Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
"What is eBPF? With this revolutionary technology, you can write custom code that dynamically changes the way the kernel behaves. It's an extraordinary platform for building a whole new generation of security, observability, and networking tools. This practical book is ideal for developers, system administrators, operators, and students who are curious about eBPF and want to know how it works. Author Liz Rice, chief open source officer with cloud native networking and security specialists Isovalent, also provides a foundation for those who want to explore writing eBPF programs themselves"--
"In the decades between the Great Depression and the advent of cable television, when daily newspapers set the conversational agenda for the people of the United States, the best reporter in the business was a rumpled, hard-drinking figure named Homer Bigart. His reporting left marks on history. In 26 years at the New York Herald Tribune and 17 more at the New York Times, Bigart chronicled and brought to life the events that defined the era - wars in Europe, the Pacific, Korea, and Vietnam, the civil rights movement, the creation of Israel, the end of colonialism in Africa, and the Cuban revolution. He was one of the first reporters to visit and describe Hiroshima after the atomic bomb. He was the first correspondent to penetrate the Haganah, the militant Zionist underground in Palestine. He recounted the trial of Adolf Eichmann, the Army-McCarthy hearings, and the court-martial of William Calley. A model of versatility, he also wrote with verve and compassion about strip mining in Kentucky, squalor on the Bowery and the murder of a shopkeeper in Harlem. Despite two Pulitzers and a host of other prizes, Bigart never sought fame; when he retired from the New York Times in 1972, he quickly faded from public view, and few today know the extent to which he was esteemed by his peers and those who came after, including Neil Sheehan and David Halberstam. This is the first comprehensive biography to encompass all of Bigart's reporting, not just his war reporting"--
Working effectively with Apple platforms at a corporate or business level includes not only infrastructure, but a mode of thinking that administrators have to adopt to find success. A mode of thinking that forces you to leave 30 years of IT dogma at the door. This book is a guide through how to integrate Apple products in your environment with a minimum of friction. Because the Apple ecosystem is not going away.You'll start by understanding where Apple, third-party software vendors, and the IT community is taking us. What is Mobile Device Management and how does it work under the hood. By understanding how MDM works, you will understand what needs to happen on your networks in order to allow for MDM, as well as the best way to give the least amount of access to the servers or services that's necessary. You'll then look at management agents that do not include MDM, as well as when you will need to use an agent as opposed to when to use other options. Once you can install a management solution, you can deploy profiles on a device or you can deploy profiles on Macs using scripts. With Apple Device Management as your guide, you'll customize and package software for deployment and lock down devices so they're completely secure. You'll also work on getting standard QA environments built out, so you can test more effectively with less effort. Apple is forging their own path in IT. They trade spots with Amazon, Google, and Microsoft as the wealthiest company to ever exist. And they will not be constrained by 30 or more years of dogma in the IT industry. You can try to shoehorn Apple devices into outdated modes of device management, or you can embrace Apple's stance on management with the help of this book. What You'll LearnDeploy profiles across devices effectively and securelyInstall apps remotely both from the app store and through custom solutionsWork natively with Apple environments rather than retrofitting older IT solutions Who This Book Is ForMac administrators within organizations that want to integrate with the current Apple ecosystem, including Windows administrators learning how to use/manage Macs, mobile administrators working with iPhones and iPads, and mobile developers tasked with creating custom apps for internal, corporate distribution.
Review topics ranging from Intel x64 assembly language instructions and writing programs in assembly language, to pointers, live debugging, and static binary analysis of compiled C and C++ code. This book is ideal for Linux desktop and cloud developers. Using the latest version of Debian, yoüll focus on the foundations of the diagnostics of core memory dumps, live and postmortem debugging of Linux applications, services, and systems, memory forensics, malware, and vulnerability analysis. This requires an understanding of x64 Intel assembly language and how C and C++ compilers generate code, including memory layout and pointers. This book provides the background knowledge and practical foundations yoüll need in order to master internal Linux program structure and behavior. It consists of practical step-by-step exercises of increasing complexity with explanations and ample diagrams. Yoüll also work with the GDB debugger and use it for disassembly and reversing. By the end of the book, you will have a solid understanding of how Linux C and C++ compilers generate binary code. In addition, you will be able to analyze such code confidently, understand stack memory usage, and reconstruct original C/C++ code. Foundations of Linux Debugging, Disassembling, and Reversing is the perfect companion to Foundations of ARM64 Linux Debugging, Disassembling, and Reversing for readers interested in the cloud or cybersecurity.What You'll LearnReview the basics of x64 assembly languageExamine the essential GDB debugger commands for debugging and binary analysis Study C and C++ compiler code generation with and without compiler optimizations Look at binary code disassembly and reversing patternsSee how pointers in C and C++ are implemented and usedWho This Book Is ForSoftware support and escalation engineers, cloud security engineers, site reliability engineers, DevSecOps, platform engineers, software testers, Linux C/C++ software engineers and security researchers without Intel x64 assembly language background, beginners learning Linux software reverse engineering techniques, and engineers coming from non-Linux environments.
