've been desiring to understand how to use Linux and take advantage of the many opportunities that the knowledge offers, this is your guide. It will help you understand everything you need to know about Linux- right from the basics, making the requisite installations to the terminal and many other important skills.
Android Studio Masterclass
���� Are you ready to unlock the full potential of Android app development? Look no further than the "Android Studio Masterclass" bundle! ����Whether you're just starting out or a seasoned developer, this bundle has something for everyone. With four comprehensive books, you'll embark on a journey from novice to expert in no time.���� Book 1: "Android Studio Essentials: A Beginner's Guide to App Development" ���� Perfect for beginners, this book takes you by the hand and guides you through the essentials of Android app development. Learn how to build your first app and navigate the Android Studio environment with ease.���� Book 2: "Advanced Android Development Techniques: Mastering Android Studio" ����️ Ready to take your skills to the next level? Dive deep into advanced features and techniques within Android Studio. Master complex challenges and build sophisticated apps like a pro.���� Book 3: "Optimizing Performance in Android Studio: Expert Strategies for Efficient App Development" ⚡ Performance matters! Discover expert strategies for optimizing the performance and efficiency of your Android apps. Ensure a seamless user experience across all devices with these expert tips.���� Book 4: "Android Studio Pro: Advanced Tools and Tips for Power Users" ���� Calling all power users! Unleash the full potential of Android Studio with advanced tools and customization options. Streamline your workflow and become a true Android Studio pro.With practical guidance, expert insights, and hands-on exercises, this bundle is your one-stop-shop for mastering Android app development. ����Don't miss out on this opportunity to become an Android Studio master! Grab your bundle now and start building incredible apps that stand out in the Google Play Store. ����
First Steps in C# and C++
The second book in the intense Simon Peake thriller series from MILLION COPY BESTSELLER Rob Sinclair 'We need your help...' A knock on the door in the middle of the night catches ex-Special Forces Simon Peake off guard. He only recognizes the face of one of the three men standing on the other side, and the 'help' they need is to dispose of a dead body crumpled in the trunk of their car. The problem is - the woman in the trunk isn't dead at all. In a matter of moments, Peake makes a call to help and protect this stranger, but it's a decision that will drag him back into the dark and dangerous world of drug cartels, mob bosses, and rogue CIA operatives who will stop at nothing to use Peake as a porn in their games. Having spent the last few months living in near seclusion in small town Georgia, Peake is once again faced with his past. He knows why these men have chosen to come to his door in their hour of need, but unfortunately for them, they didn't realise what a deadly mistake that would be...
Memory Dump Analysis Anthology, Volume 15
This reference volume consists of revised, edited, cross-referenced, and thematically organized selected articles from Software Diagnostics Institute (DumpAnalysis.org + TraceAnalysis.org) and Software Diagnostics Library (former Crash Dump Analysis blog, DumpAnalysis.org/blog) about software diagnostics, root cause analysis, debugging, crash and hang dump analysis, software trace and log analysis written from 15 August 2021 to 14 April 2023 for software engineers developing and maintaining products on Windows platforms, quality assurance engineers testing software, technical support, DevOps and DevSecOps, escalation and site reliability engineers dealing with complex software issues, security and vulnerability researchers, reverse engineers, malware and memory forensics analysts. This volume is fully cross-referenced with volumes 1 - 14 and features: - 11 new crash dump analysis patterns- New crash dump analysis case study- 21 new software trace and log analysis patterns- New software diagnostics architecture pattern- Introduction to systematic software diagnostics- Introduction to using Diagram language in memory dump analysis- Introduction to traces and logs as 2-categories- Introduction to a broad program for diagnostics of artificial intelligence- Lists of recommended books
Service Desk Analyst Bootcamp
