0323~0325_新天鵝堡
0325~0326_時報全書系

英文書 > 全部商品

Windows and Linux Penetration Testing from Scratch - Second Edition

Packt 出版
2022/08/05 出版

Master the art of identifying and exploiting vulnerabilities with Metasploit, Empire, PowerShell, and Python, turning Kali Linux into your fighter cockpitKey Features: Map your client's attack surface with Kali LinuxDiscover the craft of shellcode injection and managing multiple compromises in the environmentUnderstand both the attacker and the defender mindsetBook Description: Let's be honest-security testing can get repetitive. If you're ready to break out of the routine and embrace the art of penetration testing, this book will help you to distinguish yourself to your clients.This pen testing book is your guide to learning advanced techniques to attack Windows and Linux environments from the indispensable platform, Kali Linux. You'll work through core network hacking concepts and advanced exploitation techniques that leverage both technical and human factors to maximize success. You'll also explore how to leverage public resources to learn more about your target, discover potential targets, analyze them, and gain a foothold using a variety of exploitation techniques while dodging defenses like antivirus and firewalls. The book focuses on leveraging target resources, such as PowerShell, to execute powerful and difficult-to-detect attacks. Along the way, you'll enjoy reading about how these methods work so that you walk away with the necessary knowledge to explain your findings to clients from all backgrounds. Wrapping up with post-exploitation strategies, you'll be able to go deeper and keep your access.By the end of this book, you'll be well-versed in identifying vulnerabilities within your clients' environments and providing the necessary insight for proper remediation.What You Will Learn: Get to know advanced pen testing techniques with Kali LinuxGain an understanding of Kali Linux tools and methods from behind the scenesGet to grips with the exploitation of Windows and Linux clients and serversUnderstand advanced Windows concepts and protection and bypass them with Kali and living-off-the-land methodsGet the hang of sophisticated attack frameworks such as Metasploit and EmpireBecome adept in generating and analyzing shellcodeBuild and tweak attack scripts and modulesWho this book is for: This book is for penetration testers, information technology professionals, cybersecurity professionals and students, and individuals breaking into a pentesting role after demonstrating advanced skills in boot camps. Prior experience with Windows, Linux, and networking is necessary.

9 特價2156
立即代訂
下次再買

Mastering Azure Virtual Desktop

Ryan,Mangan  著
Packt 出版
2022/08/01 出版

Learn how to design, implement, configure, and manage your Azure Virtual Desktop environmentKey Features- Learn everything about designing and deploying an Azure Virtual Desktop environment- Gain in-depth insights into Azure Virtual Desktop and prepare successfully for the AZ-140 exam- Explore best practices and expert tips on how to set up Azure Virtual DesktopBook DescriptionAzure Virtual Desktop is a cloud desktop virtualization platform that securely delivers virtual desktops and remote apps. Mastering Azure Virtual Desktop will guide you through designing, implementing, configuring, and maintaining an Azure Virtual Desktop environment effectively. This book can also be used as an exam preparation guide to help you sit the Microsoft AZ-140 exam.You'll start with an introduction to the essentials of Azure Virtual Desktop. Next, you'll get to grips with planning an Azure Virtual Desktop architecture before learning how to implement an Azure Virtual Desktop environment. Moving ahead, you'll learn how to manage and control access as well as configure security controls on your Azure Virtual Desktop environment. As you progress, you'll understand how to manage user environments and configure MSIX app attach and other Azure Virtual Desktop features to enhance the user experience. You'll also learn about the Azure Active Directory (AD) join and getting started feature. Finally, you'll discover how to monitor and maintain an Azure Virtual Desktop environment to help you support your users and diagnose issues when they occur.By the end of this Microsoft Azure book, you'll have covered all the essential topics you need to know to design and manage Azure Virtual Desktop and prepare for the AZ-140 exam.What You Will Learn- Design Azure Virtual Desktop and user identities and profiles- Implement networking and storage for Azure Virtual Desktop- Create and configure session host images and host pools- Manage access and security for MS Azure Virtual Desktop- Implement FSLogix Profile Containers and FSLogix Cloud Cache- Configure user experience and Azure Virtual Desktop features- Plan and implement business continuity and disaster recovery- Automate Azure Virtual Desktop tasksWho this book is forIf you are an IT professional, workspace administrator, architect, or consultant looking to learn about designing, implementing, and managing Azure Virtual Desktop, this book is for you. You'll also find this book helpful if you're preparing for the Microsoft AZ-140 exam.Table of Contents- An Introduction to Azure Virtual Desktop- Design the Azure Virtual Desktop Architecture- Design for User Identities and Profiles- Implement and Manage Networking for Azure Virtual Desktop- Implement and Manage Storage for Azure Virtual Desktop- Create and Configure Host Pools and Session Hosts- Configure Azure Virtual Desktop Host Pools- Azure AD Join for Azure Virtual Desktop- Create and Manage Session Host Images- Manage Access- Manage Security- Implement and Manage FSLogix- Configure User Experience Settings- MSIX App Attach- Configure Apps on a Session Host- Plan and Implement Business Continuity and Disaster Recovery- Automate Azure Virtual Desktop Management Tasks- Monitor and Manage Performance and Health- Azure Virtual Desktop's Getting Started Feature- Microsoft and Community Resources- Practice Exam

9 特價2523
立即代訂
下次再買

High Availability and Scalability of Mainframe Environments using System z and z/OS as example

Ingram 出版
2022/07/26 出版

Mainframe computers are the backbone of industrial and commercial computing, hosting the most relevant and critical data of businesses. One of the most important mainframe environments is IBM System z with the operating system z/OS. This book introduces mainframe technology of System z and z/OS with respect to high availability and scalability. It highlights their presence on different levels within the hardware and software stack to satisfy the needs for large IT organizations.

9 特價4441
立即代訂
下次再買

SignatureGS

Duilio,Proni  著
Lulu.com 出版
2022/07/21 出版

use by adding a Screen Blanker, a Desktop Pattern Editor, a Sound Selector, and a Boot Setup Utility to GS/OS version 5.0 or later. Features: Phantasm - Gives your screen something to do through a variety of fun, attractive screen activities, including "Magic Molecules" and "Slimy Slugs." Graffiti - There's nothing wrong with the IIGS desktop, except it's boring. Graffiti gives you a variety of colorful desktop patterns to choose from, or you can create your own with the built-in desktop painter. Sonics - Customize your IIGS sounds, and assign special sounds for specific functions. And these aren't just beeps - they're fun and entertaining. Boot Master - Changing the configuration of all your IIGS drivers, and system components can be a pain. Boot Master makes it easy by putting all the controls for your IIGS drivers on one master control panel.

9 特價857
立即代訂
下次再買

Higher Text Plus

Lulu.com 出版
2022/07/21 出版

Generate upper and lower case text in a variety of typefaces, sizes, and colors from your programs for display on the Apple II hi-resolution screen. Features an easy-to-use editor for creation of your own unique character sets, with over 35 fonts included. Several additional utilities enhance your creation of hi-res displays. This program assumes a working knowledge of Applesoft BASIC.

9 特價1043
立即代訂
下次再買

Six Pack

Bill,Tudor  著
Lulu.com 出版
2022/07/21 出版

Six Pack, the first collection of Apple IIGS Finder Extensions, adds 13 new features to System 6. Just click the icons you want to work with, then select the Six Pack functions you want to perform from the Extras menu. Six Pack Features: - Alarm Clock - See time in a window or menu bar and provide alerts. - CDEV Alias - Add any Control Panel directly to the Apple menu. - CPU & Memory Use - See how your computer's resources are used. - Crypt - Save your data from prying eyes! - File Compare - Visually compare files for differences. - File Peeker - Preview the contents of graphics, text, and sound files. - HotKeys - Add dozens of functions to your function keys. - Morelnfo - See and change file data like actual / auxiliary file types. - Select lcons - Based on partial filename, filetype, modification date... - Super DataPath - Remembers a default data directory for programs. - Workset - Remembers a group of files and opens them all at once.

