Udvidet returret til d. 31. januar 2024

Sikkerhedskopiering og datagendannelse

Her finder du spændende bøger om Sikkerhedskopiering og datagendannelse. Nedenfor er et flot udvalg af over 10 bøger om emnet. Det er også her du finder emner som Backup.
Vis mere
Filter
Filter
Sorter efterSorter Populære
  • af Ian Wild
    387,95 kr.

    Tackle advanced platform security challenges with this practical Moodle guide complete with expert tips and techniquesKey Features:Demonstrate the security of your Moodle architecture for compliance purposesAssess and strengthen the security of your Moodle platform proactivelyExplore Moodle's baked-in security framework and discover ways to enhance it with pluginsPurchase of the print or Kindle book includes a free PDF eBookBook Description:Online learning platforms have revolutionized the teaching landscape, but with this comes the imperative of securing your students' private data in the digital realm. Have you taken every measure to ensure their data's security? Are you aligned with your organization's cybersecurity standards? What about your insurer and your country's data protection regulations?This book offers practical insights through real-world examples to ensure compliance. Equipping you with tools, techniques, and approaches, Moodle 4 Security guides you in mitigating potential threats to your Moodle platform. Dedicated chapters on understanding vulnerabilities familiarize you with the threat landscape so that you can manage your server effectively, keeping bad actors at bay and configuring Moodle for optimal user and data protection.By the end of the book, you'll have gained a comprehensive understanding of Moodle's security issues and how to address them. You'll also be able to demonstrate the safety of your Moodle platform, assuring stakeholders that their data is measurably safer.What You Will Learn:Measure a tutoring company's security risk profile and build a threat modelExplore data regulation frameworks and apply them to your organization's needsImplement the CIS Critical Security Controls effectivelyCreate JMeter test scripts to simulate server load scenariosAnalyze and enhance web server logs to identify rogue agentsInvestigate real-time application DOS protection using ModEvasiveIncorporate ModSecurity and the OWASP Core Rule Set WAF rules into your server defensesBuild custom infrastructure monitoring dashboards with GrafanaWho this book is for:If you're already familiar with Moodle, have experience in Linux systems administration, and want to expand your knowledge of protecting Moodle against data loss and malicious attacks, this book is for you. A basic understanding of user management, software installation and maintenance, Linux security controls, and network configuration will help you get the most out of this book.

  • af David Jambor
    542,95 kr.

    Implement, automate, build, operate, and optimize databases and other data-persistent technologies efficiently by leveraging the right set of DevOps best practicesKey Features:Implement core operational capabilities via automated pipelines, including testing and rollbacksCreate infrastructure, deploy software, test execution, and monitor operations using the as-code strategyAutomate common implementation patterns for databases with declarative orchestration frameworksPurchase of the print or Kindle book includes a free PDF eBookBook Description:In today's rapidly evolving world of DevOps, traditional silos are a thing of the past. Database administrators are no longer the only experts; site reliability engineers (SREs) and DevOps engineers are database experts as well. This blurring of the lines has led to increased responsibilities, making members of high-performing DevOps teams responsible for end-to-end ownership. This book helps you master DevOps for databases, making it a must-have resource for achieving success in the ever-changing world of DevOps.You'll begin by exploring real-world examples of DevOps implementation and its significance in modern data-persistent technologies, before progressing into the various types of database technologies and recognizing their strengths, weaknesses, and commonalities. As you advance, the chapters will teach you about design, implementation, testing, and operations using practical examples, as well as common design patterns, combining them with tooling, technology, and strategies for different types of data-persistent technologies. You'll also learn how to create complex end-to-end implementation, deployment, and cloud infrastructure strategies defined as code.By the end of this book, you'll be equipped with the knowledge and tools to design, build, and operate complex systems efficiently.What You Will Learn:Apply DevOps best practices to data-persistent technologiesGet to grips with architectural-level design and implementationExplore the modern data journey and data modeling with database technologyMaster the operation of large-scale systems with zero-touch automationAchieve speed, resilience, security, and operability at different scalesDesign DevOps teams with end-to-end ownership modelsWho this book is for:This book is for newcomers as well as seasoned SREs, DevOps engineers, and system engineers who are interested in large-scale systems with a heavy focus on data-persistent technologies. Database administrators looking to level up in the world of DevOps will also find this book helpful. Experience with cloud Infrastructure, basic development, and operations will help you get the most out of this book.

  • af Rhonda J Chadwick
    472,95 kr.

    Do you have boxes of old letters, photographs, keepsakes, and family heirlooms that you'd love to save for future generations?Imagine how thrilled your descendants will be a hundred years from now to discover what their ancestors' lives were like and the challenges they overcame during the Depression, the Civil Rights Movement, the Gulf War, September 11, the worldwide pandemic, and other historical events. Today's technology gives you the opportunity to preserve priceless memorabilia and add your story to the mix. Archival best practices are vital to prevent decay and destruction of your family's treasures. In "Secrets from the Stacks," expert archivist Rhonda Chadwick guides you step-by-step on how to organize collections both small and large, properly store and archive photographs, preserve textiles and heirlooms crafted of metal and other materials, and digitize photos, emails, films, audio, and video. With warmth and humor, she reveals the methods archivists use to organize a family legacy, from preserving 19th-century daguerreotypes to 2!81-century photos on your cellphone. You'll learn how to store and ensure access to and retrieval of your social media accounts and digital assets, create memory books, audio and video oral histories with family members, and more. Finally, Chadwick teaches you how to prevent damage or loss of family heirlooms from natural disasters, fire, and theft. Your cherished family stories and memories are important and don't have to die when you do. Recording and preserving your family history is not just a gift for your relatives today; it gives future generations the opportunity to connect with the past and gain a deeper understanding of their own sense of self.

