Vi bøger
Levering: 1 - 2 hverdage

Netværksadministration

Her finder du spændende bøger om Netværksadministration. Nedenfor er et flot udvalg af over 70 bøger om emnet.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Ian Wild
    379,95 kr.

    Tackle advanced platform security challenges with this practical Moodle guide complete with expert tips and techniquesKey FeaturesDemonstrate the security of your Moodle architecture for compliance purposesAssess and strengthen the security of your Moodle platform proactivelyExplore Moodle's baked-in security framework and discover ways to enhance it with pluginsPurchase of the print or Kindle book includes a free PDF eBookBook DescriptionOnline learning platforms have revolutionized the teaching landscape, but with this comes the imperative of securing your students' private data in the digital realm. Have you taken every measure to ensure their data's security? Are you aligned with your organization's cybersecurity standards? What about your insurer and your country's data protection regulations?This book offers practical insights through real-world examples to ensure compliance. Equipping you with tools, techniques, and approaches, Moodle 4 Security guides you in mitigating potential threats to your Moodle platform. Dedicated chapters on understanding vulnerabilities familiarize you with the threat landscape so that you can manage your server effectively, keeping bad actors at bay and configuring Moodle for optimal user and data protection.By the end of the book, you'll have gained a comprehensive understanding of Moodle's security issues and how to address them. You'll also be able to demonstrate the safety of your Moodle platform, assuring stakeholders that their data is measurably safer.What you will learnMeasure a tutoring company's security risk profile and build a threat modelExplore data regulation frameworks and apply them to your organization's needsImplement the CIS Critical Security Controls effectivelyCreate JMeter test scripts to simulate server load scenariosAnalyze and enhance web server logs to identify rogue agentsInvestigate real-time application DOS protection using ModEvasiveIncorporate ModSecurity and the OWASP Core Rule Set WAF rules into your server defensesBuild custom infrastructure monitoring dashboards with GrafanaWho this book is forIf you're already familiar with Moodle, have experience in Linux systems administration, and want to expand your knowledge of protecting Moodle against data loss and malicious attacks, this book is for you. A basic understanding of user management, software installation and maintenance, Linux security controls, and network configuration will help you get the most out of this book.Table of ContentsMoodle Security - First StepsMoodle Threat ModelingSecurity Industry StandardsBuilding a Secure Linux ServerEndpoint ProtectionDenial of Service ProtectionBackup And Disaster RecoveryMeeting Data Protection RequirementsMoodle Security AuditUnderstanding VulnerabilitiesInfrastructure Monitoring

  • af David Jambor
    481,95 kr.

    Implement, automate, build, operate, and optimize databases and other data-persistent technologies efficiently by leveraging the right set of DevOps best practicesKey Features:Implement core operational capabilities via automated pipelines, including testing and rollbacksCreate infrastructure, deploy software, test execution, and monitor operations using the as-code strategyAutomate common implementation patterns for databases with declarative orchestration frameworksPurchase of the print or Kindle book includes a free PDF eBookBook Description:In today's rapidly evolving world of DevOps, traditional silos are a thing of the past. Database administrators are no longer the only experts; site reliability engineers (SREs) and DevOps engineers are database experts as well. This blurring of the lines has led to increased responsibilities, making members of high-performing DevOps teams responsible for end-to-end ownership. This book helps you master DevOps for databases, making it a must-have resource for achieving success in the ever-changing world of DevOps.You'll begin by exploring real-world examples of DevOps implementation and its significance in modern data-persistent technologies, before progressing into the various types of database technologies and recognizing their strengths, weaknesses, and commonalities. As you advance, the chapters will teach you about design, implementation, testing, and operations using practical examples, as well as common design patterns, combining them with tooling, technology, and strategies for different types of data-persistent technologies. You'll also learn how to create complex end-to-end implementation, deployment, and cloud infrastructure strategies defined as code.By the end of this book, you'll be equipped with the knowledge and tools to design, build, and operate complex systems efficiently.What You Will Learn:Apply DevOps best practices to data-persistent technologiesGet to grips with architectural-level design and implementationExplore the modern data journey and data modeling with database technologyMaster the operation of large-scale systems with zero-touch automationAchieve speed, resilience, security, and operability at different scalesDesign DevOps teams with end-to-end ownership modelsWho this book is for:This book is for newcomers as well as seasoned SREs, DevOps engineers, and system engineers who are interested in large-scale systems with a heavy focus on data-persistent technologies. Database administrators looking to level up in the world of DevOps will also find this book helpful. Experience with cloud Infrastructure, basic development, and operations will help you get the most out of this book.

