Systemy operacyjne
Tutaj dowiecie się jak prawidłowo zainstalować i skonfigurować wybrany system operacyjny, naprawić ewentualne błędy lub zwiększyć wydajność komputera. Znajdziecie przydatne informacje na temat administracji OS, nauczycie się optymalnie wykorzystywać oparte na nim aplikacje oraz w pełni opanować potencjał waszego systemu.
Poszczególne pozycje odkrywają tajemnice wszystkich, mniej lub bardziej popularnych systemów operacyjnych, od DOS, Unix, Mac OS, poprzez wszelkie dystrybucje Linuxa, zarówno desktopowe, serwerowe i typu live-CD, aż po większość wersji Microsoft Windows, także wersje serwerowe. Książki napisane są przystępnym i zrozumiałym językiem, przeznaczone zarówno dla zwykłego użytkownika, stanowią również cenne źródło informacji dla profesjonalnych administratorów.
Hartowanie Linuksa we wrogich środowiskach sieciowych. Ochrona serwera od TLS po Tor
Kyle Rankin
Bezpieczeństwo serwerów - od TLS do TOR W dzisiejszym świecie, w którym wiele codziennych aktywności odbywa się przez internet, bardzo dużo zależy od bezpieczeństwa serwerów. Kiedy zwykli ludzie tworzą społeczności, komunikują się i robią zakupy online, hakerzy niestrudzenie przeglądają sieć, poszukując słabych punktów. Atakują różne obiekty: mogą to być agencje rządowe, elektrownie i banki, ale równie dobrze ich celem może się stać jakakolwiek sieć komputerów. Chodzi o uzyskanie wrażliwych informacji, zbiorów danych osobowych czy wreszcie przejęcie kontroli nad systemem. Co gorsza, agresorzy odnoszą sukcesy nawet w przypadku sieci, w których wdrożono złożone i kosztowne zabezpieczenia. Dzięki tej książce poznasz sprawdzone i niezbyt skomplikowane procedury, które pozwolą Ci na zahartowanie swoich danych. Zawarte tu treści przedstawiono w sposób bardzo praktyczny, z uwzględnieniem najnowszych osiągnięć w dziedzinie zabezpieczania systemów. Najpierw zapoznasz się z ogólnym ujęciem tematyki bezpieczeństwa systemów, w tym stacji roboczych, serwerów i sieci. Następnie dowiesz się, w jaki sposób zahartować specyficzne usługi, takie jak serwery WWW, pocztę elektroniczną, systemy DNS i bazy danych. Na końcu książki znalazł się rozdział poświęcony reagowaniu na incydenty - to również jest wiedza potrzebna każdemu administratorowi. Najciekawsze zagadnienia: Hartowanie stacji roboczych, w tym stacji roboczych administratorów Zabezpieczanie infrastruktury i ustawienie zapory sieciowej Zaawansowane hartowanie serwerów poczty elektronicznej Korzystanie z podstawowych i zaawansowanych właściwości usługi DNS Poruszanie się w sieci TOR Po pierwsze: zabezpiecz swoją sieć i zahartuj swój system! Kyle Rankin od wielu lat zajmuje się administrowaniem systemów informatycznych. Jest uznanym ekspertem w dziedzinie zabezpieczania infrastruktury, architektury, automatyzacji i rozwiązywania problemów z tym związanych. Rankin jest nagradzanym felietonistą magazynu "Linux Journal" i przewodniczącym rady doradczej Purism. Często wygłasza referaty na konferencjach poświęconych oprogramowaniu open source i bezpieczeństwu, takich jak O'Reilly Security Conference, CactusCon, SCALE, OSCON, LinuxWorld Expo, Penguicon.
