Hacking

Czy chciałbyś głębiej wniknąć w świat cyberbezpieczeństwa oraz nowoczesnych technologii? Na pewno zainteresuje Cię w takim razie nasza biblioteka online. Znajdziesz tutaj książki, dzięki którym poznasz metody wykorzystywane przez hakerów. Dowiesz się także, jak skutecznie chronić dane oraz testować programy i wykrywać w nich błędy.

441
Ebook

Mastering SAP ABAP. A complete guide to developing fast, durable, and maintainable ABAP programs in SAP

Pawe?Ç Grze?okowiak, Wojciech Ciesielski, Wojciech fÜwik

Advanced Business Application Programming (ABAP) is an established and complex programming language in the IT industry. This book is designed to help you use the latest ABAP techniques and apply legacy constructions using practical examples.You'll start with a quick refresher on language and database concepts, followed by agile techniques for adding custom code to a modern ABAP system. After this, you will get up to speed with the complete ABAP toolset for importing data to and from different environments. Next, you'll learn how to print forms and work with the different ABAP tools for Extensible Markup Language (XML) manipulation. While covering further chapters, you'll gain insights into building stunning UI5 interfaces, in addition to learning how to develop simple apps using the Business Object Processing Framework (BOPF). You will also pick up the technique of handling exceptions and performing testing in ABAP. In the concluding chapters, you can look forward to grasping various techniques for optimizing the performance of programs using a variety of performance analysis tools.By the end of this book, you will have the expertise you need to confidently build maintainable programs in Systems, Applications, and Products (SAP).

442
Ebook

Mastering Spring 5.0. Master reactive programming, microservices, Cloud Native applications, and more

Ranga Rao Karanam

Spring 5.0 is due to arrive with a myriad of new and exciting features that will change the way we’ve used the framework so far. This book will show you this evolution—from solving the problems of testable applications to building distributed applications on the cloud.The book begins with an insight into the new features in Spring 5.0 and shows you how to build an application using Spring MVC. You will realize how application architectures have evolved from monoliths to those built around microservices. You will then get a thorough understanding of how to build and extend microservices using Spring Boot. You will also understand how to build and deploy Cloud-Native microservices with Spring Cloud. The advanced features of Spring Boot will be illustrated through powerful examples. We will be introduced to a JVM language that’s quickly gaining popularity - Kotlin. Also, we will discuss how to set up a Kotlin project in Eclipse.By the end of the book, you will be equipped with the knowledge and best practices required to develop microservices with the Spring Framework.

443
Ebook
444
Ebook

Mastering Veeam Backup & Replication 10. Protect your virtual environment and implement cloud backup using Veeam technology

Chris Childerhose

Veeam is one of the leading modern data protection solutions, and mastering this technology can help you to protect your virtual environments effectively. This book guides you through implementing modern data protection solutions for your cloud and virtual infrastructure with Veeam. You will even gain in-depth knowledge of advanced concepts such as DataLabs, cloud backup and recovery, Instant VM Recovery, and Veeam ONE.This book starts by taking you through Veeam essentials, including installation, best practices, and optimizations for Veeam Backup & Replication. You'll get to grips with the 3-2-1 rule to safeguard data along with understanding how to set up a backup server, proxies, repositories, and more. Later chapters go on to cover a powerful feature of Veeam 10 – NAS backup. As you progress, you'll learn about scale-out Repositories and best practices for creating them. In the concluding chapters, you'll explore the new proxy option available in both Linux and Windows. Finally, you'll discover advanced topics such as DataLabs, cloud backup and recovery, Instant VM Recovery, and Veeam ONE.By the end of this book, you will be equipped with the skills you need to implement Veeam Backup & Replication for your environment and disaster recovery.