  • af Daniel Evans
    241,95 kr.

    Forensic criminology plays a crucial role in the field of criminal investigations, utilizing scientific methodologies to analyze and interpret evidence in order to solve crimes. In the book "Mastering Forensic Criminology: Techniques for Student Investigators," we aim to provide students in the field of criminology with a comprehensive understanding of the importance of forensic criminology in criminal investigations.One of the key reasons why forensic criminology is essential is its ability to bridge the gap between law enforcement and scientific expertise. By incorporating scientific methods into criminal investigations, forensic criminologists can provide unbiased analyses of evidence, ensuring justice is served and the guilty are convicted. This interdisciplinary approach not only strengthens the criminal justice system but also enhances public trust in the process.Another aspect of forensic criminology that makes it indispensable is its ability to uncover vital information that may not be apparent through traditional investigative techniques. By utilizing various scientific techniques such as DNA analysis, ballistics, fingerprinting, and forensic psychology, criminologists can uncover hidden connections, identify suspects, and establish links between crime scenes and offenders. These findings can provide critical insights into a crime, leading to the resolution of complex cases that would otherwise remain unsolved.Furthermore, forensic criminology helps ensure a fair trial by providing expert testimony in court. By presenting objective scientific evidence, forensic criminologists contribute to the legal process, assisting judges and juries in making informed decisions based on facts rather than speculation or biased opinions. This not only strengthens the criminal justice system but also safeguards the rights of the accused and victims alike.For students pursuing a career in criminology, mastering the techniques of forensic criminology is essential. It equips them with the necessary skills to analyze crime scenes, collect evidence, and interpret data accurately. By incorporating scientific principles into their investigations, students can develop a systematic and evidence-based approach to solving crimes, ultimately contributing to the advancement of the field and the pursuit of justice.

  • af Rhonda J Chadwick
    358,95 kr.

    Do you have boxes of old letters, photographs, keepsakes, and family heirlooms that you'd love to save for future generations?Imagine how thrilled your descendants will be a hundred years from now to discover what their ancestors' lives were like and the challenges they overcame during the Depression, the Civil Rights Movement, the Gulf War, September 11, the worldwide pandemic, and other historical events. Today's technology gives you the opportunity to preserve priceless memorabilia and add your story to the mix. Archival best practices are vital to prevent decay and destruction of your family's treasures. In "Secrets from the Stacks," expert archivist Rhonda Chadwick guides you step-by-step on how to organize collections both small and large, properly store and archive photographs, preserve textiles and heirlooms crafted of metal and other materials, and digitize photos, emails, films, audio, and video. With warmth and humor, she reveals the methods archivists use to organize a family legacy, from preserving 19th-century daguerreotypes to 2!81-century photos on your cellphone. You'll learn how to store and ensure access to and retrieval of your social media accounts and digital assets, create memory books, audio and video oral histories with family members, and more. Finally, Chadwick teaches you how to prevent damage or loss of family heirlooms from natural disasters, fire, and theft. Your cherished family stories and memories are important and don't have to die when you do. Recording and preserving your family history is not just a gift for your relatives today; it gives future generations the opportunity to connect with the past and gain a deeper understanding of their own sense of self.

  • af Brian J. (Curtin University Evans
    547,95 - 816,95 kr.

  • af Sergey Samoilenko
    547,95 - 1.526,95 kr.

  • af Michael R. (Foley & Lardner LLP Overly
    547,95 kr.

    This book provides business people and lawyers (both in-house and in private practice) with an easily understandable and accessible handbook to quickly grasp the issues and implement solutions with respect to a broad range of technology-related agreements.

