Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Working effectively with Apple platforms at a corporate or business level includes not only infrastructure, but a mode of thinking that administrators have to adopt to find success. A mode of thinking that forces you to leave 30 years of IT dogma at the door. This book is a guide through how to integrate Apple products in your environment with a minimum of friction. Because the Apple ecosystem is not going away.You'll start by understanding where Apple, third-party software vendors, and the IT community is taking us. What is Mobile Device Management and how does it work under the hood. By understanding how MDM works, you will understand what needs to happen on your networks in order to allow for MDM, as well as the best way to give the least amount of access to the servers or services that's necessary. You'll then look at management agents that do not include MDM, as well as when you will need to use an agent as opposed to when to use other options. Once you can install a management solution, you can deploy profiles on a device or you can deploy profiles on Macs using scripts. With Apple Device Management as your guide, you'll customize and package software for deployment and lock down devices so they're completely secure. You'll also work on getting standard QA environments built out, so you can test more effectively with less effort. Apple is forging their own path in IT. They trade spots with Amazon, Google, and Microsoft as the wealthiest company to ever exist. And they will not be constrained by 30 or more years of dogma in the IT industry. You can try to shoehorn Apple devices into outdated modes of device management, or you can embrace Apple's stance on management with the help of this book. What You'll LearnDeploy profiles across devices effectively and securelyInstall apps remotely both from the app store and through custom solutionsWork natively with Apple environments rather than retrofitting older IT solutions Who This Book Is ForMac administrators within organizations that want to integrate with the current Apple ecosystem, including Windows administrators learning how to use/manage Macs, mobile administrators working with iPhones and iPads, and mobile developers tasked with creating custom apps for internal, corporate distribution.
Review topics ranging from Intel x64 assembly language instructions and writing programs in assembly language, to pointers, live debugging, and static binary analysis of compiled C and C++ code. This book is ideal for Linux desktop and cloud developers. Using the latest version of Debian, yoüll focus on the foundations of the diagnostics of core memory dumps, live and postmortem debugging of Linux applications, services, and systems, memory forensics, malware, and vulnerability analysis. This requires an understanding of x64 Intel assembly language and how C and C++ compilers generate code, including memory layout and pointers. This book provides the background knowledge and practical foundations yoüll need in order to master internal Linux program structure and behavior. It consists of practical step-by-step exercises of increasing complexity with explanations and ample diagrams. Yoüll also work with the GDB debugger and use it for disassembly and reversing. By the end of the book, you will have a solid understanding of how Linux C and C++ compilers generate binary code. In addition, you will be able to analyze such code confidently, understand stack memory usage, and reconstruct original C/C++ code. Foundations of Linux Debugging, Disassembling, and Reversing is the perfect companion to Foundations of ARM64 Linux Debugging, Disassembling, and Reversing for readers interested in the cloud or cybersecurity.What You'll LearnReview the basics of x64 assembly languageExamine the essential GDB debugger commands for debugging and binary analysis Study C and C++ compiler code generation with and without compiler optimizations Look at binary code disassembly and reversing patternsSee how pointers in C and C++ are implemented and usedWho This Book Is ForSoftware support and escalation engineers, cloud security engineers, site reliability engineers, DevSecOps, platform engineers, software testers, Linux C/C++ software engineers and security researchers without Intel x64 assembly language background, beginners learning Linux software reverse engineering techniques, and engineers coming from non-Linux environments.
