List books in category Computers & Technology / Networking

  • Azure DevOps Server 2019 Cookbook: Proven recipes to accelerate your DevOps journey with Azure DevOps Server 2019 (formerly TFS), 2nd Edition, Edition 2

    Azure DevOps Server 2019 Cookbook: Proven recipes to accelerate your DevOps journey with Azure DevOps Server 2019 (formerly TFS), 2nd Edition, Edition 2
    Tarun Arora

    Over 70 recipes to effectively apply DevOps best practices and implement Agile, Git, CI-CD & Test automation using Azure DevOps Server (TFS) 2019Key FeaturesLearn improving code quality using pull requests, branch policies, githooks and git branching designAccelerate the deployment of high quality software by automating build and releases using CI-CD Pipelines.Learn tried and tested techniques to automate database deployments, App Service & Function Deployments in Azure.Book DescriptionAzure DevOps Server, previously known as Team Foundation Server (TFS), is a comprehensive on-premise DevOps toolset with a rich ecosystem of open source plugins. This book is your one stop guide to learn how to effectively use all of these Azure DevOps services to go from zero to DevOps. You will start by building high-quality scalable software targeting .NET, .NET core or Node.js applications. You will learn techniques that will help you to set up end-to-end traceability of your code changes from design through to release. Whether you are deploying software on-premise or in the cloud in App Service, Functions, or Azure VMs, this book will help you learn release management techniques to reduce release failures. Next, you will be able to secure application configuration by using Azure KeyVault. You will also learn how to create and release extensions to the Azure DevOps marketplace and reach million developer ecosystem for feedback. The working extension samples will allow you to iterate changes in your extensions easily and release updates to the marketplace quickly. By the end of this book, techniques provided in the book will help you break down the invisible silos between your software development teams. This will transform you from being a good software development team to an elite modern cross functional software development team.What you will learnSet up a team project for an Agile delivery team, importing requirements from ExcelPlan,track, and monitor progress using self updating boards, Sprint and Kanban boardsUnlock the features of Git by using branch policies, Git pull requests, forks, and Git hooksBuild and release .NET core, SQL and Node.js applications using Azure PipelineAutomate testing by integrating Microsoft and open source testing frameworksExtend Azure DevOps Server to a million developer ecosystemWho this book is forThis book is for anyone looking to succeed with DevOps. The techniques in this book apply to all roles of the software development lifecycle including developers, testers, architects, configuration analysts, site reliability engineers and release managers. If you are a new user you’ll learn how to get started; if you are an experienced user you’ll learn how to launch your project into a modern and mature DevOps enabled software development team.

  • Modern Cryptography: Applied Mathematics for Encryption and Information Security

    Modern Cryptography: Applied Mathematics for Encryption and Information Security
    Chuck Easttom

    This comprehensive guide to modern data encryption makes cryptography accessible to information security professionals of all skill levels—with no math expertise required Cryptography underpins today’s cyber-security; however, few information security professionals have a solid understanding of these encryption methods due to their complex mathematical makeup. Modern Cryptography: Applied Mathematics for Encryption and Information Security leads readers through all aspects of the field, providing a comprehensive overview of cryptography and practical instruction on the latest encryption methods. The book begins with an overview of the evolution of cryptography and moves on to modern protocols with a discussion of hashes, cryptanalysis, and steganography. From there, seasoned security author Chuck Easttom provides readers with the complete picture—full explanations of real-world applications for cryptography along with detailed implementation instructions. Unlike similar titles on the topic, this reference assumes no mathematical expertise—the reader will be exposed to only the formulas and equations needed to master the art of cryptography. Concisely explains complex formulas and equations and makes the math easy Teaches even the information security novice critical encryption skills Written by a globally-recognized security expert who has taught cryptography to various government and civilian groups and organizations around the world

  • Computer Security Fundamentals: Computer Security Fundame_2, Edition 2

    Computer Security Fundamentals: Computer Security Fundame_2, Edition 2
    William (Chuck) Easttom II

    Welcome to today’s most useful and practical one-volume introduction to computer security. Chuck Easttom brings together up-to-the-minute coverage of all basic concepts, terminology, and issues, along with all the skills you need to get started in the field. Drawing on his extensive experience as a security instructor and consultant, Easttom thoroughly covers core topics, such as vulnerability assessment, virus attacks, hacking, spyware, network defense, passwords, firewalls, VPNs, and intrusion detection. Writing clearly and simply, he fully addresses crucial issues that many introductory security books ignore, from industrial espionage to cyberbullying. Computer Security Fundamentals, Second Edition is packed with tips and examples, all extensively updated for the state-of-the-art in both attacks and defense. Each chapter offers exercises, projects, and review questions designed to deepen your understanding and help you apply all you’ve learned. Whether you’re a student, a system or network administrator, a manager, or a law enforcement professional, this book will help you protect your systems and data and expand your career options. Learn how to Identify the worst threats to your network and assess your risks Get inside the minds of hackers, so you can prevent their attacks Implement a proven layered approach to network security Use basic networking knowledge to improve security Resist the full spectrum of Internet-based scams and frauds Defend against today’s most common Denial of Service (DoS) attacks Prevent attacks by viruses, spyware, and other malware Protect against low-tech social engineering attacks Choose the best encryption methods for your organization Select firewalls and other security technologies Implement security policies that will work in your environment Scan your network for vulnerabilities Evaluate potential security consultants Understand cyberterrorism and information warfare Master basic computer forensics and know what to do after you’re attacked

  • Gray Hat Hacking: The Ethical Hacker s Handbook, Fifth Edition: Edition 5

    Gray Hat Hacking: The Ethical Hacker’s Handbook, Fifth Edition: Edition 5
    Daniel Regalado

    Cutting-edge techniques for finding and fixing critical security flaws Fortify your network and avert digital catastrophe with proven strategies from a team of security experts. Completely updated and featuring 13 new chapters, Gray Hat Hacking, The Ethical Hacker’s Handbook, Fifth Edition explains the enemy’s current weapons, skills, and tactics and offers field-tested remedies, case studies, and ready-to-try testing labs. Find out how hackers gain access, overtake network devices, script and inject malicious code, and plunder Web applications and browsers. Android-based exploits, reverse engineering techniques, and cyber law are thoroughly covered in this state-of-the-art resource. And the new topic of exploiting the Internet of things is introduced in this edition. •Build and launch spoofing exploits with Ettercap •Induce error conditions and crash software using fuzzers •Use advanced reverse engineering to exploit Windows and Linux software •Bypass Windows Access Control and memory protection schemes •Exploit web applications with Padding Oracle Attacks •Learn the use-after-free technique used in recent zero days •Hijack web browsers with advanced XSS attacks •Understand ransomware and how it takes control of your desktop •Dissect Android malware with JEB and DAD decompilers •Find one-day vulnerabilities with binary diffing •Exploit wireless systems with Software Defined Radios (SDR) •Exploit Internet of things devices •Dissect and exploit embedded devices •Understand bug bounty programs •Deploy next-generation honeypots •Dissect ATM malware and analyze common ATM attacks •Learn the business side of ethical hacking

  • Mastering Ansible: Effectively automate configuration management and deployment challenges with Ansible 2.7, 3rd Edition, Edition 3

    Mastering Ansible: Effectively automate configuration management and deployment challenges with Ansible 2.7, 3rd Edition, Edition 3
    James Freeman

    Design, develop, and solve real-world automation and orchestration problems by unlocking the automation capabilities of Ansible.Key FeaturesTackle complex automation challenges with the newly added features in Ansible 2.7Book DescriptionAutomation is essential for success in the modern world of DevOps. Ansible provides a simple, yet powerful, automation engine for tackling complex automation challenges.This book will take you on a journey that will help you exploit the latest version's advanced features to help you increase efficiency and accomplish complex orchestrations. This book will help you understand how Ansible 2.7 works at a fundamental level and will also teach you to leverage its advanced capabilities. Throughout this book, you will learn how to encrypt Ansible content at rest and decrypt data at runtime. Next, this book will act as an ideal resource to help you master the advanced features and capabilities required to tackle complex automation challenges. Later, it will walk you through workflows, use cases, orchestrations, troubleshooting, and Ansible extensions. Lastly, you will examine and debug Ansible operations, helping you to understand and resolve issues.By the end of the book, you will be able to unlock the true power of the Ansible automation engine and tackle complex, real- world actions with ease.What you will learnGain an in-depth understanding of how Ansible works under the hoodFully automate Ansible playbook executions with encrypted dataAccess and manipulate variable data within playbooksUse blocks to perform failure recovery or cleanupExplore the Playbook debugger and the Ansible ConsoleTroubleshoot unexpected behavior effectivelyWork with cloud infrastructure providers and container systemsDevelop custom modules, plugins, and dynamic inventory sourcesWho this book is forThis book is for Ansible developers and operators who have an understanding of its core elements and applications but are now looking to enhance their skills in applying automation using Ansible.

  • Network Security Tools: Writing, Hacking, and Modifying Security Tools

    Network Security Tools: Writing, Hacking, and Modifying Security Tools
    Nitesh Dhanjani

    If you're an advanced security professional, then you know that the battle to protect online privacy continues to rage on. Security chat rooms, especially, are resounding with calls for vendors to take more responsibility to release products that are more secure. In fact, with all the information and code that is passed on a daily basis, it's a fight that may never end. Fortunately, there are a number of open source security tools that give you a leg up in the battle.Often a security tool does exactly what you want, right out of the box. More frequently, you need to customize the tool to fit the needs of your network structure. Network Security Tools shows experienced administrators how to modify, customize, and extend popular open source security tools such as Nikto, Ettercap, and Nessus.This concise, high-end guide discusses the common customizations and extensions for these tools, then shows you how to write even more specialized attack and penetration reviews that are suited to your unique network environment. It also explains how tools like port scanners, packet injectors, network sniffers, and web assessment tools function.Some of the topics covered include:Writing your own network sniffers and packet injection toolsWriting plugins for Nessus, Ettercap, and NiktoDeveloping exploits for MetasploitCode analysis for web applicationsWriting kernel modules for security applications, and understanding rootkitsWhile many books on security are either tediously academic or overly sensational, Network Security Tools takes an even-handed and accessible approach that will let you quickly review the problem and implement new, practical solutions–without reinventing the wheel. In an age when security is critical, Network Security Tools is the resource you want at your side when locking down your network.