9 特價1076
立即代訂
下次再買

Mastering Windows Security and Hardening - Second Edition

Packt 出版
2022/07/13 出版

A comprehensive guide to administering and protecting the latest Windows 11 and Windows Server 2022 from the complex cyber threatsKey Features- Learn to protect your Windows environment using zero-trust and a multi-layered security approach- Implement security controls using Intune, Configuration Manager, Defender for Endpoint, and more- Understand how to onboard modern cyber-threat defense solutions for Windows clientsBook DescriptionAre you looking for the most current and effective ways to protect Windows-based systems from being compromised by intruders? This updated second edition is a detailed guide that helps you gain the expertise to implement efficient security measures and create robust defense solutions using modern technologies.The first part of the book covers security fundamentals with details around building and implementing baseline controls. As you advance, you'll learn how to effectively secure and harden your Windows-based systems through hardware, virtualization, networking, and identity and access management (IAM). The second section will cover administering security controls for Windows clients and servers with remote policy management using Intune, Configuration Manager, Group Policy, Defender for Endpoint, and other Microsoft 365 and Azure cloud security technologies. In the last section, you'll discover how to protect, detect, and respond with security monitoring, reporting, operations, testing, and auditing.By the end of this book, you'll have developed an understanding of the processes and tools involved in enforcing security controls and implementing zero-trust security principles to protect Windows systems.What you will learn- Build a multi-layered security approach using zero-trust concepts- Explore best practices to implement security baselines successfully- Get to grips with virtualization and networking to harden your devices- Discover the importance of identity and access management- Explore Windows device administration and remote management- Become an expert in hardening your Windows infrastructure- Audit, assess, and test to ensure controls are successfully applied and enforced- Monitor and report activities to stay on top of vulnerabilitiesWho this book is forIf you're a cybersecurity or technology professional, solutions architect, systems engineer, systems administrator, or anyone interested in learning how to secure the latest Windows-based systems, this book is for you. A basic understanding of Windows security concepts, Intune, Configuration Manager, Windows PowerShell, and Microsoft Azure will help you get the best out of this book.Table of Contents- Fundamentals of Windows Security- Building a Baseline- Hardware and Virtualization- Networking Fundamentals for Hardening Windows- Identity and Access Management- Administration and Policy Management- Deploying Windows Securely- Keeping Your Windows Client Secure- Advanced Hardening for Windows Clients- Mitigating Common Attack Vectors- Server Infrastructure Management- Keeping Your Windows Server Secure- Security Monitoring and Reporting- Security Operations- Testing and Auditing- Top 10 Recommendations and the Future

9 特價2523
立即代訂
下次再買

End-to-End Automation with Kubernetes and Crossplane

Packt 出版
2022/07/07 出版

A complete journey to automating infrastructure provisioning and cloud-native application deploymentKey Features: Leverage Crossplane and Kubernetes for a unified automation experience of infrastructure and appsBuild a modern self-service infrastructure platform abstracting recipes and in-house policiesClear guidance on trade-offs to manage Kubernetes configuration and ecosystem toolsBook Description: In the last few years, countless organizations have taken advantage of the disruptive application deployment operating model provided by Kubernetes. With Crossplane, the same benefits are coming to the world of infrastructure provisioning and management. The limitations of Infrastructure as Code with respect to drift management, role-based access control, team collaboration, and weak contract make people move towards a control-plane-based infrastructure automation, but setting it up requires a lot of know-how and effort.This book will cover a detailed journey to building a control-plane-based infrastructure automation platform with Kubernetes and Crossplane. The cloud-native landscape has an overwhelming list of configuration management tools that can make it difficult to analyze and choose. This book will guide cloud-native practitioners to select the right tools for Kubernetes configuration management that best suit the use case. You'll learn about configuration management with hands-on modules built on popular configuration management tools such as Helm, Kustomize, Argo, and KubeVela. The hands-on examples will be patterns that one can directly use in their work.By the end of this book, you'll be well-versed with building a modern infrastructure automation platform to unify application and infrastructure automation.What You Will Learn: Understand the context of Kubernetes-based infrastructure automationGet to grips with Crossplane concepts with the help of practical examplesExtend Crossplane to build a modern infrastructure automation platformUse the right configuration management tools in the Kubernetes environmentExplore patterns to unify application and infrastructure automationDiscover top engineering practices for infrastructure platform as a productWho this book is for: This book is for cloud architects, platform engineers, infrastructure or application operators, and Kubernetes enthusiasts who want to simplify infrastructure and application automation. A basic understanding of Kubernetes and its building blocks like Pod, Deployment, Service, and Namespace is needed before you can get started with this book.

9 特價2385
立即代訂
下次再買

Microsoft Azure Compute

Ingram 出版
2022/07/01 出版

Proven best practices for success with every Azure compute service! Compute services are key to most Azure cloud solutions, but maximizing their value requires best-practice planning, design, deployment, and operations. Now, leading consultant Avinash Valiramani presents expert guidance for driving maximum value from Microsoft's portfolio of Azure compute services for IaaS, PaaS, and FaaS. Drawing on his extensive work with Microsoft's Azure teams, he covers Azure VMs, VM Scale Sets, App Services, Azure Virtual Desktops, Azure Container Instances, Azure Functions, Azure Batch, and other Compute services. Whatever your role in delivering efficient, scalable compute services, this deep dive will help you make the most of your Azure investment. Leading Azure consultant Avinash Valiramani shows how to: Dive deeply into the frequently used Azure Compute services to better understand how each service works Walk through configuring each compute service and its related features and options Size, price, and create Azure VMs, and deliver the right levels of redundancy and availability Use VM Scale Sets (VMSS) to integrate VMs with load balancing and autoscaling Host web applications, mobile app back ends, and REST APIs via Azure App Service Run desktops-as-a-service at scale with Azure Virtual Desktop (AVD) Easily deploy containers on demand with Azure Container Instances (ACIs) Use serverless Azure Functions to build web APIs, process streams, and manage message queues About this Book For everyone interested in Azure infrastructure, including IT/cloud admins, security specialists, developers, engineers, and others at all levels of Azure compute experience. Especially useful for experienced IT pros in mid-sized to large organizations who have deployed, operated, monitored, upgraded, migrated, or designed infrastructure services.

9 特價2064
立即代訂
下次再買

Microsoft Defender for Cloud Cookbook

Packt 出版
2022/06/16 出版

Effectively secure their cloud and hybrid infrastructure, how to centrally manage security, and improve organizational security postureKey Features: Implement and optimize security posture in Azure, hybrid, and multi-cloud environmentsUnderstand Microsoft Defender for Cloud and its featuresProtect workloads using Microsoft Defender for Cloud's threat detection and prevention capabilitiesBook Description: Microsoft Defender for Cloud is a multi-cloud and hybrid cloud security posture management solution that enables security administrators to build cyber defense for their Azure and non-Azure resources by providing both recommendations and security protection capabilities.This book will start with a foundational overview of Microsoft Defender for Cloud and its core capabilities. Then, the reader is taken on a journey from enabling the service, selecting the correct tier, and configuring the data collection, to working on remediation. Next, we will continue with hands-on guidance on how to implement several security features of Microsoft Defender for Cloud, finishing with monitoring and maintenance-related topics, gaining visibility in advanced threat protection in distributed infrastructure and preventing security failures through automation.By the end of this book, you will know how to get a view of your security posture and where to optimize security protection in your environment as well as the ins and outs of Microsoft Defender for Cloud.What You Will Learn: Understand Microsoft Defender for Cloud features and capabilitiesUnderstand the fundamentals of building a cloud security posture and defending your cloud and on-premises resourcesImplement and optimize security in Azure, multi-cloud and hybrid environments through the single pane of glass - Microsoft Defender for CloudHarden your security posture, identify, track and remediate vulnerabilitiesImprove and harden your security and services security posture with Microsoft Defender for Cloud benchmarks and best practicesDetect and fix threats to services and resourcesWho this book is for: This book is for Security engineers, systems administrators, security professionals, IT professionals, system architects, and developers. Anyone whose responsibilities include maintaining security posture, identifying, and remediating vulnerabilities, and securing cloud and hybrid infrastructure. Anyone who is willing to learn about security in Azure and to build secure Azure and hybrid infrastructure, to improve their security posture in Azure, hybrid and multi-cloud environments by leveraging all the features within Microsoft Defender for Cloud.

9 特價2156
立即代訂
下次再買

Digitalized and Harmonized Industrial Production Systems

Ingram 出版
2022/06/15 出版

After a Technology Trend Screening and beyond a comprehensive State-of-the-Art analysis about Industrial Digitalization and Industry 4.0-compliant solutions, the book introduces methods, architectures, and technologies applicable in real industrial use cases, explained for a broad audience of researchers, practitioners and industrialists.

9 特價4018
立即代訂
下次再買

Heterogeneous Computing Architectures

Ingram 出版
2022/06/15 出版

Heterogeneous Computing Architectures: Challenges and Vision provides an updated vision of the state-of-the-art of heterogeneous computing systems, covering all the aspects related to their design: from the architecture and programming models to hardware/software integration and orchestration to real-time and security requirements.