Gain a solid understanding of how Linux C and C++ compilers generate binary code. This book explains the reversing and binary analysis of ARM64 architecture now used by major Linux cloud providers and covers topics ranging from writing programs in assembly language, live debugging, and static binary analysis of compiled C and C++ code. It is ideal for those working with embedded devices, including mobile phones and tablets. Using the latest version of Red Hat, you'll look closely at the foundations of diagnostics of core memory dumps, live and postmortem debugging of Linux applications, services, and systems. You'll also work with the GDB debugger and use it for disassembly and reversing. This book uses practical step-by-step exercises of increasing complexity with explanations and many diagrams, including some necessary background topics. In addition, you will be able to analyze such code confidently, understand stack memory usage, and reconstruct original C/C++ code. And as you'll see, memory forensics, malware, and vulnerability analysis, require an understanding of ARM64 assembly language and how C and C++ compilers generate code, including memory layout and pointers. This book provides the background knowledge and practical foundations yoüll need to understand internal Linux program structure and behavior. Foundations of ARM64 Linux Debugging, Disassembling, and Reversing is the perfect companion to Foundations of Linux Debugging, Disassembling, and Reversing for readers interested in the cloud or cybersecurity. What You'll LearnReview the basics of ARM64 assembly languageExamine the essential GDB debugger commands for debugging and binary analysis Study C and C++ compiler code generation with and without compiler optimizations Look at binary code disassembly and reversing patternsSee how pointers in C and C++ are implemented and usedWho This Book Is ForSoftware support and escalation engineers, cloud security engineers, site reliability engineers, DevSecOps, platform engineers, software testers, Linux C/C++ software engineers and security researchers without ARM64 assembly language background, and beginners learning Linux software reverse engineering techniques.
Learn the value that OpenTelemetry can bring to organizations that aim to implement observability best practices, and gain a deeper understanding of how different building blocks interact with each other to bring out-of-the-box, vendor-neutral instrumentation to your stack. With examples in Java, this book shows how to use OpenTelemetry APIs and configure plugins and SDKs to instrument services and produce valuable telemetry data. Yoüll learn how to maximize adoption of OpenTelemetry and encourage the change needed in debugging workflows to reduce cognitive load for engineers troubleshooting production workloads.Adopting observability best practices across an organization is challenging. This book begins with a discussion of how operational monitoring processes widely followed for decades fall short at providing the insights needed for debugging cloud-native, distributed systems in production. The book goes on to show how the Cloud Native Computing Foundation¿s OpenTelemetry project helps you standardize instrumentation and transport of telemetry signals, providing a common language for all observability tooling.You Will LearnWhy observability is a necessity in modern distributed systemsThe value of OpenTelemetry for engineers and organizations OpenTelemetry component specification and general designTracing, metrics, and logs APIs and SDKs, with examples in JavaOpenTelemetry Collectors and recommended transport and processing pipelinesHow to adopt observability standards across an organizationWho This Book Is ForSoftware engineers familiar with cloud-native technologies and operational monitoring who want to instrument and export telemetry data from their services; observability leads who want to roll out OpenTelemetry standards and bestpractices across their organizations; and Java developers who want a book with OpenTelemetry examples in that language
Develop well-structured applications using tested techniques and patterns. When you start to develop an application, you not only have to think about the idea of the finished application, but also about how it will evolve as it is built. This book shows you how to plan for changes, scope creep, and for the possibility of other developers joining in. Start by learning what architecture patterns for an application are. Yoüll find out why it¿s important for your applications to be based on these patterns and which ones are the most common. Then yoüll look at the MVC as one of the best known and used patterns. Yoüll see how and when it can be implemented in your applications, as well as its advantages and disadvantages. From there, yoüll discover the first evolution of the MVC model: the MVP, which introduces a new layer (Presenter) to better manage views. The next evolution after that is the MVVM, which introduces the ViewModel layer and its connection withthe views through Data Binding. With those prominent patterns covered, yoüll read about VIPER and VIP, Architecture Patterns that seeks to make applications easily maintainable, modularized, and highly scalable. All of which are hallmarks of Clean Architecture. Architecture patterns have developed and evolved to give your applications solid foundations. Understanding these patterns, you will reduce the problems that may arise when modifying existing functions, adding new ones, or correcting errors that may arise in the development process.What You'll LearnCode cleanly with solid foundations Start your project ready to adapt and evolve as features and other developers are added Find and apply the right patterns for the best results Who This Book Is ForDevelopers with some programming knowledge who want to learn different architecturepatterns, those who already have more experience and are looking for a starting point on complex patterns such as VIPER or VIP, and beginner programmers
