Practical Paranoia macOS 13 Security Essentials
New edition, completely updated December 14, 2022 for macOS 13 Ventura. The best-selling, easiest, step-by-step, most comprehensive guide to securing your home or business macOS computers, data, and communications.Official workbook for the Practical Paranoia Security Essentials Workshop, STEM and college cybersecurity courses. Designed for instructor-led, self-study, and DIY. The entire course is contained within the book. Includes all instructor presentations, hands-on assignments, links to all software, and security checklist.You don't need to be paranoid to know they are out there to get your computer, data, and identity.- 2,000,000 laptops were stolen or lost in the US last year.- Only 3% of stolen computers are ever recovered.- Malware attacks on macOS have become commonplace.- Hundreds of eyes may be able to see your name and password, along with the contents of every email you send.- It may take the bad guy under one minute to bypass your password to gain access to all your data.- With a slight bit of social engineering, your iCloud, Facebook, LinkedIn, Google, and other social media accounts, along with all your data, is freely accessible.- Through PRISM and other avenues, our government has access to your online browsing and email history.You don't need to be an Apple Genius to protect your system!In this easy, step-by-step guide, CIO, Security Specialist, and Apple Certified Technical Coordinator Marc L. Mintz takes any macOS user-from the novice with no technical skills, to experienced IT professional-through the process of fully encrypting and hardening the security of their computer, data, email, documents, network, instant messaging, storage devices, iCloud, browsing, and entire Internet experience.Guaranteed to be the easiest to follow and most comprehensive macOS cybersecurity book available.
OpenBSD Mastery
"Many users assume that their advanced filesystem is better than UFS because they have so many features-snapshots, checksums, compression, sophisticated caching algorithms, and so on-while all UFS has ever done is muck about putting data on disk. But, conversely, UFS users believe their filesystem is better for exactly the same reasons."-Hitchhikers Guide to OpenBSDDisk management is the core of system administration. Nobody can tell you how large that database is going to grow or how many files that archive must eventually support, but for everything else there's OpenBSD Mastery: Filesystems. This guide takes you through the latest in OpenBSD storage management, including: - OpenBSD's cross-platform storage stack- MBR, GPT, and disklabel partitions- The Unix File System- Growing, removing, and repairing filesystems- Memory file systems- The Buffer Cache- Why you need swap, and how to live with it- Coping with FAT, NTFS, EXT, and more- The Network File System- iSCSI- Software RAID- Encrypted filesystems- Encrypted installsAnd more! Partition yourself for success and grab OpenBSD Mastery: Filesystems now.
OpenBSD Mastery
"Many users assume that their advanced filesystem is better than UFS because they have so many features-snapshots, checksums, compression, sophisticated caching algorithms, and so on-while all UFS has ever done is muck about putting data on disk. But, conversely, UFS users believe their filesystem is better for exactly the same reasons."-Hitchhikers Guide to OpenBSDDisk management is the core of system administration. Nobody can tell you how large that database is going to grow or how many files that archive must eventually support, but for everything else there's OpenBSD Mastery: Filesystems. This guide takes you through the latest in OpenBSD storage management, including: - OpenBSD's cross-platform storage stack- MBR, GPT, and disklabel partitions- The Unix File System- Growing, removing, and repairing filesystems- Memory file systems- The Buffer Cache- Why you need swap, and how to live with it- Coping with FAT, NTFS, EXT, and more- The Network File System- iSCSI- Software RAID- Encrypted filesystems- Encrypted installsAnd more! Partition yourself for success and grab OpenBSD Mastery: Filesystems now.
Accelerated macOS Core Dump Analysis, Third Edition
The full transcript of Software Diagnostics Services training with 12 step-by-step exercises. Learn how to analyze app crashes and freezes, navigate through process core memory dump space and diagnose corruption, memory leaks, CPU spikes, blocked threads, deadlocks, wait chains, and much more. We use a unique and innovative pattern-driven analysis approach to speed up the learning curve. The training consists of practical step-by-step exercises using Xcode and LLDB environments, highlighting more than 30 analysis patterns from Software Diagnostics Institute diagnosed in ARM64 process core memory dumps. The training also includes an overview of relevant similarities and differences between Windows and macOS user space memory dump analysis useful for engineers with a Wintel background and the relevant ARM64 disassembly tutorial. The course is thoroughly updated for the latest macOS version and M2 platform. The primary audience for this training is software technical support and escalation engineers who analyze crash reports and memory dumps, quality assurance and software engineers who test and debug macOS software, security and vulnerability researchers, and malware and memory forensics analysts who have never used LLDB for the analysis of computer memory.
Accelerated Windows API for Software Diagnostics
The book contains the full transcript of Software Diagnostics Services training with 10 hands-on exercises on various topics related to Windows API. Knowledge of Windows API is necessary for: DevelopmentMalware analysisVulnerability analysis and exploitationReversingDiagnosticsDebuggingMemory forensicsCrash and hang analysisSecure codingStatic code analysisTrace and log analysisThe training uses a unique and innovative pattern-oriented analysis approach and provides: OverviewClassificationPatternsInternalsDevelopment examplesAnalysis examples
Exploring Apple Mac Ventura Edition
We've all been there before, glaring at a computer screen with no idea what to do - don't worry Exploring Apple Mac is here to help. Written by best-selling technology author, lecturer, and computer trainer Kevin Wilson, Exploring Apple Mac is packed with over 450 pages of full color screenshots, illustrations, helpful tips, and easy to follow instructions along with video demos.Updated to cover the Ventura release of MacOS, Exploring Apple Mac will help you understand the fundamentals of your Mac. You'll learn how to: Upgrade your Mac to Ventura and explore new features such as passkeys, FreeForm and stage managerFind your way around the desktop, dock, finder, and launchpad in MacOSMaster touch gestures, trackpads and the magic mouse to get around your MacUse Notification Centre, Handoff, Spaces, Control Center, Universal Control, and Universal Clipboard in MacOSOrganising files and folders in Finder in MacOSBrowse the web with the Safari Web Browser safely and efficiently in MacOSKeep in touch with friends and family using email, iMessage, and FaceTime video chat on your macSet important appointments with CalendarKeep the people you correspond with in the Contacts appSet yourself reminders and 'to-do' listsCheck the weather on your macRecord voice memos Download countless apps from the App Store on your macCatch up with your favourite podcasts and the latest newsRead ebooks on your macFind your way around with the Maps App, get directions, create guides, explore places in 3D, and use the interactive globeUse the clock app to set alarms, timers, and world clocksStream music with Apple Music, buy tracks & albums from iTunes StoreStream TV programs & movies with the Apple TV AppGetting started with Pages, Keynote and Numbers on your MacUsing iCloud storage on your MacUse time machine to back up your data stored on your MacGet to know Siri in MacOSUse the photos app to store and enhance your photosCreate slideshows, photo albums and use iMovie to edit your home movies and more...Finally, system updates and maintenance tips to help you keep your Mac running smoothly complete this invaluable guide. So order yourself a copy today, and keep it handy as you make your way around the new OS.We want to create the best possible resource to help you, so if we've missed anything out then please get in touch using office@elluminetpress.com and let us know. Thanks.
Dell VxRail System Design and Best Practices
Design, build, and protect your clusters with ease with VxRail, Dell's hyper-converged infrastructure solution, and this comprehensive in-depth guideKey Features: Combine your virtualization systems into one with this comprehensive guide to VxRailProtect against data loss with a variety of backup, replication, and recovery optionsTake your virtualization skills to the next level thanks to Dell's hyper-converged infrastructureBook Description: Virtualized systems are well established now, and their disparate components can be found bundled together in hyper-converged infrastructures, such as VxRail from Dell EMC. Dell VxRail System Design and Best Practices will take you, as a system architect or administrator, through the process of designing and protecting VxRail systems.While this book assumes a certain level of knowledge of VMware, vSphere 7.x, and vCenter Server, you'll get a thorough overview of VxRail's components, features, and architecture, as well as a breakdown of the benefits of this hyper-converged system. This guide will give you an in-depth understanding of VxRail, as well as plenty of practical examples and self-assessment questions along the way to help you plan and design every core component of a VxRail system - from vSAN storage policies to cluster expansion. It's no good having a great system if you lose everything when it breaks, so you'll spend some time examining advanced recovery options, such as VMware Site Recovery Manager and Veeam Backup and Replication.By the end of this book, you will have got to grips with Dell's hyper-converged VxRail offering, taking your virtualization proficiency to the next level.What You Will Learn: Design vSAN storage policiesScale-out and expand clustersDesign stretched clustersProtect your system with VMware Site Recovery ManagerDiscover how to configure EMC RecoverPoint for Virtual MachinesIntegrate Veeam Backup and Replication with VxRailSet up a vSAN 2-node clusterWho this book is for: This book is for system architects, system administrators, or consultants involved in planning and designing VxRail HCI. The reader is expected to have equivalent knowledge and administration experience with VMware vSphere 7. x and vCenter Server 7.x.