9 特價5532
立即代訂
下次再買

Expert Linux Administration Guide

Vishal,Rai  著
Ingram 出版
2022/06/10 出版

Linux administration based on hosted virtualization.Key FeaturesDesigned for absolute beginners and early Linux users with the most up-to-date knowledge.Contains troubleshooting tips and best practices for running a Linux system on your own.Supplemental knowledge and insights in server security, threat management, and virtualization.Description'Expert Linux Administration Guide' is for the readers who are interested in developing the skills and abilities essential to operate as a professional Linux system administrator. This is the only book that explains everything about Linux practically through examples, simplified visuals, solution tips, and expert-led best practices.This book begins with an introduction to Linux fundamentals and swiftly progresses to the day-to-day tasks of a Linux administrator. You practically learn how to plan your network by installing Linux and gaining a firm grasp of its file system and system configuration. This book covers all the Linux server settings, including DNS, mail servers, Squid proxy servers, and backup recovery. In addition, the book contains troubleshooting hints and ready-to-use solutions for server configuration, load balancing, firewall configuration, network security concerns, and virtualization. The book does not end here, as it discusses some of the advanced administrator's responsibilities. Topics such as monitoring system performance, process controls, user provisioning, file and database recovery and backup, and software package upgrades are also covered.By the end of this book, you'll be able to practise and implement the latest system administration techniques in a Linux environment considerably more effectively.What you will learnLearn to install and configure Linux servers quickly.Manage configurations, license software, and patch security flaws.Obtain the highest level of support for RAID configurations.Learn how to set up database servers, backups, and system recovery.Expert advice on firewalls, web servers, disc utilization, and network resources.Who this book is forThis book is intended for System Managers, System Administrators, Network Administrators, Server Administrators, System Engineers, and others interested in becoming professional Linux Administrators. No prerequisite knowledge is required, as the book covers everything clearly and precisely.Table of Contents1. Linux Fundamental2. Files, Directories & User Management3. File Compression and Archival4. Performing Search5. Vi Editor6. Linux Installation7. System Initialization8. Overview of Network commands9. Firewall Setup10A. Partition System in CentOS7/810B. LVM and ISCSI CentOS7/811. YUM Server12. Telnet13. Domain Name System14. Dynamic Host Control Protocol15. Unified Threat Management (UTM)16. Squid Web Proxy17. Apache Web Server18. Linux as a Router19. NIS Server20. NFS Server21. File Transfer Protocol22. Samba Configuration23. Mail Server Configuration24. Linux Hardening25. Load Balancer26. Setup Network Printer Services27. System Backup and Restore Process28. Linux Virtualization KVM29. Introduction to Open-Source tools30. Troubleshooting Network IssuesRead more

9 特價2193
立即代訂
下次再買

Active Directory Administration Cookbook - Second Edition

Packt 出版
2022/06/09 出版

Simplified actionable recipes for managing Active Directory and Azure AD, as well as Azure AD Connect, for administration on-premise and in the cloud with Windows Server 2022Key Features: Expert solutions for name resolution, federation, certificates, and security with Active DirectoryExplore Microsoft Azure AD and Azure AD Connect for effective administration on the cloudAutomate security tasks using Active Directory tools and PowerShellBook Description: Updated to the Windows Server 2022, this second edition covers effective recipes for Active Directory administration that will help you leverage AD's capabilities for automating network, security, and access management tasks in the Windows infrastructure.Starting with a detailed focus on forests, domains, trusts, schemas, and partitions, this book will help you manage domain controllers, organizational units, and default containers. You'll then explore Active Directory sites management as well as identify and solve replication problems. As you progress, you'll work through recipes that show you how to manage your AD domains as well as user and group objects and computer accounts, expiring group memberships, and Group Managed Service Accounts (gMSAs) with PowerShell. Once you've covered DNS and certificates, you'll work with Group Policy and then focus on federation and security before advancing to Azure Active Directory and how to integrate on-premise Active Directory with Azure AD. Finally, you'll discover how Microsoft Azure AD Connect synchronization works and how to harden Azure AD.By the end of this AD book, you'll be able to make the most of Active Directory and Azure AD Connect.What You Will Learn: Manage the Recycle Bin, gMSAs, and fine-grained password policiesWork with Active Directory from both the graphical user interface (GUI) and command lineUse Windows PowerShell to automate tasksCreate and remove forests, domains, domain controllers, and trustsCreate groups, modify group scope and type, and manage membershipsDelegate, view, and modify permissionsSet up, manage, and optionally decommission certificate authoritiesOptimize Active Directory and Azure AD for securityWho this book is for: This book is for administrators of existing Active Directory Domain Service environments as well as for Azure AD tenants looking for guidance to optimize their day-to-day tasks. Basic networking and Windows Server Operating System knowledge will be useful for getting the most out of this book.

9 特價2385
立即代訂
下次再買

Unix Programming

Ingram 出版
2022/05/23 出版

Functioning of UNIX operating system with shell programmingKey FeaturesEquipped with installation, administration, and best practices for UNIX system management.Provides a wide range of shell scripting and Unix-based solutions.UNIX foundations, Resource Management, Socket Programming, Shell Scripting, and the C Interface are all covered.DescriptionThis book is intended to be an instructional tool and study guide for those interested in learning about the principles of the UNIX operating system, process management, socket programming, and numerous shell scripting techniques.First, you will learn about the UNIX system architecture and programming environment, which provide an overview of all system resources and their management. Then, Unix file systems, Kernel data structures for performing file I/O, Basic File permissions and Library functions, and UNIX system calls are discussed. Process control, parallel execution, user data access, and signal management are just some of the topics covered in this book. Next, we'll go through the basics of network communication, such as system calls, data transmission over sockets, and I/O multiplexing models. Finally, the book discusses more advanced UNIX and C interface concepts such as library functions, command-line arguments, and environment variables.Throughout the book, you'll find plenty of solutions, exercises, and shell scripts to help you get the most out of your hands-on experience with the UNIX system.What you will learnInvestigate every aspect of the UNIX operating system.Understand how to use the shell and how to develop shell scripts.Acquaint yourself with all of UNIX's file and process components.Gain a working knowledge of file access and manipulation.Learn more about inter-process communication and its many methods.Who this book is forThe book appeals to UNIX professionals, students, master's degree applicants, and candidates for competitive exams who wish to understand UNIX principles thoroughly. However, it is written for beginners and may be read by anyone without prior understanding.Table of Contents1. Fundamental Concepts of UNIX Operating System2. File Management3. Process Management4. Inter-Process Communication5. Socket Programming6. Memory Management7. UNIX Shell and Custom Environment8. Shell Programming Using Bourne ShellRead more

9 特價1644
立即代訂
下次再買

Practical Guide to IT Problem Management

Andrew,Dixon  著
Ingram 出版
2022/05/13 出版

Whilst IT problem management is well understood, doing it in practice is much harder. Aligned with such well known frameworks as ITIL, this book offers practical advice on how to tackle problems in complex environments. Each chapter explores a different aspect of problem solving and is illustrated with real-life case studies.

9 特價1251
立即代訂
下次再買

Combinatorics of Permutations

Miklos,Bona  著
Ingram 出版
2022/05/12 出版

The new edition of this award-winning, graduate textbook is upated throughout. Including mostly enumerative combinatorics, yet there are algebraic, analytic, and topological parts as well, and many applications. The author continues to reveal the usefulness of the subject for both students and researchers.

9 特價8613
立即代訂
下次再買

Azure Active Directory for Secure Application Development

Sjoukje,Zaal  著
Packt 出版
2022/05/11 出版

Develop secure applications using different features of Azure Active Directory along with modern authentication techniques and protocolsKey Features: Confidently secure your Azure applications using the tools offered by Azure ADGet to grips with the most modern and effective authorization and authentication protocolsUnlock the potential of Azure AD's most advanced features including Microsoft Graph and Azure AD B2CBook Description: Azure Active Directory for Secure Application Development is your one-stop shop for learning how to develop secure applications using modern authentication techniques with Microsoft Azure AD. Whether you're working with single-tenant, multi-tenant, or line-of-business applications, this book contains everything you need to secure them.The book wastes no time in diving into the practicalities of Azure AD. Right from the start, you'll be setting up tenants, adding users, and registering your first application in Azure AD. The balance between grasping and applying theory is maintained as you move from the intermediate to the advanced: from the basics of OAuth to getting your hands dirty with building applications and registering them in Azure AD. Want to pin down the Microsoft Graph, Azure AD B2C, or authentication protocol best practices? We've got you covered. The full range of Azure AD functionality from a developer perspective is here for you to explore with confidence.By the end of this secure app development book, you'll have developed the skill set that so many organizations are clamoring for. Security is mission-critical, and after reading this book, you will be too.What You Will Learn: Get an overview of Azure AD and set up your Azure AD instanceMaster application configuration and the use of service principalsUnderstand new authentication protocolsExplore the Microsoft Identity librariesUse OpenID Connect, OAuth 2.0, and MSAL to make sign-in fully secureBuild a custom app that leverages the Microsoft Graph APIDeploy Azure AD B2C to meet your security requirementsCreate user flows and policies in Azure AD B2CWho this book is for: If you are a developer or architect who has basic knowledge of Azure Active Directory and are looking to gain expertise in the application security domain, this is the book for you. Basic Azure knowledge and experience in building web applications and web APIs in C# will help you get the most out of this book.

