Windows 10

Windows 10 — na wstępie przypominający połączenie cieszącego się dużym uznaniem użytkowników systemu Windows 7 z nowatorskim Windows 8 — został zaprojektowany tak, aby wykorzystać najnowsze technologie (przede wszystkim ekrany dotykowe) do usprawnienia codziennej pracy z komputerem.

To pierwsza wersja Windows, która została opracowana z myślą o użytkownikach komputerów (tu wzorem był wysoko oceniany przez użytkowników komputerów PC Windows 7), tabletów (w tym zakresie wykorzystane zostały doświadczenia z systemu Windows 8) i smartfonów (Windows 10 zastąpił system Windows Phone). Windows 10 jest tak uniwersalny, że firma Microsoft zdecydowała, iż będzie on również systemem nowej wersji konsoli Xbox.

17
Ładowanie...
EBOOK

Enterprise PowerShell Scripting Bootcamp. The fastest way to learn PowerShell scripting

Brenton J.W. Blawat

Enterprise PowerShell Scripting Bootcamp explains how to create your own repeatable PowerShell scripting framework. This framework contains script logging methodologies, answer file interactions, and string encryption and decryption strategies.This book focuses on evaluating individual components to identify the system’s function, role, and unique characteristics. To do this, you will leverage built-in CMDlets and Windows Management Instrumentation (WMI) to explore Windows services, Windows processes, Windows features, scheduled tasks, and disk statistics. You will also create custom functions to perform a deep search for specific strings in files and evaluate installed software through executable properties.We will then discuss different scripting techniques to improve the efficiency of scripts. By leveraging several small changes to your code, you can increase the execution performance by over 130%.By the end of this book, you will be able to tie all of the concepts together in a PowerShell-based Windows server scanning script. This discovery script will be able to scan a Windows server to identify a multitude of components.

18
Ładowanie...
EBOOK

Generative AI for Software Developers. Future-proof your career with AI-powered development and hands-on skills

Saurabh Shrivastava, Kamal Arora, Ashutosh Dubey, Sanjeet...

Generative AI for Software Developers is your practical guide to mastering AI-powered development and staying ahead in a fast-changing industry. Through a structured, hands-on approach, this book helps you understand, implement, and optimize Generative AI in modern software engineering. From AI-assisted coding, debugging, and documentation to testing, deployment, and system design, it equips you with the skills to integrate AI seamlessly into your workflows.You’ll work with tools such as GitHub Copilot, Amazon Q Developer, and OpenAI APIs while learning strategies for prompt engineering, fine-tuning, and building scalable AI-powered applications. Featuring real-world use cases, best practices, and expert insights, this book bridges the gap between experimenting with AI and production deployment.Whether you’re an aspiring AI developer, experienced engineer, or solutions architect, this guide gives you the clarity, confidence, and tactical knowledge to thrive in the GenAI-driven future of software development. Armed with these insights, you’ll be ready to build, integrate, and scale intelligent solutions that enhance every stage of the software development lifecycle.

19
Ładowanie...
EBOOK

Getting Started with Microsoft System Center Operations Manager. Using SCOM 2016 TP 5

Kevin Greene

Most modern IT environments comprise a heterogeneous mixture of servers, network devices, virtual hypervisors, storage solutions, cross-platform operating systems and applications. All this complexity brings a requirement to deliver a centralized monitoring and reporting solution that can help IT administrators quickly identify where the problems are and how best to resolve them. Using System Center Operations Manager (OpsMgr), administrators get a full monitoring overview of the IT services they have responsibility for across the organization - along with some useful management capabilities to help them remediate any issues they've been alerted to.This book begins with an introduction to OpsMgr and its core concepts and then walks you through designing and deploying the various roles. After a chapter on exploring the consoles, you will learn how to deploy agents, work with management packs, configure network monitoring and model your IT services using distributed applications. There’s a chapter dedicated to alert tuning and another that demonstrates how to visualize your IT using dashboards. The final chapters in the book discuss how to create alert subscriptions, manage reports, backup and recover OpsMgr, perform maintenance and troubleshoot common problems.

20
Ładowanie...
EBOOK

Getting Started with Nano Server. Automate multiple VMs and transform your datacenter

Charbel Nemnom

Nano Server allows developers and operations teams to work closely together and use containers that package applications so that the entire platform works as one. The aim of Nano Server is to help applications run the way they are intended to. It can be used to run and deploy infrastructures (acting as a compute host, storage host, container, or VM guest operating system) without consuming significant resources. Although Nano Server isn't intended to replace Server 2016 or 2012 R2, it will be an attractive choice for developers and IT teams.Want to improve your ability to deploy a new VM and install and deploy container apps within minutes? You have come to the right place! The objective of this book is to get you started with Nano Server successfully. The journey is quite exciting, since we are introducing you to a cutting-edge technology that will revolutionize today's datacenters. We'll cover everything from the basic to advanced topics. You'll discover a lot of added value from using Nano Server, such as hundreds of VM types on a single host through a small footprint, which could be a big plus for you and your company. After reading this book, you will have the necessary skills to start your journey effectively using Nano Server.

