Gør som tusindvis af andre bogelskere
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.Du kan altid afmelde dig igen.
Tackle advanced platform security challenges with this practical Moodle guide complete with expert tips and techniquesKey Features:Demonstrate the security of your Moodle architecture for compliance purposesAssess and strengthen the security of your Moodle platform proactivelyExplore Moodle's baked-in security framework and discover ways to enhance it with pluginsPurchase of the print or Kindle book includes a free PDF eBookBook Description:Online learning platforms have revolutionized the teaching landscape, but with this comes the imperative of securing your students' private data in the digital realm. Have you taken every measure to ensure their data's security? Are you aligned with your organization's cybersecurity standards? What about your insurer and your country's data protection regulations?This book offers practical insights through real-world examples to ensure compliance. Equipping you with tools, techniques, and approaches, Moodle 4 Security guides you in mitigating potential threats to your Moodle platform. Dedicated chapters on understanding vulnerabilities familiarize you with the threat landscape so that you can manage your server effectively, keeping bad actors at bay and configuring Moodle for optimal user and data protection.By the end of the book, you'll have gained a comprehensive understanding of Moodle's security issues and how to address them. You'll also be able to demonstrate the safety of your Moodle platform, assuring stakeholders that their data is measurably safer.What You Will Learn:Measure a tutoring company's security risk profile and build a threat modelExplore data regulation frameworks and apply them to your organization's needsImplement the CIS Critical Security Controls effectivelyCreate JMeter test scripts to simulate server load scenariosAnalyze and enhance web server logs to identify rogue agentsInvestigate real-time application DOS protection using ModEvasiveIncorporate ModSecurity and the OWASP Core Rule Set WAF rules into your server defensesBuild custom infrastructure monitoring dashboards with GrafanaWho this book is for:If you're already familiar with Moodle, have experience in Linux systems administration, and want to expand your knowledge of protecting Moodle against data loss and malicious attacks, this book is for you. A basic understanding of user management, software installation and maintenance, Linux security controls, and network configuration will help you get the most out of this book.
Implement, automate, build, operate, and optimize databases and other data-persistent technologies efficiently by leveraging the right set of DevOps best practicesKey Features:Implement core operational capabilities via automated pipelines, including testing and rollbacksCreate infrastructure, deploy software, test execution, and monitor operations using the as-code strategyAutomate common implementation patterns for databases with declarative orchestration frameworksPurchase of the print or Kindle book includes a free PDF eBookBook Description:In today's rapidly evolving world of DevOps, traditional silos are a thing of the past. Database administrators are no longer the only experts; site reliability engineers (SREs) and DevOps engineers are database experts as well. This blurring of the lines has led to increased responsibilities, making members of high-performing DevOps teams responsible for end-to-end ownership. This book helps you master DevOps for databases, making it a must-have resource for achieving success in the ever-changing world of DevOps.You'll begin by exploring real-world examples of DevOps implementation and its significance in modern data-persistent technologies, before progressing into the various types of database technologies and recognizing their strengths, weaknesses, and commonalities. As you advance, the chapters will teach you about design, implementation, testing, and operations using practical examples, as well as common design patterns, combining them with tooling, technology, and strategies for different types of data-persistent technologies. You'll also learn how to create complex end-to-end implementation, deployment, and cloud infrastructure strategies defined as code.By the end of this book, you'll be equipped with the knowledge and tools to design, build, and operate complex systems efficiently.What You Will Learn:Apply DevOps best practices to data-persistent technologiesGet to grips with architectural-level design and implementationExplore the modern data journey and data modeling with database technologyMaster the operation of large-scale systems with zero-touch automationAchieve speed, resilience, security, and operability at different scalesDesign DevOps teams with end-to-end ownership modelsWho this book is for:This book is for newcomers as well as seasoned SREs, DevOps engineers, and system engineers who are interested in large-scale systems with a heavy focus on data-persistent technologies. Database administrators looking to level up in the world of DevOps will also find this book helpful. Experience with cloud Infrastructure, basic development, and operations will help you get the most out of this book.