9 特價1926
立即代訂
下次再買

Exam Ref Az-500 Microsoft Azure Security Technologies

Ingram 出版
2022/05/04 出版

Prepare for Microsoft Exam AZ-500: Demonstrate your real-world knowledge of Microsoft Azure security, including tools and techniques for protecting identity, access, platforms, data, and applications, and for effectively managing security operations. Designed for professionals with Azure security experience, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified: Azure Security Engineer Associate level. Focus on the expertise measured by these objectives: Manage identity and access Implement platform protection Manage security operations Secure data and applications This Microsoft Exam Ref: Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you have expertise implementing security controls and threat protection, managing identity and access, and protecting assets in cloud and hybrid environments About the Exam Exam AZ-500 focuses on the knowledge needed to manage Azure Active Directory identities; configure secure access with Azure AD; manage application access and access control; implement advanced network security; configure advanced security for compute; monitor security with Azure Monitor, Azure Firewall manager, Azure Security Center, Azure Defender, and Azure Sentinel; configure security policies; configure security for storage and databases; and configure and manage Key Vault. About Microsoft Certification Passing this exam fulfills your requirements for the Microsoft Certified: Azure Security Engineer Associate credential, demonstrating your expertise as an Azure Security Engineer capable of maintaining security posture, identifying and remediating vulnerabilities, implementing threat protection, and responding to incident escalations as part of a cloud-based management and security team. See full details at: microsoft.com/learn

9 特價2064
立即代訂
下次再買

Macos Support Essentials 12 - Apple Pro Training Series

Arek,Dreyer  著
Ingram 出版
2022/04/26 出版

macOS Support Essentials 12, the official book for macOS support, is a top-notch primer for anyone who needs to support, troubleshoot, or optimize macOS Monterey, such as IT professionals, technicians, help desk specialists, and ardent Mac users. This is the only Apple Pro Training Series book that covers Monterey. You'll find in-depth, step-by-step instructions on everything from upgrading, updating, reinstalling and configuring macOS Monterey to setting-up network services. This book covers updated system utilities and new features in macOS Monterey: Passwords System Preference Live Text Voice Control User privacy settings Notarized apps Startup Security Utility And more! This book includes the following content: Authoritative explanations of underlying technologies, troubleshooting, system administration, and much more Focused lessons that take you step by step through practical, real-world tasks A Web Edition that provides the full text of the book online The Apple Pro Training Series is Apple's official self-paced learning resource. Books in this series offer downloadable lesson files and an online version of the book. Additional information on this and other books in this series can be found at www.peachpit.com/apple. For more on certification, visit training.apple.com.

9 特價3212
立即代訂
下次再買

Tuning and Customizing a Linux System

Apress 出版
2022/04/24 出版

Dan Morrill fills in the gap between the simple basics covered in most texts and advanced, specialized topics; his readers gain a genuine mastery of how Linux systems are designed and come away with insight to work with any distribution, even one not discussed in the book.The books covers detailed analyses of three popular Linux distributions, example configuration and administration tasks, and three real-world case studies.

9 特價1539
立即代訂
下次再買

Foundations of WPF

Apress 出版
2022/04/24 出版

Windows Presentation Foundations (WPF), formerly code-named Avalon, is part of a suite of new technologies collectively known as 'The WinFX stack'. This suite, coupled with new ancillary technologies such as XAML and LINQ provides a powerful addition to the .NET 2.0 Framework for creating applications for Windows Vista, and WinFX-enabled Windows XP computers. These technologies have been eagerly awaited, and demand for them is going to be very high within the Windows programming community. This book deals exclusively with WPF, explaining what it is, how it can be used and how it fits into the wider picture of new WinFX technologies. Readers get quickly up to speed with new coding techniques and processes needed for successful WPF coding, then receive a thorough practical grounding in how the technologies can be used. By the end of the book readers will be creating WPF-enabled applications for themselves.

9 特價1368
立即代訂
下次再買

Learning Modern Linux

Ingram 出版
2022/04/18 出版

If you use Linux in development or operations and need a structured approach to help you dive deeper, this book is for you. Author Michael Hausenblas also provides tips and tricks for improving your workflow with this open source operating system. Whether you're a developer, software architect, or site reliability engineer, this hands-on guide focuses on ways to use Linux for your everyday needs, from development to office-related tasks. Along the way, you'll gain hands-on experience with modern Linux terminals and shells, and learn how to manage your workloads. You'll understand how to run Linux applications by using containers, systemd, modern filesystems, and immutable distros such as Flatcar and Bottlerocket. Use Linux as a modern work environment, rather than just from an admin perspective Learn critical components such as the Linux kernel, terminal multiplexer, human-friendly shells, and portable shell scripting Become familiar with access control, from file permissions to capabilities, and understand the role of filesystems as a fundamental building block Learn about application dependency management and containers Gain hands-on experience with the Linux networking stack and tooling, including DNS Apply modern operating system observability to manage your workloads Become familiar with interprocess communication, virtual machines, and selected security topics

9 特價2257
立即代訂
下次再買

Continuous Delivery with Docker and Jenkins - Third Edition

Rafal,Leszko  著
Packt 出版
2022/04/12 出版

Create a complete continuous delivery process using modern DevOps tools such as Docker, Jenkins, Kubernetes, Ansible, Terraform, and many moreKey Features: Build reliable and secure applications using Docker containersCreate a highly available environment to scale Jenkins and your services using KubernetesAutomate your release process end-to-endBook Description: This updated third edition of Continuous Delivery with Docker and Jenkins will explain the advantages of combining Jenkins and Docker to improve the continuous integration and delivery process of app development.You'll start by setting up a Docker server and configuring Jenkins on it. Next, you'll discover steps for building applications and microservices on Dockerfiles and integrating them with Jenkins using continuous delivery processes such as continuous integration, automated acceptance testing, configuration management, and Infrastructure as Code. Moving ahead, you'll learn how to ensure quick application deployment with Docker containers, along with scaling Jenkins using Kubernetes. Later, you'll explore how to deploy applications using Docker images and test them with Jenkins. Toward the concluding chapters, the book will focus on missing parts of the CD pipeline, such as the environments and infrastructure, application versioning, and non-functional testing.By the end of this continuous integration and continuous delivery book, you'll have gained the skills you need to enhance the DevOps workflow by integrating the functionalities of Docker and Jenkins.What You Will Learn: Grasp Docker fundamentals and dockerize applications for the CD processUnderstand how to use Jenkins on-premises and in the cloudScale a pool of Docker servers using KubernetesWrite acceptance tests using CucumberRun tests in the Docker ecosystem using JenkinsProvision your servers and infrastructure using Ansible and TerraformPublish a built Docker image to a Docker registryDeploy cycles of Jenkins pipelines using community best practicesWho this book is for: The book is for DevOps engineers, system administrators, Docker professionals, or anyone who wants to explore the power of working with Docker and Jenkins together. No prior knowledge of DevOps is required to get started.

9 特價2753
立即代訂
下次再買

Linux Desktop Pocket Guide

Ingram 出版
2022/04/06 出版

While Mac OS X garners all the praise from pundits, and Windows XP attracts all the viruses, Linux is quietly being installed on millions of desktops every year. For programmers and system administrators, business users, and educators, desktop Linux is a breath of fresh air and a needed alternative to other operating systems. The Linux Desktop Pocket Guide is your introduction to using Linux on five of the most popular distributions: Fedora, Gentoo, Mandriva, SUSE, and Ubuntu. Despite what you may have heard, using Linux is not all that hard. Firefox and Konqueror can handle all your web browsing needs; GAIM and Kopete allow you to chat with your friends on the AOL, MSN, and Yahoo! networks; and the email programs Evolution and Kontact provide the same functionality as Microsoft Outlook, with none of the cost. All of these programs run within the beautiful, feature-packed, and easy-to-use GNOME or KDE desktop environments. No operating system truly "just works," and Linux is no exception. Although Linux is capable of running on most any computing hardware that Microsoft Windows can use, you sometimes need to tweak it just a little to make it work the way you really want. To help you with this task, Linux Desktop Pocket Guide covers essential topics, such as configuring your video card, screen resolution, sound, and wireless networking. And laptop users are not left out--an entire section is devoted to the laptop issues of battery life, sleep, and hibernate modes.