Cybersecurity and Privacy Law Handbook
Get to grips with cybersecurity and privacy laws to protect your company's data and comply with international privacy standardsKey Features: Comply with cybersecurity standards and protect your data from hackersIdentify the gaps in your company's security posture using gap analysis and business impact analysisUnderstand what you need to do for security and privacy without needing to pay consultantsBook Description: Cybercriminals are incessantly coming up with new ways to compromise online systems and wreak havoc, creating an ever-growing need for cybersecurity practitioners in every organization across the globe who understand international security standards, such as the ISO27k family of standards.If you're looking to ensure that your company's data conforms to these standards, Cybersecurity and Privacy Law Handbook has got you covered. It'll not only equip you with the rudiments of cybersecurity but also guide you through privacy laws and explain how you can ensure compliance to protect yourself from cybercrime and avoid the hefty fines imposed for non-compliance with standards.Assuming that you're new to the field, this book starts by introducing cybersecurity frameworks and concepts used throughout the chapters. You'll understand why privacy is paramount and how to find the security gaps in your company's systems. There's a practical element to the book as well-you'll prepare policies and procedures to prevent your company from being breached. You'll complete your learning journey by exploring cloud security and the complex nature of privacy laws in the US.By the end of this cybersecurity book, you'll be well-placed to protect your company's data and comply with the relevant standards.What You Will Learn: Strengthen the cybersecurity posture throughout your organizationUse both ISO27001 and NIST to make a better security frameworkUnderstand privacy laws such as GDPR, PCI CSS, HIPAA, and FTCDiscover how to implement training to raise cybersecurity awarenessFind out how to comply with cloud privacy regulationsExamine the complex privacy laws in the USWho this book is for: If you're a seasoned IT security or cybersecurity pro, this book isn't for you. This book is for novices, freshers, students, experts in other fields, as well as managers who want to learn the workings and management of a security function. Although this book will teach you how to build and manage a security function on your own, you'll also find it valuable if you want to supervise a team devoted to implementing cybersecurity and privacy practices in an organization.
Administering Windows Server Hybrid Core Infrastructure AZ-800 Exam Guide
Breeze through the AZ-800 certification with this up-to-date practical guide and gain valuable skills that will help you in your day-to-day administrationKey Features: Develop a solid base of all the essentials necessary to pass AZ-800 certification exam on your first attemptGo beyond exam prep by working on practical examples that will prepare you for the work aheadSimplify and automate your workflows with Windows Admin Center, PowerShell, Azure Arc, and IaaS VMBook Description: Written by an Azure MVP and Microsoft Certified Trainer with 20 years of experience in data center infrastructure, this AZ-800 study guide is an essential preparation tool for administrators who want to take the exam and acquire key skills that will help them thrive in their careers.This book will guide you through all the ways Windows Server can be used to manage hybrid solutions on-premises and in the cloud, starting with deploying and managing Active Directory Domain Services (AD DS) in on-premises and cloud environments. You'll then dive into managing virtual machines and containers and progress to implementing and managing an on-premises and hybrid networking infrastructure.The later parts of the book focus on managing storage and file services, concluding with a detailed overview of all the knowledge needed to pass the AZ-800 exam with practical examples throughout the chapters. In the final chapter, you'll be able to test your understanding of the topics covered with the help of practice exams to make sure that you're completely prepared for the contents and structure of the exam.By the end of the book, you'll have gained the knowledge, both practical and conceptual, that's required to administer Windows Server hybrid core infrastructure confidently.What You Will Learn: Deploy and manage AD DS on-premises and in cloud environmentsImplement and manage hybrid core infrastructure solutions for compute, storage, networking, identity, and managementDiscover expert tips and tricks to achieve your certification in the first goMaster the hybrid implementation of Windows Server running as virtual machines and containersManage storage and file services with easeWork through hands-on exercises to prepare for the real worldWho this book is for: This book is for Windows Server administrators who want to pass the AZ-800 and implement hybrid infrastructure on premises and in the cloud. Azure administrators, enterprise architects, Microsoft 365 administrators, and network engineers will also get plenty of useful insights from this book. You'll need a solid understanding of the Windows Server to get started with this book, especially if you're preparing for the exam.
Linux Mint 21
Linux mint 21 (Vanessa) is based on the Ubuntu 22.04 LTR (Long Term Release). The Cinnamon and Mate desktops are examined in detail. Cinnamon and Mate have custom Mint menus to manage access to applications and devices. Advanced components are also examined such as the LightDM Display Manager, Warpinator, Timeshift, NetworkManager, the Samba server, and Mint software management applications (Software Manager and Update Manager). The Linux Mint X-Apps are also reviewed, including Xed, Xviewer, and Timeshift. Administration topics include system tools, managing users, file systems, Bluetooth setup (Blueman), printer configuration, and network folder and file sharing. In addition, configuration of wired and wireless connections, firewalls, and service management using systemd are covered. Shared resources are also examined, including the CUPS printing server, the NFS Linux network file server, and Samba Windows file server.
9front the Golden Age of Ballooning
9front is a fork of the Plan 9 from Bell Labs operating system. This publication is a print edition of the 9front Dash 1 manual. It is very likely outdated.
Linux All-In-One for Dummies
Linux is for everyone! Linux All-in-One For Dummies breaks down the ever-popular operating system to its basics and trains users on the art of Linux. This handy reference covers all the latest updates and operating system features. It presents content on Linux desktops, applications, and more. With eight books in one, you'll have access to the most comprehensive overview of Linux around. Explore the inner workings of Linux machines, so you'll know Linux front to back. This all-inclusive handbook also walks you through solving Linux problems--complete with hands-on examples--so you'll be a Linux whiz before you know it. Get familiar with Linux as you install and customize the operating system Learn how to navigate the file system, use the Linux shell, and get online Become a Linux guru with server hosting, scripting, and security how-tos Study for your Linux certification by using this complete guide as your referenceThis book is a massive source of support for beginning and intermediate Linux users, as well as those looking to brush up on their knowledge for certification. And, thanks to the signature Dummies approach, it's also a lot of fun.
Red Hat Enterprise Linux 9 Administration - Second Edition
Develop the skills required to administer your RHEL environment on-premises and in the cloud while preparing for the RHCSA examPurchase of the print or Kindle book includes a free eBook in PDF formatKey Features- Become a pro at system administration from installation to container management- Secure and harden your Linux environment using SSH, SELinux, firewall, and system permissions- Gain confidence to pass the RHCSA exam with the help of practice testsBook DescriptionWith Red Hat Enterprise Linux 9 becoming the standard for enterprise Linux used from data centers to the cloud, Linux administration skills are in high demand. With this book, you'll learn how to deploy, access, tweak, and improve enterprise services on any system on any cloud running Red Hat Enterprise Linux 9.Throughout the book, you'll get to grips with essential tasks such as configuring and maintaining systems, including software installation, updates, and core services. You'll also understand how to configure the local storage using partitions and logical volumes, as well as assign and deduplicate storage. You'll learn how to deploy systems while also making them secure and reliable.This book provides a base for users who plan to become full-time Linux system administrators by presenting key command-line concepts and enterprise-level tools, along with essential tools for handling files, directories, command-line environments, and documentation for creating simple shell scripts or running commands. With the help of command line examples and practical tips, you'll learn by doing and save yourself a lot of time.By the end of the book, you'll have gained the confidence to manage the filesystem, users, storage, network connectivity, security, and software in RHEL 9 systems on any footprint.What You Will Learn- Become well versed with the fundamentals of RHEL9-from system deployment to user management- Secure a system by using SELinux policies and configuring firewall rules- Understand LVM to manage volumes and maintain VDO deduplication- Manage a system remotely using SSH and public key authentication- Get the hang of the boot process and kernel tunable to adjust your systems- Automate simple tasks using scripts or Ansible PlaybooksWho this book is forThis book is for Red Hat Enterprise Linux system administrators and Linux system administrators. It's also a good resource for any IT professional who wants to learn system administration. RHCSA certification candidates will find this book useful in their preparation for the certification exam.Table of Contents- Getting RHEL Up and Running- RHEL 9 Advanced Installation Options- Basic Commands and Simple Shell Scripts- Tools for Regular Operations- Securing Systems with Users, Groups, and Permissions- Enabling Network Connectivity- Adding, Patching, and Managing Software- Administering Systems Remotely- Securing Network Connectivity with firewalld- Keeping Your System Hardened with SELinux- System Security Profiles with OpenSCAP- Managing Local Storage and Filesystems- Flexible Storage Management with LVM- Advanced Storage Management with Stratis and VDO- Understanding the Boot Process- Kernel Tuning and Managing Performance Profiles with tuned- Managing Containers with Podman, Buildah, and Skopeo- Practice Exercises - 1- Practice Exercises - 2