  • af Nijaz Bajgoric
    547,95 - 1.099,95 kr.

  • af Shailesh Kumar (Senior Technology Architect Shivakumar
    522,95 - 1.416,95 kr.

  • af Jay Liebowitz
    522,95 kr.

    A recent study found that most business leaders believe in the value of using data and analytics, but say they lack confidence in measures of their effectiveness. In the data analytics community, intuition has been rarely discussed in executive decision-making. The book examines how well do executives trust their intuition.

  • af Jay Liebowitz
    1.403,95 kr.

    A recent study found that most business leaders believe in the value of using data and analytics, but say they lack confidence in measures of their effectiveness. In the data analytics community, intuition has been rarely discussed in executive decision-making. The book examines how well do executives trust their intuition.

  • af Mounir Kehal
    596,95 kr.

    Innovation based in data analytics is a contemporary approach to developing empirically supported advances that encourage entrepreneurial activity inspired by novel marketing inferences. Data Analytics in Marketing, Entrepreneurship, and Innovation covers techniques, processes, models, tools, and practices for creating business opportunities through data analytics. It features case studies that provide realistic examples of applications. This multifaceted examination of data analytics looks at: Business analyticsApplying predictive analytics Using discrete choice analysis for decision-making Marketing and customer analyticsDeveloping new productsTechnopreneurshipDisruptive versus incremental innovationThe book gives researchers and practitioners insight into how data analytics is used in the areas of innovation, entrepreneurship, and marketing. Innovation analytics helps identify opportunities to develop new products and services, and improve existing methods of product manufacturing and service delivery. Entrepreneurial analytics facilitates the transformation of innovative ideas into strategy and helps entrepreneurs make critical decisions based on data-driven techniques. Marketing analytics is used in collecting, managing, assessing, and analyzing marketing data to predict trends, investigate customer preferences, and launch campaigns.

  • af Tiko (Cape Peninsula University of Technology Iyamu
    669,95 - 1.587,95 kr.

  • af Preston (Preston de Guise de Guise
    252,95 - 1.220,95 kr.

  • af Celina Olszak
    914,95 - 916,95 kr.

  • af James (Senior Director Ransome
    522,95 - 730,95 kr.

  • af Ewa Ziemba
    1.832,95 kr.

    This book presents contemporary issues and challenges in finance and risk management in a time of rapid transformation due to technological advancements. It includes research articles based on financial and economic data and intends to cover the emerging role of analytics in financial management, asset management, and risk management.

  • af Nitin Gupta
    337,95 kr.

    The advancement in technology and increasing interest in the various emerging wireless products has lead to the exponential growth in demand of limited spectrum, which is extremely difficult to satisfy through the current fixed spectrum assignment policy. Cognitive radio technology has emerged as a promising solution for the spectrum scarcity problem which enables the access of licensed spectrum band opportunistically. Cognitive radio technique helps in enabling the communication on both licensed and unlicensed channels without interfering with the licensed user. One of the important issues in cognitive radio networks is the channel assignment which is the mapping of available idle licensed channels to the unlicensed users. A dynamic channel assignment is required such that available resources are utilized effectively along with minimizing interference to the licensed user. This thesis focused on some functionalities of cognitive radio networks for the development of efficient channel assignment techniques. Different functions of cognitive radio networks depend upon each other for its effective performance. Therefore, this thesis focused on various cognitive functions like spectrum sensing, spectrum sharing and spectrum handoff to develop channel assignment methods such that the overall network performance is improved. To achieve this objective, the proposed research applied the concept of economics, contract theory, game theory and markov chain to address the various issues of spectrum channel assignment. An effective channel assignment cannot be performed until spectrum sensing is done accurately. Generally, sensing is done individually or cooperatively by the unlicensed users. Further, cooperative sensing improves the sensing reliability other than the sensing performed by any single user. The first contribution of this thesis is the design of incentive mechanism to encourage users for cooperative sensing. As sensing costs energy, the unlicensed users often do not cooperate in sensing to save their respective energies for their own transmission. To address this issue, a contract theory based incentive mechanism has been designed to encourage the unlicensed users to cooperate in the sensing process. Moreover, to reduce the communication overhead incurred in cooperative sensing only a subset of users have been selected that were enoug

  • af Kyle Rankin
    227,95 kr.