9 特價513
立即代訂
下次再買

Exam Ref Az-305 Designing Microsoft Azure Infrastructure Solutions

Ingram 出版
2022/04/06 出版

Prepare for Microsoft Exam AZ-305 and help demonstrate your real-world expertise in designing cloud and hybrid solutions that run on Microsoft Azure, including identity, governance, monitoring, data storage, business continuity, and infrastructure. Designed for modern IT professionals, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified Expert level. Focus on the expertise measured by these objectives: Design identity, governance, and monitoring solutions Design data storage solutions Design business continuity solutions Design infrastructure solutions This Microsoft Exam Ref: Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you have advanced experience and knowledge of IT operations, as well as experience in Azure administration, Azure development, and DevOps processes About the Exam Exam AZ-305 focuses on knowledge needed to design logging, monitoring, authentication, and authorization solutions; design governance, identities, and application access; design relational and non-relational data storage solutions; design data integration; recommend data storage solutions; design backup and disaster recovery solutions; design for high availability; design compute and network solutions, application architecture, and migration. About Microsoft Certification If you hold Microsoft Certified: Azure Administrator Associate certification, passing this exam fulfills your requirements for the Microsoft Certified: Azure Solutions Architect Expert credential. Passing this exam demonstrates your expert-level skills in advising stakeholders and translating business requirements into designs for secure, scalable, and reliable Azure solutions; and in partnering with others to implement these solutions. See full details at: microsoft.com/learn

9 特價2064
立即代訂
下次再買

Bash Idioms

Carl,Albing  著
Ingram 出版
2022/03/21 出版

Shell scripts are everywhere, especially those written in bash-compatible syntax. But these scripts can be complex and obscure. Complexity is the enemy of security, but it's also the enemy of readability and understanding. With this practical book, you'll learn how to decipher old bash code and write new code that's as clear and readable as possible. Authors Carl Albing and JP Vossen show you how to use the power and flexibility of the shell to your advantage. You may know enough bash to get by, but this book will take your skills from manageable to magnificent. Whether you use Linux, Unix, Windows, or a Mac, you'll learn how to read and write scripts like an expert. Your future you will thank you. You'll explore the clear idioms to use and obscure ones to avoid, so that you can: Write useful, flexible, and readable bash code with style Decode bash code such as ${MAKEMELC, } and ${PATHNAME##*/} Save time and ensure consistency when automating tasks Discover how bash idioms can make your code clean and concise

9 特價1915
立即代訂
下次再買

Terraform: Up and Running

Ingram 出版
2022/03/21 出版

Terraform has become a key player in the DevOps world for defining, launching, and managing infrastructure as code (IaC) across a variety of cloud and virtualization platforms, including AWS, Google Cloud, Azure, and more. This hands-on third edition, expanded and thoroughly updated for version 1.0 and beyond, shows you the fastest way to get up and running with Terraform. Gruntwork cofounder Yevgeniy (Jim) Brikman takes you through code examples that demonstrate Terraform's simple, declarative programming language for deploying and managing infrastructure with a few commands. Veteran sysadmins, DevOps engineers, and novice developers will quickly go from Terraform basics to running a full stack that can support a massive amount of traffic and a large team of developers. Compare Terraform with Chef, Puppet, Ansible, CloudFormation, and Pulumi Deploy servers, load balancers, and databases Create reusable infrastructure with Terraform modules Test your Terraform modules with static analysis, unit tests, and integration tests Configure CI/CD pipelines for both your apps and infrastructure code Use advanced Terraform syntax for loops, conditionals, and zero-downtime deployment Get up to speed on Terraform 0.13 to 1.0 and beyond Work with multiple clouds and providers (including Kubernetes!)

9 特價2257
立即代訂
下次再買

Linux Device Driver Development - Second Edition

John,Madieu  著
Packt 出版
2022/03/16 出版

Get up to speed with the most important concepts in driver development and focus on common embedded system requirements such as memory management, interrupt management, and locking mechanismsKey Features: Write feature-rich and customized Linux device drivers for any character, SPI, and I2C deviceDevelop a deep understanding of locking primitives, IRQ management, memory management, DMA, and so onGain practical experience in the embedded side of Linux using GPIO, IIO, and input subsystemsBook Description: Linux is by far the most-used kernel on embedded systems. Thanks to its subsystems, the Linux kernel supports almost all of the application fields in the industrial world. This updated second edition of Linux Device Driver Development is a comprehensive introduction to the Linux kernel world and the different subsystems that it is made of, and will be useful for embedded developers from any discipline.You'll learn how to configure, tailor, and build the Linux kernel. Filled with real-world examples, the book covers each of the most-used subsystems in the embedded domains such as GPIO, direct memory access, interrupt management, and I2C/SPI device drivers. This book will show you how Linux abstracts each device from a hardware point of view and how a device is bound to its driver(s). You'll also see how interrupts are propagated in the system as the book covers the interrupt processing mechanisms in-depth and describes every kernel structure and API involved. This new edition also addresses how not to write device drivers using user space libraries for GPIO clients, I2C, and SPI drivers.By the end of this Linux book, you'll be able to write device drivers for most of the embedded devices out there.What You Will Learn: Download, configure, build, and tailor the Linux kernelDescribe the hardware using a device treeWrite feature-rich platform drivers and leverage I2C and SPI busesGet the most out of the new concurrency managed workqueue infrastructureUnderstand the Linux kernel timekeeping mechanism and use time-related APIsUse the regmap framework to factor the code and make it genericOffload CPU for memory copies using DMAInteract with the real world using GPIO, IIO, and input subsystemsWho this book is for: This Linux OS book is for embedded system and embedded Linux enthusiasts/developers who want to get started with Linux kernel development and leverage its subsystems. Electronic hackers and hobbyists interested in Linux kernel development as well as anyone looking to interact with the platform using GPIO, IIO, and input subsystems will also find this book useful.

9 特價2523
立即代訂
下次再買

PowerShell

Roger,Wilson  著
Ingram 出版
2022/03/09 出版

POWERSHELLWindows PowerShell is a scripting language and automation engine that is designed using object-oriented concepts with the .NET framework. It provides a Graphical User Interface (GUI) and command line components to manipulate servers and workstations using a scripting language that offers easy syntax.This book aims to serve as a beginner's guide to Windows PowerShell and will take you through all of its key features and components including commands, objects, the pipeline, scripting, and more!

9 特價855
立即代訂
下次再買

Offensive Shellcode from Scratch

Packt 出版
2022/03/09 出版

Gain practical knowledge of shellcode and leverage it to develop shellcode for Windows and Linux operating systems, while understanding the countermeasures in place and how these can be bypassedKey Features: Get up and running with shellcode fundamentalsDevelop Shellcode for Windows and LinuxUnderstand the building blocks of shellcodeBook Description: Shellcoding is a technique that is executed by many red teams and used in penetration testing and real-world attacks. Books on shellcode can be complex, and writing shellcode is perceived as a kind of "dark art." Offensive Shellcode from Scratch will help you to build a strong foundation of shellcode knowledge and enable you to use it with Linux and Windows.This book helps you to explore simple to more complex examples of shellcode that are used by real advanced persistent threat (APT) groups. You'll get to grips with the components of shellcode and understand which tools are used when building shellcode, along with the automated tools that exist to create shellcode payloads. As you advance through the chapters, you'll become well versed in assembly language and its various components, such as registers, flags, and data types. This shellcode book also teaches you about the compilers and decoders that are used when creating shellcode. Finally, the book takes you through various attacks that entail the use of shellcode in both Windows and Linux environments.By the end of this shellcode book, you'll have gained the knowledge needed to understand the workings of shellcode and build your own exploits by using the concepts explored.What You Will Learn: Gain a thorough understanding of shellcodeGet to grips with assembly language and its key purpose in shellcode developmentIdentify key elements of memory registersExplore debuggers and their use casesGet up and running with hands-on shellcode creation for both Windows and LinuxExploit Windows and Linux operating systems using shellcodeAssess countermeasures of Windows and LinuxWho this book is for: This book is for red teamers, penetration testers, and anyone looking to learn about shellcode and find out how it is used to break into systems by making use of simple to complex instructions of code in memory. Basic shellcode knowledge is helpful but not mandatory to understand the topics covered in this book.