HoloLens Beginner's Guide. Join the AR revolution with HoloLens
Jason M. Odom
HoloLens revolutionizes the way we work and interact with the virtual world. HoloLens brings you the amazing world of augmented reality and provides an opportunity to explore it like never before. This is the best book for developers who want to start creating interactive and intuitive augmented reality apps for the HoloLens platform.You will start with a walkthrough of the HoloLens hardware before creating your first app. Next you will be introduced to the various HoloLens sensors and find out how to program them efficiently so that they can interact with the real world seamlessly. Moving on, you will learn how to create smart animations and add video overlay that implements real-time tracking and motion-sensing abilities to your HoloLens app. Finally, you will learn how to test your app effectively.
HoloLens Blueprints. Build immersive AR and Mixed Reality Applications
Abhijit Jana, Manish Sharma, Mallikarjuna Rao
Do you want to create stunning applications with HoloLens? Are you a developer who is fascinated with Microsoft HoloLens and its capabilities? If so, this is the book for you.This book introduces and demystifies the HoloLens platform and shows you different ways of interaction with computers (mixed-reality).You will start your mixed-reality journey by understanding different types of digital reality. You will learn to build your first holographic app. Also, you will understand holographic application integration possibilities within Line of Business Applications using Azure. Moving ahead, you will create Integrated Solutions using IoT with HoloLens. Gradually you'll learn how to create and deploy apps on a device. You will learn to publish application to the store; if you are an enterprise developer, you will also manage and distribute applications for enterprise-enabled or domain-joined HoloLens.Finally, you will develop an end-to-end realistic holographic app, ranging from scenario identification to sketching, development, deployment, and, finally, production.
Vladimir Stefanovic, Sasha Kranjac
MCSA: Windows Server 2016 certification is one of the most sought-after certifications for IT professionals, which includes working with Windows Server and performing administrative tasks around it. This book is aimed at the 70-742 certification and is part of Packt's three-book series on MCSA Windows Server 2016 certification, which covers Exam 70-740, Exam 70-741, and Exam 70-742.This exam guide covers the exam objectives for the 70-742 Identity with Windows Server 2016 exam. It starts with installing and configuring Active Directory Domain Services (AD DS), managing and maintaining AD DS objects and advanced configurations, configuring Group Policy, Active Directory Certificate Services, and Active Directory Federation Services and Rights Management. At the end of each chapter, convenient test questions will help you in preparing for the certification in a practical manner.By the end of this book, you will be able to develop the knowledge and skills needed to complete MCSA Exam 70-742: Identity with Windows Server 2016 with confidence.
Implementing Modern DevOps. Enabling IT organizations to deliver faster and smarter
David Gonzalez, Danny Varghese
This book follows a unique approach to modern DevOps using cutting-edge tools and technologies such as Ansible, Kubernetes, and Google Cloud Platform.This book starts by explaining the organizational alignment that has to happen in every company that wants to implement DevOps in order to be effective, and the use of cloud datacenters in combination with the most advanced DevOps tools to get the best out of a small team of skilled engineers. It also delves into how to use Kubernetes to run your applications in Google Cloud Platform, minimizing the friction and hassle of maintaining a cluster but ensuring its high availability.By the end of this book, you will be able to realign teams in your company and create a Continuous Delivery pipeline with Kubernetes and Docker. With strong monitoring in place, you will also be able to react to adverse events in your system, minimizing downtime and improving the overall up-time and stability of your system.
Victor Wu
Hyper-converged infrastructure (HCI) can help you simplify the provisioning and daily operations of computing and storage. With this book, you'll understand how HCI can offload the day 0 deployment and day-to-day operations of a system administrator. You'll explore the VxRail Appliance, which is an HCI solution that provides lifecycle management, automation, and operational simplicity. Starting with an overview of the VxRail Appliance system architecture and components, you'll understand the benefits of the VxRail system and compare it with the environment of traditional servers and storage. As you advance, the book covers topics such as disaster recovery and active-active and active-passive solutions for VxRail.By the end of this book, you'll have gained the confidence to manage the deployment, administration, planning, and design of a VxRail system.