Salesforce for Beginners - Second Edition
Learn how to leverage the Salesforce platform for sales, service, marketing, and automating business activities from a 360-degree perspective.Purchase of the print or Kindle book includes a free eBook in the PDF format.Key Features: Enhanced with reader feedback and updated with the latest UI for efficient learningLearn how to use Salesforce Flow, the new replacement for workflow rules and process builders on the Salesforce platformBecome familiar with the basics of Salesforce administration and mobile app setupBook Description: Salesforce is the world's leading Customer Relationship Management (CRM) software, helping businesses connect with their constituents and partners. This book will give you a comprehensive introduction to managing sales, marketing, customer relationships, and overall administration for your organization. You'll learn how to configure and use Salesforce for maximum efficiency and return on investmentThis book will teach you how to create activities, manage leads, manage users, set up security, customize your UX, work with third-party applications, build flows, develop your prospects and sales pipeline using opportunities and accounts, understand how you can enhance marketing activities using campaigns and much more. Packed with real-world business use cases, this Salesforce book will show you how to analyze your business information accurately to make productive decisions for your business. As you advance, you'll learn how to build various reports and dashboards in Salesforce to derive valuable business insights. Finally, you'll explore tools such as Flows, Approval Processes, and Assignment Rules to achieve business process automation and set out on the path to becoming a successful Salesforce administratorBy the end of the book, you will know how to manipulate Salesforce to achieve your business goalsWhat You Will Learn: Explore business development with leads, accounts and contacts in SalesforceFind out how stages and sales processes help you manage your opportunity pipelineAchieve marketing goals using Salesforce campaignsPerform business analysis using reports and dashboardsPractice automating with Flows, the main automation tool for SalesforceGain a high-level overview of the items in the administration sectionGrasp the different aspects needed to build an effective Salesforce security modelWho this book is for: If you are new to Salesforce and want to learn it from scratch, an administrator looking to build your Salesforce skills, or a student looking to start a career in Salesforce, this book is for you. No prior knowledge of the Salesforce is required to get started with this book
UNIX Programming
Functioning of UNIX operating system with shell programming KEY FEATURES ● Equipped with installation, administration, and best practices for UNIX system management.● Provides a wide range of shell scripting and Unix-based solutions.● UNIX foundations, Resource Management, Socket Programming, Shell Scripting, and the C Interface are all covered. DESCRIPTION This book is intended to be an instructional tool and study guide for those interested in learning about the principles of the UNIX operating system, process management, socket programming, and numerous shell scripting techniques. First, you will learn about the UNIX system architecture and programming environment, which provide an overview of all system resources and their management. Then, Unix file systems, Kernel data structures for performing file I/O, Basic File permissions and Library functions, and UNIX system calls are discussed. Process control, parallel execution, user data access, and signal management are just some of the topics covered in this book. Next, we'll go through the basics of network communication, such as system calls, data transmission over sockets, and I/O multiplexing models. Finally, the book discusses more advanced UNIX and C interface concepts such as library functions, command-line arguments, and environment variables. Throughout the book, you'll find plenty of solutions, exercises, and shell scripts to help you get the most out of your hands-on experience with the UNIX system. WHAT YOU WILL LEARN● Investigate every aspect of the UNIX operating system.● Understand how to use the shell and how to develop shell scripts.● Acquaint yourself with all of UNIX's file and process components.● Gain a working knowledge of file access and manipulation.● Learn more about inter-process communication and its many methods.WHO THIS BOOK IS FORThe book appeals to UNIX professionals, students, master's degree applicants, and candidates for competitive exams who wish to understand UNIX principles thoroughly. However, it is written for beginners and may be read by anyone without prior understanding.
Certified Kubernetes Administrator (CKA) Exam Guide
Develop a deep understanding of Kubernetes and the cloud native ecosystem, and pass the CKA exam with confidence with this end-to-end study guideKey Features: Get to grips with the core concepts of Kubernetes API primitivesDeploy, configure, manage, and troubleshoot Kubernetes clustersCement your credibility in the job market by becoming a Certified Kubernetes AdministratorBook Description: Kubernetes is the most popular container orchestration tool in the industry. The Kubernetes Administrator certification will help you establish your credibility and enable you to efficiently support the business growth of individual organizations with the help of this open source platform.The book begins by introducing you to Kubernetes architecture and the core concepts of Kubernetes. You'll then get to grips with the main Kubernetes API primitives, before diving into cluster installation, configuration, and management. Moving ahead, you'll explore different approaches while maintaining the Kubernetes cluster, perform upgrades for the Kubernetes cluster, as well as backup and restore etcd. As you advance, you'll deploy and manage workloads on Kubernetes and work with storage for Kubernetes stateful workloads with the help of practical scenarios. You'll also delve into managing the security of Kubernetes applications and understand how different components in Kubernetes communicate with each other and with other applications. The concluding chapters will show you how to troubleshoot cluster- and application-level logging and monitoring, cluster components, and applications in Kubernetes.By the end of this Kubernetes book, you'll be fully prepared to pass the CKA exam and gain practical knowledge that can be applied in your day-to-day work.What You Will Learn: Understand the fundamentals of Kubernetes and its toolsGet hands-on experience in installing and configuring Kubernetes clustersManage Kubernetes clusters and deployed workloads with easeGet up and running with Kubernetes networking and storageManage the security of applications deployed on KubernetesFind out how to monitor, log, and troubleshoot Kubernetes clusters and apps among othersWho this book is for: This book is for application developers, DevOps engineers, data engineers, and cloud architects who want to pass the CKA exam and certify their Kubernetes Administrator skills in the market. Basic knowledge of Kubernetes is recommended to get the most out of this book.
Ubuntu 22.04 LTS Desktop
This book covers the Ubuntu 22.04 LTS (Jammy Jellyfish) release, focusing on applications and administrative tools. The emphasis here is on what users will face when using Ubuntu, covering topics like installation, applications, software management for Snap and APT, the Ubuntu desktops (GNOME, MATE, and KDE), shell commands, network connections, and system administration tasks. There are four parts: Getting Started, Applications, Desktops, and Administration.Part 1 focuses on getting started, covering Ubuntu information and resources, using the Ubuntu Live DVD/USB drive, installing and setting up Ubuntu, upgrading Ubuntu, basic use of the desktop interface, and connecting to wired and wireless networks. Repositories and their use are covered in detail, along with the new Snap system for managing Snap packages. Ubuntu Snap package management with Ubuntu Software, the snap command, the Snap Store are examined, as well as APT package management with Gnome Software, the Synaptic Package Manager, and the apt and apt-get commands.Part 2 keys in on office, multimedia, mail, Internet, and social media applications. Part 3 covers the Ubuntu, Kubuntu, Ubuntu MATE, Xubuntu, and Lubuntu desktops. as well as the BASH shell. The Ubuntu desktop, which uses GNOME, is examined in detail. Part 4 deals with administration topics, first discussing system tools like the GNOME system monitor, the Disk Usage Analyzer, Seahorse, and Disk Utility. Then a detailed chapter on Ubuntu system administration tools is presented, covering tasks such as managing users and file systems, Bluetooth setup, network folder sharing, backups, and printing. The network connections chapter covers a variety of network tasks, including manual configuration of wired and wireless connections, and firewalls.