    Kyle Rankin wrote a monthly column titled "Hack and /" for Linux Journal magazine for almost 12 years starting in their January 2008 issue until Linux Journal closed for good on August 7, 2019. The column aimed to provide useful tips and tricks on topics ranging from system administration to security to 3D printing to VIM. After he published his final farewell article for Linux Journal, one of the most common questions he got was "what's going to happen to the giant archive of articles?" He realized he had a whole book's worth of material just in sysadmin tips alone.This book doesn't aim to be an exhaustive guide to everything you need to know to be a system administrator. Instead, this book allows Rankin to act as a remote mentor to someone starting out in IT or system administration whether as a full-time job or as a full stack developer. Think of each section in a chapter like sitting down with him over lunch or looking over his shoulder as he shows you a tip to save you time, a tool he found useful, a lesson he learned the hard way, or an explanation of how he'd tackle a project you got assigned.Table of ContentsChapter 1 Sysadmin 101- The Importance of Learning IT Fundamentals- Leveling Up: A Sysadmin Career Path- Automation- Ticketing- Patch Management- Alerting- Preparing for Vacation- Travel Laptops Tips in PracticeChapter 2 Sysadmin's Toolbox- Filesystem Hierarchy Standard- Scheduling One-time Jobs with At- Sort and Uniq- Tracking Bandwidth with Iftop- Right Command, Wrong Server- Chopping Logs- Shorter Commands- Add Progress Bars to dd- Lock Files with the flock CommandChapter 3 Home Servers- Setting Up Your Network- Setting Up A Home DNS Server- A Local Mail Server- Clustering with Raspberry Pis- Home As Your Backup Data CenterChapter 4 Server Projects- Last Minute Secondary Mail Server- Check Exchange from the Command Line- Migrate to a New Hard Drive- Remotely Wipe a Server- Preseeding Full Disk Encryption- Localhost DNS Cache- PXE Magic- More PXE MagicChapter 5 When Disaster Strikes- Stop Killing Your Cattle- Troubleshooting High Load- Troubleshooting the Local Network- Troubleshooting Remote Networks- Troubleshooting with Telnet- Collecting Server Metrics with Sar- Dynamic DNS Disaster- Troubleshoot Full Disks- Hard Drive Crashes- Recover the Master Boot Record- Restoring Deleted FilesAppendices A My Favorite InfrastructureSample Chapter: https://kylerank.in/bohs_lacc_sample_chapter.pdf

  • af Kyle Cucci
    627,95 kr.

    Get up to speed on state-of-the-art malware with this first-ever guide to analyzing malicious Windows software designed to actively avoid detection and forensic tools.Dive into the fascinating and terrifying world of evasive malware—malicious software designed to avoid detection. The first of its kind, this thorough introduction is full of practical information, real-world examples, and cutting-edge techniques for discovering, reverse-engineering, and analyzing state-of-the-art malware. Beginning with foundational knowledge about malware analysis in the context of the Windows OS, you'll learn about the evasive maneuvers that malware programs use to determine whether they’re being analyzed and the tricks they employ to avoid detection. You'll explore the ways malware circumvents security controls, such as network or endpoint defense bypasses, anti-forensics techniques, and malware that deploys data and code obfuscation. At the end of the book, you'll build your very own anti-evasion analysis lab.You’ll learn:Modern evasive malware threatsAnti-analysis techniques used in malwareHow malware bypasses and circumvents security controlsHow malware uses victim targeting and profiling techniquesHow malware uses anti-forensics and file-less techniquesHow to perform malware analysis and reverse engineering on evasive programs

  • af Matt Hand
    547,95 kr.

