Операційні системи

W niniejszej kategorii naszej biblioteki online znajdziesz książki dotyczące systemów operacyjnych. Część z nich stanowi wprowadzenie do takiego oprogramowania jak Windows, Linux, czy Android. Inne wgłębiają się w bardziej techniczne zagadnienia dotyczące konfiguracji tych systemów oraz narzędzi na nich wykorzystywanych jak np. Ansible.

577
Eлектронна книга
578
Eлектронна книга

Puppet 4.10 Beginner's Guide. From newbie to pro with Puppet 4.10 - Second Edition

John Arundel

Puppet 4.10 Beginner’s Guide, Second Edition, gets you up and running with the very latest features of Puppet 4.10, including Docker containers, Hiera data, and Amazon AWS cloud orchestration. Go from beginner to confident Puppet user with a series of clear, practical examples to help you manage every aspect of your server setup.Whether you’re a developer, a system administrator, or you are simply curious about Puppet, you’ll learn Puppet skills that you can put into practice right away. With practical steps giving you the key concepts you need, this book teaches you how to install packages and config files, create users, set up scheduled jobs, provision cloud instances, build containers, and so much more. Every example in this book deals with something real and practical that you’re likely to need in your work, and you’ll see the complete Puppet code that makes it happen, along with step-by-step instructions for what to type and what output you’ll see. All the examples are available in a GitHub repo for you to download and adapt for your own server setup.

579
Eлектронна книга

Puppet 5 Beginner's Guide. Go from newbie to pro with Puppet 5 - Third Edition

John Arundel

Puppet 5 Beginner’s Guide, Third Edition gets you up and running with the very latest features of Puppet 5, including Docker containers, Hiera data, and Amazon AWS cloud orchestration. Go from beginner to confident Puppet user with a series of clear, practical examples to help you manage every aspect of your server setup. Whether you’re a developer, a system administrator, or you are simply curious about Puppet, you’ll learn Puppet skills that you can put into practice right away. With practical steps giving you the key concepts you need, this book teaches you how to install packages and config files, create users, set up scheduled jobs, provision cloud instances, build containers, and so much more. Every example in this book deals with something real and practical that you’re likely to need in your work, and you’ll see the complete Puppet code that makes it happen, along with step-by-step instructions for what to type and what output you’ll see. All the examples are available in a GitHub repo for you to download and adapt for your own server setup.

580
Eлектронна книга

Puppet 5 Essentials. A fast-paced guide to automating your infrastructure - Third Edition

Martin Alfke, Felix Frank

Puppet is a configuration management tool that allows you to automate all your IT configurations, giving you control over what you do to each Puppet Agent in a network, and when and how you do it. In this age of digital delivery and ubiquitous Internet presence, it's becoming increasingly important to implement scaleable and portable solutions, not only in terms of software, but also the system that runs it.This book gets you started quickly with Puppet and its tools in the right way. It highlights improvements in Puppet and provides solutions for upgrading. It starts with a quick introduction to Puppet in order to quickly get your IT automation platform in place. Then you learn about the Puppet Agent and its installation and configuration along with Puppet Server and its scaling options. The book adopts an innovative structure and approach, and Puppet is explained with flexible use cases that empower you to manage complex infrastructures easily.Finally, the book will take readers through Puppet and its companion tools such as Facter, Hiera, and R10k and how to make use of tool chains.

581
Eлектронна книга

Puppet: Mastering Infrastructure Automation

Jaime Soriano Pastor

Puppet is a configuration management tool that allows you to automate all your IT configurations, giving you control. It was written for and by system administrators to manage large numbers of systems efficiently and prevent configuration drifts. Puppet gives you control of what you do to each node, when you do it, and how you do it.This Learning Path will take you from the basics of Puppet to extending it and then mastering it. We will start off with a primer on Puppet, its installation and get a sneak peek under its hood. We will then move on to designing and deploying your Puppet architecture, learning best practices for writing reusable and maintainable code, and executing, testing, and deploying Puppet across your systems. Finally, we will deal with problems of scale and exceptions in your code, automate workflows, and support multiple developers working simultaneously.This course is based on the following books: 1)Puppet 4 Essentials - Second Edition 2)Extending Puppet - Second Edition 3)Mastering Puppet - Second Edition