  • Enterprise IoT: Strategies and Best Practices for Connected Products and Services

    Enterprise IoT: Strategies and Best Practices for Connected Products and Services
    Dirk Slama

    Current hype aside, the Internet of Things will ultimately become as fundamental as the Internet itself, with lots of opportunities and trials along the way. To help you navigate these choppy waters, this practical guide introduces a dedicated methodology for businesses preparing to transition towards IoT-based business models.With a set of best practices based on case study analysis, expert interviews, and the authors’ own experience, the Ignite | IoT Methodology outlined in this book delivers actionable guidelines to assist you with IoT strategy management and project execution. You’ll also find a detailed case study of a project fully developed with this methodology.This book consists of three parts:Illustrative case studies of selected IoT domains, including smart energy, connected vehicles, manufacturing and supply chain management, and smart citiesThe Ignite | IoT Methodology for defining IoT strategy, preparing your organization for IoT adoption, and planning and executing IoT projectsA detailed case study of the IIC Track & Trace testbed, one of the first projects to be fully developed according to the Ignite | IoT Methodology

  • Mastering Microsoft Azure Infrastructure Services

    Mastering Microsoft Azure Infrastructure Services
    John Savill

    Understand, create, deploy, and maintain a public cloud using Microsoft Azure Mastering Microsoft Azure Infrastructure Services guides you through the process of creating and managing a public cloud and virtual network using Microsoft Azure. With step-by-step instruction and clear explanation, this book equips you with the skills required to provide services both on-premises and off-premises through full virtualization, providing a deeper understanding of Azure's capabilities as an infrastructure service. Each chapter includes online videos that visualize and enhance the concepts presented in the book, and access to a Windows app that provides instant Azure updates and demonstrates the process of going from on-premises to public cloud via Azure. Coverage includes storage customization, connectivity, virtual networks, backing up, hybrid environments, System Center management, and more, giving you everything you need to understand, evaluate, deploy, and maintain environments that utilize Microsoft Azure. Understand cost, options, and applications of Infrastructure as a Service (IaaS) Enable on- and off-premises connectivity to Azure Customize Azure templates and management processes Exploit key technologies and embrace the hybrid environment Mastering Microsoft Azure Infrastructure Services is your total solution.

  • Thinking Security: Stopping Next Year s Hackers

    Thinking Security: Stopping Next Year’s Hackers
    Steven M. Bellovin

    If you’re a security or network professional, you already know the “do’s and don’ts”: run AV software and firewalls, lock down your systems, use encryption, watch network traffic, follow best practices, hire expensive consultants . . . but it isn’t working. You’re at greater risk than ever, and even the world’s most security-focused organizations are being victimized by massive attacks. In Thinking Security, author Steven M. Bellovin provides a new way to think about security. As one of the world’s most respected security experts, Bellovin helps you gain new clarity about what you’re doing and why you’re doing it. He helps you understand security as a systems problem, including the role of the all-important human element, and shows you how to match your countermeasures to actual threats. You’ll learn how to move beyond last year’s checklists at a time when technology is changing so rapidly. You’ll also understand how to design security architectures that don’t just prevent attacks wherever possible, but also deal with the consequences of failures. And, within the context of your coherent architecture, you’ll learn how to decide when to invest in a new security product and when not to. Bellovin, co-author of the best-selling Firewalls and Internet Security, caught his first hackers in 1971. Drawing on his deep experience, he shares actionable, up-to-date guidance on issues ranging from SSO and federated authentication to BYOD, virtualization, and cloud security. Perfect security is impossible. Nevertheless, it’s possible to build and operate security systems far more effectively. Thinking Security will help you do just that.

  • Threat Modeling: Designing for Security

    Threat Modeling: Designing for Security
    Adam Shostack

    The only security book to be chosen as a Dr. Dobbs Jolt Award Finalist since Bruce Schneier's Secrets and Lies and Applied Cryptography!Adam Shostack is responsible for security development lifecycle threat modeling at Microsoft and is one of a handful of threat modeling experts in the world. Now, he is sharing his considerable expertise into this unique book. With pages of specific actionable advice, he details how to build better security into the design of systems, software, or services from the outset. You'll explore various threat modeling approaches, find out how to test your designs against threats, and learn effective ways to address threats that have been validated at Microsoft and other top companies. Systems security managers, you'll find tools and a framework for structured thinking about what can go wrong. Software developers, you'll appreciate the jargon-free and accessible introduction to this essential skill. Security professionals, you'll learn to discern changing threats and discover the easiest ways to adopt a structured approach to threat modeling. Provides a unique how-to for security and software developers who need to design secure products and systems and test their designs Explains how to threat model and explores various threat modeling approaches, such as asset-centric, attacker-centric and software-centric Provides effective approaches and techniques that have been proven at Microsoft and elsewhere Offers actionable how-to advice not tied to any specific software, operating system, or programming language Authored by a Microsoft professional who is one of the most prominent threat modeling experts in the world As more software is delivered on the Internet or operates on Internet-connected devices, the design of secure software is absolutely critical. Make sure you're ready with Threat Modeling: Designing for Security.

  • The Art of Deception: Controlling the Human Element of Security

    The Art of Deception: Controlling the Human Element of Security
    Kevin D. Mitnick

    The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films, and documentaries. Since his release from federal prison, in 1998, Mitnick has turned his life around and established himself as one of the most sought-after computer security experts worldwide. Now, in The Art of Deception, the world's most notorious hacker gives new meaning to the old adage, "It takes a thief to catch a thief." Focusing on the human factors involved with information security, Mitnick explains why all the firewalls and encryption protocols in the world will never be enough to stop a savvy grifter intent on rifling a corporate database or an irate employee determined to crash a system. With the help of many fascinating true stories of successful attacks on business and government, he illustrates just how susceptible even the most locked-down information systems are to a slick con artist impersonating an IRS agent. Narrating from the points of view of both the attacker and the victims, he explains why each attack was so successful and how it could have been prevented in an engaging and highly readable style reminiscent of a true-crime novel. And, perhaps most importantly, Mitnick offers advice for preventing these types of social engineering hacks through security protocols, training programs, and manuals that address the human element of security.

  • CCNA Collaboration CICD 210-060 Official Cert Guide: CCNA Coll CICD 210 OCG_c1

    CCNA Collaboration CICD 210-060 Official Cert Guide: CCNA Coll CICD 210 OCG_c1
    Michael H. Valentine

    CCNA Collaboration CICD 210-060 Official Cert Guide from Cisco Press enables you to succeed on the exam the first time and is the only self-study resource approved by Cisco. Long-time Cisco expert and trainer Michael Valentine shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. This is the eBook edition of the CCNA Collaboration CIVND 210-065 Official Cert Guide. This eBook does not include the companion CD-ROM with practice exam that comes with the print edition. This complete, official study package includes A test-preparation routine proven to help you pass the exam “Do I Know This Already?” quizzes, which enable you to decide how much time you need to spend on each section Chapter-ending exercises, which help you drill on key concepts you must know thoroughly A final preparation chapter that guides you through tools and resources to help you craft your review and test-taking strategies Study plan suggestions and templates to help you organize and optimize your study time Well regarded for its level of detail, study plans, assessment features, challenging review questions and exercises, this official study guide helps you master the concepts and techniques that ensure your exam success. CCNA Collaboration CICD 210-060 Official Cert Guide is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit www.cisco.com. Michael Valentine, CCNA, CCNP, CCDP, CCVP, CCSI No. 31461, has worked in IT since 1996, and as a trainer since 2001. He is currently a Cisco trainer with Skyline Advanced Technology Services, specializing in Cisco Unified Communications and CCNA. His accessible, humorous, and effective teaching style has demystified Cisco technology for thousands of students. He has developed courseware and labs for both Cisco and its training partners, is co-author of CCNA Exam Cram (Exam 640-802), Third Edition, and is the author of CCNA Voice Quick Reference Guide. The official study guide helps you master topics on the CCNA Collaboration CICD 210-060 exam, including the following: Cisco Unified Communications components Cisco Unified Communications Manager Express administration, end user management, dial plans, and telephony features Cisco Unified Communications Manager administration, end point management, dial plan elements and interactions, and telephony and mobility features Cisco Unity Connection voicemail CM IM and Presence support CME and CUCM management and troubleshooting Monitoring Cisco Unity Connection

  • Network Warrior: Everything You Need to Know That Wasn t on the CCNA Exam, Edition 2

    Network Warrior: Everything You Need to Know That Wasn’t on the CCNA Exam, Edition 2
    Gary A. Donahue

    Pick up where certification exams leave off. With this practical, in-depth guide to the entire network infrastructure, you’ll learn how to deal with real Cisco networks, rather than the hypothetical situations presented on exams like the CCNA. Network Warrior takes you step by step through the world of routers, switches, firewalls, and other technologies based on the author's extensive field experience. You'll find new content for MPLS, IPv6, VoIP, and wireless in this completely revised second edition, along with examples of Cisco Nexus 5000 and 7000 switches throughout.Topics include:An in-depth view of routers and routingSwitching, using Cisco Catalyst and Nexus switches as examplesSOHO VoIP and SOHO wireless access point design and configurationIntroduction to IPv6 with configuration examplesTelecom technologies in the data-networking world, including T1, DS3, frame relay, and MPLSSecurity, firewall theory, and configuration, as well as ACL and authenticationQuality of Service (QoS), with an emphasis on low-latency queuing (LLQ)IP address allocation, Network Time Protocol (NTP), and device failures

  • A Research Primer for Technical Communication: Methods, Exemplars, and Analyses

    A Research Primer for Technical Communication: Methods, Exemplars, and Analyses
    Michael A. Hughes

    This practical volume provides a thorough introduction to conducting and critically reading research in technical communication, complete with exemplars of research articles for study. Offering a solid grounding in the research underpinnings of the technical communication field, this resource has been developed for use in master’s level and upper-division undergraduate research methods courses in technical and professional communication.