9 特價2018
立即代訂
下次再買

Microsoft Azure Sentinel

Ingram 出版
2022/03/02 出版

Build next-generation security operations with Microsoft Sentinel Microsoft Sentinel is the scalable, cloud-native, security information and event management (SIEM) solution for automating and streamlining threat identification and response across your enterprise. Now, three leading experts guide you step-by-step through planning, deployment, and operations, helping you use Microsoft Sentinel to escape the complexity and scalability challenges of traditional solutions. Fully updated for the latest enhancements, this edition introduces new use cases for investigation, hunting, automation, and orchestration across your enterprise and all your clouds. The authors clearly introduce each service, concisely explain all new concepts, and present proven best practices for maximizing Microsoft Sentinel's value throughout security operations. Three of Microsoft's leading security operations experts show how to: Review emerging challenges that make better cyberdefense an urgent priority See how Microsoft Sentinel responds by unifying alert detection, threat visibility, proactive hunting, and threat response Explore components, architecture, design, and initial configuration Ingest alerts and raw logs from all sources you need to monitor Define and validate rules that prevent alert fatigue Use threat intelligence, machine learning, and automation to triage issues and focus on high-value tasks Add context with User and Entity Behavior Analytics (UEBA) and Watchlists Hunt sophisticated new threats to disrupt cyber kill chains before you're exploited Enrich incident management and threat hunting with Jupyter notebooks Use Playbooks to automate more incident handling and investigation tasks Create visualizations to spot trends, clarify relationships, and speed decisions Simplify integration with point-and-click data connectors that provide normalization, detection rules, queries, and Workbooks About This Book For cybersecurity analysts, security administrators, threat hunters, support professionals, engineers, and other IT professionals concerned with security operations For both Microsoft Azure and non-Azure users at all levels of experience

9 特價1835
立即代訂
下次再買

Efficient Linux at the Command Line

Ingram 出版
2022/02/17 出版

Take your Linux skills to the next level! Whether you're a system administrator, software developer, site reliability engineer, or enthusiastic hobbyist, this practical, hands-on book will help you work faster, smarter, and more efficiently. You'll learn how to create and run complex commands that solve real business problems, process and retrieve information, and automate manual tasks. You'll also truly understand what happens behind the shell prompt, so no matter which commands you run, you can be more successful in everyday Linux use and more competitive on the job market. As you build intermediate to advanced command-line skills, you'll learn how to: Choose or construct commands that get your work done quickly Run commands efficiently and navigate the Linux filesystem with ease Build powerful, complex commands out of simpler ones Transform text files and query them like databases to achieve business goals Control Linux point-and-click features from the command line

9 特價1915
立即代訂
下次再買

Linux Command Line and Shell Scripting Techniques

Vedran,Dakic  著
Packt 出版
2022/02/16 出版

Practical and actionable recipes for using shell and command-line scripting on your Linux OS with confidenceKey Features: Learn how to use the command line and write and debug Linux Shell scriptsAutomate complex repetitive tasks and backups, and learn networking and securityA practical approach to system administration, and virtual machine and software managementBook Description: Linux Command Line and Shell Scripting Techniques begins by taking you through the basics of the shell and command-line utilities. You'll start by exploring shell commands for file, directory, service, package, and process management. Next, you'll learn about networking - network, firewall and DNS client configuration, ssh, scp, rsync, and vsftpd, as well as some network troubleshooting tools.You'll also focus on using the command line to find and manipulate text content, via commands such as cut, egrep, and sed. As you progress, you'll learn how to use shell scripting. You'll understand the basics - input and output, along with various programming concepts such as loops, variables, arguments, functions, and arrays. Later, you'll learn about shell script interaction and troubleshooting, before covering a wide range of examples of complete shell scripts, varying from network and firewall configuration, through to backup and concepts for creating live environments. This includes examples of performing scripted virtual machine installation and administration, LAMP (Linux, Apache, MySQL, PHP) stack provisioning and bulk user creation for testing environments.By the end of this Linux book, you'll have gained the knowledge and confidence you need to use shell and command-line scripts.What You Will Learn: Get an introduction to the command line, text editors and shell scriptingFocus on regular expressions, file handling, and automating complex tasksAutomate common administrative tasksBecome well-versed with networking and system security scriptingGet to grips with repository management and network-based file synchronizationUse loops, arguments, functions, and arrays for task automationWho this book is for: This book is for anyone looking to learn about Linux administration via CLI and scripting. Those with no Linux command-line interface (CLI) experience will benefit from it by learning from scratch. More experienced Linux administrators or engineers will also find this book useful, as it will help them organize their knowledge, fill in any gaps, and work efficiently with shell scripts to increase productivity.

9 特價2523
立即代訂
下次再買

Microsoft Azure Monitoring & Management

Ingram 出版
2022/01/28 出版

Proven best practices for success with every Azure monitoring and management service For cloud environments to deliver optimal value, their monitoring and management services must be designed, deployed, and managed well. Leading cloud consultant Avinash Valiramani shows how to simplify administration, reduce downtime, control cost, solve problems faster, and prepare for any workload in any environment. Explore detailed, expert coverage of Azure Backup, Azure Site Recovery, Azure Migrate, Azure Monitor, Azure Network Watcher, Azure Portal, Azure Cloud Shell, Azure Service Health, Azure Cost Management, and more. Whatever your role in delivering efficient, reliable cloud services, this best practice, deep dive guide will help you make the most of your Azure investment. Leading Azure consultant Avinash Valiramani shows how to: Back up on-premises, Azure-based, and other cloud workloads for short- and long-term retention Implement simple, stable, cost-effective business continuity/disaster recovery with Azure Site Recovery Discover, assess, and migrate diverse workloads to Azure, VMs, web apps, databases, and more Monitor all Azure applications, VMs, and other deployed services centrally via Azure Monitor Track, troubleshoot, and optimize networking for IaaS resources Create and manage anything from single-service solutions to complex multi-service architectures Run Azure Cloud Shell's cloud-native command line from any device, anywhere Monitor service health, workload levels, service layer resources, and availability Also look for these Definitive Guides to Azure success: Microsoft Azure Compute: The Definitive Guide Microsoft Azure Networking: The Definitive Guide Microsoft Azure Storage: The Definitive Guide

9 特價2064
立即代訂
下次再買

Windows 11 for Seniors in Easy Steps

Ingram 出版
2022/01/24 出版

Windows 11 for Seniors in easy steps is written with older citizens in mind. It'll guide you through Windows 11, a step at a time, and covers all the key features in the 22H2 Windows update, including: The redesigned Windows user interface.Apps and widgets to stay in touch, browse the net, watch movies, share photos, play music and games, get real-time world weather and news, and more.Personalizing Windows to suit your needs using Settings and features such as Focus to choose when you receive notifications.Accessibility features in Windows 11.Keeping your files and apps organized for easy access, and keeping your computer secure and working in tip-top condition! Packed with tips throughout, this leading guide for seniors will help you get more out of Windows 11 - at your own pace!

9 特價649
立即代訂
下次再買

Memory Dump Analysis Anthology, Volume 14

Ingram 出版
2022/01/21 出版

This reference volume consists of revised, edited, cross-referenced, and thematically organized selected articles from Software Diagnostics Institute (DumpAnalysis.org + TraceAnalysis.org) and Software Diagnostics Library (former Crash Dump Analysis blog, DumpAnalysis.org/blog) about software diagnostics, root cause analysis, debugging, crash and hang dump analysis, software trace and log analysis written in August 2020 - 14 August 2021 for software engineers developing and maintaining products on Windows and Linux platforms, quality assurance engineers testing software, technical support, escalation and site reliability engineers dealing with complex software issues, security and vulnerability researchers, reverse engineers, malware and memory forensics analysts. This volume is fully cross-referenced with volumes 1 - 13 and features: - 7 new crash dump analysis patterns with selected downloadable example memory dumps; - New crash dump analysis case study not previously published anywhere; - 14 new software trace and log analysis patterns; - Introduction to cloud analysis patterns; - Introduction to the fractal nature of software traces and logs; - Introduction to the general architecture of analysis pattern networks; - Lists of recommended books.

9 特價2295
立即代訂
下次再買

The Kubernetes Bible

Packt 出版
2022/01/14 出版

Get up and running with Kubernetes 1.19 and simplify the way you build, deploy, and maintain scalable distributed systemsKey Features: Design and deploy large clusters on various cloud platformsExplore containerized application deployment, debugging, and recovery with the latest Kubernetes version 1.19Become well-versed with advanced Kubernetes topics such as traffic routing or Pod autoscaling and schedulingBook Description: With its broad adoption across various industries, Kubernetes is helping engineers with the orchestration and automation of container deployments on a large scale, making it the leading container orchestration system and the most popular choice for running containerized applications.This Kubernetes book starts with an introduction to Kubernetes and containerization, covering the setup of your local development environment and the roles of the most important Kubernetes components. Along with covering the core concepts necessary to make the most of your infrastructure, this book will also help you get acquainted with the fundamentals of Kubernetes. As you advance, you'll learn how to manage Kubernetes clusters on cloud platforms, such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP), and develop and deploy real-world applications in Kubernetes using practical examples. Additionally, you'll get to grips with managing microservices along with best practices.By the end of this book, you'll be equipped with battle-tested knowledge of advanced Kubernetes topics, such as scheduling of Pods and managing incoming traffic to the cluster, and be ready to work with Kubernetes on cloud platforms.What You Will Learn: Manage containerized applications with KubernetesUnderstand Kubernetes architecture and the responsibilities of each componentSet up Kubernetes on Amazon Elastic Kubernetes Service, Google Kubernetes Engine, and Microsoft Azure Kubernetes ServiceDeploy cloud applications such as Prometheus and Elasticsearch using Helm chartsDiscover advanced techniques for Pod scheduling and auto-scaling the clusterUnderstand possible approaches to traffic routing in KubernetesWho this book is for: This book is for software developers and DevOps engineers looking to understand how to work with Kubernetes for orchestrating containerized applications and services in the cloud. Prior experience with designing software running in operating system containers, as well as a general background in DevOps best practices, will be helpful. Basic knowledge of Kubernetes, Docker, and leading cloud service providers assist with grasping the concepts covered easily.