    "Introduces readers to the most common components of EDR systems, including function hooking, callback notifications, Event Tracing for Windows, and filesystem minifilters, by explaining how they are implemented and how they collect various data points. Covers documented evasion strategies for bypassing detections and describes how defenders might protect themselves"--

  • af Jay Liebowitz
    1.464,95 kr.

    Some of the hottest topics today involve cryptocurrency, and FinTech. With all these trends, businesses need to become better informed. This book provides an easy-to-read, yet comprehensive, view of cryptocurrency in the U.S. and international markets, as well as the key issues, technologies, applications, challenges, and trends.

  • af Jay Liebowitz
    484,95 kr.

    Some of the hottest topics today involve cryptocurrency, and FinTech. With all these trends, businesses need to become better informed. This book provides an easy-to-read, yet comprehensive, view of cryptocurrency in the U.S. and international markets, as well as the key issues, technologies, applications, challenges, and trends.

  • af Suaib Mohammad
    327,95 kr.

    The internet has become an integral component of our daily life. It has led billions of individuals all around the world to participate and collaborate in accessing and sharing information across the world. It is possible only internet that people today can access practically any type of information at any time, from anywhere by just making a search on their internet-devices (such as smartphones, tablets Laptop etc.). They are just a click away from any information which is globally available around them on internet. "Searching is an Art" to make it true "Search Engines" come in a big picture. Search engine plays a vital role particularly exploring information within large and voluminous websites such as E-commerce websites, corporate sites, and social networking sites etc.

  • af Dmitry Vostokov & Software Diagnostics Services
    257,95 - 287,95 kr.

  • - Skills for the Next-Generation Network Engineer
    af Jason Edelman, Scott S. Lowe & Matt Oswalt
    473,95 kr.

    Like sysadmins before them, network engineers are finding that they cannot do their work manually anymore. As the field faces new protocols, technologies, delivery models, and a pressing need for businesses to be more agile and flexible, network automation is becoming essential. This practical guide shows network engineers how to use a range of technologies and toolsincluding Linux, Python, JSON, and XMLto automate their systems through code.Network programming and automation will help you simplify tasks involved in configuring, managing, and operating network equipment, topologies, services, and connectivity. Through the course of the book, youll learn the basic skills and tools you need to make this critical transition.This book covers:Python programming basics: data types, conditionals, loops, functions, classes, and modulesLinux fundamentals to provide the foundation you need on your network automation journeyData formats and models: JSON, XML, YAML, and YANG for networkingJinja templating and its applicability for creating network device configurationsThe role of application programming interfaces (APIs) in network automationSource control with Git to manage code changes during the automation processHow Ansible, Salt, and StackStorm open source automation tools can be used to automate network devicesKey tools and technologies required for a Continuous Integration (CI) pipeline in network operations

  • - Shipping Reliable Containers in Production
    af Karl Matthias & Sean P. Kane
    523,95 kr.

    Updated to cover Docker version 1.10Docker is quickly changing the way that organizations are deploying software at scale. But understanding how Linux containers fit into your workflowand getting the integration details rightare not trivial tasks. With this practical guide, youll learn how to use Docker to package your applications with all of their dependencies, and then test, ship, scale, and support your containers in production.Two Lead Site Reliability Engineers at New Relic share much of what they have learned from using Docker in production since shortly after its initial release. Their goal is to help you reap the benefits of this technology while avoiding the many setbacks they experienced.Learn how Docker simplifies dependency management and deployment workflow for your applicationsStart working with Docker images, containers, and command line toolsUse practical techniques to deploy and test Docker-based Linux containers in productionDebug containers by understanding their composition and internal processesDeploy production containers at scale inside your data center or cloud environmentExplore advanced Docker topics, including deployment tools, networking, orchestration, security, and configuration

  • af Byron DeVries & Paul C. (Grand Valley State University Jorgensen
    487,95 - 914,95 kr.

  • af Julian Ashbourn
    424,95 - 1.220,95 kr.

  •  
    522,95 kr.

    New Work and Industry 4.0 have come to maturity and this book takes a practical, experience-based approach to project management in these areas. It introduces methods and covers practical aspects. It critically examines existing approaches and practices and shows their limitations. The book also covers human and social

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.