Mastering Ubuntu Server - Fourth Edition
Your one-stop resource to learn, configure and use Ubuntu 22.04 for your day-to-day operations and deployments.Purchase of the print or Kindle book includes a free eBook in PDF format.Key FeaturesGet well-versed with newly added features in Ubuntu 22.04Master the art of installing, managing, and troubleshooting Ubuntu ServerLeverage the improved performance and security-related aspects of Ubuntu Server 22.04Book DescriptionUbuntu Server is taking the server world by storm - and for a good reason! The server-focused spin of Ubuntu is a stable, flexible, and powerful enterprise-class distribution of Linux with a focus on running servers both small and large. Mastering Ubuntu Server is a book that will teach you everything you need to know in order to manage real Ubuntu-based servers in actual production deployments. This book will take you from initial installation to deploying production-ready solutions to empower your small office network, or even a full data center. You'll see examples of running an Ubuntu Server in the cloud, be walked through set up popular applications (such as Nextcloud), host your own websites, and deploy network resources such as DHCP, DNS, and others. You'll also see how to containerize applications via LXD to maximize efficiency and learn how to build Kubernetes clusters. This new fourth edition updates the popular book to cover Ubuntu 22.04 LTS, which takes advantage of the latest in Linux-based technologies. By the end of this Ubuntu book, you will have gained all the knowledge you need in order to work on real-life Ubuntu Server deployments and become an expert Ubuntu Server administrator who is well versed in its feature set.What you will learnInstall Ubuntu Server on physical servers and on the Raspberry PiDeploy Ubuntu Server in the cloud and host websites on your own serverDeploy your applications to their own containers and scale your infrastructureSet up popular applications such as NextcloudAutomate deployments and configuration with Ansible to save timeContainerize applications via LXD to maximize efficiencyDiscover best practices and troubleshooting techniquesWho this book is forThis book is for System Administrators, Site Reliability Engineers, DevOps professionals, enthusiasts, as well as for individuals looking to make a career change and learn the skills they'll need to work with Ubuntu servers. Prior knowledge of Ubuntu is not required but a basic understanding of basic computing concepts is assumed. Some IT administration, Linux, and shell scripting experience is preferred, although the first several chapters will bring newcomers up to speed as well.Table of ContentsDeploying Ubuntu ServerManaging Users and PermissionsManaging Software PackagesNavigating and Essential CommandsManaging Files and DirectoriesBoosting Your Command-line EfficiencyControlling and Managing ProcessesMonitoring System ResourcesManaging Storage VolumesConnecting to NetworksSetting Up Network ServicesSharing and Transferring FilesManaging DatabasesServing Web ContentAutomating Server Configuration with AnsibleVirtualizationRunning ContainersContainer OrchestrationDeploying Ubuntu in the CloudAutomating Cloud Deployments with TerraformSecuring Your ServerTroubleshooting Ubuntu ServersPreventing Disasters
Windows XP in a Nutshell
Windows XP in a Nutshell, Second Edition documents everything there is to know about the world's most widely used operating system. Updated to include information on Service Pack 2 (SP2), this compact guide is the ultimate resource for IT professionals and Windows XP power users everywhere. Written in O'Reilly's time-tested in a Nutshell format, Windows XP in a Nutshell, Second Edition cuts through the hype and delivers practical details in a no-nonsense manner. At the heart of the book is an invaluable 200-plus-page section titled Windows XP Application and Tools. In it, readers will find: A list of available commands and utilities, including Start Menu accessories, command prompt tools, and hidden system administration utilities A Task and Setting Index for quick access to hundreds of XP settings A complete reference to XP's command prompt, including advanced commands and scripting features Windows XP in a Nutshell, Second Edition also includes a primer on files, folders, and windows; control panels and built-in applications; how to set up a PC for Internet use; and the standard Windows rituals of troubleshooting, installation, and upgrading. And, of course, this greatly expanded second edition also includes all the need-to-know details about the security technologies featured in SP 2, so you can better defend yourself against viruses, worms, and hackers. Readers even receive guidelines and instructions for installing SP2 on their PC, or across a network of computers. With its wealth of tips, careful instruction, and expert advice, this must-have desktop reference is dedicated to making your time at the computer safer, easier, and more fun.
Knoppix Pocket Reference
Knoppix is a portable Linux distribution replete with hundreds of valuable programs and utilities -- a veritable Swiss Army knife in bootable CD form. It includes Linux software and desktop environments, automatic hardware detection and hundreds of other quality open source programs. Whether you're a system administrator or power user, you can use Knoppix for many different purposes. Knoppix boots and runs completely from a single CD so you don't need to install anything to your hard drive. Due to on-the-fly decompression, the CD can have up to 2 GB of executable software installed on it. What you do need, however, is a comprehensive reference guide so you can benefit from all that Knoppix has to offer. The Knoppix Pocket Reference from O'Reilly fits the bill. This handy book shows you how to use Knoppix to troubleshoot and repair your computer, how to customize the Knoppix CD, running RAM memory checks, recovering data from a damaged hard drive, cloning hard drives, using Knoppix as a Terminal Server, using Knoppix as a kiosk OS, scanning for viruses on a Windows system, editing the Registry of a Windows system, and much more. If you want more information than the average Knoppix user, Knoppix Pocket Reference is an absolutely essential addition to your personal library.
Managing Kubernetes Resources Using Helm - Second Edition
Reduce the complexity of managing applications on Kubernetes and develop an enterprise pattern for application deliveryKey Features: Learn best practices from the core maintainer of Helm for application delivery and life cycle managementManage applications deployed in Kubernetes effectively using HelmGo beyond the basics when using Helm with key security considerations and management optionsBook Description: Containerization is one of the best ways to implement DevOps, and learning how to execute it effectively is an essential part of a developer's skillset. Kubernetes is the current industry standard for container orchestration. This book will help you discover the efficiency of managing applications running on Kubernetes with Helm.Starting with a brief introduction to Helm and its impact on users working with containers and Kubernetes, you'll delve into the primitives of Helm charts and their architecture and use cases. From there, you'll understand how to write Helm charts in order to automate application deployment on Kubernetes and work your way toward more advanced strategies. These enterprise-ready patterns are focused on concepts beyond the basics so that you can use Helm optimally, looking at topics related to automation, application development, delivery, lifecycle management, and security.By the end of this book, you'll have learned how to leverage Helm to build, deploy, and manage applications on Kubernetes.What You Will Learn: Understand how to deploy applications on Kubernetes with easePackage dynamic applications for deployment on KubernetesIntegrate Helm into an existing software release processDevelop an enterprise automation strategy on Kubernetes using HelmUse Helm within a Helm Kubernetes operatorLeverage Helm in a secure and stable manner that fits the enterpriseDiscover the ins and outs of automation with HelmWho this book is for: This book is for Kubernetes developers or administrators who are interested in learning Helm to provide automation for app development on Kubernetes. Although no prior knowledge of Helm is required, basic knowledge of Kubernetes application development will be useful.
Ansible for Real-Life Automation
Learn how to automate and manage your IT infrastructure and applications using AnsibleKey Features: Develop Ansible automation use cases by automating day-to-day IT and application operationsUse Ansible to automate private and public cloud, application containers, and container platformsImprove your DevOps workflow with AnsibleBook Description: Get ready to leverage the power of Ansible's wide applicability to automate and manage IT infrastructure with Ansible for Real-Life Automation. This book will guide you in setting up and managing the free and open source automation tool and remote-managed nodes in the production and dev/staging environments.Starting with its installation and deployment, you'll learn automation using simple use cases in your workplace. You'll go beyond just Linux machines to use Ansible to automate Microsoft Windows machines, network devices, and private and public cloud platforms such as VMWare, AWS, and GCP. As you progress through the chapters, you'll integrate Ansible into your DevOps workflow and deal with application container management and container platforms such as Kubernetes. This Ansible book also contains a detailed introduction to Red Hat Ansible Automation Platform to help you get up to speed with Red Hat AAP and integration with CI/CD and ITSM.What's more, you'll implement efficient automation solutions while learning best practices and methods to secure sensitive data using Ansible Vault and alternatives to automate non-supported platforms and operations using raw commands, command modules, and REST API calls.By the end of this book, you'll be proficient in identifying and developing real-life automation use cases using Ansible.What You Will Learn: Explore real-life IT automation use cases and employ Ansible for automationDevelop playbooks with best practices for production environmentsApproach different automation use cases with the most suitable methodsUse Ansible for infrastructure management and automate VMWare, AWS, and GCPIntegrate Ansible with Terraform, Jenkins, OpenShift, and KubernetesManage container platforms such as Kubernetes and OpenShift with AnsibleGet to know the Red Hat Ansible Automation Platform and its capabilitiesWho this book is for: This book is for DevOps and systems engineers looking to adopt Ansible as their automation tool. To get started with this book, basic knowledge of Linux is necessary, along with an understanding of how tasks are done the manual way before setting out to automate them.