9 特價2982
立即代訂
下次再買

Linux Administration Best Practices

Packt 出版
2022/01/13 出版

Gain an understanding of system administration that will remain applicable throughout your career and understand why tasks are done rather than how to do themKey Features: Deploy, secure, and maintain your Linux system in the best possible wayDiscover best practices to implement core system administration tasks in LinuxExplore real-world decisions, tasks, and solutions involved in Linux system administrationBook Description: Linux is a well-known, open source Unix-family operating system that is the most widely used OS today. Linux looks set for a bright future for decades to come, but system administration is rarely studied beyond learning rote tasks or following vendor guidelines. To truly excel at Linux administration, you need to understand how these systems work and learn to make strategic decisions regarding them.Linux Administration Best Practices helps you to explore best practices for efficiently administering Linux systems and servers. This Linux book covers a wide variety of topics from installation and deployment through to managing permissions, with each topic beginning with an overview of the key concepts followed by practical examples of best practices and solutions. You'll find out how to approach system administration, Linux, and IT in general, put technology into proper business context, and rethink your approach to technical decision making. Finally, the book concludes by helping you to understand best practices for troubleshooting Linux systems and servers that'll enable you to grow in your career as well as in any aspect of IT and business.By the end of this Linux administration book, you'll have gained the knowledge needed to take your Linux administration skills to the next level.What You Will Learn: Find out how to conceptualize the system administrator roleUnderstand the key values of risk assessment in administrationApply technical skills to the IT business contextDiscover best practices for working with Linux specific system technologiesUnderstand the reasoning behind system administration best practicesDevelop out-of-the-box thinking for everything from reboots to backups to triagePrioritize, triage, and plan for disasters and recoveriesDiscover the psychology behind administration dutiesWho this book is for: This book is for anyone looking to fully understand the role and practices of being a professional system administrator, as well as for system engineers, system administrators, and anyone in IT or management who wants to understand the administration career path. The book assumes a basic understanding of Linux, including the command line, and an understanding of how to research individual tasks. Basic working knowledge of Linux systems and servers is expected.

9 特價2018
立即代訂
下次再買

Learn Linux Quickly

Code,Quickly  著
Ingram 出版
2022/01/11 出版

You've experienced the shiny, point-and-click surface of your Linux computer--now dive below and explore its depths with the power of the command line. The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell (or command line). Along the way you'll learn the timeless skills handed down by generations of experienced, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matching, and more. In addition to that practical knowledge, we reveal the philosophy behind these tools and the rich heritage that your desktop Linux machine has inherited from Unix mainframes of yore. As you make your way through the book's short, easily-digestible chapters, you'll learn how to: - Create and delete files, directories, and symlinks - Administer your system, including account creation, package installation, and process management - Use standard input and output, redirection, and pipelines - Edit files with Vim, the world's most popular text editor - Write shell scripts to automate common or boring tasks - Slice and dice text files with grep, sed, uniq, and sort Once you overcome your initial "shell shock," you'll find that the command line is a natural and expressive way to communicate with your computer. Just don't be surprised if your mouse starts to gather dust

9 特價774
立即代訂
下次再買

The Ultimate Kali Linux Book - Second Edition

Glen D,Singh  著
Packt 出版
2022/01/06 出版

The most comprehensive guide to ethical hacking and penetration testing with Kali Linux, from beginner to professionalKey FeaturesLearn to compromise enterprise networks with Kali LinuxGain comprehensive insights into security concepts using advanced real-life hacker techniquesUse Kali Linux in the same way ethical hackers and penetration testers do to gain control of your environmentPurchase of the print or Kindle book includes a free eBook in the PDF formatBook DescriptionKali Linux is the most popular and advanced penetration testing Linux distribution within the cybersecurity industry. Using Kali Linux, a cybersecurity professional will be able to discover and exploit various vulnerabilities and perform advanced penetration testing on both enterprise wired and wireless networks.This book is a comprehensive guide for those who are new to Kali Linux and penetration testing that will have you up to speed in no time. Using real-world scenarios, you'll understand how to set up a lab and explore core penetration testing concepts. Throughout this book, you'll focus on information gathering and even discover different vulnerability assessment tools bundled in Kali Linux. You'll learn to discover target systems on a network, identify security flaws on devices, exploit security weaknesses and gain access to networks, set up Command and Control (C2) operations, and perform web application penetration testing. In this updated second edition, you'll be able to compromise Active Directory and exploit enterprise networks. Finally, this book covers best practices for performing complex web penetration testing techniques in a highly secured environment.By the end of this Kali Linux book, you'll have gained the skills to perform advanced penetration testing on enterprise networks using Kali Linux.What you will learnExplore the fundamentals of ethical hackingUnderstand how to install and configure Kali LinuxPerform asset and network discovery techniquesFocus on how to perform vulnerability assessmentsExploit the trust in Active Directory domain servicesPerform advanced exploitation with Command and Control (C2) techniquesImplement advanced wireless hacking techniquesBecome well-versed with exploiting vulnerable web applicationsWho this book is forThis pentesting book is for students, trainers, cybersecurity professionals, cyber enthusiasts, network security professionals, ethical hackers, penetration testers, and security engineers. If you do not have any prior knowledge and are looking to become an expert in penetration testing using the Kali Linux operating system (OS), then this book is for you.Table of ContentsIntroduction to Ethical HackingBuilding a Penetration Testing LabSetting Up for Advanced Hacking TechniquesReconnaissance and FootprintingExploring Active Information GatheringPerforming Vulnerability AssessmentsUnderstanding Network Penetration TestingPerforming Network Penetration TestingAdvanced Network Penetration Testing - Post ExploitationWorking with Active Directory AttacksAdvanced Active Directory AttacksDelving into Command and Control TacticsAdvanced Wireless Penetration TestingPerforming Client-Side Attacks - Social EngineeringUnderstanding Website Application SecurityAdvanced Website Penetration TestingBest Practices for the Real World

9 特價2523
立即代訂
下次再買

Linux Service Management Made Easy with systemd

Packt 出版
2022/01/06 出版

A comprehensive guide for teaching system administrators, developers, and security professionals how to create their own systemd units and maintain system securityKey FeaturesMaintain and troubleshoot systemd services with easeLearn to create, modify, and reload service files and use systemd utilitiesUse cgroups to control resource usage and enhance securityBook DescriptionLinux Service Management Made Easy with systemd will provide you with an in-depth understanding of systemd, so that you can set up your servers securely and efficiently.This is a comprehensive guide for Linux administrators that will help you get the best of systemd, starting with an explanation of the fundamentals of systemd management.You'll also learn how to edit and create your own systemd units, which will be particularly helpful if you need to create custom services or timers and add features or security to an existing service.Next, you'll find out how to analyze and fix boot-up challenges and set system parameters. An overview of cgroups that'll help you control system resource usage for both processes and users will also be covered, alongside a practical demonstration on how cgroups are structured, spotting the differences between cgroups Version 1 and 2, and how to set resource limits on both.Finally, you'll learn about the systemd way of performing time-keeping, networking, logging, and login management. You'll discover how to configure servers accurately and gather system information to analyze system security and performance.By the end of this Linux book, you'll be able to efficiently manage all aspects of a server running the systemd init system.What you will learnUse basic systemd utilities to manage a systemCreate and edit your own systemd unitsCreate services for Podman-Docker containersEnhance system security by adding security-related parametersFind important information with journaldAnalyze boot-up problemsConfigure system settings with systemd utilitiesWho this book is forThis book is best suited for Linux administrators who want to learn more about maintaining and troubleshooting Linux servers. It will also be useful for aspiring administrators studying for a Linux certification exam, developers looking to learn how to create systemd unit files, and security administrators who want to understand the security settings that can be used in systemd units and how to control resource usage with cgroups. Before you dive into this book, you'll need a solid working knowledge of basic Linux commands.Table of ContentsUnderstanding the Need for systemdUnderstanding systemd Directories and FilesUnderstanding Service, Path, and Socket UnitsControlling systemd ServicesCreating and Editing ServicesUnderstanding systemd TargetsUnderstanding systemd TimersUnderstanding the systemd Boot ProcessSetting System ParametersUnderstanding Shutdown and Reboot CommandsUnderstanding cgroups Version 1Controlling Resource Usage with cgroups Version 1Understanding cgroup Version 2Using journaldUsing systemd-networkd and systemd-resolvedUnderstanding Timekeeping with systemdUnderstanding systemd and BootloadersUnderstanding systemd-logind