Gain a solid understanding of how Linux C and C++ compilers generate binary code. This book explains the reversing and binary analysis of ARM64 architecture now used by major Linux cloud providers and covers topics ranging from writing programs in assembly language, live debugging, and static binary analysis of compiled C and C++ code. It is ideal for those working with embedded devices, including mobile phones and tablets. Using the latest version of Red Hat, you'll look closely at the foundations of diagnostics of core memory dumps, live and postmortem debugging of Linux applications, services, and systems. You'll also work with the GDB debugger and use it for disassembly and reversing. This book uses practical step-by-step exercises of increasing complexity with explanations and many diagrams, including some necessary background topics. In addition, you will be able to analyze such code confidently, understand stack memory usage, and reconstruct original C/C++ code. And as you'll see, memory forensics, malware, and vulnerability analysis, require an understanding of ARM64 assembly language and how C and C++ compilers generate code, including memory layout and pointers. This book provides the background knowledge and practical foundations yoüll need to understand internal Linux program structure and behavior. Foundations of ARM64 Linux Debugging, Disassembling, and Reversing is the perfect companion to Foundations of Linux Debugging, Disassembling, and Reversing for readers interested in the cloud or cybersecurity. What You'll LearnReview the basics of ARM64 assembly languageExamine the essential GDB debugger commands for debugging and binary analysis Study C and C++ compiler code generation with and without compiler optimizations Look at binary code disassembly and reversing patternsSee how pointers in C and C++ are implemented and usedWho This Book Is ForSoftware support and escalation engineers, cloud security engineers, site reliability engineers, DevSecOps, platform engineers, software testers, Linux C/C++ software engineers and security researchers without ARM64 assembly language background, and beginners learning Linux software reverse engineering techniques.
Learn the value that OpenTelemetry can bring to organizations that aim to implement observability best practices, and gain a deeper understanding of how different building blocks interact with each other to bring out-of-the-box, vendor-neutral instrumentation to your stack. With examples in Java, this book shows how to use OpenTelemetry APIs and configure plugins and SDKs to instrument services and produce valuable telemetry data. Yoüll learn how to maximize adoption of OpenTelemetry and encourage the change needed in debugging workflows to reduce cognitive load for engineers troubleshooting production workloads.Adopting observability best practices across an organization is challenging. This book begins with a discussion of how operational monitoring processes widely followed for decades fall short at providing the insights needed for debugging cloud-native, distributed systems in production. The book goes on to show how the Cloud Native Computing Foundation¿s OpenTelemetry project helps you standardize instrumentation and transport of telemetry signals, providing a common language for all observability tooling.You Will LearnWhy observability is a necessity in modern distributed systemsThe value of OpenTelemetry for engineers and organizations OpenTelemetry component specification and general designTracing, metrics, and logs APIs and SDKs, with examples in JavaOpenTelemetry Collectors and recommended transport and processing pipelinesHow to adopt observability standards across an organizationWho This Book Is ForSoftware engineers familiar with cloud-native technologies and operational monitoring who want to instrument and export telemetry data from their services; observability leads who want to roll out OpenTelemetry standards and bestpractices across their organizations; and Java developers who want a book with OpenTelemetry examples in that language
Develop well-structured applications using tested techniques and patterns. When you start to develop an application, you not only have to think about the idea of the finished application, but also about how it will evolve as it is built. This book shows you how to plan for changes, scope creep, and for the possibility of other developers joining in. Start by learning what architecture patterns for an application are. Yoüll find out why it¿s important for your applications to be based on these patterns and which ones are the most common. Then yoüll look at the MVC as one of the best known and used patterns. Yoüll see how and when it can be implemented in your applications, as well as its advantages and disadvantages. From there, yoüll discover the first evolution of the MVC model: the MVP, which introduces a new layer (Presenter) to better manage views. The next evolution after that is the MVVM, which introduces the ViewModel layer and its connection withthe views through Data Binding. With those prominent patterns covered, yoüll read about VIPER and VIP, Architecture Patterns that seeks to make applications easily maintainable, modularized, and highly