582
Eлектронна книга

Python dla DevOps. Naucz się bezlitośnie skutecznej automatyzacji

Noah Gift, Kennedy Behrman, Alfredo Deza, Grig Gheorghiu

Ostatnia dekada zmieniła oblicze IT. Kluczowego znaczenia nabrały big data, a chmura i automatyzacja rozpowszechniły się wszędzie tam, gdzie mowa o efektywności. Inżynierowie muszą wykorzystywać zalety systemów linuksowych w codziennej praktyce, aby zapewnić należyty poziom automatyzacji swoich zadań. Do tych celów świetnie nadaje się Python. Język ten zdobywa coraz większe uznanie z uwagi na jego wszechstronność, jak również wydajność, przenaszalność i bezpieczeństwo kodu. Warto więc wykorzystywać Pythona do administrowania systemami Linux wraz z takimi narzędziami DevOps jak Docker, Kubernetes i Terraform. Dzięki tej książce dowiesz się, jak sobie z tym poradzić. Znalazło się w niej krótkie wprowadzenie do Pythona oraz do automatyzacji przetwarzania tekstu i obsługi systemu plików, a także do pisania własnych narzędzi wiersza poleceń. Zaprezentowano również przydatne narzędzia linuksowe, systemy zarządzania pakietami oraz systemy budowania, monitorowania i automatycznego testowania kodu. Zagadnienia te szczególnie zainteresują specjalistów DevOps. Ponadto zawarto tu podstawowe informacje o chmurze obliczeniowej, usługach IaC i systemach Kubernetes. Omówiono zasady uczenia maszynowego i inżynierii danych z perspektywy DevOps. Przedstawiono także kompletny przewodnik po procesach budowania, wdrażania oraz operacyjnego wykorzystywania modelu uczenia maszynowego z użyciem systemów Flask, sklearn, Docker i Kubernetes. W tej książce: wprowadzenie do Pythona automatyczne przetwarzanie tekstu oraz automatyzacja operacji na plikach automatyzacja za pomocą sprawdzonych narzędzi linuksowych chmura, infrastruktura jako kod, Kubernetes i tryb bezserwerowy uczenie maszynowe i inżynieria danych z perspektywy DevOps tworzenie i operacjonalizacja projektu uczenia maszynowego Python: tutaj ważna jest prawdziwa nowoczesność oprogramowania!

583
Eлектронна книга

Python Penetration Testing Cookbook. Practical recipes on implementing information gathering, network security, intrusion detection, and post-exploitation

Rejah Rehim

Penetration testing is the use of tools and code to attack a system in order to assess its vulnerabilities to external threats. Python allows pen testers to create their own tools. Since Python is a highly valued pen-testing language, there are many native libraries and Python bindings available specifically for pen-testing tasks.Python Penetration Testing Cookbook begins by teaching you how to extract information from web pages. You will learn how to build an intrusion detection system using network sniffing techniques. Next, you will find out how to scan your networks to ensure performance and quality, and how to carry out wireless pen testing on your network to avoid cyber attacks. After that, we’ll discuss the different kinds of network attack. Next, you’ll get to grips with designing your own torrent detection program. We’ll take you through common vulnerability scenarios and then cover buffer overflow exploitation so you can detect insecure coding. Finally, you’ll master PE code injection methods to safeguard your network.

584
Eлектронна книга

Python: Penetration Testing for Developers. Execute effective tests to identify software vulnerabilities

Christopher Duffy, Mohit Raj, Cameron Buchanan, Andrew Mabbitt, ...