Do you have boxes of old letters, photographs, keepsakes, and family heirlooms that you'd love to save for future generations?Imagine how thrilled your descendants will be a hundred years from now to discover what their ancestors' lives were like and the challenges they overcame during the Depression, the Civil Rights Movement, the Gulf War, September 11, the worldwide pandemic, and other historical events. Today's technology gives you the opportunity to preserve priceless memorabilia and add your story to the mix. Archival best practices are vital to prevent decay and destruction of your family's treasures. In "Secrets from the Stacks," expert archivist Rhonda Chadwick guides you step-by-step on how to organize collections both small and large, properly store and archive photographs, preserve textiles and heirlooms crafted of metal and other materials, and digitize photos, emails, films, audio, and video. With warmth and humor, she reveals the methods archivists use to organize a family legacy, from preserving 19th-century daguerreotypes to 2!81-century photos on your cellphone. You'll learn how to store and ensure access to and retrieval of your social media accounts and digital assets, create memory books, audio and video oral histories with family members, and more. Finally, Chadwick teaches you how to prevent damage or loss of family heirlooms from natural disasters, fire, and theft. Your cherished family stories and memories are important and don't have to die when you do. Recording and preserving your family history is not just a gift for your relatives today; it gives future generations the opportunity to connect with the past and gain a deeper understanding of their own sense of self.
Since A Guide to IT Contracting: Checklists, Tools, and Techniques first published, several alarming trends have developed in the technology contracting industry. These trends include:The Dawn of the "As-Is" Technology ProductThe Ever-Changing ProductWhere in the World Is My Data?To meet these challenges, the Second Edition helps business managers and lawyers explore alternate solutions from other vendors, conduct simultaneous negotiations with other vendors, and, generally, ensure prospective vendors understand they can "lose the deal" if they refuse to act reasonably.Distilling the most critical business and legal lessons learned through the author's decades of legal experience drafting and negotiating IT-related agreements, this single volume lets readers quickly access information on virtually every type of technology agreement. Structured to focus on a particular type of IT agreement, each chapter includes a checklist of essential terms, a brief summary of what the agreement is intended to do, and a complete review of the legal and business issues that are addressed in that particular agreement. Providing nonlegal professionals with the tools to address IT contracting issues, the book:Contains checklists to help readers organize key concepts for ready referenceSupplies references to helpful online resources and aids for contract draftingIncludes a complete glossary that defines key legal, business, and technical termsTechnology contracting is becoming ever more difficult. This book is filled with recommendations to mitigate potential risk and makes clear the importance of maintaining negotiating leverage with potential vendors.
A recent study found that most business leaders believe in the value of using data and analytics, but say they lack confidence in measures of their effectiveness. In the data analytics community, intuition has been rarely discussed in executive decision-making. The book examines how well do executives trust their intuition.
A recent study found that most business leaders believe in the value of using data and analytics, but say they lack confidence in measures of their effectiveness. In the data analytics community, intuition has been rarely discussed in executive decision-making. The book examines how well do executives trust their intuition.
Innovation based in data analytics is a contemporary approach to developing empirically supported advances that encourage entrepreneurial activity inspired by novel marketing inferences. Data Analytics in Marketing, Entrepreneurship, and Innovation covers techniques, processes, models, tools, and practices for creating business opportunities through data analytics. It features case studies that provide realistic examples of applications. This multifaceted examination of data analytics looks at: Business analyticsApplying predictive analytics Using discrete choice analysis for decision-making Marketing and customer analyticsDeveloping new productsTechnopreneurshipDisruptive versus incremental innovationThe book gives researchers and practitioners insight into how data analytics is used in the areas of innovation, entrepreneurship, and marketing. Innovation analytics helps identify opportunities to develop new products and services, and improve existing methods of product manufacturing and service delivery. Entrepreneurial analytics facilitates the transformation of innovative ideas into strategy and helps entrepreneurs make critical decisions based on data-driven techniques. Marketing analytics is used in collecting, managing, assessing, and analyzing marketing data to predict trends, investigate customer preferences, and launch campaigns.
This book presents contemporary issues and challenges in finance and risk management in a time of rapid transformation due to technological advancements. It includes research articles based on financial and economic data and intends to cover the emerging role of analytics in financial management, asset management, and risk management.