  • Incident Response & Computer Forensics, Third Edition: Edition 3

    Incident Response & Computer Forensics, Third Edition: Edition 3
    Jason T. Luttgens

    The definitive guide to incident response–updated for the first time in a decade! Thoroughly revised to cover the latest and most effective tools and techniques, Incident Response & Computer Forensics, Third Edition arms you with the information you need to get your organization out of trouble when data breaches occur. This practical resource covers the entire lifecycle of incident response, including preparation, data collection, data analysis, and remediation. Real-world case studies reveal the methods behind–and remediation strategies for–today's most insidious attacks. Architect an infrastructure that allows for methodical investigation and remediation Develop leads, identify indicators of compromise, and determine incident scope Collect and preserve live data Perform forensic duplication Analyze data from networks, enterprise services, and applications Investigate Windows and Mac OS X systems Perform malware triage Write detailed incident response reports Create and implement comprehensive remediation plans

  • Hacking For Dummies: Edition 5

    Hacking For Dummies: Edition 5
    Kevin Beaver

    Learn to hack your own system to protect against malicious attacks from outside Is hacking something left up to the bad guys? Certainly not! Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your system to better protect your network against malicious attacks. This revised text helps you recognize any vulnerabilities that are lurking in your system, allowing you to fix them before someone else finds them. Penetration testing, vulnerability assessments, security best practices, and other aspects of ethical hacking are covered in this book, including Windows 10 hacks, Linux hacks, web application hacks, database hacks, VoIP hacks, and mobile computing hacks. Additionally, you have access to free testing tools and an appendix detailing valuable tools and resources. Ethical hacking entails thinking like the bad guys to identify any vulnerabilities that they might find in your system—and fixing them before they do. Also called penetration testing, ethical hacking is essential to keeping your system, and all of its data, secure. Understanding how to perform effective ethical hacking can improve the safety of your network. Defend your system—and all of the data it holds—against the latest Windows 10 and Linux hacks Develop an effective ethical hacking plan that keeps your system safe Protect your web applications, databases, laptops, and smartphones by going beyond simple hacking strategies Leverage the latest testing tools and techniques when using ethical hacking to keep your system secure Hacking For Dummies, 5th Edition is a fully updated resource that guides you in hacking your own system to protect it—and it will become your go-to reference when ethical hacking is on your to-do list.

  • Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security

    Understanding the Digital World: What You Need to Know about Computers, the Internet, Privacy, and Security
    Brian W. Kernighan

    The basics of how computer hardware, software, and systems work, and the risks they create for our privacy and securityComputers are everywhere. Some of them are highly visible, in laptops, tablets, cell phones, and smart watches. But most are invisible, like those in appliances, cars, medical equipment, transportation systems, power grids, and weapons. We never see the myriad computers that quietly collect, share, and sometimes leak vast amounts of personal data about us. Through computers, governments and companies increasingly monitor what we do. Social networks and advertisers know far more about us than we should be comfortable with, using information we freely give them. Criminals have all-too-easy access to our data. Do we truly understand the power of computers in our world?Understanding the Digital World explains how computer hardware, software, networks, and systems work. Topics include how computers are built and how they compute; what programming is and why it is difficult; how the Internet and the web operate; and how all of these affect our security, privacy, property, and other important social, political, and economic issues. This book also touches on fundamental ideas from computer science and some of the inherent limitations of computers. It includes numerous color illustrations, notes on sources for further exploration, and a glossary to explain technical terms and buzzwords.Understanding the Digital World is a must-read for all who want to know more about computers and communications. It explains, precisely and carefully, not only how they operate but also how they influence our daily lives, in terms anyone can understand, no matter what their experience and knowledge of technology.

  • The Web Application Hacker s Handbook: Finding and Exploiting Security Flaws, Edition 2

    The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws, Edition 2
    Dafydd Stuttard

    The highly successful security book returns with a new edition, completely updated Web applications are the front door to most organizations, exposing them to attacks that may disclose personal information, execute fraudulent transactions, or compromise ordinary users. This practical book has been completely updated and revised to discuss the latest step-by-step techniques for attacking and defending the range of ever-evolving web applications. You'll explore the various new technologies employed in web applications that have appeared since the first edition and review the new attack techniques that have been developed, particularly in relation to the client side. Reveals how to overcome the new technologies and techniques aimed at defending web applications against attacks that have appeared since the previous edition Discusses new remoting frameworks, HTML5, cross-domain integration techniques, UI redress, framebusting, HTTP parameter pollution, hybrid file attacks, and more Features a companion web site hosted by the authors that allows readers to try out the attacks described, gives answers to the questions that are posed at the end of each chapter, and provides a summarized methodology and checklist of tasks Focusing on the areas of web application security where things have changed in recent years, this book is the most current resource on the critical topic of discovering, exploiting, and preventing web application security flaws.Also available as a set with, CEHv8: Certified Hacker Version 8 Study Guide, Ethical Hacking and Web Hacking Set, 9781119072171.

  • Mastering Docker Enterprise: A companion guide for agile container adoption

    Mastering Docker Enterprise: A companion guide for agile container adoption
    Mark Panthofer

    A journey toward containerized applications in production with a cloud-portable, secure, robust and highly available Docker Enterprise platform.Key FeaturesGet an insider’s view into the container movement and Docker EnterpriseManage the transformation associated with enterprise container adoptionWalk through the enterprise container adoption journeyBook DescriptionWhile known mostly as the open source engine behind tens of millions of server nodes, Docker also offers commercially supported enterprise tooling known as the Docker Enterprise. This platform leverages the deep roots from Docker Engine – Community (formerly Docker CE) and Kubernetes, but adds support and tooling to efficiently operate a secure container platform at scale. With hundreds of enterprises on board, best practices and adoption patterns are emerging rapidly. These learning points can be used to inform adopters and help manage the enterprise transformation associated with enterprise container adoption. This book starts by explaining the case for Docker Enterprise, as well as its structure and reference architecture. From there, we progress through the PoC,pilot and production stages as a working model for adoption, evolving the platform’s design and configuration for each stage and using detailed application examples along the way to clarify and demonstrate important concepts.The book concludes with Docker’s impact on other emerging software technologies, such as Blockchain and Serverless computing.By the end of this book, you’ll have a better understanding of what it takes to get your enterprise up and running with Docker Enterprise and beyond.What you will learnUnderstand why containers are important to an enterpriseUnderstand the features and components of Docker Enterprise 2Find out about the PoC, pilot, and production adoption phasesGet to know the best practices for installing and operating Docker EnterpriseUnderstand what is important for a Docker Enterprise in productionRun Kubernetes on Docker EnterpriseWho this book is forThis book is for Software Architects, DevOps Engineers, Tech Ops, Docker professionals, or any IT professional working with Docker and containers who wants to move containerized workloads to production. This book discusses the enterprise adoption of Docker and Kubernetes,therefore a basic understanding of Docker concepts will be helpful.

  • Implementing SSL / TLS Using Cryptography and PKI

    Implementing SSL / TLS Using Cryptography and PKI
    Joshua Davies

    Hands-on, practical guide to implementing SSL and TLS protocols for Internet security If you are a network professional who knows C programming, this practical book is for you. Focused on how to implement Secure Socket Layer (SSL) and Transport Layer Security (TLS), this book guides you through all necessary steps, whether or not you have a working knowledge of cryptography. The book covers SSLv2, TLS 1.0, and TLS 1.2, including implementations of the relevant cryptographic protocols, secure hashing, certificate parsing, certificate generation, and more. Coverage includes: Understanding Internet Security Protecting against Eavesdroppers with Symmetric Cryptography Secure Key Exchange over an Insecure Medium with Public Key Cryptography Authenticating Communications Using Digital Signatures Creating a Network of Trust Using X.509 Certificates A Usable, Secure Communications Protocol: Client-Side TLS Adding Server-Side TLS 1.0 Support Advanced SSL Topics Adding TLS 1.2 Support to Your TLS Library Other Applications of SSL A Binary Representation of Integers: A Primer Installing TCPDump and OpenSSL Understanding the Pitfalls of SSLv2 Set up and launch a working implementation of SSL with this practical guide.

  • Advanced Penetration Testing: Hacking the World s Most Secure Networks

    Advanced Penetration Testing: Hacking the World’s Most Secure Networks
    Wil Allsopp

    Build a better defense against motivated, organized, professional attacks Advanced Penetration Testing: Hacking the World's Most Secure Networks takes hacking far beyond Kali linux and Metasploit to provide a more complex attack simulation. Featuring techniques not taught in any certification prep or covered by common defensive scanners, this book integrates social engineering, programming, and vulnerability exploits into a multidisciplinary approach for targeting and compromising high security environments. From discovering and creating attack vectors, and moving unseen through a target enterprise, to establishing command and exfiltrating data—even from organizations without a direct Internet connection—this guide contains the crucial techniques that provide a more accurate picture of your system's defense. Custom coding examples use VBA, Windows Scripting Host, C, Java, JavaScript, Flash, and more, with coverage of standard library applications and the use of scanning tools to bypass common defensive measures. Typical penetration testing consists of low-level hackers attacking a system with a list of known vulnerabilities, and defenders preventing those hacks using an equally well-known list of defensive scans. The professional hackers and nation states on the forefront of today's threats operate at a much more complex level—and this book shows you how to defend your high security network. Use targeted social engineering pretexts to create the initial compromise Leave a command and control structure in place for long-term access Escalate privilege and breach networks, operating systems, and trust structures Infiltrate further using harvested credentials while expanding control Today's threats are organized, professionally-run, and very much for-profit. Financial institutions, health care organizations, law enforcement, government agencies, and other high-value targets need to harden their IT infrastructure and human capital against targeted advanced attacks from motivated professionals. Advanced Penetration Testing goes beyond Kali linux and Metasploit and to provide you advanced pen testing for high security networks.

  • Mastering Python Networking

    Mastering Python Networking
    Eric Chou

    Become an expert in implementing advanced, network-related tasks with Python.About This BookBuild the skills to perform all networking tasks using Python with easeUse Python for network device automation, DevOps, and software-defined networkingGet practical guidance to networking with PythonWho This Book Is ForIf you are a network engineer or a programmer who wants to use Python for networking, then this book is for you. A basic familiarity with networking-related concepts such as TCP/IP and a familiarity with Python programming will be useful.What You Will LearnReview all the fundamentals of Python and the TCP/IP suiteUse Python to execute commands when the device does not support the API or programmatic interaction with the deviceImplement automation techniques by integrating Python with Cisco, Juniper, and Arista eAPIIntegrate Ansible using Python to control Cisco, Juniper, and Arista networksAchieve network security with PythonBuild Flask-based web-service APIs with PythonConstruct a Python-based migration plan from a legacy to scalable SDN-based network.In DetailThis book begins with a review of the TCP/ IP protocol suite and a refresher of the core elements of the Python language. Next, you will start using Python and supported libraries to automate network tasks from the current major network vendors. We will look at automating traditional network devices based on the command-line interface, as well as newer devices with API support, with hands-on labs. We will then learn the concepts and practical use cases of the Ansible framework in order to achieve your network goals.We will then move on to using Python for DevOps, starting with using open source tools to test, secure, and analyze your network. Then, we will focus on network monitoring and visualization. We will learn how to retrieve network information using a polling mechanism, ?ow-based monitoring, and visualizing the data programmatically. Next, we will learn how to use the Python framework to build your own customized network web services.In the last module, you will use Python for SDN, where you will use a Python-based controller with OpenFlow in a hands-on lab to learn its concepts and applications. We will compare and contrast OpenFlow, OpenStack, OpenDaylight, and NFV. Finally, you will use everything you've learned in the book to construct a migration plan to go from a legacy to a scalable SDN-based network.Style and approachAn easy-to-follow guide packed with hands-on examples of using Python for network device automation, DevOps, and SDN.