Anatoly Tykushin, Svetlana Ostrovskaya, Dmitry Volkov
Cybersecurity threats are constantly evolving, posing serious risks to organizations. Incident Response for Windows, by cybersecurity experts Anatoly Tykushin and Svetlana Ostrovskaya, provides a practical hands-on guide to mitigating threats in Windows environments, drawing from their real-world experience in incident response and digital forensics.Designed for cybersecurity professionals, IT administrators, and digital forensics practitioners, the book covers the stages of modern cyberattacks, including reconnaissance, infiltration, network propagation, and data exfiltration. It takes a step-by-step approach to incident response, from preparation and detection to containment, eradication, and recovery. You will also explore Windows endpoint forensic evidence and essential tools for gaining visibility into Windows infrastructure. The final chapters focus on threat hunting and proactive strategies to identify cyber incidents before they escalate.By the end of this book, you will gain expertise in forensic evidence collection, threat hunting, containment, eradication, and recovery, equipping them to detect, analyze, and respond to cyber threats while strengthening your organization's security posture
Anatoly Tykushin, Svetlana Ostrovskaya, Dmitry Volkov
Cybersecurity threats are constantly evolving, posing serious risks to organizations. Incident Response for Windows, by cybersecurity experts Anatoly Tykushin and Svetlana Ostrovskaya, provides a practical hands-on guide to mitigating threats in Windows environments, drawing from their real-world experience in incident response and digital forensics.Designed for cybersecurity professionals, IT administrators, and digital forensics practitioners, the book covers the stages of modern cyberattacks, including reconnaissance, infiltration, network propagation, and data exfiltration. It takes a step-by-step approach to incident response, from preparation and detection to containment, eradication, and recovery. You will also explore Windows endpoint forensic evidence and essential tools for gaining visibility into Windows infrastructure. The final chapters focus on threat hunting and proactive strategies to identify cyber incidents before they escalate.By the end of this book, you will gain expertise in forensic evidence collection, threat hunting, containment, eradication, and recovery, equipping them to detect, analyze, and respond to cyber threats while strengthening your organization's security posture
Roberto Martinez
With constantly evolving cyber threats, developing a cybersecurity incident response capability to identify and contain threats is indispensable for any organization regardless of its size. This book covers theoretical concepts and a variety of real-life scenarios that will help you to apply these concepts within your organization.Starting with the basics of incident response, the book introduces you to professional practices and advanced concepts for integrating threat hunting and threat intelligence procedures in the identification, contention, and eradication stages of the incident response cycle. As you progress through the chapters, you'll cover the different aspects of developing an incident response program. You'll learn the implementation and use of platforms such as TheHive and ELK and tools for evidence collection such as Velociraptor and KAPE before getting to grips with the integration of frameworks such as Cyber Kill Chain and MITRE ATT&CK for analysis and investigation. You'll also explore methodologies and tools for cyber threat hunting with Sigma and YARA rules.By the end of this book, you'll have learned everything you need to respond to cybersecurity incidents using threat intelligence.
Pascal Ackerman
With Industrial Control Systems (ICS) expanding into traditional IT space and even into the cloud, the attack surface of ICS environments has increased significantly, making it crucial to recognize your ICS vulnerabilities and implement advanced techniques for monitoring and defending against rapidly evolving cyber threats to critical infrastructure. This second edition covers the updated Industrial Demilitarized Zone (IDMZ) architecture and shows you how to implement, verify, and monitor a holistic security program for your ICS environment.You'll begin by learning how to design security-oriented architecture that allows you to implement the tools, techniques, and activities covered in this book effectively and easily. You'll get to grips with the monitoring, tracking, and trending (visualizing) and procedures of ICS cybersecurity risks as well as understand the overall security program and posture/hygiene of the ICS environment. The book then introduces you to threat hunting principles, tools, and techniques to help you identify malicious activity successfully. Finally, you'll work with incident response and incident recovery tools and techniques in an ICS environment.By the end of this book, you'll have gained a solid understanding of industrial cybersecurity monitoring, assessments, incident response activities, as well as threat hunting.