Direct from Microsoft, this Exam Ref is the official study guide for the new Microsoft DP-300 Administering Microsoft Azure SQL Solutions certification exam.Exam Ref DP-300 Administering Microsoft Azure SQL Solutions offers professional-level preparation to maximize your exam performance and sharpen your skills on the job. It focuses on helping modern IT professionals demonstrate real-world mastery of implementing and managing cloud-native and hybrid data platform solutions with Microsoft SQL Server and Microsoft Azure Data Services. Learn how to:Plan and implement data platform resourcesImplement a secure environmentMonitor, configure, and optimize database resourcesConfigure and manage automation of tasksPlan and configure a high availability and disaster recovery (HA/DR) environmentMicrosoft Exam Ref publications stand apart from third-party study guides because they:Provide guidance from Microsoft, the creator of Microsoft certification examsTarget IT professional-level exam candidates with content focused on their needs, not "one-size-fits-all" contentStreamline study by organizing material according to the exam's objective domain (OD),covering one functional group and its objectives in each chapterOffer concise overviews of every skill covered by the examFeature "Thought Experiments" and "Thought Experiment Answers" to guide candidates through a set of "what if?" scenarios, and prepare them more effectively for Pro-level style exam questionsInclude "Need more review?" aids pointing you to more study materials if you need themExplore big picture thinking around the planning and design aspects of the IT pro's job roleDeliver exam tips, summaries, and inline questions and answers to help you identify key pointsInclude "Need more review?" reader aids pointing to more study materials when readers need themFor more information on Exam DP-300 and the Microsoft Certified: Azure Database Administrator Associate credential, visit https://learn.microsoft.com/en-us/certifications/azure-database-administrator-associate/.
Develop the skills required to administer your RHEL environment on-premises and in the cloud while preparing for the RHCSA examPurchase of the print or Kindle book includes a free eBook in PDF formatKey Features- Become a pro at system administration from installation to container management- Secure and harden your Linux environment using SSH, SELinux, firewall, and system permissions- Gain confidence to pass the RHCSA exam with the help of practice testsBook DescriptionWith Red Hat Enterprise Linux 9 becoming the standard for enterprise Linux used from data centers to the cloud, Linux administration skills are in high demand. With this book, you'll learn how to deploy, access, tweak, and improve enterprise services on any system on any cloud running Red Hat Enterprise Linux 9.Throughout the book, you'll get to grips with essential tasks such as configuring and maintaining systems, including software installation, updates, and core services. You'll also understand how to configure the local storage using partitions and logical volumes, as well as assign and deduplicate storage. You'll learn how to deploy systems while also making them secure and reliable.This book provides a base for users who plan to become full-time Linux system administrators by presenting key command-line concepts and enterprise-level tools, along with essential tools for handling files, directories, command-line environments, and documentation for creating simple shell scripts or running commands. With the help of command line examples and practical tips, you'll learn by doing and save yourself a lot of time.By the end of the book, you'll have gained the confidence to manage the filesystem, users, storage, network connectivity, security, and software in RHEL 9 systems on any footprint.What You Will Learn- Become well versed with the fundamentals of RHEL9-from system deployment to user management- Secure a system by using SELinux policies and configuring firewall rules- Understand LVM to manage volumes and maintain VDO deduplication- Manage a system remotely using SSH and public key authentication- Get the hang of the boot process and kernel tunable to adjust your systems- Automate simple tasks using scripts or Ansible PlaybooksWho this book is forThis book is for Red Hat Enterprise Linux system administrators and Linux system administrators. It's also a good resource for any IT professional who wants to learn system administration. RHCSA certification candidates will find this book useful