Cybercriminals are always one step ahead, when it comes to tools and techniques. This means you need to use the same tools and adopt the same mindset to properly secure your software. This course shows you how to do just that, demonstrating how effective Python can be for powerful pentesting that keeps your software safe. Comprising of three key modules, follow each one to push your Python and security skills to the next level.In the first module, we’ll show you how to get to grips with the fundamentals. This means you’ll quickly find out how to tackle some of the common challenges facing pentesters using custom Python tools designed specifically for your needs. You’ll also learn what tools to use and when, giving you complete confidence when deploying your pentester tools to combat any potential threat.In the next module you’ll begin hacking into the application layer. Covering everything from parameter tampering, DDoS, XXS and SQL injection, it will build on the knowledge and skills you learned in the first module to make you an even more fluent security expert.Finally in the third module, you’ll find more than 60 Python pentesting recipes. We think this will soon become your trusted resource for any pentesting situation.This Learning Path combines some of the best that Packt has to offer in one complete, curated package. It includes content from the following Packt products:? Learning Penetration Testing with Python by Christopher Duffy? Python Penetration Testing Essentials by Mohit? Python Web Penetration Testing Cookbook by Cameron Buchanan,Terry Ip, Andrew Mabbitt, Benjamin May and Dave Mound

585
Eлектронна книга

React Native Cookbook. Recipes for solving common React Native development problems - Second Edition

Daniel Ward

If you are a developer looking to create mobile applications with maximized code reusability and minimized cost, React Native is what you need. With this practical guide, you’ll be able to build attractive UIs, tackle common problems in mobile development, and achieve improved performance in mobile environments.This book starts by covering the common techniques for React Native customization and helps you set up your development platforms. Over the course of the book, you’ll work through a wide variety of recipes that help you create, style, and animate your apps with built-in React Native and custom third-party components. You’ll also develop real-world browser-based authentication, build a fully functional audio player, and integrate Google Maps in your apps. This book will help you explore different strategies for working with data, including leveraging the popular Redux library and optimizing your app’s dataflow. You’ll also learn how to write native device functionality for new and existing React Native projects and how app deployment works.By the end of this book, you'll be equipped with tips and tricks to write efficient code and have the skills to build full iOS and Android applications using React Native.

586
Eлектронна книга

Reactive Programming with Swift 4. Build asynchronous reactive applications with easy-to-maintain and clean code using RxSwift and Xcode 9

Navdeep Singh

RxSwift belongs to a large family of Rx implementations in different programming languages that share almost identical syntax and semantics. Reactive approach will help you to write clean, cohesive, resilient, scalable, and maintainable code with highly configurable behavior.This book will introduce you to the world of reactive programming, primarily focusing on mobile platforms. It will tell how you can benefit from using RxSwift in your projects, existing or new. Further on, the book will demonstrate the unbelievable ease of configuring asynchronous behavior and other aspects of the app that are traditionally considered to be hard to implement and maintain. It will explain what Rx is made of, and how to switch to reactive way of thinking to get the most out of it. Also, test production code using RxTest and the red/ green approach. Finally, the book will dive into real-world recipes and show you how to build a real-world app by applying the reactive paradigm.By the end of the book, you’ll be able to build a reactive swift application by leveraging all the concepts this book takes you through.

587
Eлектронна книга

Real-World SRE. The Survival Guide for Responding to a System Outage and Maximizing Uptime

Nat Welch

Real-World SRE is the go-to survival guide for the software developer in the middle of catastrophic website failure. Site Reliability Engineering (SRE) has emerged on the frontline as businesses strive to maximize uptime. This book is a step-by-step framework to follow when your website is down and the countdown is on to fix it. Nat Welch has battle-hardened experience in reliability engineering at some of the biggest outage-sensitive companies on the internet. Arm yourself with his tried-and-tested methods for monitoring modern web services, setting up alerts, and evaluating your incident response.Real-World SRE goes beyond just reacting to disaster—uncover the tools and strategies needed to safely test and release software, plan for long-term growth, and foresee future bottlenecks. Real-World SRE gives you the capability to set up your own robust plan of action to see you through a company-wide website crisis.The final chapter of Real-World SRE is dedicated to acing SRE interviews, either in getting a first job or a valued promotion.