���� Introducing the ultimate guide to mastering the art of service desk management! ����️���� The "Service Desk Analyst Bootcamp" bundle is your go-to resource for mastering the maintenance, configuration, and installation of hardware and software systems. With four comprehensive books packed with essential knowledge and practical tips, you'll be equipped to tackle any challenge that comes your way.���� In Book 1 - "Service Desk Essentials: A Beginner's Guide to Hardware and Software Basics," you'll build a solid foundation in hardware and software fundamentals. From understanding hardware components to navigating operating systems, this book covers everything you need to know to get started in the world of IT support.���� Ready to take your troubleshooting skills to the next level? Book 2 - "Mastering Service Desk Troubleshooting: Configuring Software for Efficiency" is here to help. Learn how to identify and resolve common software issues, optimize performance, and troubleshoot compatibility problems like a pro.���� Dive deeper into hardware maintenance and optimization with Book 3 - "Advanced Service Desk Techniques: Hardware Maintenance and Optimization." From hardware diagnostics to preventive maintenance, you'll discover expert strategies for keeping your systems running smoothly.���� And finally, in Book 4 - "Expert Service Desk Strategies: Installing and Managing Complex Software Systems," you'll learn how to tackle the most challenging tasks in software deployment and management. From deploying enterprise-level applications to managing complex configurations, you'll gain the skills you need to excel in your role.����]���� Whether you're just starting out in IT support or looking to level up your skills, the "Service Desk Analyst Bootcamp" bundle has you covered. Get your hands on this invaluable resource today and become the ultimate service desk analyst! ����
An iOS Developer's Guide to SwiftUI
Get started with SwiftUI and build efficient iOS apps in this illustrated, easy-to-follow guide with coverage on integration with UIKit, asynchronous programming techniques, efficient app architecture and design patternsKey Features: - Learn how to structure and maintain clean app architecture- Under the guidance of industry expert Michele Fadda, build well-structured, maintainable, and high-performance applications- Understand the declarative functional approach and focus on asynchronous programming within the context of SwiftUI- Purchase of the print or Kindle book includes a free PDF eBookBook Description: - SwiftUI transforms Apple Platform app development with intuitive Swift code for seamless UI design.- Explore SwiftUI's declarative programming: define what the app should look like and do, while the OS handles the heavy lifting.- Hands-on approach covers SwiftUI fundamentals and often-omitted parts in introductory guides.- Progress from creating views and modifiers to intricate, responsive UIs and advanced techniques for complex apps.- Focus on new features in asynchronous programming and architecture patterns for efficient, modern app design.- Learn UIKit and SwiftUI integration, plus how to run tests for SwiftUI applications.- Gain confidence to harness SwiftUI's full potential for building professional-grade apps across Apple devices.What You Will Learn: - Get to grips with UI coding across Apple platforms using SwiftUI- Build modern apps, delving into complex architecture and asynchronous programming- Explore animations, graphics, and user gestures to build responsive UIs- Respond to asynchronous events and store and share data the modern way- Add advanced features by integrating SwiftUI and UIKit to enhance your apps- Gain proficiency in testing and debugging SwiftUI applicationsWho this book is for: - This book is for iOS developers interested in mastering SwiftUI, software developers with extensive iOS development experience using UIkit transitioning to SwiftUI, as well as mobile consultants and engineers who want to gain an in-depth understanding of the framework.- Newcomers equipped with knowledge of Swift, UIkit, XCode, and asynchronous programming will find this book invaluable for launching a career in mobile software development with iOS.Table of Contents- Exploring the Environment - Xcode, Playgrounds, and SwiftUI- Adding Basic UI Elements and Designing Layouts- Adding Interactivity to a SwiftUI View- Iterating Views, Scroll Views, FocusState, Lists, and Scroll View Reader- The Art of Displaying Grids- Tab Bars and Modal View Presentation- All About Navigation- Creating Custom Graphics- An Introduction to Animations in SwiftUI- App Architecture and SwiftUI Part I: the Practical Tools- App Architecture and SwiftUI Part II - the Theory- Persistence with Core Data- Modern Structured Concurrency- An Introduction to SwiftData- Consuming REST Services in SwiftUI- Exploring the Apple Vision Pro
IT Helpdesk Training Best Practices
���� Introducing: IT Helpdesk Training Best Practices Bundle! ����️Are you ready to level up your IT support skills? Look no further! Dive into the ultimate bundle designed to transform you into a desktop support and system administration expert. �������� Book 1: Foundations of IT Support New to IT? No problem! This beginner's guide will walk you through the essentials of desktop troubleshooting, from diagnosing hardware issues to resolving software glitches. Get ready to build a solid foundation for your IT career! �������� Book 2: Mastering Desktop Support Ready to take your skills to the next level? Learn advanced techniques in system administration to optimize desktop environments and tackle complex IT challenges with confidence. Become the go-to expert in your team! ����️���� Book 3: Efficient IT Helpdesk Management Efficiency is key in IT helpdesk management. Discover strategies for streamlining support processes, managing tickets effectively, and keeping stakeholders happy. Say goodbye to chaos and hello to smooth operations! �������� Book 4: Expert-Level Troubleshooting Become a troubleshooting maestro with this expert-level guide! Learn advanced solutions for the most complex IT issues, from network troubleshooting to data recovery techniques. Elevate your troubleshooting game to legendary status! ����With over 1000 pages of invaluable insights and practical techniques, this bundle is your ticket to success in the fast-paced world of IT support and system administration. Don't miss out on this opportunity to become a true IT rockstar! ����Grab your copy now and embark on a journey to IT mastery! ��������✨