Kyle Rankin wrote a monthly column titled "Hack and /" for Linux Journal magazine for almost 12 years starting in their January 2008 issue until Linux Journal closed for good on August 7, 2019. The column aimed to provide useful tips and tricks on topics ranging from system administration to security to 3D printing to VIM. After he published his final farewell article for Linux Journal, one of the most common questions he got was "what's going to happen to the giant archive of articles?" He realized he had a whole book's worth of material just in sysadmin tips alone.This book doesn't aim to be an exhaustive guide to everything you need to know to be a system administrator. Instead, this book allows Rankin to act as a remote mentor to someone starting out in IT or system administration whether as a full-time job or as a full stack developer. Think of each section in a chapter like sitting down with him over lunch or looking over his shoulder as he shows you a tip to save you time, a tool he found useful, a lesson he learned the hard way, or an explanation of how he'd tackle a project you got assigned.Table of ContentsChapter 1 Sysadmin 101- The Importance of Learning IT Fundamentals- Leveling Up: A Sysadmin Career Path- Automation- Ticketing- Patch Management- Alerting- Preparing for Vacation- Travel Laptops Tips in PracticeChapter 2 Sysadmin's Toolbox- Filesystem Hierarchy Standard- Scheduling One-time Jobs with At- Sort and Uniq- Tracking Bandwidth with Iftop- Right Command, Wrong Server- Chopping Logs- Shorter Commands- Add Progress Bars to dd- Lock Files with the flock CommandChapter 3 Home Servers- Setting Up Your Network- Setting Up A Home DNS Server- A Local Mail Server- Clustering with Raspberry Pis- Home As Your Backup Data CenterChapter 4 Server Projects- Last Minute Secondary Mail Server- Check Exchange from the Command Line- Migrate to a New Hard Drive- Remotely Wipe a Server- Preseeding Full Disk Encryption- Localhost DNS Cache- PXE Magic- More PXE MagicChapter 5 When Disaster Strikes- Stop Killing Your Cattle- Troubleshooting High Load- Troubleshooting the Local Network- Troubleshooting Remote Networks- Troubleshooting with Telnet- Collecting Server Metrics with Sar- Dynamic DNS Disaster- Troubleshoot Full Disks- Hard Drive Crashes- Recover the Master Boot Record- Restoring Deleted FilesAppendices A My Favorite InfrastructureSample Chapter: https://kylerank.in/bohs_lacc_sample_chapter.pdf
Dive into the fascinating and terrifying world of evasive malware - malicious software designed to avoid detection. The first of its kind, this thorough introduction is full of practical information, real-world examples, and cutting-edge techniques for discovering, reverse-engineering, and analysing state-of-the-art malware. Beginning with foundational knowledge about malware analysis in the context of the Windows OS, you'll learn about the evasive manoeuvres that malware programs use to determine whether they're being analysed and the tricks they employ to avoid detection. You'll explore the ways malware circumvents security controls, such as network or endpoint defence bypasses, anti-forensics techniques, and malware that deploys data and code obfuscation. At the end of the book, you'll build your very own anti-evasion analysis lab. You'll learn: Modern evasive malware threats, anti-analysis techniques used in malware, how malware bypasses and circumvents security controls, how malware uses victim targeting and profiling techniques, how malware uses anti-forensics and file-less techniques, how to perform malware analysis and reverse engineering on evasive programs.
"Introduces readers to the most common components of EDR systems, including function hooking, callback notifications, Event Tracing for Windows, and filesystem minifilters, by explaining how they are implemented and how they collect various data points. Covers documented evasion strategies for bypassing detections and describes how defenders might protect themselves"--
Some of the hottest topics today involve cryptocurrency, and FinTech. With all these trends, businesses need to become better informed. This book provides an easy-to-read, yet comprehensive, view of cryptocurrency in the U.S. and international markets, as well as the key issues, technologies, applications, challenges, and trends.
Whether the source is more industry-based or academic research, there certainly appears to be a growing interest in the field of cryptocurrency. The New York Times had a cover story on March 24, 2022, titled "Time to Enter the Crypto Zone?," and they talked about institutional investors pouring billions into digital tokens, salaries being taken in Bitcoins, and even Bitcoin ATMs in grocery stores. Certainly, there have been ups and downs in crypto, but it has a kind of alluring presence that tempts one to include crypto as part of one's portfolio. Those who are "prime crypto-curious" investors are usually familiar with the tech/pop culture and feel they want to diversify a bit in this fast-moving market. Even universities are beginning to offer more courses and create "Centers on Cryptocurrency." Some universities are even requiring their students who take a crypto course to pay the course tuition via cryptocurrency.In response to the growing interest and fascination about the crypto industry and cryptocurrency in general, Cryptocurrency Concepts, Technology, and Applications brings together many leading worldwide contributors to discuss a broad range of issues associated with cryptocurrency. The book covers a wide array of crypto-related topics, including:BlockchainNFTsData analytics and AICrypto crimeCrypto industry and regulationCrypto and public choiceConsumer confidenceBitcoin and other cryptocurrencies.Presenting various viewpoints on where the crypto industry is heading, this timely book points out both the advantages and limitations of this emerging field. It is an easy-to-read, yet comprehensive, overview of cryptocurrency in the U.S. and international markets.
The internet has become an integral component of our daily life. It has led billions of individuals all around the world to participate and collaborate in accessing and sharing information across the world. It is possible only internet that people today can access practically any type of information at any time, from anywhere by just making a search on their internet-devices (such as smartphones, tablets Laptop etc.). They are just a click away from any information which is globally available around them on internet. "Searching is an Art" to make it true "Search Engines" come in a big picture. Search engine plays a vital role particularly exploring information within large and voluminous websites such as E-commerce websites, corporate sites, and social networking sites etc.