  • Find Your Passion: 17 Simple Questions You Must Ask Yourself

    Find Your Passion: 17 Simple Questions You Must Ask Yourself
    Evan Scott

    If somebody were to ask you right now, what is your passion? What's your reply? How confident are you?Imagine what life would be like if you woke up every single day and do what you believe is what you are born to do? How much more lively, spirited and refreshed would you be every single day? All of these boils down to one powerful factor… PASSION.Have you ever found yourself buying things you don't really like to impress people you don't even give a f*** about? Why? Why is it that we do pointless and meaningless things? Why do we sometimes indulge in "killing time"… and even when we are doing so, find ourselves bored, exhausted and unhappy?Find Your Passion is a deep look into what causes people to "ignite". It is the single pivotal factor that makes an outstanding player shine from the crowd. Finding your passion is the moment in your life where everything changes. As the bible says, "without a vision, people perish". How could one have a vision when one does not know him/herself?"Passion is energy. Feel the power from focusing on what excites you." – Oprah WinfreyDoes something, sometimes feels off? Like… something is lacking… or something is not good enough… even though nothing seems to be going wrong? Have you ever felt this way before? Have you ever found yourself sitting down, staring into blank space, thinking and then forgot what you were think about? And yet, that feeling felt invincible… it felt powerful and it felt… peaceful yet passionate…If there's one thing that successful people have in common, it's passion. Passion creates world-leading businesses and is a great inspiration to others. Passion is inside each and everyone of us. The best time to plant a tree was 20 years ago. The second best time is NOW. It is time to find out what truly ignites that dormant fire inside of you and take back control.Scroll Up Now To Get ::::: Find Your Passion: 17 Simple Questions You Must Ask YourselfIn Find Your Passion you will discover:How to dive past all the noise and truly find out what your passion and purpose are with powerful questions.How to find out more about yourself because this is where everything begins to click.How to tap on the infinite intelligence and wisdom that is sleeping inside each and every single one of us.How to use negativity to greatly increase the positivity of your life.How to not only find your passion but strengthen and clarify it.And much more…Jim Rohn, the original teacher of Tony Robbins once said: "Never wish life were easier, wish that you were better." Are you ready to not only complain about things, but actually uncover the truths behind your passion?What you could only dream of, someone else have already done it. It is possible and finding your passion is possible if you have the right blueprint to guide you.Start Finding Your Passion Now by Clicking the "BUY NOW" Button at the Top of the Page.

  • Designing for Cisco Network Service Architectures (ARCH) Foundation Learning Guide: CCDP ARCH 300-320, Edition 4

    Designing for Cisco Network Service Architectures (ARCH) Foundation Learning Guide: CCDP ARCH 300-320, Edition 4
    Marwan Al-shawi

    Designing for Cisco Network Service Architectures (ARCH) Foundation Learning Guide, Fourth Edition · Learn about the Cisco modular enterprise architecture · Create highly available enterprise network designs · Develop optimum Layer 3 designs · Examine advanced WAN services design considerations · Evaluate data center design considerations · Design effective modern WAN and data center designs · Develop effective migration approaches to IPv6 · Design resilient IP multicast networks · Create effective network security designs Designing for Cisco Network Service Architectures (ARCH) Foundation Learning Guide , Fourth Edition, is a Cisco-authorized, self-paced learning tool for CCDP foundation learning. This book provides you with the knowledge needed to perform the conceptual, intermediate, and detailed design of a network infrastructure that supports desired network solutions over intelligent network services to achieve effective performance, scalability, and availability. This book presents concepts and examples necessary to design converged enterprise networks. You learn additional aspects of modular campus design, advanced routing designs, WAN service designs, enterprise data center design, IP multicast design, and security design. Advanced and modern network infrastructure solutions, such as virtual private networks (VPN), Cisco Intelligent WAN (IWAN), and Cisco Application-Centric Infrastructure (ACI), are also covered. Chapter-ending review questions illustrate and help solidify the concepts presented in the book. Whether you are preparing for CCDP certification or CCDE certification, or simply want to gain a better understanding of designing scalable and reliable network architectures, you will benefit from the foundation information presented in this book. Designing for Cisco Network Service Architectures (ARCH) Foundation Learning Guide, Fourth Edition, is part of a recommended learning path from Cisco that includes simulation and hands-on training from authorized Cisco Learning Partners and self-study products from Cisco Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered by authorized Cisco Learning Partners worldwide, please visit https://learningnetwork.cisco.com. Category: Cisco Certification Covers: CCDP ARCH 300-320

  • Practical Load Balancing: Ride the Performance Tiger

    Practical Load Balancing: Ride the Performance Tiger
    Peter Membrey

    The emergence of the cloud and modern, fast corporate networks demands that you perform judicious balancing of computational loads. Practical Load Balancing presents an entire analytical framework to increase performance not just of one machine, but of your entire infrastructure. Practical Load Balancing starts by introducing key concepts and the tools you'll need to tackle your load-balancing issues. You'll travel through the IP layers and learn how they can create increased network traffic for you. You'll see how to account for persistence and state, and how you can judge the performance of scheduling algorithms. You'll then learn how to avoid performance degradation and any risk of the sudden disappearance of a service on a server. If you're concerned with running your load balancer for an entire network, you'll find out how to set up your network topography, and condense each topographical variety into recipes that will serve you in different situations. You'll also learn about individual servers, and load balancers that can perform cookie insertion or improve your SSL throughput. You'll also explore load balancing in the modern context of the cloud. While load balancers need to be configured for high availability once the conditions on the network have been created, modern load balancing has found its way into the cloud, where good balancing is vital for the very functioning of the cloud, and where IPv6 is becoming ever more important. You can read Practical Load Balancing from end to end or out of sequence, and indeed, if there are individual topics that interest you, you can pick up this book and work through it once you have read the first three chapters.

  • Guide to Wireless Communications: Edition 4

    Guide to Wireless Communications: Edition 4
    Jorge Olenewa

    Readers learn about the most popular wireless data communications technologies in use today as GUIDE TO WIRELESS COMMUNICATIONS, 4Ed examines Bluetooth, ZigBee, Wi-Fi, cellular and satellite communications while providing a broad industry perspective. Readers develop a solid base of knowledge in Wireless Personal Area Networks (WPANs), Wireless Local Area Networks (WLANs), Wireless Metropolitan Area Networks (WMANs), and Wireless Wide Area Networks (WWANs) to better understand the most popular wireless communications available today. This book’s comprehensive approach to wireless communication technology provides the solid background readers need to prepare for a future career in today’s information and communications technology field.Important Notice: Media content referenced within the product description or the product text may not be available in the ebook version.

  • Getting Started with Arduino

    Getting Started with Arduino
    Massimo Banzi

    This valuable little book offers a thorough introduction to the open-source electronics prototyping platform that's taking the design and hobbyist world by storm. Getting Started with Arduino gives you lots of ideas for Arduino projects and helps you get going on them right away. From getting organized to putting the final touches on your prototype, all the information you need is right in the book. Inside, you'll learn about:Interaction design and physical computingThe Arduino hardware and software development environmentBasics of electricity and electronicsPrototyping on a solderless breadboardDrawing a schematic diagramAnd more. With inexpensive hardware and open-source software components that you can download free, getting started with Arduino is a snap. To use the introductory examples in this book, all you need is a USB Arduino, USB A-B cable, and an LED.Join the tens of thousands of hobbyists who have discovered this incredible (and educational) platform. Written by the co-founder of the Arduino project, with illustrations by Elisa Canducci, Getting Started with Arduino gets you in on the fun! This 128-page book is a greatly expanded follow-up to the author's original short PDF that's available on the Arduino website.

  • Arista Warrior: Arista Products with a Focus on EOS, Edition 2

    Arista Warrior: Arista Products with a Focus on EOS, Edition 2
    Gary A. Donahue

    Arista Networks has become a key player when it comes to software-driven cloud networking solutions for large data center storage and computing environments. In this updated edition of Arista Warrior, renowned consultant and technical author Gary Donahue Network Arista Networks has become a key player when it comes to software-driven cloud networking solutions for large data center, storage, and computing environments, and with their continued expansion and growth since the first edition was released, this book is a welcome update. In this updated edition of Arista Warrior, renowned trainer, consultant, and technical author Gary A. Donahue (Network Warrior) provides an in-depth, objective guide to Arista’s products explains why its network switches, software products, and Extensible Operating System (EOS) are so effective.Anyone with a CCNA or equivalent knowledge will benefit from this book, especially entrenched administrators, engineers, or architects tasked with building an Arista network. Is Arista right for your network? Pick up this in-depth guide and find out.In addition to the topics covered in the first edition, this book also includes:Configuration Management: Config sessions, config replace, etc.CloudVision: Arista’s management, workload orchestration, workflow automation, configuration, and telemetry toolVXLAN: Layer-2 overlay networkingFlexRoute: Two million routes in hardwareTap Aggregation: Make your switch or blade into a Tap Aggregation deviceAdvanced Mirroring: Mirror to a port-channel or even the CPUNetwork Design: A quick overview of the Arista recommended network designsvEOS: Arista’s Extensible Operating System in a VM with step-by-step instructionscEOS: Arista’s EOS in a container with exampleseAPI: Arista’s fabulous extended Application Programmable Interface

  • SSH, The Secure Shell: The Definitive Guide: The Definitive Guide, Edition 2

    SSH, The Secure Shell: The Definitive Guide: The Definitive Guide, Edition 2
    Daniel J. Barrett

    Are you serious about network security? Then check out SSH, the Secure Shell, which provides key-based authentication and transparent encryption for your network connections. It's reliable, robust, and reasonably easy to use, and both free and commercial implementations are widely available for most operating systems. While it doesn't solve every privacy and security problem, SSH eliminates several of them very effectively.Everything you want to know about SSH is in our second edition of SSH, The Secure Shell: The Definitive Guide. This updated book thoroughly covers the latest SSH-2 protocol for system administrators and end users interested in using this increasingly popular TCP/IP-based solution.How does it work? Whenever data is sent to the network, SSH automatically encrypts it. When data reaches its intended recipient, SSH decrypts it. The result is "transparent" encryption-users can work normally, unaware that their communications are already encrypted. SSH supports secure file transfer between computers, secure remote logins, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. With SSH, users can freely navigate the Internet, and system administrators can secure their networks or perform remote administration.Written for a wide, technical audience, SSH, The Secure Shell: The Definitive Guide covers several implementations of SSH for different operating systems and computing environments. Whether you're an individual running Linux machines at home, a corporate network administrator with thousands of users, or a PC/Mac owner who just wants a secure way to telnet or transfer files between machines, our indispensable guide has you covered. It starts with simple installation and use of SSH, and works its way to in-depth case studies on large, sensitive computer networks.No matter where or how you're shipping information, SSH, The Secure Shell: The Definitive Guide will show you how to do it securely.