Mastering Microsoft Intune - Second Edition
Get ready to master Microsoft Intune and revolutionize your endpoint management strategy with this comprehensive guide and provide next-level security with the Intune Suite. Includes forewords from Scott Manchester, Vice President, Windows 365 + AVD and Steve Dispensa Corporate Vice President, Microsoft Intune.Key FeaturesThis new edition covers the latest updates of Microsoft Intune, Windows 365, Intune Suite, Windows Autopatch, Microsoft Defender and Universal PrintGet detailed guidance on device enrolment, app deployment, management, data security, and policy configurationSecure data on personal devices with app policies, encryption, and moreBook DescriptionThe slow adoption of modern Work solutions, which are designed to streamline the management of your environment, can often be attributed to a lack of understanding and familiarity with those solutions. This book will provide you with all the information you need to successfully transition to Microsoft Intune.Mastering Microsoft Intune, Second Edition, explains various concepts in detail to give you the clarity on how to use Microsoft Intune and eliminate any migration challenges. You'll master Cloud Computing services such as Windows 365 Cloud PCs, Intune Suite, Windows Autopatch, Windows Autopilot, profile management, monitoring and analytics, Universal Print, and much more. The book will take you through the latest features and new Microsoft Cloud services to help you to get grips with the fundamentals of Intune and understand which services you can manage. Whether you're interested in physical or cloud endpoints it's all covered.By the end of the book, you'll be able to set up Intune and use it to run Windows and Windows 365 efficiently, using all the latest features of Intune.What you will learnSimplify the deployment of Windows in the cloud with Windows 365 Cloud PCsDeliver next-generation security features with Intune SuiteSimplify Windows Updates with Windows AutopatchConfigure advanced policy management within IntuneDiscover modern profile management and migration options for physical and Cloud PCsHarden security with baseline settings and other security best practicesFind troubleshooting tips and tricks for Intune, Windows 365 Cloud PCs, and moreDiscover deployment best practices for physical and cloud-managed endpointsWho this book is forIf you're an IT professional, enterprise mobility administrator, architect, or consultant looking to learn about managing Windows on both physical and cloud endpoints using Microsoft Intune, then this book is for you.Table of ContentsIntroduction to Microsoft 365Cloud-Native EndpointsRequirements for Microsoft IntuneWhat is Windows 365?Deploying Windows 365Windows Deployment and ManagementWindows AutopilotApplication Management and DeliveryUnderstanding Policy ManagementAdvanced Policy ManagementIntune SuiteCopilot/AIIdentity and Security ManagementMonitoring and Endpoint AnalyticsUniversal PrintTroubleshooting Microsoft IntuneTroubleshooting Windows 365Community Help
The Metaverse for Learning and Education
Accompanying The Metaverse: A Critical Introduction in CRC Press' new The Metaverse Series, this book explores the ways in which the Metaverse can be used for education and learning, as well as how it is different from virtual reality (VR) application development. For example, institutions and tutors can make use of the Metaverse space to represent themselves in it or create their own content and share experiences, whilst students can access a wider range of material, learn within appropriate settings and create content to support their own and others' learning.Key Features: - Provides practical advice from the authors' collective three decades of work and experience in VR and Metaverse learning and education.- Examines different approaches to learning that are relevant in a VR and Metaverse context, including theoretical and practical approaches to pedagogy.- Suggests different approaches to learning that might be used and explores learning in practice in the metaverse - from early versions such as computer-supported collaborative learning and action learning through to more recent practices such as games and gamification and the use of problem-based learning in virtual worlds.- Examines a number of advantages of learning in the metaverse such as the opportunity to be inclusive towards different approaches to learning, the value of affordances, peer-to-peer learning and genres of participation.This book is aimed primarily at practitioners in the learning and education field, and those who set policy and commission work. It may also be of interest to parents, managers, other interested professionals, students, researchers and lay readers.