Azure for Developers - Second Edition
Develop cloud applications based on the most popular Azure services, including hosting web applications, running containers, storing data using both relational and non-relational databases, and much moreKey Features: - Take a modern approach to Azure Cloud development and management- Get a detailed introduction to services such as web hosting, databases, and serverless platforms- Get the hang of cloud services with this practical, developer-centric guide for Azure developersBook Description: Microsoft Azure is currently one of the fastest growing public cloud service providers thanks to its sophisticated set of services for building fault-tolerant and scalable cloud-based applications.This second edition of Azure for Developers will take you on a journey through the various PaaS services available in Azure, including Azure App Service, Azure Functions, and Azure SQL Databases, showing you how to build a complete and reliable system with ease. Throughout the book, you'll discover ways to enhance your skills when building cloud-based solutions leveraging different SQL/NoSQL databases, serverless and messaging components, containerized solutions, and even search engines such as Azure Cognitive Search. That's not all!! The book also covers more advanced scenarios such as scalability best practices, serving static content with Azure CDN, and distributing loads with Azure Traffic Manager, Azure Application Gateway, and Azure Front Door.By the end of this Azure book, you'll be able to build modern applications on the Azure cloud using the most popular and promising technologies to make your solutions reliable, stable, and efficient.What You Will Learn: - Identify the Azure services that can help you get the results you need- Implement PaaS components - Azure App Service, Azure SQL, Traffic Manager, CDN, Notification Hubs, and Azure Cognitive Search- Work with serverless components- Integrate applications with storage- Put together messaging components (Event Hubs, Service Bus, and Azure Queue Storage)- Use Application Insights to create complete monitoring solutions- Secure solutions using Azure RBAC and manage identities- Develop fast and scalable cloud applicationsWho this book is for: This book is for developers and IT professionals who want to learn Microsoft Azure by developing applications based on various cloud services. Prior knowledge of software development and the basics of software architecture and Azure services give you an advantage.Table of Contents- Web Applications in Azure- Using Azure Container Registry for Storing and Managing Images- Deploying Web Applications as Containers- Using Azure Container Instances for Ad Hoc Application Hosting- Building a Search Engine with Azure Cognitive Search- Mobile Notifications with Notification Hubs- Serverless and Azure Functions- Durable Functions- Integrating Different Components with Logic Apps- Swiss Army Knife- Reactive Architecture with Event Grid- Using Azure Storage- Big Data Pipeline- Real-Time Data Analysis- Enterprise Integration- Using Application Insights to Monitor Your Applications- SQL in Azure- Big Data Storage- Scaling Azure Applications- Serving Static Content Using Azure CDN- Managing APIs with Azure API Management- Building a Scalable Entry Point for Your Service with Azure Front Door- Azure Application Gateway as a Web Traffic Load Balancer- Distributing Load with Azure Traffic Manager- Tips and Tricks for Azure
Windows Server 2022 Administration Fundamentals - Third Edition
Deploy, set up, and deliver network services with Windows Server 2022, along with exploring Microsoft's role-based certificationsKey FeaturesGet started with server installation, performance monitoring, and server maintenanceDevelop the skills necessary to manage an enterprise environmentImplement networking and security best practices in your Windows Server environmentBook DescriptionThis third edition gets you up and running with Windows Server 2022, Microsoft's new server operating system, as part of the Windows NT family of operating systems, developed concurrently with Windows 10, version 21H2.The book begins by introducing computer networking and Windows Server concepts, gradually moving towards Windows Server 2022. With the help of step-by-step instructions and easy-to-understand graphics, you'll become well versed with the roles, features, and functionalities of Windows Server 2022. Topics such as the installation process, upgrades, post-installation tasks, and initial server configuration are covered in detail. As you make progress, you'll explore roles, features, and role services such as Active Directory, DNS, Hyper-V, remote access, storage, and printers, among others. The book then takes you through maintenance and troubleshooting tasks to guide you in efficiently managing Windows Server 2022. Finally, by working with numerous questions in each chapter and detailed answers at the end, you can test your understanding of the concepts covered.By the end of this Windows Server book, you'll be equipped with the knowledge needed to update, maintain, and troubleshoot servers to ensure business continuity by relying on best practices and using step-by-step graphic-driven examples.What you will learnGrasp the fundamentals of Windows Server 2022Understand how to deploy Windows Server 2022Discover Windows Server post-installation tasksAdd roles to your Windows Server environmentApply Windows Server 2022 GPOs to your networkDelve into virtualization and Hyper-V conceptsTune, maintain, update, and troubleshoot Windows Server 2022Get familiar with Microsoft's role-based certificationsWho this book is forIf you are an IT professional who wants to deploy and configure Windows Server 2022, then this book is for you. You can also use this book to learn about Microsoft's role-based certifications if you're planning to enroll in a course. No prior experience with Windows Server operating systems or familiarity with networking concepts is required.Table of ContentsGetting Started with Windows ServerIntroducing Windows Server 2022Installing Windows Server 2022Post-Installation Tasks in Windows Server 2022Directory Services in Windows Server 2022Adding Roles to Windows Server 2022Group Policy in Windows Server 2022Virtualization with Windows Server 2022Storing Data in Windows Server 2022Tuning and Maintaining Windows Server 2022Updating and Troubleshooting Windows Server 2022Preparing for Microsoft Certifications
Windows and Linux Penetration Testing from Scratch - Second Edition
Master the art of identifying and exploiting vulnerabilities with Metasploit, Empire, PowerShell, and Python, turning Kali Linux into your fighter cockpitKey Features: Map your client's attack surface with Kali LinuxDiscover the craft of shellcode injection and managing multiple compromises in the environmentUnderstand both the attacker and the defender mindsetBook Description: Let's be honest-security testing can get repetitive. If you're ready to break out of the routine and embrace the art of penetration testing, this book will help you to distinguish yourself to your clients.This pen testing book is your guide to learning advanced techniques to attack Windows and Linux environments from the indispensable platform, Kali Linux. You'll work through core network hacking concepts and advanced exploitation techniques that leverage both technical and human factors to maximize success. You'll also explore how to leverage public resources to learn more about your target, discover potential targets, analyze them, and gain a foothold using a variety of exploitation techniques while dodging defenses like antivirus and firewalls. The book focuses on leveraging target resources, such as PowerShell, to execute powerful and difficult-to-detect attacks. Along the way, you'll enjoy reading about how these methods work so that you walk away with the necessary knowledge to explain your findings to clients from all backgrounds. Wrapping up with post-exploitation strategies, you'll be able to go deeper and keep your access.By the end of this book, you'll be well-versed in identifying vulnerabilities within your clients' environments and providing the necessary insight for proper remediation.What You Will Learn: Get to know advanced pen testing techniques with Kali LinuxGain an understanding of Kali Linux tools and methods from behind the scenesGet to grips with the exploitation of Windows and Linux clients and serversUnderstand advanced Windows concepts and protection and bypass them with Kali and living-off-the-land methodsGet the hang of sophisticated attack frameworks such as Metasploit and EmpireBecome adept in generating and analyzing shellcodeBuild and tweak attack scripts and modulesWho this book is for: This book is for penetration testers, information technology professionals, cybersecurity professionals and students, and individuals breaking into a pentesting role after demonstrating advanced skills in boot camps. Prior experience with Windows, Linux, and networking is necessary.
Mastering Azure Virtual Desktop
Learn how to design, implement, configure, and manage your Azure Virtual Desktop environmentKey Features- Learn everything about designing and deploying an Azure Virtual Desktop environment- Gain in-depth insights into Azure Virtual Desktop and prepare successfully for the AZ-140 exam- Explore best practices and expert tips on how to set up Azure Virtual DesktopBook DescriptionAzure Virtual Desktop is a cloud desktop virtualization platform that securely delivers virtual desktops and remote apps. Mastering Azure Virtual Desktop will guide you through designing, implementing, configuring, and maintaining an Azure Virtual Desktop environment effectively. This book can also be used as an exam preparation guide to help you sit the Microsoft AZ-140 exam.You'll start with an introduction to the essentials of Azure Virtual Desktop. Next, you'll get to grips with planning an Azure Virtual Desktop architecture before learning how to implement an Azure Virtual Desktop environment. Moving ahead, you'll learn how to manage and control access as well as configure security controls on your Azure Virtual Desktop environment. As you progress, you'll understand how to manage user environments and configure MSIX app attach and other Azure Virtual Desktop features to enhance the user experience. You'll also learn about the Azure Active Directory (AD) join and getting started feature. Finally, you'll discover how to monitor and maintain an Azure Virtual Desktop environment to help you support your users and diagnose issues when they occur.By the end of this Microsoft Azure book, you'll have covered all the essential topics you need to know to design and manage Azure Virtual Desktop and prepare for the AZ-140 exam.What You Will Learn- Design Azure Virtual Desktop and user identities and profiles- Implement networking and storage for Azure Virtual Desktop- Create and configure session host images and host pools- Manage access and security for MS Azure Virtual Desktop- Implement FSLogix Profile Containers and FSLogix Cloud Cache- Configure user experience and Azure Virtual Desktop features- Plan and implement business continuity and disaster recovery- Automate Azure Virtual Desktop tasksWho this book is forIf you are an IT professional, workspace administrator, architect, or consultant looking to learn about designing, implementing, and managing Azure Virtual Desktop, this book is for you. You'll also find this book helpful if you're preparing for the Microsoft AZ-140 exam.Table of Contents- An Introduction to Azure Virtual Desktop- Design the Azure Virtual Desktop Architecture- Design for User Identities and Profiles- Implement and Manage Networking for Azure Virtual Desktop- Implement and Manage Storage for Azure Virtual Desktop- Create and Configure Host Pools and Session Hosts- Configure Azure Virtual Desktop Host Pools- Azure AD Join for Azure Virtual Desktop- Create and Manage Session Host Images- Manage Access- Manage Security- Implement and Manage FSLogix- Configure User Experience Settings- MSIX App Attach- Configure Apps on a Session Host- Plan and Implement Business Continuity and Disaster Recovery- Automate Azure Virtual Desktop Management Tasks- Monitor and Manage Performance and Health- Azure Virtual Desktop's Getting Started Feature- Microsoft and Community Resources- Practice Exam
High Availability and Scalability of Mainframe Environments using System z and z/OS as example
Mainframe computers are the backbone of industrial and commercial computing, hosting the most relevant and critical data of businesses. One of the most important mainframe environments is IBM System z with the operating system z/OS. This book introduces mainframe technology of System z and z/OS with respect to high availability and scalability. It highlights their presence on different levels within the hardware and software stack to satisfy the needs for large IT organizations.