588
Eлектронна книга

Red Hat Enterprise Linux 8 Administration. Master Linux administration skills and prepare for the RHCSA certification exam

Miguel Pérez Colino, Pablo Iranzo Gómez, Scott McCarty

Whether in infrastructure or development, as a DevOps or site reliability engineer, Linux skills are now more relevant than ever for any IT job, forming the foundation of understanding the most basic layer of your architecture. With Red Hat Enterprise Linux (RHEL) becoming the most popular choice for enterprises worldwide, achieving the Red Hat Certified System Administrator (RHCSA) certification will validate your Linux skills to install, configure, and troubleshoot applications and services on RHEL systems. Complete with easy-to-follow tutorial-style content, self-assessment questions, tips, best practices, and practical exercises with detailed solutions, this book covers essential RHEL commands, user and group management, software management, networking fundamentals, and much more. You'll start by learning how to create an RHEL 8 virtual machine and get to grips with essential Linux commands. You'll then understand how to manage users and groups on an RHEL 8 system, install software packages, and configure your network interfaces and firewall. As you advance, the book will help you explore disk partitioning, LVM configuration, Stratis volumes, disk compression with VDO, and container management with Podman, Buildah, and Skopeo. By the end of this book, you'll have covered everything included in the RHCSA EX200 certification and be able to use this book as a handy, on-the-job desktop reference guide. This book and its contents are solely the work of Miguel Pérez Colino, Pablo Iranzo Gómez, and Scott McCarty. The content does not reflect the views of their employer (Red Hat Inc.). This work has no connection to Red Hat, Inc. and is not endorsed or supported by Red Hat, Inc.

589
Eлектронна книга

Rejestr Windows 7. Praktyczne przykłady

Witold Wrotek

Zajrzyj pod maskę systemu Windows 7 Poznaj budowę rejestru systemowego Naucz się edytować klucze i modyfikować wartości Odkryj potężne możliwości dostosowywania środowiska do swoich potrzeb Rejestr Windows jest bazą danych konfiguracyjnych, za pomocą których można kontrolować każdy aspekt działania systemu operacyjnego. Zawiera on informacje na temat zainstalowanego w komputerze sprzętu i oprogramowania, a także ustawienia związane z poszczególnymi użytkownikami środowiska. Edytując wpisy przechowywane w rejestrze, można w znacznym stopniu dostosować wygląd i sposób funkcjonowania systemu do własnych potrzeb oraz zoptymalizować jego pracę w celu zwiększenia ogólnej wydajności komputera. Aby osiągnąć odpowiednie efekty, niczego przy okazji nie psując, trzeba oczywiście dysponować wiedzą, przez niektórych uważaną za niemal magiczną. Dzięki książce "Rejestr Windows 7. Praktyczne przykłady " również Ty możesz dołączyć do grona osób wtajemniczonych. Dowiesz się z niej, jak zbudowany jest ów rejestr i jaką rolę pełnią poszczególne jego elementy. Nauczysz się zabezpieczać go przed awariami i właściwie reagować w sytuacjach, gdy mimo wszystko wystąpi jakiś błąd. Poznasz możliwości drzemiące w rejestrze i metody wykorzystywania ich w celu modyfikacji interfejsu środowiska czy działania dostępnych w nim narzędzi. Odkryjesz również sposoby optymalizacji i defragmentacji rejestru, a wszystko to bez konieczności wczytywania się w techniczną nowomowę i przebijania przez niezrozumiałą dokumentację. Szybko, łatwo, praktycznie. Struktura i funkcje rejestru systemu Windows 7 Sposoby dodawania oraz edytowania kluczy i wartości Zabezpieczanie rejestru przed awariami i postępowanie w przypadku ich wystąpienia Dostosowywanie interfejsu systemu do swoich potrzeb Kontrolowanie działania aplikacji i narzędzi systemowych Zarządzanie usługami z poziomu rejestru Utrzymywanie rejestru w dobrej kondycji

590
Eлектронна книга

RHCSA Red Hat Enterprise Linux 9. Comprehensive Mastery for Advanced System Administration and Certification Success