Shiva V. N. Parasram
Aby pomyślnie przeprowadzić dochodzenie cyfrowe, poza specjalnymi umiejętnościami i wiedzą techniczną musisz dysponować odpowiednimi narzędziami. Z rozwoju technologii korzystają również przestępcy, którzy popełniają swoje występki na wiele dotychczas nieznanych sposobów. W tych warunkach bezcenną pomoc możesz znaleźć w Kali Linuksie - potężnym systemie specjalnie przygotowanym do prowadzenia testów penetracyjnych i dochodzeń w informatyce śledczej. Ta książka pomoże Ci w doskonaleniu umiejętności potrzebnych na każdym etapie dochodzenia cyfrowego, od zbierania dowodów, poprzez ich analizę, po tworzenie raportów. Dzięki wielu wskazówkom i praktycznym ćwiczeniom przyswoisz techniki analizy, ekstrakcji danych i raportowania przy użyciu zaawansowanych narzędzi. Poznasz różne systemy przechowywania plików i nauczysz się wyszukiwać urządzenia sieciowe za pomocą skanerów Nmap i Netdiscover. Zapoznasz się też ze sposobami utrzymywania integralności cyfrowego materiału dowodowego. Znajdziesz tu ponadto omówienie kilku bardziej zaawansowanych tematów, takich jak pozyskiwanie ulotnych danych z sieci, nośników pamięci i systemów operacyjnych. Z książki dowiesz się: jak przygotować do pracy system Kali Linux na różnych platformach sprzętowych po co w analizach DFIR bada się zawartość RAM, a także systemy plików i nośniki danych jak używać narzędzi takich jak Scalpel, Magic Rescue, Volatility 3 czy Autopsy 4 czym jest ransomware i jak korzystać z artefaktów systemowych w dochodzeniach DFIR jak za pomocą narzędzi NFAT przechwytywać pakiety i analizować ruch sieciowy Kali Linux: Twój najlepszy partner w cyfrowej dochodzeniówce!
Infrastructure as Code Cookbook. Automate complex infrastructures
Stephane Jourdan, Pierre Pomes
Para 1: Infrastructure as code is transforming the way we solve infrastructural challenges. This book will show you how to make managing servers in the cloud faster, easier and more effective than ever before. With over 90 practical recipes for success, make the very most out of IAC.
Sasha Kranjac, Vladimir Stefanovic
MCSA: Windows Server 2016 certification is one of the most sought-after certifications for IT professionals, which includes working with Windows Server and performing administrative tasks around it. This book is aimed at the 70-740 certification and is part of Packt's three-book series on MCSA Windows Server 2016 certification, which covers Exam 70-740, Exam 70-741, and Exam 70-742.This book will cover exam objectives for the 70-740 exam, and starting from installing and configuring Windows Server 2016, Windows Server imaging and deployment to configuring and managing disks and volumes, implementing and configuring server storage and implementing Hyper-V. At the end of each chapter you will be provided test questions to revise your learnings which will boost your confidence in preparing for the actual certifications.By the end of this book, you will learn everything needed to pass the, MCSA Exam 70-740: Installation, Storage, and Compute with Windows Server 2016, certification.
Bekim Dauti
The Installing and Configuring Windows 10: 70-698 Exam Guide is designed to confirm what you already know, while also updating your knowledge of Windows 10. With its easy-to-follow guidance, you will quickly learn the user interface and discover steps to work efficiently in Windows 10 to rule out delays and obstacles.This book begins by covering various ways of installing Windows 10, followed by instructions on post-installation tasks. You will learn about the deployment of Windows 10 in Enterprise and also see how to configure networking in Windows 10. You’ll understand how to leverage Disk Management and Windows PowerShell to configure disks, volumes, and file system options. As you progress through the chapters, you will be able to set up remote management in Windows 10 and learn more about Windows update usage, behavior, and settings. You will also gain insights that will help you monitor and manage data recovery and explore how to configure authentication, authorization, and advanced management tools in Windows 10.By the end of this book, you will be equipped with enough knowledge to take the 70-698 exam and explore different study methods to improve your chances of passing the exam with ease.
