Udvidet returret til d. 31. januar 2024

Netværksadministration

Her finder du spændende bøger om Netværksadministration. Nedenfor er et flot udvalg af over 61 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Ian Wild
    387,95 kr.

    Tackle advanced platform security challenges with this practical Moodle guide complete with expert tips and techniquesKey Features:Demonstrate the security of your Moodle architecture for compliance purposesAssess and strengthen the security of your Moodle platform proactivelyExplore Moodle's baked-in security framework and discover ways to enhance it with pluginsPurchase of the print or Kindle book includes a free PDF eBookBook Description:Online learning platforms have revolutionized the teaching landscape, but with this comes the imperative of securing your students' private data in the digital realm. Have you taken every measure to ensure their data's security? Are you aligned with your organization's cybersecurity standards? What about your insurer and your country's data protection regulations?This book offers practical insights through real-world examples to ensure compliance. Equipping you with tools, techniques, and approaches, Moodle 4 Security guides you in mitigating potential threats to your Moodle platform. Dedicated chapters on understanding vulnerabilities familiarize you with the threat landscape so that you can manage your server effectively, keeping bad actors at bay and configuring Moodle for optimal user and data protection.By the end of the book, you'll have gained a comprehensive understanding of Moodle's security issues and how to address them. You'll also be able to demonstrate the safety of your Moodle platform, assuring stakeholders that their data is measurably safer.What You Will Learn:Measure a tutoring company's security risk profile and build a threat modelExplore data regulation frameworks and apply them to your organization's needsImplement the CIS Critical Security Controls effectivelyCreate JMeter test scripts to simulate server load scenariosAnalyze and enhance web server logs to identify rogue agentsInvestigate real-time application DOS protection using ModEvasiveIncorporate ModSecurity and the OWASP Core Rule Set WAF rules into your server defensesBuild custom infrastructure monitoring dashboards with GrafanaWho this book is for:If you're already familiar with Moodle, have experience in Linux systems administration, and want to expand your knowledge of protecting Moodle against data loss and malicious attacks, this book is for you. A basic understanding of user management, software installation and maintenance, Linux security controls, and network configuration will help you get the most out of this book.

  • af David Jambor
    542,95 kr.

    Implement, automate, build, operate, and optimize databases and other data-persistent technologies efficiently by leveraging the right set of DevOps best practicesKey Features:Implement core operational capabilities via automated pipelines, including testing and rollbacksCreate infrastructure, deploy software, test execution, and monitor operations using the as-code strategyAutomate common implementation patterns for databases with declarative orchestration frameworksPurchase of the print or Kindle book includes a free PDF eBookBook Description:In today's rapidly evolving world of DevOps, traditional silos are a thing of the past. Database administrators are no longer the only experts; site reliability engineers (SREs) and DevOps engineers are database experts as well. This blurring of the lines has led to increased responsibilities, making members of high-performing DevOps teams responsible for end-to-end ownership. This book helps you master DevOps for databases, making it a must-have resource for achieving success in the ever-changing world of DevOps.You'll begin by exploring real-world examples of DevOps implementation and its significance in modern data-persistent technologies, before progressing into the various types of database technologies and recognizing their strengths, weaknesses, and commonalities. As you advance, the chapters will teach you about design, implementation, testing, and operations using practical examples, as well as common design patterns, combining them with tooling, technology, and strategies for different types of data-persistent technologies. You'll also learn how to create complex end-to-end implementation, deployment, and cloud infrastructure strategies defined as code.By the end of this book, you'll be equipped with the knowledge and tools to design, build, and operate complex systems efficiently.What You Will Learn:Apply DevOps best practices to data-persistent technologiesGet to grips with architectural-level design and implementationExplore the modern data journey and data modeling with database technologyMaster the operation of large-scale systems with zero-touch automationAchieve speed, resilience, security, and operability at different scalesDesign DevOps teams with end-to-end ownership modelsWho this book is for:This book is for newcomers as well as seasoned SREs, DevOps engineers, and system engineers who are interested in large-scale systems with a heavy focus on data-persistent technologies. Database administrators looking to level up in the world of DevOps will also find this book helpful. Experience with cloud Infrastructure, basic development, and operations will help you get the most out of this book.

  • af Rhonda J Chadwick
    472,95 kr.