Mastering Kotlin for Android 14
Accelerate your Android development journey by mastering the latest Kotlin techniques and libraries to build robust apps with the help of this part-color guideKey Features- Apply best practices and industry-essential skills used by Google Developer Experts- Find out how to publish, monitor, and improve your app metrics on the Google Play Store- Learn how to debug issues, detect leaks, inspect network calls, and inspect your app's local database- Purchase of the print or Kindle book includes a free PDF eBookBook DescriptionWritten with the best practices, this book will help you master Kotlin and use its powerful language features, libraries, tools, and APIs to elevate your Android apps.As you progress, you'll use Jetpack Compose and Material Design 3 to build UIs for your app, explore how to architect and improve your app architecture, and use Jetpack Libraries like Room and DataStore to persist your data locally. Using a step-by-step approach, this book will teach you how to debug issues in your app, detect leaks, inspect network calls fired by your app, and inspect your Room database. You'll also add tests to your apps to detect and address code smells.Toward the end, you'll learn how to publish apps to the Google Play Store and see how to automate the process of deploying consecutive releases using GitHub actions, as well as learn how to distribute test builds to Firebase App Distribution. Additionally, the book covers tips on how to increase user engagement.By the end of this Kotlin book, you'll be able to develop market-ready apps, add tests to their codebase, address issues, and get them in front of the right audience.What you will learn- Build beautiful, responsive, and accessible UIs with Jetpack Compose- Explore various app architectures and find out how you can improve them- Perform code analysis and add unit and instrumentation tests to your apps- Publish, monitor, and improve your apps in the Google Play Store- Perform long-running operations with WorkManager and persist data in your app- Use CI/CD with GitHub Actions and distribute test builds with Firebase App Distribution- Find out how to add linting and static checks on CI/CD pipelinesWho this book is forIf you're an aspiring Android developer or an Android developer working with Java, then this book is for you. Basic Java programming skills are a must if you want to fully utilize the techniques and best practices showcased in this book.Table of Contents- Get Started with Kotlin Android Development- Creating Your First Android App- Jetpack Compose Layout Basics- Design with Material Design 3- Architect Your app- Network Calls with Kotlin Coroutines- Navigating within Your App- Persisting Data Locally and Doing Background Work- Runtime Permissions- Debugging Your App- Enhancing Code Quality- Testing Your App- Publishing Your App- Continuous Integration and Continuous Deployment- Improving Your App
Operating Systems 101
���� Welcome to the ultimate operating systems book bundle! ����Get ready to level up your skills with "Operating Systems 101: Novice to Expert" - a comprehensive collection covering Windows, Linux, UNIX, iOS, and Android. ��������️ Book 1: "Windows Mastery" ����️ Perfect for beginners, this guide unlocks the secrets of Windows operating systems, helping you navigate with ease and confidence. Say goodbye to confusion and hello to Windows mastery! �������� Book 2: "Linux Unleashed" ���� From novice to system administrator, this book takes you on a journey through Linux, empowering you to harness its power and become a Linux expert. Say hello to the world of open-source possibilities! �������� Book 3: "Unlocking UNIX" ���� Ready to take your skills to the next level? Dive into advanced techniques for UNIX operating systems and discover the keys to unlocking its full potential. Elevate your UNIX game like never before! �������� Book 4: "iOS Demystified" ���� Explore the inner workings of Apple's iOS with expert insights and insider knowledge. Whether you're a developer or a curious user, this book will unravel the mysteries of iOS and empower you to make the most of your Apple devices. �������� Book 5: "Android Engineering" ���� Become a master of the world's most popular mobile operating system - Android! From app development to system optimization, this book has everything you need to engineer greatness on the Android platform. Get ready to dominate the mobile world! �������� Why choose this bundle? ����- Comprehensive coverage of five major operating systems- Suitable for beginners and experts alike- Expert insights and insider knowledge- Practical tips and techniques for real-world application- Unlock your full potential and become an operating system expert!Don't miss out on this opportunity to become a true operating systems guru. Grab your bundle today and embark on a journey to operating system mastery! ����
Android Development With Kotlin
���� ANDROID DEVELOPMENT WITH KOTLIN: NOVICE TO NINJA ����Are you ready to level up your Android development skills? ���� Look no further! Introducing our comprehensive book bundle - "Android Development with Kotlin: Novice to Ninja." ����With four action-packed volumes, this bundle covers everything you need to know to become a Kotlin Android development expert: ���� Book 1: Kotlin Essentials Kickstart your journey with the basics! ���� Learn the fundamental concepts of Kotlin programming language and its integration with Android development. Perfect for beginners!���� Book 2: Building Dynamic UIs Ready to take your skills to the next level? ���� Discover intermediate Kotlin techniques for creating dynamic and engaging user interfaces in your Android apps. Say goodbye to boring UIs!���� Book 3: Advanced Android Architecture Become a master architect! ���� Dive deep into advanced Kotlin patterns and best practices for designing scalable, maintainable, and robust Android architectures. Elevate your app's architecture game!���� Book 4: Optimizing Performance Make your apps shine! ✨ Explore expert strategies for optimizing the performance of your Kotlin Android applications. From memory management to network optimization, become a performance guru!���� Why Choose Our Book Bundle?- Comprehensive coverage of Kotlin essentials, UI design, architecture, and performance optimization.- Perfect for beginners and experienced developers alike.- Practical, hands-on tutorials and real-world examples.- Written by industry experts with years of experience in Android development.- Packed with actionable tips and best practices to help you build high-quality Kotlin Android apps.���� Don't miss out on this opportunity to become an Android ninja! ���� Whether you're just starting or looking to sharpen your skills, this book bundle has something for everyone. ���� Grab your copy now and embark on the journey to Android mastery! ����
Microsoft 365 and SharePoint Online Cookbook - Second Edition
Unlock over 100 recipes for mastering Microsoft 365. Boost productivity with Copilot, collaborate with SharePoint and Teams, automate tasks, create apps and reports using Power Automate (with RPA), Power Apps, Power BI, and more.Print or Kindle book purchase includes a free PDF eBook.Key Features- Enhance collaboration and productivity using SharePoint, Teams, OneDrive, Viva, Planner, and Microsoft Forms- Automate processes, build apps, bots, and dashboards with Power Automate (with RPA), Power Apps, Copilot Studio, and Power BI- Harness Copilot, the new AI virtual assistant, for seamless support in your everyday tasksBook DescriptionMicrosoft 365 offers tools for content management, communication, process automation, and report creation. Microsoft 365 and SharePoint Online Cookbook maximizes workplace collaboration and productivity using SharePoint Online, Teams, OneDrive, Delve, M365 Search, Copilot, Power Platform, Viva, Planner, and Microsoft Forms.You will find thoroughly updated recipes for SharePoint Online, covering sites, lists, libraries, pages, web parts, and learn SharePoint Framework (SPFx) basics for building solutions. You will explore many Microsoft Teams recipes to prepare it to be your organization's central collaboration hub. You will be able to unlock Power Platform potential with recipes for Power Apps to enable low-code/no-code app development and learn to automate tasks with Power Automate and Power Automate Desktop. The book teaches you data visualization with Power BI, and chatbot creation with Power Virtual Agents (Copilot Studio). Finally, you will also learn about the cutting-edge Copilot and Gen AI functionality in Microsoft 365 and Power Platform. By the end, you will be equipped with skills to effectively use Microsoft 365, SharePoint Online, and the Power Platform.Whether it's enhancing career prospects or improving business operations, this book is a perfect companion on your journey through the Microsoft Office 365 suite.What you will learn- Collaborate effectively with SharePoint, Teams, OneDrive, Delve, Search, and Viva- Boost creativity and productivity with Microsoft Copilot- Develop and deploy custom applications using Power Apps- Create custom bots using Power Virtual Agents (Copilot Studio)- Integrate with