scalable. All of which are hallmarks of Clean Architecture. Architecture patterns have developed and evolved to give your applications solid foundations. Understanding these patterns, you will reduce the problems that may arise when modifying existing functions, adding new ones, or correcting errors that may arise in the development process.What You'll LearnCode cleanly with solid foundations Start your project ready to adapt and evolve as features and other developers are added Find and apply the right patterns for the best results Who This Book Is ForDevelopers with some programming knowledge who want to learn different architecturepatterns, those who already have more experience and are looking for a starting point on complex patterns such as VIPER or VIP, and beginner programmers
Directfrom Microsoft, this Exam Ref is the official study guide for the new MicrosoftDP-300 Administering Microsoft Azure SQL Solutions certification exam.ExamRef DP-300 Administering Microsoft Azure SQL Solutions offers professional-levelpreparation to maximize your exam performance and sharpen your skills on thejob. It focuses on helping modern IT professionals demonstrate real-worldmastery of implementing and managing cloud-native and hybrid data platformsolutions with Microsoft SQL Server and Microsoft Azure Data Services. Learnhow to:Planand implement data platform resourcesImplementa secure environmentMonitor,configure, and optimize database resourcesConfigureand manage automation of tasksPlanand configure a high availability and disaster recovery (HA/DR) environment MicrosoftExam Ref publications stand apart from third-party study guides because they:Provideguidance from Microsoft, the creator of Microsoft certification examsTargetIT professional-level exam candidates with content focused on their needs, notone-size-fits-all contentStreamlinestudy by organizing material according to the exam's objective domain (OD),covering one functional group and its objectives in each chapterOfferconcise overviews of every skill covered by the examFeatureThought Experiments and Thought Experiment Answers to guide candidatesthrough a set of what if? scenarios, and prepare them more effectively forPro-level style exam questionsIncludeNeed more review? aids pointing you to more study materials if you need themExplorebig picture thinking around the planning and design aspects of the IT pro's jobroleDeliverexam tips, summaries, and inline questions and answers to help you identify keypointsIncludeNeed more review? reader aids pointing to more study materials when readersneed themFormore information on Exam DP-300 and the Microsoft Certified: Azure DatabaseAdministrator Associate credential, visit https://learn.microsoft.com/en-us/certifications/azure-database-administrator-associate/.
Develop the skills required to administer your RHEL environment on-premises and in the cloud while preparing for the RHCSA examPurchase of the print or Kindle book includes a free eBook in PDF formatKey Features- Become a pro at system administration from installation to container management- Secure and harden your Linux environment using SSH, SELinux, firewall, and system permissions- Gain confidence to pass the RHCSA exam with the help of practice testsBook DescriptionWith Red Hat Enterprise Linux 9 becoming the standard for enterprise Linux used from data centers to the cloud, Linux administration skills are in high demand. With this book, you'll learn how to deploy, access, tweak, and improve enterprise services on any system on any cloud running Red Hat Enterprise Linux 9.Throughout the book, you'll get to grips with essential tasks such as configuring and maintaining systems, including software installation, updates, and core services. You'll also understand how to configure the local storage using partitions and logical volumes, as well as assign and deduplicate storage. You'll learn how to deploy systems while also making them secure and reliable.This book provides a base for users who plan to become full-time Linux system administrators by presenting key command-line concepts and enterprise-level tools, along with essential tools for handling files, directories, command-line environments, and documentation for creating simple shell scripts or running commands. With the help of command line examples and practical tips, you'll learn by doing and save yourself a lot of time.By the end of the book, you'll have gained the confidence to manage the filesystem, users, storage, network connectivity, security, and software in RHEL 9 systems on any footprint.What You Will Learn- Become well versed with the fundamentals of RHEL9-from system deployment to user management- Secure a system by using SELinux policies and configuring firewall rules- Understand LVM to manage volumes and maintain VDO deduplication- Manage a system remotely using SSH and public key authentication- Get the hang of the boot process and kernel tunable to adjust your systems- Automate simple tasks using scripts or Ansible PlaybooksWho this book is forThis book is for Red Hat Enterprise Linux system administrators and Linux system administrators. It's also a good resource for any IT professional who wants to learn system administration. RHCSA certification