in their preparation for the certification exam.Table of Contents- Getting RHEL Up and Running- RHEL 9 Advanced Installation Options- Basic Commands and Simple Shell Scripts- Tools for Regular Operations- Securing Systems with Users, Groups, and Permissions- Enabling Network Connectivity- Adding, Patching, and Managing Software- Administering Systems Remotely- Securing Network Connectivity with firewalld- Keeping Your System Hardened with SELinux- System Security Profiles with OpenSCAP- Managing Local Storage and Filesystems- Flexible Storage Management with LVM- Advanced Storage Management with Stratis and VDO- Understanding the Boot Process- Kernel Tuning and Managing Performance Profiles with tuned- Managing Containers with Podman, Buildah, and Skopeo- Practice Exercises - 1- Practice Exercises - 2
Learn, prepare, and practice for Red Hat RHCSA 9 (EX200) exam success with this Cert Guide from Pearson IT Certification, a leader in IT Certification learning.Master Red Hat RHCSA 9 EX200 exam topicsAssess your knowledge with chapter-ending quizzes and labsReview key concepts with exam-preparation tasksPractice with four unique practice testsLearn from two full hours of video training from the author's Red Hat Certified System Administrator (RHCSA) RHEL 9 Complete Video CourseRed Hat RHCSA 9 Cert Guide: EX200 is a comprehensive exam study guide. Leading Linux consultant, author, and instructor Sander van Vugt shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. The material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics.The book presents you with an organized test-preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy, and chapter-ending Exam Preparation Tasks help you drill deep on key concepts you must know thoroughly to pass the exam. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan.The companion website also contains two additional practice tests plus two full hours of personal video training from the author's Red Hat Certified System Administrator (RHCSA) RHEL 9 Complete Video Course.Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this study guide helps you master the concepts and techniques that will enable you to succeed on the exam the first time, includingBasic system management: Installation, tools, file management, text files, RHEL9 connections, user/group management, permissions, and network configurationOperating running systems: Managing software, processes, storage, and advanced storage; working with Systemd; scheduling tasks; and configuring loggingAdvanced system administration: Managing the kernel and boot procedures, essential troubleshooting, bash shell scriptingManaging network services: Configuring SSH, firewalls, and time services; managing Apache HTTP services and SE Linux; accessing network storage; and managing containersCompanion WebsiteThe website contains two complete practice exams and more than an hour of video training from the author's Red Hat Certified System Administrator (RHCSA) RHEL 9 Complete Video Course.Includes Exclusive Offer for 70% Off the full Red Hat Certified System Administrator (RHCSA) RHEL 9 Complete Video Course.
This book constitutes revised selected papers from the proceedings of the 26th International Conference on Financial Cryptography and Data Security, FC 2022, which was held in Grenada during May 2022.The 32 full papers and 4 short papers included in this book were carefully reviewed andselected from 159 submissions. They were organized in topical sections as follows: tokenomics; MPC (mostly); privacy; ZKP; old-school consensus; mostly payment networks; incentives; not proof of work; performance; measurements.
The book describes state-of-the-art advances in simulators and emulators for quantum computing. It introduces the main concepts of quantum computing, defining q-bits, explaining the parallelism behind any quantum computation, describing measurement of the quantum state of information and explaining the process of quantum bit entanglement, collapsed state and cloning. The book reviews the concept of quantum unitary, binary and ternary quantum operators as well as the computation implied by each operator. It provides details of the quantum processor, providing its architecture, which is validated via execution simulation of some quantum instructions.
Sie möchten testen, wie sicher Ihr IT-System ist? Dann hilft Ihnen dieses Buch! Es zeigt Ihnen Schritt für Schritt, wie Sie Ihre Systeme mit Kali Linux auf Herz und Nieren prüfen. Sie lernen, wie Passwörter geknackt werden, wie Sie Schwachstellen von Websites finden, die Konfigurationen von Webservern überprüfen und vieles mehr. Außerdem führen die Autoren Sie in Wireless Attacks, Sniffing, Spoofing und IT-Forensik-Analysen ein. Endlose Theorie? Fehlanzeige! Unter Anleitung ausgewiesener IT-Security-Experten lernen Sie aus der Sicht von Hackern zu denken und Ihre IT-Infrastruktur entsprechend zu sichern.
This book constitutes the thoroughly refereed post conference papers of the 4th International Conference on Blockchain and Trustworthy Systems, Blocksys 2022, held in Chengdu, China, in August 2022.The 26 full papers were carefully reviewed and selected from 56 submissions. The papers are organized in topical sections: Trustworthy Systems; Blockchain; Private Computing.