Asghar Ghori

Embark on a journey through Red Hat Enterprise Linux 9, beginning with the basics of local installation and initial system interactions. Our course guides you through fundamental and advanced file management techniques, ensuring you can handle any file-related tasks with ease. Explore user management in-depth, from basic to advanced levels, providing you with the skills to manage users and groups effectively.Delve into the core aspects of the Linux operating system, including the Bash shell, process management, and job scheduling. Gain expertise in package management, both basic and advanced, to keep your system up-to-date and efficient. Understand the intricacies of the Linux boot process, system initialization, and system tuning to optimize performance and reliability.The course also covers essential networking concepts, including device management, connections, and hostname resolution. You'll learn to secure your system with SSH, firewall configuration, and SELinux. Additionally, explore storage management, local file systems, and swap configurations to ensure robust data handling. Finally, enhance your automation skills with shell scripting and containers, preparing you for modern DevOps environments.

591
Eлектронна книга

Robotic Process Automation with Blue Prism Quick Start Guide. Create software robots and automate business processes

Lim Mei Ying

Robotic process automation is a form of business process automation where user-configured robots can emulate the actions of users. Blue Prism is a pioneer of robotic process automation software, and this book gives you a solid foundation to programming robots with Blue Prism. If you've been tasked with automating work processes, but don't know where to start, this is the book for you!You begin with the business case for robotic process automation, and then move to implementation techniques with the leading software for enterprise automation, Blue Prism. You will become familiar with the Blue Prism Studio by creating your first process. You will build upon this by adding pages, data items, blocks, collections, and loops. You will build more complex processes by learning about actions, decisions, choices, and calculations. You will move on to teach your robot to interact with applications such as Internet Explorer. This can be used for spying elements that identify what your robot needs to interact with on the screen.You will build the logic behind a business objects by using read, write, and wait stages. You will then enable your robot to read and write to Excel and CSV files. This will finally lead you to train your robot to read and send emails in Outlook. You will learn about the Control Room, where you will practice adding items to a queue, processing the items and updating the work status.Towards the end of this book you will also teach your robot to handle errors and deal with exceptions. The book concludes with tips and coding best practices for Blue Prism.

592
Eлектронна книга

Robust Cloud Integration with Azure. Unleash the power of serverless integration with Azure

Gyanendra Kumar Gautam, Ashish Bhambhani, Abhishek Kumar, James Corbould, ...

Any software developers, architects, and technical managers lookng to learn about Azure IaaS essentials need look no further. This book is ideal for Microsoft Enterprise developers, DevOps or any IT professionals looking to connect cloud-based and on-premises systems with Azure.

593
Eлектронна книга

ROS Robotics By Example. Learning to control wheeled, limbed, and flying robots using ROS Kinetic Kame - Second Edition

Carol Fairchild, Dr. Thomas L. Harman

ROS is a robust robotics framework that works regardless of hardware architecture or hardware origin. It standardizes most layers of robotics functionality from device drivers to process control and message passing to software package management. But apart from just plain functionality, ROS is a great platform to learn about robotics itself and to simulate, as well as actually build, your first robots. This does not mean that ROS is a platform for students and other beginners; on the contrary, ROS is used all over the robotics industry to implement flying, walking and diving robots, yet implementation is always straightforward, and never dependent on the hardware itself.ROS Robotics has been the standard introduction to ROS for potential professionals and hobbyists alike since the original edition came out; the second edition adds a gradual introduction to all the goodness available with the Kinetic Kame release.By providing you with step-by-step examples including manipulator arms and flying robots, the authors introduce you to the new features. The book is intensely practical, with space given to theory only when absolutely necessary. By the end of this book, you will have hands-on experience on controlling robots with the best possible framework.

594
Eлектронна книга

Rust Quick Start Guide. The easiest way to learn Rust programming

Daniel Arbuckle

Rust is an emerging programming language applicable to areas such as embedded programming, network programming, system programming, and web development. This book will take you from the basics of Rust to a point where your code compiles and does what you intend it to do!This book starts with an introduction to Rust and how to get set for programming, including the rustup and cargo tools for managing a Rust installation and development work?ow.Then you'll learn about the fundamentals of structuring a Rust program, such as functions, mutability, data structures, implementing behavior for types, and many more. You will also learn about concepts that Rust handles differently from most other languages.After understanding the Basics of Rust programming, you will learn about the core ideas, such as variable ownership, scope, lifetime, and borrowing. After these key ideas, you will explore making decisions in Rust based on data types by learning about match and if let expressions. After that, you'll work with different data types in Rust, and learn about memory management and smart pointers.