Bekim Dauti
The Installing and Configuring Windows 10: 70-698 Exam Guide is designed to confirm what you already know, while also updating your knowledge of Windows 10. With its easy-to-follow guidance, you will quickly learn the user interface and discover steps to work efficiently in Windows 10 to rule out delays and obstacles.This book begins by covering various ways of installing Windows 10, followed by instructions on post-installation tasks. You will learn about the deployment of Windows 10 in Enterprise and also see how to configure networking in Windows 10. You’ll understand how to leverage Disk Management and Windows PowerShell to configure disks, volumes, and file system options. As you progress through the chapters, you will be able to set up remote management in Windows 10 and learn more about Windows update usage, behavior, and settings. You will also gain insights that will help you monitor and manage data recovery and explore how to configure authentication, authorization, and advanced management tools in Windows 10.By the end of this book, you will be equipped with enough knowledge to take the 70-698 exam and explore different study methods to improve your chances of passing the exam with ease.
Carmel Jacob
With the rise of cloud computing and virtualization comes a whole new threat to business security. When dealing with highly confidential information you need your security to be bulletproof. This book will help you do that.Instant Citrix Security How-to will allow you to achieve simplicity in security when dealing with real life examples. This guide will give your systems that extra layer of protection when they need it most. This book could be the difference between secure data and stolen data.Starting with how to deploy a Citrix Netscaler on DMZ this book presents you with options, their uses, and features that can be enabled. In order to ensure each recipe gives you the most benefit, case studies are included to show you real life implications of your decisions.This book will guide you through the world of load balancing using both content switching and redirection. We will also discuss load balancing based on geographical location and disaster recovery methods.The number of features within each module to reduce server load and CPU is astounding and will make your life, the end user, a walk in the park.
Andrew Mallett
Citrix XenApp is the market leader in application hosting and virtualization delivery, allowing users from different platforms such as Windows, Mac, Linux, and mobile devices to connect to their business applications. Using XenApp, you can deploy secure applications quickly to thousands of users. This book takes you through the deployment of your server farm. With the infrastructure in place, you can publish applications to users and manage load balancing within the server farm.Instant Citrix XenApp 6.5 is written to be a quick and effective guide to deploy your Citrix-based remote desktop server farm.You begin by laying out the resources required, such as the Licensing Server, the Web Interface Server, and the XenApp Server. You will then learn their purpose and move onto installing them in their logical order. Next, you can customize the web interface to brand it with your corporate identity. It won't be long before you have already published an application and resources for users and testing gets underway in earnest.
Onur Yilmaz , Süleyman Akba?ü
Kubernetes and DevOps are the two pillars that can keep your business at the top by ensuring high performance of your IT infrastructure. Introduction to DevOps with Kubernetes will help you develop the skills you need to improve your DevOps with the power of Kubernetes. The book begins with an overview of Kubernetes primitives and DevOps concepts. You'll understand how Kubernetes can assist you with overcoming a wide range of real-world operation challenges. You will get to grips with creating and upgrading a cluster, and then learn how to deploy, update, and scale an application on Kubernetes. As you advance through the chapters, you’ll be able to monitor an application by setting up a pod failure alert on Prometheus. The book will also guide you in configuring Alertmanager to send alerts to the Slack channel and trace down a problem on the application using kubectl commands. By the end of this book, you’ll be able to manage the lifecycle of simple to complex applications on Kubernetes with confidence.