This comprehensive study guide delivers 100% coverage of every topic on the challenging CompTIA Linux+ examGet complete coverage of all the objectives included on CompTIA Linux+ exam XK0-005 from this up-to-date resource. Written by Linux experts and technology trainers, the book provides learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth answer explanations. Designed to help you pass this challenging exam, this definitive volume also serves as an essential on-the-job reference.Covers all exam topics, including how to:Use the vi text editorWork with the Linux shellManage Linux users, groups, files, and directoriesAdminister ownership, permissions, and quotasInstall Linux and manage the boot processPerform container operations and version control with GitManage software and hardwareWrite shell scriptsManage network settings and servicesSecure Linux and use encryptionOnline content includes:180 practice exam questions in a customizable test engine4 interactive questionsDownloadable virtual machines40 video clips
"Start taking better photos with your iPhone! I remember my first phone. It had a cord attached and was shaped like a popular animated character. You didn't surf the Internet on it. You didn't send text messages. You didn't check your email. And you definitely didn't take pictures on it! Times have changed, haven't they? Most people probably don't even have a camera that's not attached to their phones. iPhons don't match the quality of a DSLR camera-but they're certainly coming close. This book won't teach you how to be the next Ansel Adams, but it will teach things you probably never knew about the camera and photo app. Inside, I'll show you how to: Take and edit photos -- Organize photos -- Use different photo modes and lenes -- Use photographic styles -- And much more. If you are ready to get the most out of your iPhone camera, then read on! Note: this book is based off of the iPhone 14 Pro, which has photo features (notably ProRes) that are not available on other iPhones. I will point out when a feature might not work on your phone." --
With the advent of emerging and complex technologies, traffic capture and analysis play an integral part in the overall IT operation. This book outlines the rich set of advanced features and capabilities of the Wireshark tool, considered by many to be the de-facto Swiss army knife for IT operational activities involving traffic analysis. This open-source tool is available as CLI or GUI. It is designed to capture using different modes, and to leverage the community developed and integrated features, such as filter-based analysis or traffic flow graph view. You'll start by reviewing the basics of Wireshark, and then examine the details of capturing and analyzing secured application traffic such as SecureDNS, HTTPS, and IPSec. You'll then look closely at the control plane and data plane capture, and study the analysis of wireless technology traffic such as 802.11, which is the common access technology currently used, along with Bluetooth. You'll also learn waysto identify network attacks, malware, covert communications, perform security incident post mortems, and ways to prevent the same. The book further explains the capture and analysis of secure multimedia traffic, which constitutes around 70% of all overall internet traffic. Wireshark for Network Forensics provides a unique look at cloud and cloud-native architecture-based traffic capture in Kubernetes, Docker-based, AWS, and GCP environments. What You'll LearnReview Wireshark analysis and network forensicsStudy traffic capture and its analytics from mobile devicesAnalyze various access technology and cloud trafficWrite your own dissector for any new or proprietary packet formatsCapture secured application traffic for analysisWho This Book Is ForIT Professionals, Cloud Architects, Infrastructure Administrators, and Network/Cloud Operators
Journey into the world of Web3-based application development, its related protocols, and its usage in developing decentralized applications. This book will explain how programmable blockchains are revolutionizing the world of web applications, which can be run on decentralized platforms or peer-to-peer networks like IPFS.You'll start with an introduction to decentralization with a focus on blockchain implementations like Ethereum and Bitcoin. You'll then learn to develop simple decentralized applications (dApps) using Solidity, the language used for developing apps with Ethereum as well as smart contracts, wallets, gateways and NFTs. This book also covers how security and scale are addressed by L2 networks for scaling Bitcoin and Ethereum blockchains. A Brief Introduction to Web3 is your go-to guide for setting up simple Web3 applications using the Ethereum blockchain programming model.WhatYou Will Learn Build NFT tokensExamine Web3 differs from Web2-based applicationsUnderstand the fundamentals of blockchain and the corresponding data structures around itSee how consensus and trustless computing can be performed using blockchain Use Solidity and Truffle to build Web3 applications Who This Book Is ForSoftware developers and architects who are looking to hone their skills in dApps and web3 applications developed on sound principles of decentralized computing.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.