595
Eлектронна книга
596
Eлектронна книга

Salesforce CRM Admin Cookbook. Solutions to help you implement, configure, and customize your business applications with Salesforce CRM and Lightning Experience - Second Edition

Paul Goodey

Salesforce CRM is a market-leading customer relationship management (CRM) application that is accessed over the internet. This application greatly enhances a company's sales performance, improves customer satisfaction, and provides a robust customer relationship management system for an organization.Salesforce CRM Admin Cookbook, Second Edition enables you to instantly extend and unleash the power of Salesforce CRM and its Lightning Experience framework. It provides clear, comprehensive instructions along with detailed screenshots and code. Whether you are looking for solutions to enhance the core features, such as data management, process automation, data validation, and home page administration, or are looking for ideas on advanced customization techniques, this book will provide you with immediate, practical, and exciting real-world recipes. This book guides you through interesting topics spanning a variety of functional areas. Recipes are provided that allow you to configure, build and extend the capability of Salesforce CRM using the Lightning Experience framework.

597
Eлектронна книга
598
Eлектронна книга

Security Automation with Ansible 2. Leverage Ansible 2 to automate complex security tasks like application security, network security, and malware analysis

Akash Mahajan, MADHU AKULA

Security automation is one of the most interesting skills to have nowadays. Ansible allows you to write automation procedures once and use them across your entire infrastructure. This book will teach you the best way to use Ansible for seemingly complex tasks by using the various building blocks available and creating solutions that are easy to teach others, store for later, perform version control on, and repeat.We’ll start by covering various popular modules and writing simple playbooks to showcase those modules. You’ll see how this can be applied over a variety of platforms and operating systems, whether they are Windows/Linux bare metal servers or containers on a cloud platform. Once the bare bones automation is in place, you’ll learn how to leverage tools such as Ansible Tower or even Jenkins to create scheduled repeatable processes around security patching, security hardening, compliance reports, monitoring of systems, and so on. Moving on, you’ll delve into useful security automation techniques and approaches, and learn how to extend Ansible for enhanced security. While on the way, we will tackle topics like how to manage secrets, how to manage all the playbooks that we will create and how to enable collaboration using Ansible Galaxy. In the final stretch, we’ll tackle how to extend the modules of Ansible for our use, and do all the previous tasks in a programmatic manner to get even more powerful automation frameworks and rigs.

599
Eлектронна книга

Security Monitoring with Wazuh. A hands-on guide to effective enterprise security using real-life use cases in Wazuh

Rajneesh Gupta, Santiago Bassett

Strengthen your cybersecurity posture with Wazuh’s powerful security monitoring and compliance capabilities.Security Monitoring with Wazuh is a comprehensive, hands-on guide that helps you deploy, configure, and optimize Wazuh to detect threats, automate incident response, and enforce compliance. With real-world use cases, step-by-step configurations, and tool integrations, this book equips you to build an enterprise-grade defense system.You'll begin by setting up an Intrusion Detection System (IDS) using Wazuh and integrating Suricata to monitor network and host-based threats. Moving forward, you'll explore malware detection, vulnerability assessment, and security automation with SOAR. The book also covers threat intelligence, incident response, and proactive threat hunting, helping you detect and mitigate cybersecurity risks effectively.Beyond detection, you'll enforce compliance with industry standards such as MITRE ATT&CK, PCI DSS, and GDPR, ensuring regulatory adherence and security best practices. By integrating Wazuh with TheHive, Cortex, MISP, and other security tools, you'll streamline threat analysis and response.By the end of this book, you'll master Wazuh's full potential, enabling you to deploy, manage, and enhance security monitoring across your infrastructure—from on-premises to cloud environments.

600
Eлектронна книга