  • Cisco Networking All-in-One For Dummies

    Cisco Networking All-in-One For Dummies
    Edward Tetz

    A helpful guide on all things Cisco Do you wish that the complex topics of routers, switches, and networking could be presented in a simple, understandable presentation? With Cisco Networking All-in-One For Dummies, they are! This expansive reference is packed with all the information you need to learn to use Cisco routers and switches to develop and manage secure Cisco networks. This straightforward-by-fun guide offers expansive coverage of Cisco and breaks down intricate subjects such as networking, virtualization, and database technologies into easily digestible pieces. Drills down complex subjects concerning Cisco networking into easy-to-understand, straightforward coverage Shares best practices for utilizing Cisco switches and routers to implement, secure, and optimize Cisco networks Reviews Cisco networking solutions and products, securing Cisco networks, and optimizing Cisco networks Details how to design and implement Cisco networks Whether you're new to Cisco networking products and services or an experienced professional looking to refresh your knowledge about Cisco, this For Dummies guide provides you with the coverage, solutions, and best practices you need.

  • Framework Design Guidelines: Conventions, Idioms, and Patterns for Reusable .NET Libraries, Edition 2

    Framework Design Guidelines: Conventions, Idioms, and Patterns for Reusable .NET Libraries, Edition 2
    Krzysztof Cwalina

    This is the eBook version of the print title, Framework Design Guidelines, Second Edition . Access to all the samples, applications, and content on the DVD is available through the product catalog page www.informit.com/title/9780321545619 Navigate to the “Downloads” tab and click on the “DVD Contents” links – see instructions in back pages of your eBook. Framework Design Guidelines, Second Edition, teaches developers the best practices for designing reusable libraries for the Microsoft .NET Framework. Expanded and updated for .NET 3.5, this new edition focuses on the design issues that directly affect the programmability of a class library, specifically its publicly accessible APIs. This book can improve the work of any .NET developer producing code that other developers will use. It includes copious annotations to the guidelines by thirty-five prominent architects and practitioners of the .NET Framework, providing a lively discussion of the reasons for the guidelines as well as examples of when to break those guidelines. Microsoft architects Krzysztof Cwalina and Brad Abrams teach framework design from the top down. From their significant combined experience and deep insight, you will learn The general philosophy and fundamental principles of framework design Naming guidelines for the various parts of a framework Guidelines for the design and extending of types and members of types Issues affecting–and guidelines for ensuring–extensibility How (and how not) to design exceptions Guidelines for–and examples of–common framework design patterns Guidelines in this book are presented in four major forms: Do, Consider, Avoid, and Do not. These directives help focus attention on practices that should always be used, those that should generally be used, those that should rarely be used, and those that should never be used. Every guideline includes a discussion of its applicability, and most include a code example to help illuminate the dialogue. Framework Design Guidelines, Second Edition, is the only definitive source of best practices for managed code API development, direct from the architects themselves. A companion DVD includes the Designing .NET Class Libraries video series, instructional presentations by the authors on design guidelines for developing classes and components that extend the .NET Framework. A sample API specification and other useful resources and tools are also included.

  • Wireless Communication in Underground Mines: RFID-based Sensor Networking

    Wireless Communication in Underground Mines: RFID-based Sensor Networking
    L. K. Bandyopadhyay

    Wireless communication has emerged as an independent discipline in the past decades. Everything from cellular voice telephony to wireless data transmission using wireless sensor networks has profoundly impacted the safety, production, and productivity of industries and our lifestyle as well. After a decade of exponential growth, the wireless industry is one of the largest industries in the world. Therefore, it would be an injustice if the wireless communication is not explored for mining industry. Underground mines, which are characterized by their tough working conditions and hazardous environments, require fool-proof mine-wide communication systems for smooth functioning of mine workings and ensuring better safety. Proper and re- able communication systems not only save the machine breakdown time but also help in immediate passing of messages from the vicinity of underground working area to the surface for day-to-day normal mining operations as well as for speedy rescue operations in case of disaster. Therefore, a reliable and effective commu- cation system is an essential requisite for safe working, and maintaining requisite production and productivity of underground mines. Most of the existing systems generally available in underground mines are based on line (wired) communication principle, hence these are unable to withstand in the disaster conditions and dif?cult to deploy in inaccessible places. Therefore, wireless communication is an indispe- able, reliable, and convenient system and essential in case of day-to-day normal duty or disaster situations.

  • Networking All-in-One For Dummies: Edition 4

    Networking All-in-One For Dummies: Edition 4
    Doug Lowe

    The ultimate reference guide for network administrators Network administrators now have a single, convenient place to turn for all the information they need. Networking All-in-One For Dummies, 4th Edition is like ten books in one, covering such topics as networking basics, network security, setting up TCP/IP and connecting to the Internet, handling mobile devices, and much more. This valuable book covers all the newest updates and trends, including Windows 7 and Windows Server 2008 R2. A single-source reference for network administrators Includes ten minibooks: Networking Basics; Building a Network; Network Administration and Security; TCP/IP and the Internet; Wireless Networking; Telecom, Convergence, and Mobile Devices; Windows Server 2008 Reference; Using Other Windows Servers; Linux Networking Reference; and Appendices Explores the latest technologies in broadband, storage, and back-up Delves into new trends in networking and includes the latest Windows Server 2008 R2 and Windows 7 updates System administrators will want to keep this practical all-in-one guide within reach.

  • SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol

    SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol
    Syed A. Ahson

    Widely adopted by service providers to enable IP telephony, instant messaging, and other data services, SIP is the signaling protocol of choice for advanced multimedia communications signaling. Compiled by noted engineering experts Syed Ahson and Mohammad Ilyas, SIP Handbook: Services, Technologies, and Security of Session Initiation Protocol presents a thorough technical review of all aspects of SIP. It captures the current state of IP Multimedia Subsystem technology and provides a unique source of comprehensive reference material on this subject. SIP Applications for Today and Tomorrow The scope of this volume ranges from basic concepts to future perspectives. Divided into three sections, the book begins with a discussion of SIP in peer-to-peer networks and then goes on to examine advanced media integration, migration considerations, mobility management, and group conferencing, while also reviewing home networking and compliance issues. The middle section of the book focuses on the underlying technologies of SIP. Chapters review network architecture, vertical handoffs, NAT traversals, multipoint extensions, and other areas at the forefront of research. Finally, the text examines various security vulnerabilities and provides perspectives on secure intelligent SIP services with a future outlook on a fraud detection framework in VoIP networks. Insights from International Researchers Authored by 65 experts from across the world, this text is sure to advance the field of knowledge in this ever-changing industry and provide further impetus for new areas of exploration. Because of the editors’ pivotal influence and their proximity to both the current market and the latest science, this work is certain to become the definitive text on this emerging technology.

  • The Mobile Application Hacker s Handbook

    The Mobile Application Hacker’s Handbook
    Dominic Chell

    See your app through a hacker's eyes to find the real sources of vulnerability The Mobile Application Hacker's Handbook is a comprehensive guide to securing all mobile applications by approaching the issue from a hacker's point of view. Heavily practical, this book provides expert guidance toward discovering and exploiting flaws in mobile applications on the iOS, Android, Blackberry, and Windows Phone platforms. You will learn a proven methodology for approaching mobile application assessments, and the techniques used to prevent, disrupt, and remediate the various types of attacks. Coverage includes data storage, cryptography, transport layers, data leakage, injection attacks, runtime manipulation, security controls, and cross-platform apps, with vulnerabilities highlighted and detailed information on the methods hackers use to get around standard security. Mobile applications are widely used in the consumer and enterprise markets to process and/or store sensitive data. There is currently little published on the topic of mobile security, but with over a million apps in the Apple App Store alone, the attack surface is significant. This book helps you secure mobile apps by demonstrating the ways in which hackers exploit weak points and flaws to gain access to data. Understand the ways data can be stored, and how cryptography is defeated Set up an environment for identifying insecurities and the data leakages that arise Develop extensions to bypass security controls and perform injection attacks Learn the different attacks that apply specifically to cross-platform apps IT security breaches have made big headlines, with millions of consumers vulnerable as major corporations come under attack. Learning the tricks of the hacker's trade allows security professionals to lock the app up tight. For better mobile security and less vulnerable data, The Mobile Application Hacker's Handbook is a practical, comprehensive guide.

  • Routing and Switching Essentials v6 Companion Guide

    Routing and Switching Essentials v6 Companion Guide
    Cisco Networking Academy

    This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book. Routing and Switching Essentials v6 Companion Guide Routing and Switching Essentials v6 Companion Guide is the official supplemental textbook for the Routing and Switching Essentials course in the Cisco Networking Academy CCNA Routing and Switching curriculum. This course describes the architecture, components, and operations of routers and switches in a small network. The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time. The book’s features help you focus on important concepts to succeed in this course: · Chapter Objectives—Review core concepts by answering the focus questions listed at the beginning of each chapter. · Key Terms—Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter. · Glossary—Consult the comprehensive Glossary with more than 250 terms. · Summary of Activities and Labs—Maximize your study time with this complete list of all associated practice exercises at the end of each chapter. · Check Your Understanding—Evaluate your readiness with the end-ofchapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer. · How To—Look for this icon to study the steps you need to learn to perform certain tasks. · Interactive Activities—Reinforce your understanding of topics with dozens of exercises from the online course identified throughout the book with this icon. · Packet Tracer Activities—Explore and visualize networking concepts using Packet Tracer exercises interspersed throughout the chapters and provided in the accompanying Labs & Study Guide book. · Videos—Watch the videos embedded within the online course. · Hands-on Labs—Work through all the course labs and additional Class Activities that are included in the course and published in the separate Labs & Study Guide. This book is part of the Cisco Networking Academy Series from Cisco Press. Books in this series support and complement the Cisco Networking Academy curriculum.