9 特價2294
立即代訂
下次再買

Memory Dump Analysis Anthology, Volume 1, Revised Edition

Ingram 出版
2022/01/03 出版

This reference volume consists of revised, edited, cross-referenced, and thematically organized articles from Software Diagnostics Institute and Software Diagnostics Library (former Crash Dump Analysis blog) written in August 2006 - December 2007. This major revision updates tool information and links with ones relevant for Windows 10 and removes obsolete references. Some articles are preserved for historical reasons, and some are updated to reflect the debugger engine changes. Most of the content, especially memory analysis pattern language, is still relevant today and for the foreseeable future. Crash dump analysis pattern names are also corrected to reflect the continued expansion of the catalog. The primary audience for Memory Dump Analysis Anthology reference volumes is: software engineers developing and maintaining products on Windows platforms, technical support, escalation, and site reliability engineers dealing with complex software issues, quality assurance engineers testing software on Windows platforms, security and vulnerability researchers, reverse engineers, malware and memory forensics analysts.

9 特價2065
立即代訂
下次再買

Memory Dump Analysis Anthology, Volume 2, Revised Edition

Ingram 出版
2021/12/31 出版

This reference volume consists of revised, edited, cross-referenced, and thematically organized articles from Software Diagnostics Institute and Software Diagnostics Library (former Crash Dump Analysis blog) written in January - September 2008. In addition to various corrections, this major revision updates relevant links and removes obsolete references. Some articles are preserved for historical reasons. Most of the content, especially memory analysis pattern language, is still relevant today and for the foreseeable future. Crash dump analysis pattern names are also corrected to reflect the continued expansion of the catalog. Compared to the first revised volume, the second revised volume features: - 44 more crash dump analysis patterns; - Pattern interaction and case studies; - Fully cross-referenced with Volume 1; - New appendixes. The primary audience for Memory Dump Analysis Anthology reference volumes is: software engineers developing and maintaining products on Windows platforms, technical support, escalation, and site reliability engineers dealing with complex software issues, quality assurance engineers testing software on Windows platforms, security and vulnerability researchers, reverse engineers, malware and memory forensics analysts.

9 特價1836
立即代訂
下次再買

Memory Dump Analysis Anthology, Volume 3, Revised Edition

Ingram 出版
2021/12/31 出版

This reference volume consists of revised, edited, cross-referenced, and thematically organized articles from Software Diagnostics Institute and Software Diagnostics Library (former Crash Dump Analysis blog) written in October 2008 - June 2009. In addition to various corrections, this major revision updates relevant links and removes obsolete references. Some articles are preserved for historical reasons. Most of the content, especially memory analysis and trace and log analysis pattern languages, is still relevant today and for the foreseeable future. Crash dump analysis pattern names are also corrected to reflect the continued expansion of the catalog. Compared to the second revised volume, the third revised volume features: - 15 new crash dump analysis patterns; - 29 new pattern interaction case studies; - Trace analysis patterns; - Fully cross-referenced with Volume 1 and Volume 2; - New appendixes. The primary audience for Memory Dump Analysis Anthology reference volumes is: software engineers developing and maintaining products on Windows platforms, technical support, escalation, and site reliability engineers dealing with complex software issues, quality assurance engineers testing software on Windows platforms, security and vulnerability researchers, reverse engineers, malware and memory forensics analysts. Trace and log analysis articles may be of interest to users of other platforms.

9 特價1836
立即代訂
下次再買

Using CSH & Tcsh

Paul,DuBois  著
Ingram 出版
2021/12/16 出版

If you use UNIX, you probably use csh to type commands even if you've never heard of it. It's the standard shell (command line) on most UNIX systems. tcsh is an enhanced version that's freely available and highly recommended. Using csh & tcsh describes from the beginning how to use these shells interactively. More important, it shows how to get your work done faster with less typing. Even if you've used UNIX for years, techniques described in this book can make you more efficient. You'll learn how to: Make your prompt tell you where you are (no more pwd) Use what you've typed before (history) Type long command lines with very few keystrokes (command and filename completion) Remind yourself of filenames when in the middle of typing a command Edit a botched command instead of retyping it This book does not cover programming or script writing in csh or tcsh because the tasks are better done with a different shell, such as sh (the Bourne shell) or a language like Perl.

9 特價1197
立即代訂
下次再買

Cracking Containers with Docker and Kubernetes

Ingram 出版
2021/12/09 出版

A book that will help you become the Mozart of Microservices KEY FEATURES ● All codes tested on the latest software versions with visual illustrations.● Covers bleeding-edge DevOps skills to build a future-proof job profile.● Includes expert advice, industry insights, and logical analogies to craft a technical narrative.WHAT YOU WILL LEARN● Learn to create, manage and orchestrate Containers using Docker and Kubernetes.● Practice writing Dockerfiles, Compose Files and Kubernetes YAML Manifests.● Perform container networking, storage, authorization, security, and scaling in a production environment.● Explore shipping, CI/CD, Service Mesh, Logging & Monitoring in detail.● Get the Cracking Containers with Docker and Kubernetes know-how of hosted and Serverless Kubernetes on Cloud.WHO THIS BOOK IS FORThis book is intended for students, enthusiasts, and professionals in Software Development, DevOps, and Cloud Computing who want to put their career progress on a pedestal by reducing the operational and scaling costs of their web applications and optimizing their IT infrastructure utilization.

9 特價1927
立即代訂
下次再買

Microsoft 365 Certified Fundamentals MS-900 Exam Guide - Second Edition

Packt 出版
2021/11/22 出版

Explore the latest MS-900 exam skills and concepts with this updated second editionKey FeaturesWork with self-assessment questions, exam tips, and mock tests based on the latest exam patternThis updated second edition covers concepts including Microsoft Forms, Microsoft 365 Security Center, and moreUnderstand the security considerations and benefits of adopting different types of cloud servicesBook DescriptionMicrosoft 365 Certified Fundamentals certification demonstrates your foundational knowledge of adopting cloud services, specifically the software as a service (SaaS) model. Exam MS-900 tests your understanding of Microsoft 365 services, components, their implementation, security, licensing, and general cloud concepts. This updated second edition covers all the recent and important changes in the examination in detail to help you achieve certification. You'll begin by exploring key topics such as Microsoft security and compliance policies, pricing and support, and cloud concepts. The book helps you to understand these concepts with the help of real-world scenarios, learning about platform services such as Microsoft Windows, SharePoint, Microsoft 365 apps, Teams, and Exchange. The content has been updated to include Microsoft Forms, Power Platform, Microsoft 365 Security Center, Windows Virtual Desktop, and Insider Risk Management. Each chapter contains a section that will test your knowledge of the core concepts covered. Finally, you'll take a practice exam with extra questions to help prepare you for the actual test. By the end of this MS-900 book, you'll be well-equipped to confidently pass the MS-900 certification exam with the help of the updated exam pattern.What you will learnUnderstand cloud services and deployment models, including public and private cloudsFind out the differences between SaaS and IaaS consumption models, and where Microsoft services fit inExplore the reporting and analytics capabilities of Microsoft 365Use Compliance Manager and Security Center to audit your organizationDiscover and implement best practices for licensing options available in Microsoft 365Gain insights into the exam objectives and knowledge required before taking the MS-900 examWho this book is forThis book is for intermediate as well as experienced administrators and individuals looking for tips and tricks to pass the latest MS-900 exam and achieve Microsoft 365 certification. Basic knowledge of Microsoft services and cloud concepts is assumed in order to get the most out of this book.Table of ContentsIntroduction to Cloud ComputingCloud Deployment Models and ServicesCore Microsoft 365 Components Comparing Core Services in Microsoft 365Understanding the Concepts of Modern ManagementDeploying Microsoft 365 AppsUnderstanding Collaboration and Mobility with Microsoft 365Microsoft 365 Analytics Understanding Security and Compliance Concepts with Microsoft 365Understanding Identity Protection and ManagementEndpoint and Security ManagementExploring the Service Trust Portal, Compliance Manager, and the Microsoft 365 Security Center Licensing in Microsoft 365Planning, Predicting, and Comparing PricingSupport Offerings for Microsoft 365 ServicesService Life Cycle in Microsoft 365Mock ExamAssessments

9 特價4130
立即代訂
下次再買
頁數6/12
移至第
金石堂門市 全家便利商店 ok便利商店 萊爾富便利商店 7-11便利商店
World wide
活動ing