445
Ebook

Mastering Veeam Backup & Replication. Design and deploy a secure and resilient Veeam 12 platform using best practices - Third Edition

Chris Childerhose

Veeam is one of the leading modern data protection solutions, making it a necessary skill for anyone responsible for backing up virtual environments. This new edition of Mastering Veeam Backup & Replication is revised and updated to cover Veeam version 12.This edition covers some new features added to the application, such as VeeaMover, Per Machine Backup chains, and MFA on the console. The book guides you through implementing modern data protection solutions for your cloud and virtual infrastructure with Veeam while helping you master advanced concepts such as Continuous Data Protection (CDP), extended object storage support, VeeaMover, and security settings. You’ll dive deep into other new features as well, such as Direct to Object storage, Object to Tape and learn about CDP from a service provider perspective with Veeam Cloud Connect (VCC).By the end of this Veeam book, you'll be able to successfully implement Veeam Backup & Replication to secure your environment and enable disaster recovery.

446
Ebook

Mastering Veeam Backup & Replication. Secure backup with Veeam 11 for defending your data and accelerating your data protection strategy - Second Edition

Chris Childerhose

Veeam is one of the leading modern data protection solutions, making it a necessary skill for anyone responsible for securing virtual environments. This revised second edition of Mastering Veeam Backup & Replication is updated to cover Veeam version 11. The book guides you through implementing modern data protection solutions for your cloud and virtual infrastructure with Veeam, all while helping you master advanced concepts such as Continuous Data Protection (CDP), extended object storage support, Veeam ONE enhancements, and Orchestrator.Starting with Veeam essentials, including installation, best practices, and optimizations for Veeam Backup & Replication, you'll get to grips with the 3-2-1-1-0 rule to safeguard data. You'll understand how to set up a backup server, proxies, repositories, and more and then advance to cover a powerful feature of Veeam 11 – CDP. As you progress, you'll learn about immutability (also known as hardened repositories) and discover the best practices for creating them. Finally, you'll explore the new proxy option available in Linux and become well-versed with advanced topics such as extended object storage support, Veeam ONE enhancements, and Orchestrator.By the end of this Veeam book, you'll be able to implement Veeam Backup & Replication for securing your environment and enabling disaster recovery.

447
Ebook

Mastering Vim. Build a software development environment with Vim and Neovim

Ruslan Osipov

Vim is a ubiquitous text editor that can be used for all programming languages. It has an extensive plugin system and integrates with many tools. Vim offers an extensible and customizable development environment for programmers, making it one of the most popular text editors in the world. Mastering Vim begins with explaining how the Vim editor will help you build applications efficiently. With the fundamentals of Vim, you will be taken through the Vim philosophy. As you make your way through the chapters, you will learn about advanced movement, text operations, and how Vim can be used as a Python (or any other language for that matter) IDE. The book will then cover essential tasks, such as refactoring, debugging, building, testing, and working with a version control system, as well as plugin configuration and management. In the concluding chapters, you will be introduced to additional mindset guidelines, learn to personalize your Vim experience, and go above and beyond with Vimscript.By the end of this book, you will be sufficiently confident to make Vim (or its fork, Neovim) your first choice when writing applications in Python and other programming languages.

448
Ebook

Mastering Windows Security and Hardening. Secure and protect your Windows environment from cyber threats using zero-trust security principles - Second Edition

Mark Dunkerley, Matt Tumbarello

Are you looking for the most current and effective ways to protect Windows-based systems from being compromised by intruders? This updated second edition is a detailed guide that helps you gain the expertise to implement efficient security measures and create robust defense solutions using modern technologies.The first part of the book covers security fundamentals with details around building and implementing baseline controls. As you advance, you’ll learn how to effectively secure and harden your Windows-based systems through hardware, virtualization, networking, and identity and access management (IAM). The second section will cover administering security controls for Windows clients and servers with remote policy management using Intune, Configuration Manager, Group Policy, Defender for Endpoint, and other Microsoft 365 and Azure cloud security technologies. In the last section, you’ll discover how to protect, detect, and respond with security monitoring, reporting, operations, testing, and auditing.By the end of this book, you’ll have developed an understanding of the processes and tools involved in enforcing security controls and implementing zero-trust security principles to protect Windows systems.