  • af Preston (Preston de Guise de Guise
    302,95 - 1.220,95 kr.

  • af Kyle Rankin
    217,95 kr.

    Kyle Rankin wrote a monthly column titled "Hack and /" for Linux Journal magazine for almost 12 years starting in their January 2008 issue until Linux Journal closed for good on August 7, 2019. The column aimed to provide useful tips and tricks on topics ranging from system administration to security to 3D printing to VIM. After he published his final farewell article for Linux Journal, one of the most common questions he got was "what's going to happen to the giant archive of articles?" He realized he had a whole book's worth of material just in sysadmin tips alone.This book doesn't aim to be an exhaustive guide to everything you need to know to be a system administrator. Instead, this book allows Rankin to act as a remote mentor to someone starting out in IT or system administration whether as a full-time job or as a full stack developer. Think of each section in a chapter like sitting down with him over lunch or looking over his shoulder as he shows you a tip to save you time, a tool he found useful, a lesson he learned the hard way, or an explanation of how he'd tackle a project you got assigned.Table of ContentsChapter 1 Sysadmin 101- The Importance of Learning IT Fundamentals- Leveling Up: A Sysadmin Career Path- Automation- Ticketing- Patch Management- Alerting- Preparing for Vacation- Travel Laptops Tips in PracticeChapter 2 Sysadmin's Toolbox- Filesystem Hierarchy Standard- Scheduling One-time Jobs with At- Sort and Uniq- Tracking Bandwidth with Iftop- Right Command, Wrong Server- Chopping Logs- Shorter Commands- Add Progress Bars to dd- Lock Files with the flock CommandChapter 3 Home Servers- Setting Up Your Network- Setting Up A Home DNS Server- A Local Mail Server- Clustering with Raspberry Pis- Home As Your Backup Data CenterChapter 4 Server Projects- Last Minute Secondary Mail Server- Check Exchange from the Command Line- Migrate to a New Hard Drive- Remotely Wipe a Server- Preseeding Full Disk Encryption- Localhost DNS Cache- PXE Magic- More PXE MagicChapter 5 When Disaster Strikes- Stop Killing Your Cattle- Troubleshooting High Load- Troubleshooting the Local Network- Troubleshooting Remote Networks- Troubleshooting with Telnet- Collecting Server Metrics with Sar- Dynamic DNS Disaster- Troubleshoot Full Disks- Hard Drive Crashes- Recover the Master Boot Record- Restoring Deleted FilesAppendices A My Favorite InfrastructureSample Chapter: https://kylerank.in/bohs_lacc_sample_chapter.pdf

  • af Kyle Cucci
    712,95 kr.

    Dive into the fascinating and terrifying world of evasive malware - malicious software designed to avoid detection. The first of its kind, this thorough introduction is full of practical information, real-world examples, and cutting-edge techniques for discovering, reverse-engineering, and analysing state-of-the-art malware. Beginning with foundational knowledge about malware analysis in the context of the Windows OS, you'll learn about the evasive manoeuvres that malware programs use to determine whether they're being analysed and the tricks they employ to avoid detection. You'll explore the ways malware circumvents security controls, such as network or endpoint defence bypasses, anti-forensics techniques, and malware that deploys data and code obfuscation. At the end of the book, you'll build your very own anti-evasion analysis lab. You'll learn: Modern evasive malware threats, anti-analysis techniques used in malware, how malware bypasses and circumvents security controls, how malware uses victim targeting and profiling techniques, how malware uses anti-forensics and file-less techniques, how to perform malware analysis and reverse engineering on evasive programs.

  • af Matt Hand
    563,95 kr.

    "Introduces readers to the most common components of EDR systems, including function hooking, callback notifications, Event Tracing for Windows, and filesystem minifilters, by explaining how they are implemented and how they collect various data points. Covers documented evasion strategies for bypassing detections and describes how defenders might protect themselves"--

  • af Dmitry Vostokov & Software Diagnostics Services
    277,95 kr.

  • af Frank Rubin
    515,95 kr.

  • af Marianne Bellotti
    185,95 kr.

    The Legacy Apocalypse is upon us and business, community, and political leaders at all levels need this timely and thoughtful book from a superstar in the field. Aging computer systems present complex technical challenges for organizations both large and small, and Kill It with Fire provides sound strategies for spearheading modernization efforts.Kill It with Fire examines aging computer systems, the evolution of technology over time, and how organizations can modernize, maintain, and future-proof their current systems.In playful and engaging prose, Marianne Bellotti uses real-world case studies to illustrate the technical challenges of modernizing complex legacy systems, as well as the organizational challenges of time-intensive maintenance efforts. The book explains how to evaluate existing architecture, create upgrade plans, and handle communication structures. Team exercises and historical analyses of complex computer systems make this a valuable resource for those in both older and newer companies, and will help readers restore or create systems built to evolve as time goes on.

Gør som tusindvis af andre bogelskere

Tilmeld dig nyhedsbrevet og få gode tilbud og inspiration til din næste læsning.