Like sysadmins before them, network engineers are finding that they cannot do their work manually anymore. As the field faces new protocols, technologies, delivery models, and a pressing need for businesses to be more agile and flexible, network automation is becoming essential. This practical guide shows network engineers how to use a range of technologies and toolsincluding Linux, Python, JSON, and XMLto automate their systems through code.Network programming and automation will help you simplify tasks involved in configuring, managing, and operating network equipment, topologies, services, and connectivity. Through the course of the book, youll learn the basic skills and tools you need to make this critical transition.This book covers:Python programming basics: data types, conditionals, loops, functions, classes, and modulesLinux fundamentals to provide the foundation you need on your network automation journeyData formats and models: JSON, XML, YAML, and YANG for networkingJinja templating and its applicability for creating network device configurationsThe role of application programming interfaces (APIs) in network automationSource control with Git to manage code changes during the automation processHow Ansible, Salt, and StackStorm open source automation tools can be used to automate network devicesKey tools and technologies required for a Continuous Integration (CI) pipeline in network operations
Updated to cover Docker version 1.10Docker is quickly changing the way that organizations are deploying software at scale. But understanding how Linux containers fit into your workflowand getting the integration details rightare not trivial tasks. With this practical guide, youll learn how to use Docker to package your applications with all of their dependencies, and then test, ship, scale, and support your containers in production.Two Lead Site Reliability Engineers at New Relic share much of what they have learned from using Docker in production since shortly after its initial release. Their goal is to help you reap the benefits of this technology while avoiding the many setbacks they experienced.Learn how Docker simplifies dependency management and deployment workflow for your applicationsStart working with Docker images, containers, and command line toolsUse practical techniques to deploy and test Docker-based Linux containers in productionDebug containers by understanding their composition and internal processesDeploy production containers at scale inside your data center or cloud environmentExplore advanced Docker topics, including deployment tools, networking, orchestration, security, and configuration
New Work and Industry 4.0 have come to maturity and this book takes a practical, experience-based approach to project management in these areas. It introduces methods and covers practical aspects. It critically examines existing approaches and practices and shows their limitations. The book also covers human and social
New Work and Industry 4.0 have matured and this book takes a practical, experience-based approach to project management in these areas. It introduces methods and covers the practical aspects. It critically examines existing approaches and practices and shows their limitations. The book covers appropriate methods as well as human and social aspects. It contributes to the ongoing discussion of business practices and methods. It also aims to stimulate dialogue in the professional community.Digital Project Practice for New Work and Industry 4.0 begins by introducing basic concepts in the context of Industry 4.0 and discussing how they might influence organizational communication and impact the work environment. After examining the possibilities and challenges of remote work and collaboration in distributed teams all over the world, the book looks at a company's fundamental changes related to New Work from a practical business perspective as well as legal and ethical perspectives. It reviews the case of the VW emission scandal and recommends ways to improve corporate culture. Legal issues include New Work and hybrid forms of collaboration as well as liability for automated decisions (i.e., the potential need for an 'electronic person'). Other implications for the workplace include how:Industry 4.0 might influence the potential demand for "Digital Unions"Industry 4.0, and lean production, and their applications can change industrial practicesOpen Banking presents new approaches and new business modelsWork structures and systems can empower employees' work self-managementThis book also looks at how New Work effects individual workers. It addresses digital stress, introduces strategies for coping with it, and discusses related topics. It also explores the benefits of meditation and the economics of mind, body, and spirit.In essence, this book covers appropriate methods along with human and social factors. It also covers practice, different perspectives, and various experiences from all around the globe. Contributing to the ongoing discussion on business practices and methods, this book will nourish and stimulate dialogue in the professional community.
This book presents different tools and techniques used for Decision Support Systems (DSS), including decision tree and table, and their modifications, multi-criteria decision analysis techniques, network tools of decision support, and various case-based reasoning methods supported by examples and case studies. Latest developments for each of the techniques have been discussed separately, and possible future research areas are duly identified as intelligent and spatial DSS.Features:Discusses all the major tools and techniques for Decision Support System supported by examples.Explains techniques considering their deterministic and stochastic aspects.Covers network tools including GERT and Q-GERT.Explains the application of both probability and fuzzy orientation in the pertinent techniques.Includes a number of relevant case studies along with a dedicated chapter on software.This book is aimed at researchers and graduate students in information systems, data analytics, operation research, including management and computer science areas.
Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.
Ved tilmelding accepterer du vores persondatapolitik.