  • Practical Salesforce Development Without Code: Building Declarative Solutions on the Salesforce Platform, Edition 2

    Practical Salesforce Development Without Code: Building Declarative Solutions on the Salesforce Platform, Edition 2
    Philip Weinmeister

    Use this hands-on guide to build powerful solutions on the Salesforce platform without using a single line of code. This revised and expanded second edition includes Process Builder, Flow Builder, Lightning App Builder, Lightning Bolt Solutions, and more.Practical Salesforce Development Without Code shows you how to unlock the power of the Salesforce platform to solve real business problems. Adhering to Salesforce's "clicks, not code" mantra, Salesforce expert Phil Weinmeister walks Salesforce newcomers and veterans through different business problems and identifies effective—and proven—approaches to solutions using the platform's declarative framework.By adopting this book as your guide, you will learn how to deliver business solutions within Salesforce by combining analysis, creativity, and logic with core elements such as validation rules, workflow rules, processes, flows, formula fields, and Lightning apps. In addition, Weinmeister dissects and explains the most useful functions and features for declarative developers and shows you how to use them. Best of all, Weinmeister uses real-life business scenarios and visuals. Applying the lessons learned from this how-to guide will ultimately save you time and ensure that your clients or internal customers are enabled, equipped, and empowered. What You'll Learn Build objects, fields, and relationships to establish a sensible data modelAutomate business processes by using Workflow, Process Builder, and FlowUtilize functions and develop formulas effectively for a variety of business needsDevelop approval processes to handle exception scenariosEmploy actions to easily create efficient and relevant user experiencesManage your environments and deploy your solutions Who This Book Is forBusiness analysts, Salesforce administrators, and Salesforce developers

  • Time Management for System Administrators: Stop Working Late and Start Working Smart

    Time Management for System Administrators: Stop Working Late and Start Working Smart
    Thomas A. Limoncelli

    Time is a precious commodity, especially if you're a system administrator. No other job pulls people in so many directions at once. Users interrupt you constantly with requests, preventing you from getting anything done. Your managers want you to get long-term projects done but flood you with requests for quick-fixes that prevent you from ever getting to those long-term projects. But the pressure is on you to produce and it only increases with time. What do you do?The answer is time management. And not just any time management theory–you want Time Management for System Administrators, to be exact. With keen insights into the challenges you face as a sys admin, bestselling author Thomas Limoncelli has put together a collection of tips and techniques that will help you cultivate the time management skills you need to flourish as a system administrator.Time Management for System Administrators understands that an Sys Admin often has competing goals: the concurrent responsibilities of working on large projects and taking care of a user's needs. That's why it focuses on strategies that help you work through daily tasks, yet still allow you to handle critical situations that inevitably arise.Among other skills, you'll learn how to:Manage interruptionsEliminate timewastersKeep an effective calendarDevelop routines for things that occur regularlyUse your brain only for what you're currently working onPrioritize based on customer expectationsDocument and automate processes for faster executionWhat's more, the book doesn't confine itself to just the work environment, either. It also offers tips on how to apply these time management tools to your social life. It's the first step to a more productive, happier you.

  • Android Hacker s Handbook

    Android Hacker’s Handbook
    Joshua J. Drake

    The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them. If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox. A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis Covers Android application building blocks and security as well as debugging and auditing Android apps Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack Android Hacker's Handbook is the first comprehensive resource for IT professionals charged with smartphone security.

  • Networking All-in-One For Dummies: Edition 7

    Networking All-in-One For Dummies: Edition 7
    Doug Lowe

    Becoming a master of networking has never been easier Whether you're in charge of a small network or a large network, Networking All-in-One is full of the information you’ll need to set up a network and keep it functioning. Fully updated to capture the latest Windows 10 releases through Spring 2018, this is the comprehensive guide to setting up, managing, and securing a successful network. Inside, nine minibooks cover essential, up-to-date information for networking in systems such as Windows 10 and Linux, as well as best practices for security, mobile and cloud-based networking, and much more. Serves as a single source for the most-often needed network administration information Covers the latest trends in networking Get nine detailed and easy-to-understand networking minibooks in one affordable package Networking All-in-One For Dummies is the perfect beginner’s guide as well as the professional’s ideal reference book.

  • Packet Guide to Routing and Switching: Exploring the Network Layer

    Packet Guide to Routing and Switching: Exploring the Network Layer
    Bruce Hartpence

    Go beyond layer 2 broadcast domains with this in-depth tour of advanced link and internetwork layer protocols, and learn how they enable you to expand to larger topologies. An ideal follow-up to Packet Guide to Core Network Protocols, this concise guide dissects several of these protocols to explain their structure and operation.This isn’t a book on packet theory. Author Bruce Hartpence built topologies in a lab as he wrote this guide, and each chapter includes several packet captures. You’ll learn about protocol classification, static vs. dynamic topologies, and reasons for installing a particular route.This guide covers:Host routing—Process a routing table and learn how traffic starts out across a networkStatic routing—Build router routing tables and understand how forwarding decisions are made and processedSpanning Tree Protocol—Learn how this protocol is an integral part of every network containing switchesVirtual Local Area Networks—Use VLANs to address the limitations of layer 2 networksTrunking—Get an indepth look at VLAN tagging and the 802.1Q protocolRouting Information Protocol—Understand how this distance vector protocol works in small, modern communication networksOpen Shortest Path First—Discover why convergence times of OSPF and other link state protocols are improved over distance vectors

  • Introduction to Networks v6 Companion Guide

    Introduction to Networks v6 Companion Guide
    Cisco Networking Academy

    This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book. Introduction to Networks Companion Guide v6 is the official supplemental textbook for the Introduction to Networks course in the Cisco® Networking Academy® CCNA® Routing and Switching curriculum. The course introduces the architecture, structure, functions, components, and models of the Internet and computer networks. The principles of IP addressing and fundamentals of Ethernet concepts, media, and operations are introduced to provide a foundation for the curriculum. By the end of the course, you will be able to build simple LANs, perform basic configurations for routers and switches, and implement IP addressing schemes. The Companion Guide is designed as a portable desk reference to use anytime, anywhere to reinforce the material from the course and organize your time. The book’s features help you focus on important concepts to succeed in this course: Chapter Objectives—Review core concepts by answering the focus questions listed at the beginning of each chapter Key Terms—Refer to the lists of networking vocabulary introduced and highlighted in context in each chapter. Glossary—Consult the comprehensive Glossary with more than 250 terms. Summary of Activities and Labs—Maximize your study time with this complete list of all associated practice exercises at the end of each chapter. Check Your Understanding—Evaluate your readiness with the end-ofchapter questions that match the style of questions you see in the online course quizzes. The answer key explains each answer.

  • Computer Networks: A Systems Approach, Edition 5

    Computer Networks: A Systems Approach, Edition 5
    Larry L. Peterson

    Computer Networks: A Systems Approach, Fifth Edition, explores the key principles of computer networking, with examples drawn from the real world of network and protocol design. Using the Internet as the primary example, this best-selling and classic textbook explains various protocols and networking technologies. The systems-oriented approach encourages students to think about how individual network components fit into a larger, complex system of interactions. This book has a completely updated content with expanded coverage of the topics of utmost importance to networking professionals and students, including P2P, wireless, network security, and network applications such as e-mail and the Web, IP telephony and video streaming, and peer-to-peer file sharing. There is now increased focus on application layer issues where innovative and exciting research and design is currently the center of attention. Other topics include network design and architecture; the ways users can connect to a network; the concepts of switching, routing, and internetworking; end-to-end protocols; congestion control and resource allocation; and end-to-end data. Each chapter includes a problem statement, which introduces issues to be examined; shaded sidebars that elaborate on a topic or introduce a related advanced topic; What’s Next? discussions that deal with emerging issues in research, the commercial world, or society; and exercises. This book is written for graduate or upper-division undergraduate classes in computer networking. It will also be useful for industry professionals retraining for network-related assignments, as well as for network practitioners seeking to understand the workings of network protocols and the big picture of networking. Completely updated content with expanded coverage of the topics of utmost importance to networking professionals and students, including P2P, wireless, security, and applicationsIncreased focus on application layer issues where innovative and exciting research and design is currently the center of attentionFree downloadable network simulation software and lab experiments manual available

  • Kali Linux - An Ethical Hacker s Cookbook: End-to-end penetration testing solutions

    Kali Linux – An Ethical Hacker’s Cookbook: End-to-end penetration testing solutions
    Himanshu Sharma

    Over 120 recipes to perform advanced penetration testing with Kali LinuxAbout This BookPractical recipes to conduct effective penetration testing using the powerful Kali LinuxLeverage tools like Metasploit, Wireshark, Nmap, and many more to detect vulnerabilities with easeConfidently perform networking and application attacks using task-oriented recipesWho This Book Is ForThis book is aimed at IT security professionals, pentesters, and security analysts who have basic knowledge of Kali Linux and want to conduct advanced penetration testing techniques.What You Will LearnInstalling, setting up and customizing Kali for pentesting on multiple platformsPentesting routers and embedded devicesBug hunting 2017Pwning and escalating through corporate networkBuffer overflows 101Auditing wireless networksFiddling around with software-defned radioHacking on the run with NetHunterWriting good quality reportsIn DetailWith the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2016.2) according to your needs, and move on to core functionalities. This book will start with the installation and configuration of Kali Linux so that you can perform your tests. You will learn how to plan attack strategies and perform web application exploitation using tools such as Burp, and Jexboss. You will also learn how to perform network exploitation using Metasploit, Sparta, and Wireshark. Next, you will perform wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Lastly, you will learn how to create an optimum quality pentest report! By the end of this book, you will know how to conduct advanced penetration testing thanks to the book's crisp and task-oriented recipes.Style and approachThis is a recipe-based book that allows you to venture into some of the most cutting-edge practices and techniques to perform penetration testing with Kali Linux.