    Do you have boxes of old letters, photographs, keepsakes, and family heirlooms that you'd love to save for future generations?Imagine how thrilled your descendants will be a hundred years from now to discover what their ancestors' lives were like and the challenges they overcame during the Depression, the Civil Rights Movement, the Gulf War, September 11, the worldwide pandemic, and other historical events. Today's technology gives you the opportunity to preserve priceless memorabilia and add your story to the mix. Archival best practices are vital to prevent decay and destruction of your family's treasures. In "Secrets from the Stacks," expert archivist Rhonda Chadwick guides you step-by-step on how to organize collections both small and large, properly store and archive photographs, preserve textiles and heirlooms crafted of metal and other materials, and digitize photos, emails, films, audio, and video. With warmth and humor, she reveals the methods archivists use to organize a family legacy, from preserving 19th-century daguerreotypes to 2!81-century photos on your cellphone. You'll learn how to store and ensure access to and retrieval of your social media accounts and digital assets, create memory books, audio and video oral histories with family members, and more. Finally, Chadwick teaches you how to prevent damage or loss of family heirlooms from natural disasters, fire, and theft. Your cherished family stories and memories are important and don't have to die when you do. Recording and preserving your family history is not just a gift for your relatives today; it gives future generations the opportunity to connect with the past and gain a deeper understanding of their own sense of self.

  • af Brian J. (Curtin University Evans
    601,95 - 890,95 kr.

  • af Sergey Samoilenko
    594,95 - 1.622,95 kr.

  • af Michael R. (Foley & Lardner LLP Overly
    603,95 kr.

    This book provides business people and lawyers (both in-house and in private practice) with an easily understandable and accessible handbook to quickly grasp the issues and implement solutions with respect to a broad range of technology-related agreements.

  • af Nijaz Bajgoric
    594,95 - 1.159,95 kr.

  • af Shailesh Kumar (Senior Technology Architect Shivakumar
    598,95 - 1.447,95 kr.

  • af Jay Liebowitz
    590,95 kr.

    A recent study found that most business leaders believe in the value of using data and analytics, but say they lack confidence in measures of their effectiveness. In the data analytics community, intuition has been rarely discussed in executive decision-making. The book examines how well do executives trust their intuition.

  • af Jay Liebowitz
    1.403,95 kr.

    A recent study found that most business leaders believe in the value of using data and analytics, but say they lack confidence in measures of their effectiveness. In the data analytics community, intuition has been rarely discussed in executive decision-making. The book examines how well do executives trust their intuition.

  • af Mounir Kehal
    631,95 kr.

    Innovation based in data analytics is a contemporary approach to developing empirically supported advances that encourage entrepreneurial activity inspired by novel marketing inferences. Data Analytics in Marketing, Entrepreneurship, and Innovation covers techniques, processes, models, tools, and practices for creating business opportunities through data analytics. It features case studies that provide realistic examples of applications. This multifaceted examination of data analytics looks at: Business analyticsApplying predictive analytics Using discrete choice analysis for decision-making Marketing and customer analyticsDeveloping new productsTechnopreneurshipDisruptive versus incremental innovationThe book gives researchers and practitioners insight into how data analytics is used in the areas of innovation, entrepreneurship, and marketing. Innovation analytics helps identify opportunities to develop new products and services, and improve existing methods of product manufacturing and service delivery. Entrepreneurial analytics facilitates the transformation of innovative ideas into strategy and helps entrepreneurs make critical decisions based on data-driven techniques. Marketing analytics is used in collecting, managing, assessing, and analyzing marketing data to predict trends, investigate customer preferences, and launch campaigns.

  • af Tiko (Cape Peninsula University of Technology Iyamu
    669,95 - 1.587,95 kr.

  • af Preston (Preston de Guise de Guise
    302,95 - 1.220,95 kr.

  • af Celina Olszak
    957,95 - 964,95 kr.

  • af James (Senior Director Ransome
    605,95 - 730,95 kr.

  • af Ewa Ziemba
    1.915,95 kr.

    This book presents contemporary issues and challenges in finance and risk management in a time of rapid transformation due to technological advancements. It includes research articles based on financial and economic data and intends to cover the emerging role of analytics in financial management, asset management, and risk management.

  • af Kyle Rankin
    217,95 kr.