other apps, automate workflows and repetitive processes with Power Automate/Desktop (RPA)- Design reports and engaging dashboards with Power BI- Utilize Planner, To Do, and gather feedback with polls and surveys in Microsoft Forms- Experience seamless integration in the mobile platforWho this book is forThis cookbook caters to professionals stepping into the world of Microsoft 365 and SharePoint Online. It is tailored for a broad spectrum of skillsets including general business professionals, IT administrators, and enterprise architects who are newcomers to Microsoft 365, offering valuable insights for establishing a contemporary, digital workplace effectively.Table of Contents- Overview of Microsoft 365- Introduction to SharePoint Online- Modern Sites in SharePoint Online- Lists and Libraries in SharePoint Online- Document Management in SharePoint Online- OneDrive- Microsoft Teams- Power Automate (Microsoft Flow)- Creating Power Apps- Applying Power Apps- Power BI- Overview of Copilot in Microsoft 365 and Power Platform- Term Store and Content Types in SharePoint Online- Search in Microsoft 365- Microsoft Delve (N.B. Please use the Read Sample option to see further chapters)
Linux Kernel Programming - Second Edition
Gain both a firm practical understanding and sufficient theoretical insight into the inner workings of Linux kernel internals, learn to write high-quality kernel module code, understand the complexities of kernel synchronizationPurchase of the print or Kindle book includes a free eBook in PDF format.Key FeaturesDiscover how to write Linux kernel and module code for real-world productsImplement industry-grade techniques in real-world scenarios for fast, efficient memory allocation and data synchronizationUnderstand and exploit kernel architecture, CPU scheduling, and kernel synchronization techniquesBook DescriptionThe 2nd Edition of Linux Kernel Programming is an updated, comprehensive guide for new programmers to the Linux kernel. This book uses the recent 6.1 Long-Term Support (LTS) Linux kernel series, which will be maintained until Dec 2026, and also delves into its many new features. Further, the Civil Infrastructure Project has pledged to maintain and support this 6.1 Super LTS (SLTS) kernel right until August 2033, keeping this book valid for years to come!You'll begin this exciting journey by learning how to build the kernel from source. In a step by step manner, you will then learn how to write your first kernel module by leveraging the kernel's powerful Loadable Kernel Module (LKM) framework. With this foundation, you will delve into key kernel internals topics including Linux kernel architecture, memory management, and CPU (task) scheduling. You'll finish with understanding the deep issues of concurrency, and gain insight into how they can be addressed with various synchronization/locking technologies (e.g., mutexes, spinlocks, atomic/refcount operators, rw-spinlocks and even lock-free technologies such as per-CPU and RCU).By the end of this book, you'll have a much better understanding of the fundamentals of writing the Linux kernel and kernel module code that can straight away be used in real-world projects and products.What you will learnConfigure and build the 6.1 LTS kernel from sourceWrite high-quality modular kernel code (LKM framework) for 6.x kernelsExplore modern Linux kernel architectureGet to grips with key internals details regarding memory management within the kernelUnderstand and work with various dynamic kernel memory alloc/dealloc APIsDiscover key internals aspects regarding CPU scheduling within the kernel, including cgroups v2Gain a deeper understanding of kernel concurrency issuesLearn how to work with key kernel synchronization primitivesWho this book is forThis book is for beginner Linux programmers and developers looking to get started with the Linux kernel, providing a knowledge base to understand required kernel internal topics and overcome frequent and common development issues.A basic understanding of Linux CLI and C programming is assumed.Table of ContentsLinux Kernel Programming - A Quick IntroductionBuilding the 6.x Linux Kernel from Source - Part 1Building the 6.x Linux Kernel from Source - Part 2Writing Your First Kernel Module - Part 1Writing Your First Kernel Module - Part 2Kernel Internals Essentials - Processes and ThreadsMemory Management Internals - EssentialsKernel Memory Allocation for Module Authors - Part 1Kernel Memory Allocation for Module Authors - Part 2The CPU Scheduler - Part 1The CPU Scheduler - Part 2Kernel Synchronization - Part 1Kernel Synchronization - Part 2