  • Schneier on Security

    Schneier on Security
    Bruce Schneier

    Presenting invaluable advice from the world?s most famous computer security expert, this intensely readable collection features some of the most insightful and informative coverage of the strengths and weaknesses of computer security and the price people pay — figuratively and literally — when security fails. Discussing the issues surrounding things such as airplanes, passports, voting machines, ID cards, cameras, passwords, Internet banking, sporting events, computers, and castles, this book is a must-read for anyone who values security at any level — business, technical, or personal.

  • TCP/IP Illustrated, Volume 1: The Protocols, Edition 2

    TCP/IP Illustrated, Volume 1: The Protocols, Edition 2
    Kevin R. Fall

    “For an engineer determined to refine and secure Internet operation or to explore alternative solutions to persistent problems, the insights provided by this book will be invaluable.” —Vint Cerf, Internet pioneer TCP/IP Illustrated, Volume 1, Second Edition, is a detailed and visual guide to today’s TCP/IP protocol suite. Fully updated for the newest innovations, it demonstrates each protocol in action through realistic examples from modern Linux, Windows, and Mac OS environments. There’s no better way to discover why TCP/IP works as it does, how it reacts to common conditions, and how to apply it in your own applications and networks. Building on the late W. Richard Stevens’ classic first edition, author Kevin R. Fall adds his cutting-edge experience as a leader in TCP/IP protocol research, updating the book to fully reflect the latest protocols and best practices. He first introduces TCP/IP’s core goals and architectural concepts, showing how they can robustly connect diverse networks and support multiple services running concurrently. Next, he carefully explains Internet addressing in both IPv4 and IPv6 networks. Then, he walks through TCP/IP’s structure and function from the bottom up: from link layer protocols–such as Ethernet and Wi-Fi–through network, transport, and application layers. Fall thoroughly introduces ARP, DHCP, NAT, firewalls, ICMPv4/ICMPv6, broadcasting, multicasting, UDP, DNS, and much more. He offers extensive coverage of reliable transport and TCP, including connection management, timeout, retransmission, interactive data flow, and congestion control. Finally, he introduces the basics of security and cryptography, and illuminates the crucial modern protocols for protecting security and privacy, including EAP, IPsec, TLS, DNSSEC, and DKIM. Whatever your TCP/IP experience, this book will help you gain a deeper, more intuitive understanding of the entire protocol suite so you can build better applications and run more reliable, efficient networks.

  • Windows PowerShell Cookbook: for Windows, Exchange 2007, and MOM, Volume 3

    Windows PowerShell Cookbook: for Windows, Exchange 2007, and MOM, Volume 3
    Lee Holmes

    This Cookbook by Windows PowerShell team developer Lee Holmes provides hundreds of tested scripts that you can use right away to get Microsoft's new tool working for you. More than 150 recipes, combined with a concise task-based introduction to the Windows PowerShell scripting language and environment, make it the perfect look-up guide when you encounter a thorny problem, or need a quick solution. The ideal companion to any tutorial or reference, this book meets the needs of system administrators at any level.Microsoft has revolutionized the world of system management and command-line shells with its release of Windows PowerShell, and Lee Holmes gives you practical tools and inside advice that will make you a more productive user and administrator. You will be able to solve everything from automating routine tasks, working with files, event logs and other forms of structured data, to managing the users and resources of complex Windows networks. Each recipe includes a focused piece of code plus discussion of how and why it works, so that you can apply the solution to similar tasks.You get an array of recipes covering PowerShell fundamentals, common tasks, and administrator tasks, including:Pipelines, variables, objects, looping and flow control, strings and unstructured text, calculations and mathSimple files; structured files; Internet-enabled scripts; code reuse; lists, arrays and hashtables; user feedback; error management; environmental awareness; script signing; and moreFiles and directories, registry manipulation, comparing data, event logs, process cmdlets, service cmdlets, Active Directory, enterprise computer management, and moreThose who administer Microsoft's Exchange 2007 and System Center Operations Manager (formerly MOM) will also benefit from this book, with separate chapters devoted to these servers. All Windows administrators will appreciate the appendices that include a PowerShell language quick reference, and a reference to the .NET, WMI and COM objects that PowerShell scripters will use often.With working scripts, tutorials, and references all in one volume, Windows PowerShell Cookbook will turbocharge the productivity of any Windows administrator.

  • Cabling: The Complete Guide to Copper and Fiber-Optic Networking, Edition 5

    Cabling: The Complete Guide to Copper and Fiber-Optic Networking, Edition 5
    Andrew Oliviero

    Develop the skills you need to design and build a reliable, cost-effective cabling infrastructure Fully updated for the growing demand of fiber optics for large-scale communications networks and telecommunication standards, this new edition is organized into two parts. Part I covers LAN Networks and Cabling Systems offers comprehensive coverage on current cabling methodologies and is updated to the latest industry standards. Part II addresses Fiber-Optic Cabling and Components probes deeper into fiber optics, and can be used to prepare for the Fiber Optics Installer (FOI) and/or Fiber Optics Technician (FOT) certifications, two of the Electronic Technician's Association's leading certifications. Explains why cutting corners is a bad idea Walks you through the obstacles to high-speed data transfer Encourages you to follow the golden rules of cabling This new edition is the only book you need for current cabling methodologies and standards.

  • Mastering VMware vSphere 6

    Mastering VMware vSphere 6
    Nick Marshall

    Master your virtual environment with the ultimate vSphere guide Mastering VMware vSphere 6 is the fully updated edition of the bestselling guide to VMware's virtualization solution. With comprehensive coverage of this industry-leading toolset, this book acts as an informative guide and valuable reference. Step-by-step instruction walks you through installation, configuration, operation, security processes, and much more as you conquer the management and automation of your virtual environment. Written by certified VMware vExperts, this indispensable guide provides hands-on instruction and detailed conceptual explanations, anchored by practical applications and real-world examples. This book is the ultimate guide to vSphere, helping administrators master their virtual environment. Learn to: Install, configure, and manage the vCenter Server components Leverage the Support Tools to provide maintenance and updates Create and configure virtual networks, storage devices, and virtual machines Implement the latest features to ensure compatibility and flexibility Manage resource allocation and utilization to meet application needs Monitor infrastructure performance and availability Automate and orchestrate routine administrative tasks Mastering VMware vSphere 6 is what you need to stay up-to-date on VMware's industry-leading software for the virtualized datacenter.

  • Ansible: Up and Running: Automating Configuration Management and Deployment the Easy Way, Edition 2

    Ansible: Up and Running: Automating Configuration Management and Deployment the Easy Way, Edition 2
    Lorin Hochstein

    Among the many configuration management tools available, Ansible has some distinct advantages—it’s minimal in nature, you don’t need to install anything on your nodes, and it has an easy learning curve. With this updated second edition, you’ll learn how to be productive with this tool quickly, whether you’re a developer deploying code to production or a system administrator looking for a better automation solution.Authors Lorin Hochstein and René Moser show you how to write playbooks (Ansible’s configuration management scripts), manage remote servers, and explore the tool’s real power: built-in declarative modules. You’ll discover that Ansible has the functionality you need—and the simplicity you desire.Manage Windows machines, and automate network device configurationManage your fleet from your web browser with Ansible TowerUnderstand how Ansible differs from other configuration management systemsUse the YAML file format to write your own playbooksWork with a complete example to deploy a non-trivial applicationDeploy applications to Amazon EC2 and other cloud platformsCreate Docker images and deploy Docker containers with AnsibleThis book is best read start to finish, with later chapters building on earlier ones. Because it’s written in a tutorial style, you can follow along on your own machine. Most examples focus on web applications.

  • Networking Essentials: A CompTIA Network+ N10-007 Textbook, Edition 5

    Networking Essentials: A CompTIA Network+ N10-007 Textbook, Edition 5
    Jeffrey S. Beasley

    Thoroughly updated to reflect the CompTIA Network+ N10-007 exam, Networking Essentials, Fifth Edition is a practical, up-to-date, and hands-on guide to the basics of networking. Written from the viewpoint of a working network administrator, it requires absolutely no experience with either network concepts or day-to-day network management. Networking Essentials, Fifth Edition guides readers from an entry-level knowledge in computer networks to advanced concepts in Ethernet and TCP/IP networks; routing protocols and router configuration; local, campus, and wide area network configuration; network security; wireless networking; optical networks; Voice over IP; the network server; and Linux networking. This edition contains additional coverage of switch security, troubleshooting IP networks, authorization and access control, best practices for disaster recovery, network infrastructure configuration and management, data traffic network analysis, network security, and VoIP. It also covers approximately 250 new terms now addressed by CompTIA’s N10-007 exam. Clear goals are outlined for each chapter, and every concept is introduced in easy-to-understand language that explains how and why networking technologies are used. Each chapter is packed with real-world examples and practical exercises that reinforce all concepts and guide you through using them to configure, analyze, and fix networks. KEY PEDAGOGICAL FEATURES NET-CHALLENGE SIMULATION SOFTWARE provides hands-on experience with entering router and switch commands, setting up functions, and configuring interfaces and protocols WIRESHARK NETWORK PROTOCOL ANALYZER presents techniques and examples of data traffic analysis throughout PROVEN TOOLS FOR MORE EFFECTIVE LEARNING AND NETWORK+ PREP, including chapter outlines, summaries, and Network+ objectives WORKING EXAMPLES IN EVERY CHAPTER to reinforce key concepts and promote mastery KEY TERM DEFINITIONS, LISTINGS, AND EXTENSIVE GLOSSARY to help you master the language of networking QUESTIONS, PROBLEMS, AND CRITICAL THINKING QUESTIONS to help you deepen yourunderstanding

  • AWS Certified Solutions Architect Official Study Guide: Associate Exam

    AWS Certified Solutions Architect Official Study Guide: Associate Exam
    Joe Baron

    Validate your AWS skills. This is your opportunity to take the next step in your career by expanding and validating your skills on the AWS cloud. AWS has been the frontrunner in cloud computing products and services, and the AWS Certified Solutions Architect Official Study Guide for the Associate exam will get you fully prepared through expert content, and real-world knowledge, key exam essentials, chapter review questions, access to Sybex’s interactive online learning environment, and much more. This official study guide, written by AWS experts, covers exam concepts, and provides key review on exam topics, including: Mapping Multi-Tier Architectures to AWS Services, such as web/app servers, firewalls, caches and load balancers Understanding managed RDBMS through AWS RDS (MySQL, Oracle, SQL Server, Postgres, Aurora) Understanding Loose Coupling and Stateless Systems Comparing Different Consistency Models in AWS Services Understanding how AWS CloudFront can make your application more cost efficient, faster and secure Implementing Route tables, Access Control Lists, Firewalls, NAT, and DNS Applying AWS Security Features along with traditional Information and Application Security Using Compute, Networking, Storage, and Database AWS services Architecting Large Scale Distributed Systems Understanding of Elasticity and Scalability Concepts Understanding of Network Technologies Relating to AWS Deploying and Managing Services with tools such as CloudFormation, OpsWorks and Elastic Beanstalk. Learn from the AWS subject-matter experts, review with proven study tools, and apply real-world scenarios. If you are looking to take the AWS Certified Solutions Architect Associate exam, this guide is what you need for comprehensive content and robust study tools that will help you gain the edge on exam day and throughout your career.