Six Pack
Six Pack, the first collection of Apple IIGS Finder Extensions, adds 13 new features to System 6. Just click the icons you want to work with, then select the Six Pack functions you want to perform from the Extras menu. Six Pack Features: - Alarm Clock - See time in a window or menu bar and provide alerts. - CDEV Alias - Add any Control Panel directly to the Apple menu. - CPU & Memory Use - See how your computer's resources are used. - Crypt - Save your data from prying eyes! - File Compare - Visually compare files for differences. - File Peeker - Preview the contents of graphics, text, and sound files. - HotKeys - Add dozens of functions to your function keys. - Morelnfo - See and change file data like actual / auxiliary file types. - Select lcons - Based on partial filename, filetype, modification date... - Super DataPath - Remembers a default data directory for programs. - Workset - Remembers a group of files and opens them all at once.
SignatureGS
use by adding a Screen Blanker, a Desktop Pattern Editor, a Sound Selector, and a Boot Setup Utility to GS/OS version 5.0 or later. Features: Phantasm - Gives your screen something to do through a variety of fun, attractive screen activities, including "Magic Molecules" and "Slimy Slugs." Graffiti - There's nothing wrong with the IIGS desktop, except it's boring. Graffiti gives you a variety of colorful desktop patterns to choose from, or you can create your own with the built-in desktop painter. Sonics - Customize your IIGS sounds, and assign special sounds for specific functions. And these aren't just beeps - they're fun and entertaining. Boot Master - Changing the configuration of all your IIGS drivers, and system components can be a pain. Boot Master makes it easy by putting all the controls for your IIGS drivers on one master control panel.
Higher Text Plus
Generate upper and lower case text in a variety of typefaces, sizes, and colors from your programs for display on the Apple II hi-resolution screen. Features an easy-to-use editor for creation of your own unique character sets, with over 35 fonts included. Several additional utilities enhance your creation of hi-res displays. This program assumes a working knowledge of Applesoft BASIC.
Class 1 - 8 COMPUTER LEARNING
COMPUTER BASICS FOR CHILDREN Computer system - It's an Operating Machine The following Topics are covered in this book. ? Basics of Computer ? Nature ? Human invented things ? Machine Definition ? Various types of Machines ? Computer Characteristics BASICS OF COMPUTER Hey children, I am your Mentor Computer Machine. I will make you all learn about its functionality and how to work on this machine. Desk Top Computer system Lap Top Computer system Computer is a small, compact and portable machine. It's a wonderful memory-built and electronic operating machine. This computer machine can make wonder things for you.
Mastering Windows Security and Hardening - Second Edition
A comprehensive guide to administering and protecting the latest Windows 11 and Windows Server 2022 from the complex cyber threatsKey Features- Learn to protect your Windows environment using zero-trust and a multi-layered security approach- Implement security controls using Intune, Configuration Manager, Defender for Endpoint, and more- Understand how to onboard modern cyber-threat defense solutions for Windows clientsBook DescriptionAre you looking for the most current and effective ways to protect Windows-based systems from being compromised by intruders? This updated second edition is a detailed guide that helps you gain the expertise to implement efficient security measures and create robust defense solutions using modern technologies.The first part of the book covers security fundamentals with details around building and implementing baseline controls. As you advance, you'll learn how to effectively secure and harden your Windows-based systems through hardware, virtualization, networking, and identity and access management (IAM). The second section will cover administering security controls for Windows clients and servers with remote policy management using Intune, Configuration Manager, Group Policy, Defender for Endpoint, and other Microsoft 365 and Azure cloud security technologies. In the last section, you'll discover how to protect, detect, and respond with security monitoring, reporting, operations, testing, and auditing.By the end of this book, you'll have developed an understanding of the processes and tools involved in enforcing security controls and implementing zero-trust security principles to protect Windows systems.What you will learn- Build a multi-layered security approach using zero-trust concepts- Explore best practices to implement security baselines successfully- Get to grips with virtualization and networking to harden your devices- Discover the importance of identity and access management- Explore Windows device administration and remote management- Become an expert in hardening your Windows infrastructure- Audit, assess, and test to ensure controls are successfully applied and enforced- Monitor and report activities to stay on top of vulnerabilitiesWho this book is forIf you're a cybersecurity or technology professional, solutions architect, systems engineer, systems administrator, or anyone interested in learning how to secure the latest Windows-based systems, this book is for you. A basic understanding of Windows security concepts, Intune, Configuration Manager, Windows PowerShell, and Microsoft Azure will help you get the best out of this book.Table of Contents- Fundamentals of Windows Security- Building a Baseline- Hardware and Virtualization- Networking Fundamentals for Hardening Windows- Identity and Access Management- Administration and Policy Management- Deploying Windows Securely- Keeping Your Windows Client Secure- Advanced Hardening for Windows Clients- Mitigating Common Attack Vectors- Server Infrastructure Management- Keeping Your Windows Server Secure- Security Monitoring and Reporting- Security Operations- Testing and Auditing- Top 10 Recommendations and the Future
End-to-End Automation with Kubernetes and Crossplane
A complete journey to automating infrastructure provisioning and cloud-native application deploymentKey Features: Leverage Crossplane and Kubernetes for a unified automation experience of infrastructure and appsBuild a modern self-service infrastructure platform abstracting recipes and in-house policiesClear guidance on trade-offs to manage Kubernetes configuration and ecosystem toolsBook Description: In the last few years, countless organizations have taken advantage of the disruptive application deployment operating model provided by Kubernetes. With Crossplane, the same benefits are coming to the world of infrastructure provisioning and management. The limitations of Infrastructure as Code with respect to drift management, role-based access control, team collaboration, and weak contract make people move towards a control-plane-based infrastructure automation, but setting it up requires a lot of know-how and effort.This book will cover a detailed journey to building a control-plane-based infrastructure automation platform with Kubernetes and Crossplane. The cloud-native landscape has an overwhelming list of configuration management tools that can make it difficult to analyze and choose. This book will guide cloud-native practitioners to select the right tools for Kubernetes configuration management that best suit the use case. You'll learn about configuration management with hands-on modules built on popular configuration management tools such as Helm, Kustomize, Argo, and KubeVela. The hands-on examples will be patterns that one can directly use in their work.By the end of this book, you'll be well-versed with building a modern infrastructure automation platform to unify application and infrastructure automation.What You Will Learn: Understand the context of Kubernetes-based infrastructure automationGet to grips with Crossplane concepts with the help of practical examplesExtend Crossplane to build a modern infrastructure automation platformUse the right configuration management tools in the Kubernetes environmentExplore patterns to unify application and infrastructure automationDiscover top engineering practices for infrastructure platform as a productWho this book is for: This book is for cloud architects, platform engineers, infrastructure or application operators, and Kubernetes enthusiasts who want to simplify infrastructure and application automation. A basic understanding of Kubernetes and its building blocks like Pod, Deployment, Service, and Namespace is needed before you can get started with this book.
Microsoft Azure Compute
Proven best practices for success with every Azure compute service! Compute services are key to most Azure cloud solutions, but maximizing their value requires best-practice planning, design, deployment, and operations. Now, leading consultant Avinash Valiramani presents expert guidance for driving maximum value from Microsoft's portfolio of Azure compute services for IaaS, PaaS, and FaaS. Drawing on his extensive work with Microsoft's Azure teams, he covers Azure VMs, VM Scale Sets, App Services, Azure Virtual Desktops, Azure Container Instances, Azure Functions, Azure Batch, and other Compute services. Whatever your role in delivering efficient, scalable compute services, this deep dive will help you make the most of your Azure investment. Leading Azure consultant Avinash Valiramani shows how to: Dive deeply into the frequently used Azure Compute services to better understand how each service works Walk through configuring each compute service and its related features and options Size, price, and create Azure VMs, and deliver the right levels of redundancy and availability Use VM Scale Sets (VMSS) to integrate VMs with load balancing and autoscaling Host web applications, mobile app back ends, and REST APIs via Azure App Service Run desktops-as-a-service at scale with Azure Virtual Desktop (AVD) Easily deploy containers on demand with Azure Container Instances (ACIs) Use serverless Azure Functions to build web APIs, process streams, and manage message queues About this Book For everyone interested in Azure infrastructure, including IT/cloud admins, security specialists, developers, engineers, and others at all levels of Azure compute experience. Especially useful for experienced IT pros in mid-sized to large organizations who have deployed, operated, monitored, upgraded, migrated, or designed infrastructure services.