21
Ładowanie...
EBOOK

Gray Hat C#. Język C# w kontroli i łamaniu zabezpieczeń

Brandon Perry

C# to nowoczesny język programowania, który został od podstaw zaprojektowany jako obiektowy. Ta dojrzała technologia jest często wybierana przez twórców oprogramowania, również tego służącego do pokonywania zabezpieczeń systemów. Dzięki temu, że platforma .NET jest oprogramowaniem open source, w C# można pisać kod, który bez problemu będzie działał w każdym systemie operacyjnym. Co prawda język ten jest prosty i łatwy do nauczenia się, jednak dopiero gruntowna znajomość C# umożliwia efektywne tworzenie narzędzi związanych z bezpieczeństwem, służących choćby do wyszukiwania luk w infrastrukturze czy prowadzenia testów penetracyjnych. Ta książka jest przeznaczona dla specjalistów ds. bezpieczeństwa, którzy chcą korzystać z języka C# do takich zadań jak fuzzowanie, skanowanie w poszukiwaniu luk zabezpieczeń i analiza złośliwego oprogramowania. Opisano tu zarówno podstawy języka C#, jak i jego dość zaawansowane funkcje. Przedstawiono szereg bibliotek dostępnych dla tego języka. Pokazano, jak pisać kod wyszukujący luki w zabezpieczeniach i jak tworzyć eksploity. Przedstawiono sposoby korzystania z takich narzędzi jak Nessus, sqlmap i Cuckoo Sandbox. Dzięki technikom zaprezentowanym w książce administrator bezpieczeństwa bez problemu zautomatyzuje nawet najbardziej żmudne codzienne zadania! W tej książce między innymi: Podstawowe i zaawansowane funkcjonalności języka C# Generowanie kodu ładunków, również wieloplatformowych Skanery, w tym OpenVAS, Nessus i Nexpose Automatyczna identyfikacja luk umożliwiających wstrzyknięcie kodu SQL Tworzenie w C# narzędzi do inżynierii wstecznej C#. Sprawdź swój system zabezpieczeń! Brandon Perry jest programistą i gorącym zwolennikiem idei open source. Odkąd pojawiło się środowisko Mono, pisze aplikacje w języku C#. Tworzy też moduły dla frameworka Metasploit, analizuje pliki binarne i zarządza ciekawymi projektami (https://volatileminds.net/). Fascynuje się badaniami nad bezpieczeństwem systemów informatycznych. Chętnie dzieli się swoją wiedzą, pisze książki i pomaga innym w tworzeniu solidniejszego oprogramowania.

22
Ładowanie...
EBOOK

Hands-On MLOps on Azure. Automate, secure, and scale ML workflows with the Azure ML CLI, GitHub, and LLMOps

Banibrata De

Effective machine learning (ML) now demands not just building models but deploying and managing them at scale. Written by a seasoned senior software engineer with high-level expertise in both MLOps and LLMOps, Hands-On MLOps on Azure equips ML practitioners, DevOps engineers, and cloud professionals with the skills to automate, monitor, and scale ML systems across environments.The book begins with MLOps fundamentals and their roots in DevOps, exploring training workflows, model versioning, and reproducibility using pipelines. You'll implement CI/CD with GitHub Actions and the Azure ML CLI, automate deployments, and manage governance and alerting for enterprise use. The author draws on their production ML experience to provide you with actionable guidance and real-world examples. A dedicated section on LLMOps covers operationalizing large language models (LLMs) such as GPT-4 using RAG patterns, evaluation techniques, and responsible AI practices. You'll also work with case studies across Azure, AWS, and GCP that offer practical context for multi-cloud operations.Whether you're building pipelines, packaging models, or deploying LLMs, this guide delivers end-to-end strategy to build robust, scalable systems. By the end of this book, you'll be ready to design, deploy, and maintain enterprise-grade ML solutions with confidence.

23
Ładowanie...
EBOOK

Hands-On Penetration Testing on Windows. Unleash Kali Linux, PowerShell, and Windows debugging tools for security testing and analysis

Phil Bramwell

Windows has always been the go-to platform for users around the globe to perform administration and ad hoc tasks, in settings that range from small offices to global enterprises, and this massive footprint makes securing Windows a unique challenge. This book will enable you to distinguish yourself to your clients.In this book, you'll learn advanced techniques to attack Windows environments from the indispensable toolkit that is Kali Linux. We'll work through core network hacking concepts and advanced Windows exploitation techniques, such as stack and heap overflows, precision heap spraying, and kernel exploitation, using coding principles that allow you to leverage powerful Python scripts and shellcode.We'll wrap up with post-exploitation strategies that enable you to go deeper and keep your access. Finally, we'll introduce kernel hacking fundamentals and fuzzing testing, so you can discover vulnerabilities and write custom exploits. By the end of this book, you'll be well-versed in identifying vulnerabilities within the Windows OS and developing the desired solutions for them.

24
Ładowanie...
EBOOK

Incident Response for Windows. Adapt effective strategies for managing sophisticated cyberattacks targeting Windows systems

Anatoly Tykushin, Svetlana Ostrovskaya, Dmitry Volkov

Cybersecurity threats are constantly evolving, posing serious risks to organizations. Incident Response for Windows, by cybersecurity experts Anatoly Tykushin and Svetlana Ostrovskaya, provides a practical hands-on guide to mitigating threats in Windows environments, drawing from their real-world experience in incident response and digital forensics.Designed for cybersecurity professionals, IT administrators, and digital forensics practitioners, the book covers the stages of modern cyberattacks, including reconnaissance, infiltration, network propagation, and data exfiltration. It takes a step-by-step approach to incident response, from preparation and detection to containment, eradication, and recovery. You will also explore Windows endpoint forensic evidence and essential tools for gaining visibility into Windows infrastructure. The final chapters focus on threat hunting and proactive strategies to identify cyber incidents before they escalate.By the end of this book, you will gain expertise in forensic evidence collection, threat hunting, containment, eradication, and recovery, equipping them to detect, analyze, and respond to cyber threats while strengthening your organization's security posture