    Kyle Rankin wrote a monthly column titled "Hack and /" for Linux Journal magazine for almost 12 years starting in their January 2008 issue until Linux Journal closed for good on August 7, 2019. The column aimed to provide useful tips and tricks on topics ranging from system administration to security to 3D printing to VIM. After he published his final farewell article for Linux Journal, one of the most common questions he got was "what's going to happen to the giant archive of articles?" He realized he had a whole book's worth of material just in sysadmin tips alone.This book doesn't aim to be an exhaustive guide to everything you need to know to be a system administrator. Instead, this book allows Rankin to act as a remote mentor to someone starting out in IT or system administration whether as a full-time job or as a full stack developer. Think of each section in a chapter like sitting down with him over lunch or looking over his shoulder as he shows you a tip to save you time, a tool he found useful, a lesson he learned the hard way, or an explanation of how he'd tackle a project you got assigned.Table of ContentsChapter 1 Sysadmin 101- The Importance of Learning IT Fundamentals- Leveling Up: A Sysadmin Career Path- Automation- Ticketing- Patch Management- Alerting- Preparing for Vacation- Travel Laptops Tips in PracticeChapter 2 Sysadmin's Toolbox- Filesystem Hierarchy Standard- Scheduling One-time Jobs with At- Sort and Uniq- Tracking Bandwidth with Iftop- Right Command, Wrong Server- Chopping Logs- Shorter Commands- Add Progress Bars to dd- Lock Files with the flock CommandChapter 3 Home Servers- Setting Up Your Network- Setting Up A Home DNS Server- A Local Mail Server- Clustering with Raspberry Pis- Home As Your Backup Data CenterChapter 4 Server Projects- Last Minute Secondary Mail Server- Check Exchange from the Command Line- Migrate to a New Hard Drive- Remotely Wipe a Server- Preseeding Full Disk Encryption- Localhost DNS Cache- PXE Magic- More PXE MagicChapter 5 When Disaster Strikes- Stop Killing Your Cattle- Troubleshooting High Load- Troubleshooting the Local Network- Troubleshooting Remote Networks- Troubleshooting with Telnet- Collecting Server Metrics with Sar- Dynamic DNS Disaster- Troubleshoot Full Disks- Hard Drive Crashes- Recover the Master Boot Record- Restoring Deleted FilesAppendices A My Favorite InfrastructureSample Chapter: https://kylerank.in/bohs_lacc_sample_chapter.pdf

  • af Kyle Cucci
    712,95 kr.

    Dive into the fascinating and terrifying world of evasive malware - malicious software designed to avoid detection. The first of its kind, this thorough introduction is full of practical information, real-world examples, and cutting-edge techniques for discovering, reverse-engineering, and analysing state-of-the-art malware. Beginning with foundational knowledge about malware analysis in the context of the Windows OS, you'll learn about the evasive manoeuvres that malware programs use to determine whether they're being analysed and the tricks they employ to avoid detection. You'll explore the ways malware circumvents security controls, such as network or endpoint defence bypasses, anti-forensics techniques, and malware that deploys data and code obfuscation. At the end of the book, you'll build your very own anti-evasion analysis lab. You'll learn: Modern evasive malware threats, anti-analysis techniques used in malware, how malware bypasses and circumvents security controls, how malware uses victim targeting and profiling techniques, how malware uses anti-forensics and file-less techniques, how to perform malware analysis and reverse engineering on evasive programs.

  • af Matt Hand
    563,95 kr.

    "Introduces readers to the most common components of EDR systems, including function hooking, callback notifications, Event Tracing for Windows, and filesystem minifilters, by explaining how they are implemented and how they collect various data points. Covers documented evasion strategies for bypassing detections and describes how defenders might protect themselves"--

  • af Jay Liebowitz
    1.464,95 kr.

    Some of the hottest topics today involve cryptocurrency, and FinTech. With all these trends, businesses need to become better informed. This book provides an easy-to-read, yet comprehensive, view of cryptocurrency in the U.S. and international markets, as well as the key issues, technologies, applications, challenges, and trends.

  • af Jay Liebowitz
    593,95 kr.

    Some of the hottest topics today involve cryptocurrency, and FinTech. With all these trends, businesses need to become better informed. This book provides an easy-to-read, yet comprehensive, view of cryptocurrency in the U.S. and international markets, as well as the key issues, technologies, applications, challenges, and trends.

  • af Suaib Mohammad
    317,95 kr.