Microsoft Defender for Cloud Cookbook
Effectively secure their cloud and hybrid infrastructure, how to centrally manage security, and improve organizational security postureKey Features: Implement and optimize security posture in Azure, hybrid, and multi-cloud environmentsUnderstand Microsoft Defender for Cloud and its featuresProtect workloads using Microsoft Defender for Cloud's threat detection and prevention capabilitiesBook Description: Microsoft Defender for Cloud is a multi-cloud and hybrid cloud security posture management solution that enables security administrators to build cyber defense for their Azure and non-Azure resources by providing both recommendations and security protection capabilities.This book will start with a foundational overview of Microsoft Defender for Cloud and its core capabilities. Then, the reader is taken on a journey from enabling the service, selecting the correct tier, and configuring the data collection, to working on remediation. Next, we will continue with hands-on guidance on how to implement several security features of Microsoft Defender for Cloud, finishing with monitoring and maintenance-related topics, gaining visibility in advanced threat protection in distributed infrastructure and preventing security failures through automation.By the end of this book, you will know how to get a view of your security posture and where to optimize security protection in your environment as well as the ins and outs of Microsoft Defender for Cloud.What You Will Learn: Understand Microsoft Defender for Cloud features and capabilitiesUnderstand the fundamentals of building a cloud security posture and defending your cloud and on-premises resourcesImplement and optimize security in Azure, multi-cloud and hybrid environments through the single pane of glass - Microsoft Defender for CloudHarden your security posture, identify, track and remediate vulnerabilitiesImprove and harden your security and services security posture with Microsoft Defender for Cloud benchmarks and best practicesDetect and fix threats to services and resourcesWho this book is for: This book is for Security engineers, systems administrators, security professionals, IT professionals, system architects, and developers. Anyone whose responsibilities include maintaining security posture, identifying, and remediating vulnerabilities, and securing cloud and hybrid infrastructure. Anyone who is willing to learn about security in Azure and to build secure Azure and hybrid infrastructure, to improve their security posture in Azure, hybrid and multi-cloud environments by leveraging all the features within Microsoft Defender for Cloud.
Digitalized and Harmonized Industrial Production Systems
On the one side, Industrial competitiveness today means shorter product lifecycles, increased product variety, and shorter times to market and customized tangible products and services. To face these challenges, the manufacturing industry is forced to move from traditional management, control, and automation approaches towards industrial cyber-physical systems.On the other side, several emergent engineering approaches and related Information-Communication-Control-Technologies, such as Multi-Agent-Systems, Service-Oriented Architecture, Plug-and-Produce Systems, Cloud and Fog Technologies, Big Data and Analytics, among others, have been researched during the last years. The confluence of those results with the latest developments in Industrial Digitalization, Systems-of-Cyber-Physical-Systems Engineering, Internet-of-Things, Internet-of-Services, and Industry 4.0 is opening a new broad spectrum of innovation possibilities.The PERFoRM (Production-harmonizEd-Reconfiguration of Flexible Robots and Machinery) approach is one of them. It teaches the reader what it means when production machines and systems are digitalized and migrated into Industrial Cyber-Physical Systems and what happens when they are networked and start collaborating with each other and with the human, using the internet. After a Technology Trend Screening and beyond a comprehensive state-of-the-art analysis about Industrial Digitalization and Industry 4.0-compliant solutions, the book introduces methods, architectures, and technologies applicable in real industrial use cases, explained for a broad audience of researchers, practitioners, and industrialists.
Heterogeneous Computing Architectures
Heterogeneous Computing Architectures: Challenges and Vision provides an updated vision of the state-of-the-art of heterogeneous computing systems, covering all the aspects related to their design: from the architecture and programming models to hardware/software integration and orchestration to real-time and security requirements. The transitions from multicore processors, GPU computing, and Cloud computing are not separate trends, but aspects of a single trend-mainstream; computers from desktop to smartphones are being permanently transformed into heterogeneous supercomputer clusters. The reader will get an organic perspective of modern heterogeneous systems and their future evolution.
Expert Linux Administration Guide
Linux administration based on hosted virtualization.Key FeaturesDesigned for absolute beginners and early Linux users with the most up-to-date knowledge.Contains troubleshooting tips and best practices for running a Linux system on your own.Supplemental knowledge and insights in server security, threat management, and virtualization.Description'Expert Linux Administration Guide' is for the readers who are interested in developing the skills and abilities essential to operate as a professional Linux system administrator. This is the only book that explains everything about Linux practically through examples, simplified visuals, solution tips, and expert-led best practices.This book begins with an introduction to Linux fundamentals and swiftly progresses to the day-to-day tasks of a Linux administrator. You practically learn how to plan your network by installing Linux and gaining a firm grasp of its file system and system configuration. This book covers all the Linux server settings, including DNS, mail servers, Squid proxy servers, and backup recovery. In addition, the book contains troubleshooting hints and ready-to-use solutions for server configuration, load balancing, firewall configuration, network security concerns, and virtualization. The book does not end here, as it discusses some of the advanced administrator's responsibilities. Topics such as monitoring system performance, process controls, user provisioning, file and database recovery and backup, and software package upgrades are also covered.By the end of this book, you'll be able to practise and implement the latest system administration techniques in a Linux environment considerably more effectively.What you will learnLearn to install and configure Linux servers quickly.Manage configurations, license software, and patch security flaws.Obtain the highest level of support for RAID configurations.Learn how to set up database servers, backups, and system recovery.Expert advice on firewalls, web servers, disc utilization, and network resources.Who this book is forThis book is intended for System Managers, System Administrators, Network Administrators, Server Administrators, System Engineers, and others interested in becoming professional Linux Administrators. No prerequisite knowledge is required, as the book covers everything clearly and precisely.Table of Contents1. Linux Fundamental2. Files, Directories & User Management3. File Compression and Archival4. Performing Search5. Vi Editor6. Linux Installation7. System Initialization8. Overview of Network commands9. Firewall Setup10A. Partition System in CentOS7/810B. LVM and ISCSI CentOS7/811. YUM Server12. Telnet13. Domain Name System14. Dynamic Host Control Protocol15. Unified Threat Management (UTM)16. Squid Web Proxy17. Apache Web Server18. Linux as a Router19. NIS Server20. NFS Server21. File Transfer Protocol22. Samba Configuration23. Mail Server Configuration24. Linux Hardening25. Load Balancer26. Setup Network Printer Services27. System Backup and Restore Process28. Linux Virtualization KVM29. Introduction to Open-Source tools30. Troubleshooting Network IssuesRead more
Active Directory Administration Cookbook - Second Edition
Simplified actionable recipes for managing Active Directory and Azure AD, as well as Azure AD Connect, for administration on-premise and in the cloud with Windows Server 2022Key Features: Expert solutions for name resolution, federation, certificates, and security with Active DirectoryExplore Microsoft Azure AD and Azure AD Connect for effective administration on the cloudAutomate security tasks using Active Directory tools and PowerShellBook Description: Updated to the Windows Server 2022, this second edition covers effective recipes for Active Directory administration that will help you leverage AD's capabilities for automating network, security, and access management tasks in the Windows infrastructure.Starting with a detailed focus on forests, domains, trusts, schemas, and partitions, this book will help you manage domain controllers, organizational units, and default containers. You'll then explore Active Directory sites management as well as identify and solve replication problems. As you progress, you'll work through recipes that show you how to manage your AD domains as well as user and group objects and computer accounts, expiring group memberships, and Group Managed Service Accounts (gMSAs) with PowerShell. Once you've covered DNS and certificates, you'll work with Group Policy and then focus on federation and security before advancing to Azure Active Directory and how to integrate on-premise Active Directory with Azure AD. Finally, you'll discover how Microsoft Azure AD Connect synchronization works and how to harden Azure AD.By the end of this AD book, you'll be able to make the most of Active Directory and Azure AD Connect.What You Will Learn: Manage the Recycle Bin, gMSAs, and fine-grained password policiesWork with Active Directory from both the graphical user interface (GUI) and command lineUse Windows PowerShell to automate tasksCreate and remove forests, domains, domain controllers, and trustsCreate groups, modify group scope and type, and manage membershipsDelegate, view, and modify permissionsSet up, manage, and optionally decommission certificate authoritiesOptimize Active Directory and Azure AD for securityWho this book is for: This book is for administrators of existing Active Directory Domain Service environments as well as for Azure AD tenants looking for guidance to optimize their day-to-day tasks. Basic networking and Windows Server Operating System knowledge will be useful for getting the most out of this book.