candidates will find this book useful in their preparation for the certification exam.Table of Contents- Getting RHEL Up and Running- RHEL 9 Advanced Installation Options- Basic Commands and Simple Shell Scripts- Tools for Regular Operations- Securing Systems with Users, Groups, and Permissions- Enabling Network Connectivity- Adding, Patching, and Managing Software- Administering Systems Remotely- Securing Network Connectivity with firewalld- Keeping Your System Hardened with SELinux- System Security Profiles with OpenSCAP- Managing Local Storage and Filesystems- Flexible Storage Management with LVM- Advanced Storage Management with Stratis and VDO- Understanding the Boot Process- Kernel Tuning and Managing Performance Profiles with tuned- Managing Containers with Podman, Buildah, and Skopeo- Practice Exercises - 1- Practice Exercises - 2
Learn, prepare, and practice for Red Hat RHCSA 9 (EX200) exam success with this Cert Guide from Pearson IT Certification, a leader in IT Certification learning.Master Red Hat RHCSA 9 EX200 exam topicsAssess your knowledge with chapter-ending quizzes and labsReview key concepts with exam-preparation tasksPractice with four unique practice testsLearn from two full hours of video training from the author's Red Hat Certified System Administrator (RHCSA) RHEL 9 Complete Video CourseRed Hat RHCSA 9 Cert Guide: EX200 is a comprehensive exam study guide. Leading Linux consultant, author, and instructor Sander van Vugt shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. The material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.The book presents you with an organized test-preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy, and chapter-ending Exam Preparation Tasks help you drill deep on key concepts you must know thoroughly to pass the exam. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan.The companion website also contains two additional practice tests plus two full hours of personal video training from the author's Red Hat Certified System Administrator (RHCSA) RHEL 9 Complete Video Course.Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time, includingBasic system management: Installation, tools, file management, text files, RHEL9 connections, user/group management, permissions, and network configurationOperating running systems: Managing software, processes, storage, and advanced storage; working with Systemd; scheduling tasks; and configuring loggingAdvanced system administration: Managing the kernel and boot procedures, essential troubleshooting, bash shell scriptingManaging network services: Configuring SSH, firewalls, and time services; managing Apache HTTP services and SE Linux; accessing network storage; and managing containersCompanion WebsiteThe website contains two complete practice exams and more than an hour of video training from the author's Red Hat Certified System Administrator (RHCSA) RHEL 9 Complete Video Course.Includes Exclusive Offer for 70% Off the full Red Hat Certified System Administrator (RHCSA) RHEL 9 Complete Video Course.
This book constitutes revised selected papers from the proceedings of the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022.The 32 full papers and 4 short papers included in this book were carefully reviewed andselected from 159 submissions. They were organized in topical sections as follows: tokenomics; MPC (mostly); privacy; ZKP; old-school consensus; mostly payment networks; incentives; not proof of work; performance; measurements.
The book describes state-of-the-art advances in simulators and emulators for quantum computing. It introduces the main concepts of quantum computing, defining q-bits, explaining the parallelism behind any quantum computation, describing measurement of the quantum state of information and explaining the process of quantum bit entanglement, collapsed state and cloning. The book reviews the concept of quantum unitary, binary and ternary quantum operators as well as the computation implied by each operator. It provides details of the quantum processor, providing its architecture, which is validated via execution simulation of some quantum instructions.
Linux-Server aufsetzen, administrieren und absichern: Arnold Willemer zeigt Ihnen in diesem Buch, wie Sie Ihren Debian/GNU Linux oder Ubuntu Server von Anfang an gut im Griff haben. Schritt für Schritt erklärt er Ihnen, wie Sie den Server installieren, Laufwerke und Netzwerke einrichten und Benutzerkonten anlegen. Außerdem lernen Sie, wie Sie effizient mit der Shell arbeiten und per Remote-Zugriff administrieren. Einen weiteren großen Themenkomplex bildet die Sicherung von Daten, die Systemdiagnose sowie das Härten des Servers gegen Angreifer von außen. In weiteren Kapiteln erfahren Sie, wie Sie Datenbanken anlegen oder einen Dateiserver mit SAMBA einrichten. Und auch Mail- und Webserver kommen nicht zu kurz. Alle Themen werden anschaulich und von Grund auf erklärt, sodass Sie den Beschreibungen auch dann leicht folgen können, wenn Sie bisher noch nicht mit Linux-Servern gearbeitet haben. Zudem eignet sich dieses Buch auch hervorragend als Nachschlagewerk. So gerüstet steht Ihrem sicheren und performanten Server nichts mehr im Weg!
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.