    The internet has become an integral component of our daily life. It has led billions of individuals all around the world to participate and collaborate in accessing and sharing information across the world. It is possible only internet that people today can access practically any type of information at any time, from anywhere by just making a search on their internet-devices (such as smartphones, tablets Laptop etc.). They are just a click away from any information which is globally available around them on internet. "Searching is an Art" to make it true "Search Engines" come in a big picture. Search engine plays a vital role particularly exploring information within large and voluminous websites such as E-commerce websites, corporate sites, and social networking sites etc.

  • af Dmitry Vostokov & Software Diagnostics Services
    277,95 kr.

  • - Skills for the Next-Generation Network Engineer
    af Jason Edelman, Scott S. Lowe & Matt Oswalt
    473,95 kr.

    Like sysadmins before them, network engineers are finding that they cannot do their work manually anymore. As the field faces new protocols, technologies, delivery models, and a pressing need for businesses to be more agile and flexible, network automation is becoming essential. This practical guide shows network engineers how to use a range of technologies and toolsincluding Linux, Python, JSON, and XMLto automate their systems through code.Network programming and automation will help you simplify tasks involved in configuring, managing, and operating network equipment, topologies, services, and connectivity. Through the course of the book, youll learn the basic skills and tools you need to make this critical transition.This book covers:Python programming basics: data types, conditionals, loops, functions, classes, and modulesLinux fundamentals to provide the foundation you need on your network automation journeyData formats and models: JSON, XML, YAML, and YANG for networkingJinja templating and its applicability for creating network device configurationsThe role of application programming interfaces (APIs) in network automationSource control with Git to manage code changes during the automation processHow Ansible, Salt, and StackStorm open source automation tools can be used to automate network devicesKey tools and technologies required for a Continuous Integration (CI) pipeline in network operations

  • - Shipping Reliable Containers in Production
    af Karl Matthias & Sean P. Kane
    523,95 kr.

    Updated to cover Docker version 1.10Docker is quickly changing the way that organizations are deploying software at scale. But understanding how Linux containers fit into your workflowand getting the integration details rightare not trivial tasks. With this practical guide, youll learn how to use Docker to package your applications with all of their dependencies, and then test, ship, scale, and support your containers in production.Two Lead Site Reliability Engineers at New Relic share much of what they have learned from using Docker in production since shortly after its initial release. Their goal is to help you reap the benefits of this technology while avoiding the many setbacks they experienced.Learn how Docker simplifies dependency management and deployment workflow for your applicationsStart working with Docker images, containers, and command line toolsUse practical techniques to deploy and test Docker-based Linux containers in productionDebug containers by understanding their composition and internal processesDeploy production containers at scale inside your data center or cloud environmentExplore advanced Docker topics, including deployment tools, networking, orchestration, security, and configuration

  • af Byron DeVries & Paul C. (Grand Valley State University Jorgensen
    534,95 - 1.005,95 kr.

  • af Julian Ashbourn
    466,95 - 1.220,95 kr.

  • af Tobias Endress
    1.342,95 kr.

    New Work and Industry 4.0 have come to maturity and this book takes a practical, experience-based approach to project management in these areas. It introduces methods and covers practical aspects. It critically examines existing approaches and practices and shows their limitations. The book also covers human and social

  •  
    522,95 kr.

    New Work and Industry 4.0 have come to maturity and this book takes a practical, experience-based approach to project management in these areas. It introduces methods and covers practical aspects. It critically examines existing approaches and practices and shows their limitations. The book also covers human and social

  • af Susmita Bandyopadhyay
    1.729,95 kr.

    This book presents different tools and techniques used for Decision Support Systems (DSS), including decision tree and table, and their modifications, multi-criteria decision analysis techniques, network tools of decision support, and various case-based reasoning methods supported by examples and case studies. Latest developments for each of the techniques have been discussed separately, and possible future research areas are duly identified as intelligent and spatial DSS.Features:Discusses all the major tools and techniques for Decision Support System supported by examples.Explains techniques considering their deterministic and stochastic aspects.Covers network tools including GERT and Q-GERT.Explains the application of both probability and fuzzy orientation in the pertinent techniques.Includes a number of relevant case studies along with a dedicated chapter on software.This book is aimed at researchers and graduate students in information systems, data analytics, operation research, including management and computer science areas.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.