Unix Programming
Functioning of UNIX operating system with shell programmingKey FeaturesEquipped with installation, administration, and best practices for UNIX system management.Provides a wide range of shell scripting and Unix-based solutions.UNIX foundations, Resource Management, Socket Programming, Shell Scripting, and the C Interface are all covered.DescriptionThis book is intended to be an instructional tool and study guide for those interested in learning about the principles of the UNIX operating system, process management, socket programming, and numerous shell scripting techniques.First, you will learn about the UNIX system architecture and programming environment, which provide an overview of all system resources and their management. Then, Unix file systems, Kernel data structures for performing file I/O, Basic File permissions and Library functions, and UNIX system calls are discussed. Process control, parallel execution, user data access, and signal management are just some of the topics covered in this book. Next, we'll go through the basics of network communication, such as system calls, data transmission over sockets, and I/O multiplexing models. Finally, the book discusses more advanced UNIX and C interface concepts such as library functions, command-line arguments, and environment variables.Throughout the book, you'll find plenty of solutions, exercises, and shell scripts to help you get the most out of your hands-on experience with the UNIX system.What you will learnInvestigate every aspect of the UNIX operating system.Understand how to use the shell and how to develop shell scripts.Acquaint yourself with all of UNIX's file and process components.Gain a working knowledge of file access and manipulation.Learn more about inter-process communication and its many methods.Who this book is forThe book appeals to UNIX professionals, students, master's degree applicants, and candidates for competitive exams who wish to understand UNIX principles thoroughly. However, it is written for beginners and may be read by anyone without prior understanding.Table of Contents1. Fundamental Concepts of UNIX Operating System2. File Management3. Process Management4. Inter-Process Communication5. Socket Programming6. Memory Management7. UNIX Shell and Custom Environment8. Shell Programming Using Bourne ShellRead more
Practical Guide to IT Problem Management
Some IT organisations seem to expend all their energy firefighting - dealing with incidents as they arise and fixing, or patching over, the breakage. In organisations like this, restarting computers is seen as a standard method to resolve many issues. Perhaps the best way to identify whether an organisation understands problem management is to ask what they do after they have restarted the computer. If restarting the computer fixes the issue, it is very tempting to say that the incident is over and the job is done. Problem management recognises that things do not improve if such an approach is taken. Such organisations are essentially spending their time running to stay in the same place. Written to help IT organisations move forward, Practical Guide to IT Problem Management presents a combination of methodologies including understanding timelines and failure modes, drill down, 5 whys and divide and conquer. The book also presents an exploration of complexity theory and how automation can assist in the desire to shift left both the complexity of the problem and who can resolve it. The book emphasises that establishing the root cause of a problem is not the end of the process as the resolution options need to be evaluated and then prioritised alongside other improvements. It also explores the role of problem boards and checklists as well as the relationship between problem management and Lean thinking. This practical guide provides both a framework for tackling problems and a toolbox from which to select the right methodology once the type of problem being faced has been identified. In addition to reactive methods, it presents proactive activities designed to reduce the incidence of problems or to reduce their impact and complexity should they arise. Solving problems is often a combination of common sense and methodologies which may either be learnt the hard way or may be taught. This practical guide shows how to use problem solving tools and to understand how and when to apply them while upskilling IT staff and improving IT problem solving processes.
Combinatorics of Permutations
The new edition of this award-winning, graduate textbook is upated throughout. Including mostly enumerative combinatorics, yet there are algebraic, analytic, and topological parts as well, and many applications. The author continues to reveal the usefulness of the subject for both students and researchers.
Azure Active Directory for Secure Application Development
Develop secure applications using different features of Azure Active Directory along with modern authentication techniques and protocolsKey Features: Confidently secure your Azure applications using the tools offered by Azure ADGet to grips with the most modern and effective authorization and authentication protocolsUnlock the potential of Azure AD's most advanced features including Microsoft Graph and Azure AD B2CBook Description: Azure Active Directory for Secure Application Development is your one-stop shop for learning how to develop secure applications using modern authentication techniques with Microsoft Azure AD. Whether you're working with single-tenant, multi-tenant, or line-of-business applications, this book contains everything you need to secure them.The book wastes no time in diving into the practicalities of Azure AD. Right from the start, you'll be setting up tenants, adding users, and registering your first application in Azure AD. The balance between grasping and applying theory is maintained as you move from the intermediate to the advanced: from the basics of OAuth to getting your hands dirty with building applications and registering them in Azure AD. Want to pin down the Microsoft Graph, Azure AD B2C, or authentication protocol best practices? We've got you covered. The full range of Azure AD functionality from a developer perspective is here for you to explore with confidence.By the end of this secure app development book, you'll have developed the skill set that so many organizations are clamoring for. Security is mission-critical, and after reading this book, you will be too.What You Will Learn: Get an overview of Azure AD and set up your Azure AD instanceMaster application configuration and the use of service principalsUnderstand new authentication protocolsExplore the Microsoft Identity librariesUse OpenID Connect, OAuth 2.0, and MSAL to make sign-in fully secureBuild a custom app that leverages the Microsoft Graph APIDeploy Azure AD B2C to meet your security requirementsCreate user flows and policies in Azure AD B2CWho this book is for: If you are a developer or architect who has basic knowledge of Azure Active Directory and are looking to gain expertise in the application security domain, this is the book for you. Basic Azure knowledge and experience in building web applications and web APIs in C# will help you get the most out of this book.
Foundations of WPF
Windows Presentation Foundations (WPF), formerly code-named Avalon, is part of a suite of new technologies collectively known as 'The WinFX stack'. This suite, coupled with new ancillary technologies such as XAML and LINQ provides a powerful addition to the .NET 2.0 Framework for creating applications for Windows Vista, and WinFX-enabled Windows XP computers. These technologies have been eagerly awaited, and demand for them is going to be very high within the Windows programming community. This book deals exclusively with WPF, explaining what it is, how it can be used and how it fits into the wider picture of new WinFX technologies. Readers get quickly up to speed with new coding techniques and processes needed for successful WPF coding, then receive a thorough practical grounding in how the technologies can be used. By the end of the book readers will be creating WPF-enabled applications for themselves.
Tuning and Customizing a Linux System
Dan Morrill fills in the gap between the simple basics covered in most texts and advanced, specialized topics; his readers gain a genuine mastery of how Linux systems are designed and come away with insight to work with any distribution, even one not discussed in the book.The books covers detailed analyses of three popular Linux distributions, example configuration and administration tasks, and three real-world case studies.
Learning Modern Linux
If you use Linux in development or operations and need a structured approach to help you dive deeper, this book is for you. Author Michael Hausenblas also provides tips and tricks for improving your workflow with this open source operating system. Whether you're a developer, software architect, or site reliability engineer, this hands-on guide focuses on ways to use Linux for your everyday needs, from development to office-related tasks. Along the way, you'll gain hands-on experience with modern Linux terminals and shells, and learn how to manage your workloads. You'll understand how to run Linux applications by using containers, systemd, modern filesystems, and immutable distros such as Flatcar and Bottlerocket. Use Linux as a modern work environment, rather than just from an admin perspective Learn critical components such as the Linux kernel, terminal multiplexer, human-friendly shells, and portable shell scripting Become familiar with access control, from file permissions to capabilities, and understand the role of filesystems as a fundamental building block Learn about application dependency management and containers Gain hands-on experience with the Linux networking stack and tooling, including DNS Apply modern operating system observability to manage your workloads Become familiar with interprocess communication, virtual machines, and selected security topics
Continuous Delivery with Docker and Jenkins - Third Edition
Create a complete continuous delivery process using modern DevOps tools such as Docker, Jenkins, Kubernetes, Ansible, Terraform, and many moreKey Features: Build reliable and secure applications using Docker containersCreate a highly available environment to scale Jenkins and your services using KubernetesAutomate your release process end-to-endBook Description: This updated third edition of Continuous Delivery with Docker and Jenkins will explain the advantages of combining Jenkins and Docker to improve the continuous integration and delivery process of app development.You'll start by setting up a Docker server and configuring Jenkins on it. Next, you'll discover steps for building applications and microservices on Dockerfiles and integrating them with Jenkins using continuous delivery processes such as continuous integration, automated acceptance testing, configuration management, and Infrastructure as Code. Moving ahead, you'll learn how to ensure quick application deployment with Docker containers, along with scaling Jenkins using Kubernetes. Later, you'll explore how to deploy applications using Docker images and test them with Jenkins. Toward the concluding chapters, the book will focus on missing parts of the CD pipeline, such as the environments and infrastructure, application versioning, and non-functional testing.By the end of this continuous integration and continuous delivery book, you'll have gained the skills you need to enhance the DevOps workflow by integrating the functionalities of Docker and Jenkins.What You Will Learn: Grasp Docker fundamentals and dockerize applications for the CD processUnderstand how to use Jenkins on-premises and in the cloudScale a pool of Docker servers using KubernetesWrite acceptance tests using CucumberRun tests in the Docker ecosystem using JenkinsProvision your servers and infrastructure using Ansible and TerraformPublish a built Docker image to a Docker registryDeploy cycles of Jenkins pipelines using community best practicesWho this book is for: The book is for DevOps engineers, system administrators, Docker professionals, or anyone who wants to explore the power of working with Docker and Jenkins together. No prior knowledge of DevOps is required to get started.