  • MDM: Fundamentals, Security, and the Modern Desktop: Using Intune, Autopilot, and Azure to Manage, Deploy, and Secure Windows 10

    MDM: Fundamentals, Security, and the Modern Desktop: Using Intune, Autopilot, and Azure to Manage, Deploy, and Secure Windows 10
    Jeremy Moskowitz

    The first major book on MDM written by Group Policy and Enterprise Mobility MVP and renowned expert, Jeremy Moskowitz! With Windows 10, organizations can create a consistent set of configurations across the modern enterprise desktop—for PCs, tablets, and phones—through the common Mobile Device Management (MDM) layer. MDM gives organizations a way to configure settings that achieve their administrative intent without exposing every possible setting. One benefit of MDM is that it enables organizations to apply broader privacy, security, and application management settings through lighter and more efficient tools. MDM also allows organizations to target Internet-connected devices to manage policies without using Group Policy (GP) that requires on-premises domain-joined devices. This makes MDM the best choice for devices that are constantly on the go. With Microsoft making this shift to using Mobile Device Management (MDM), a cloud-based policy-management system, IT professionals need to know how to do similar tasks they do with Group Policy, but now using MDM, with its differences and pitfalls. • What is MDM (and how is it different than GP) • Setup Azure AD and MDM Auto-Enrollment • New PC Rollouts and Remote Refreshes: Autopilot and Configuration Designer • Enterprise State Roaming and OneDrive Documents Roaming Renowned expert and Microsoft Group Policy and Enterprise Mobility MVP Jeremy Moskowitz teaches you MDM fundamentals, essential troubleshooting techniques, and how to manage your enterprise desktops.

  • SQL on Big Data: Technology, Architecture, and Innovation

    SQL on Big Data: Technology, Architecture, and Innovation
    Sumit Pal

    Learn various commercial and open source products that perform SQL on Big Data platforms. You will understand the architectures of the various SQL engines being used and how the tools work internally in terms of execution, data movement, latency, scalability, performance, and system requirements.This book consolidates in one place solutions to the challenges associated with the requirements of speed, scalability, and the variety of operations needed for data integration and SQL operations. After discussing the history of the how and why of SQL on Big Data, the book provides in-depth insight into the products, architectures, and innovations happening in this rapidly evolving space.SQL on Big Data discusses in detail the innovations happening, the capabilities on the horizon, and how they solve the issues of performance and scalability and the ability to handle different data types. The book covers how SQL on Big Data engines are permeating the OLTP, OLAP, and Operational analytics space and the rapidly evolving HTAP systems.You will learn the details of:Batch Architectures—Understand the internals and how the existing Hive engine is built and how it is evolving continually to support new features and provide lower latency on queriesInteractive Architectures—Understanding how SQL engines are architected to support low latency on large data setsStreaming Architectures—Understanding how SQL engines are architected to support queries on data in motion using in-memory and lock-free data structuresOperational Architectures—Understanding how SQL engines are architected for transactional and operational systems to support transactions on Big Data platformsInnovative Architectures—Explore the rapidly evolving newer SQL engines on Big Data with innovative ideas and conceptsWho This Book Is For:Business analysts, BI engineers, developers, data scientists and architects, and quality assurance professionals/div

  • Microsoft Visual C# Step by Step: Edition 9

    Microsoft Visual C# Step by Step: Edition 9
    John Sharp

    Your hands-on guide to Microsoft Visual C# fundamentals with Visual Studio 2017 Expand your expertise–and teach yourself the fundamentals of programming with the latest version of Visual C# with Visual Studio 2017. If you are an experienced software developer, you’ll get all the guidance, exercises, and code you need to start building responsive, scalable, cloud-connected applications that can run almost anywhere. . Discover how to: Quickly start creating Visual C# code and projects with Visual Studio 2017 Work with variables, operators, expressions, methods, and program flow Build more robust apps with error, exception, and resource management Spot problems fast with the Visual Studio debugger Make the most of improvements to C# methods, parameters, and switch statements Master the C# object model, and create your own functional data structures Leverage advanced properties, indexers, generics, and collection classes Create Windows 10 apps that share data, collaborate, and use cloud services Integrate Cortana to voice-enable your applications Perform complex queries over object collections with LINQ Improve application throughput and response time with asynchronous methods Use delegates and decoupling to construct highly extensible systems Customize C# operator behavior over your own classes and structures Streamline development with app templates Implement the powerful Model-View-ViewModel (MVVM) pattern Develop cloud-connected applications that seamlessly follow users across devices Build UWP applications that retrieve complex data via REST and present it intuitively

  • Computer Forensics For Dummies

    Computer Forensics For Dummies
    Carol Pollard

    Uncover a digital trail of e-evidence by using the helpful, easy-to-understand information in Computer Forensics For Dummies! Professional and armchair investigators alike can learn the basics of computer forensics, from digging out electronic evidence to solving the case. You won’t need a computer science degree to master e-discovery. Find and filter data in mobile devices, e-mail, and other Web-based technologies. You’ll learn all about e-mail and Web-based forensics, mobile forensics, passwords and encryption, and other e-evidence found through VoIP, voicemail, legacy mainframes, and databases. You’ll discover how to use the latest forensic software, tools, and equipment to find the answers that you’re looking for in record time. When you understand how data is stored, encrypted, and recovered, you’ll be able to protect your personal privacy as well. By the time you finish reading this book, you’ll know how to: Prepare for and conduct computer forensics investigations Find and filter data Protect personal privacy Transfer evidence without contaminating it Anticipate legal loopholes and opponents’ methods Handle passwords and encrypted data Work with the courts and win the case Plus, Computer Forensics for Dummies includes lists of things that everyone interested in computer forensics should know, do, and build. Discover how to get qualified for a career in computer forensics, what to do to be a great investigator and expert witness, and how to build a forensics lab or toolkit. Note: CD-ROM/DVD and other supplementary materials are not included as part of eBook file.

  • Google Cloud Platform for Architects: Design and manage powerful cloud solutions

    Google Cloud Platform for Architects: Design and manage powerful cloud solutions
    Vitthal Srinivasan

    Get acquainted with GCP and manage robust, highly available, and dynamic solutions to drive business objectiveKey Features Identify the strengths, weaknesses and ideal use-cases for individual services offered on the Google Cloud Platform Make intelligent choices about which cloud technology works best for your use-case Leverage Google Cloud Platform to analyze and optimize technical and business processesBook DescriptionUsing a public cloud platform was considered risky a decade ago, and unconventional even just a few years ago. Today, however, use of the public cloud is completely mainstream – the norm, rather than the exception. Several leading technology firms, including Google, have built sophisticated cloud platforms, and are locked in a fierce competition for market share.The main goal of this book is to enable you to get the best out of the GCP, and to use it with confidence and competence. You will learn why cloud architectures take the forms that they do, and this will help you become a skilled high-level cloud architect. You will also learn how individual cloud services are configured and used, so that you are never intimidated at having to build it yourself. You will also learn the right way and the right situation in which to use the important GCP services.By the end of this book, you will be able to make the most out of Google Cloud Platform design.What you will learn Set up GCP account and utilize GCP services using the cloud shell, web console, and client APIs Harness the power of App Engine, Compute Engine, Containers on the Kubernetes Engine, and Cloud Functions Pick the right managed service for your data needs, choosing intelligently between Datastore, BigTable, and BigQuery Migrate existing Hadoop, Spark, and Pig workloads with minimal disruption to your existing data infrastructure, by using Dataproc intelligently Derive insights about the health, performance, and availability of cloud-powered applications with the help of monitoring, logging, and diagnostic tools in StackdriverWho this book is forIf you are a Cloud architect who is responsible to design and manage robust cloud solutions with Google Cloud Platform, then this book is for you. System engineers and Enterprise architects will also find this book useful. A basic understanding of distributed applications would be helpful, although not strictly necessary. Some working experience on other public cloud platforms would help too.

  • VCP6-NV Official Cert Guide (Exam #2V0-641): VCPNV Offi Cer Gui ePub_1

    VCP6-NV Official Cert Guide (Exam #2V0-641): VCPNV Offi Cer Gui ePub_1
    Elver Sena Sosa

    style="margin:0px;" > Trust the Official Cert Guide series from VMware Press to help you learn, prepare, and practice for exam success. They are the only VMware authorized self-study books and are built with the objective of providing assessment, review, and practice to help ensure you are fully prepared for your certification exam. Master VMware certification exam topics Assess your knowledge with chapter-opening quizzes Review key concepts with exam preparation tasks This is the eBook edition of The VCP6-NV Official Cert Guide. This eBook does not include the practice exams that come with the print edition. The VCP6-NV Official Cert Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. “Do I Know This Already?” quizzes open each chapter and allows you to decide how much time you need to spend on each section. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. The VCP6-NV Official Cert Guide focuses specifically on the objectives for the VMware Certified Professional 6—Network Virtualization (VCP6-NV #2V0-641) exam. Leading NSX and data center expert Elver Sena Sosa shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. Well-regarded for its level of detail, assessment features, comprehensive design scenarios, and challenging review questions and exercises, this official study guide helps you master the concepts and techniques that will allow you to succeed on the exam the first time. The official study guide helps you master all the topics on the VCP6-NV (#2V0-641) exam, including: Understanding VMware NSX technology and architecture Understanding VMware NSX physical infrastructure requirements Configuring and managing vSphere networking Installing and upgrading VMware NSX Configuring VMware NSX virtual networks Configuring and managing NSX network services Configuring and administering network security Deploying a cross-vCenter NSX environment Performing operations tasks in a VMware NSX environment Troubleshooting a VMware network virtualization implementation The VCP6-NV Official Cert Guide is part of a recommended learning path from VMware that includes simulation and hands-on training from authorized VMware instructors and self-study products from VMware Press. To find out more about instructor-led training, e-learning, and hands-on instruction offered worldwide, please visit www.vmware.com/training.