|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > Microsoft Windows
The book Executing Windows Command Line Investigations targets the
needs of cyber security practitioners who focus on digital
forensics and incident response. These are the individuals who are
ultimately responsible for executing critical tasks such as
incident response; forensic analysis and triage; damage
assessments; espionage or other criminal investigations; malware
analysis; and responding to human resource violations. The authors
lead readers through the importance of Windows CLI, as well as
optimal configuration and usage. Readers will then learn the
importance of maintaining evidentiary integrity, evidence
volatility, and gain appropriate insight into methodologies that
limit the potential of inadvertently destroying or otherwise
altering evidence. Next, readers will be given an overview on how
to use the proprietary software that accompanies the book as a
download from the companion website. This software, called
Proactive Incident Response Command Shell (PIRCS), developed by
Harris Corporation provides an interface similar to that of a
Windows CLI that automates evidentiary chain of custody and reduces
human error and documentation gaps during incident response.
The Linux world is constantly changing, requiring new knowledge and
skills to work as a Linux system administrator. Linux Fundamentals,
Second Edition not only updates the first edition with new
material, but also changes the book's focus a bit, from a basic
approach to Linux to a more advanced server-oriented look at using
Linux. While the first edition tracked the skills needed to meet
the LPI Linux Fundamentals exam requirements, this edition tracks
the more advanced CompTIA Linux+ exam requirements. The Second
Edition provides a soft, accessible, and practical introduction to
Linux environments and command line basics. The addition of new
virtual labs will also empower students to apply theory in hands-on
exercises in real time. This edition dives deeper into the Linux
server environment, covering the commands you are expected to know
for the Linux+ exam. The updated chapters provide expanded coverage
on how to manage users, files, devices, and filesystems in a
multi-user networked server environment.
Breeze through the AZ-800 certification with this up-to-date
practical guide and gain valuable skills that will help you in your
day-to-day administration Key Features Develop a solid base of all
the essentials necessary to pass AZ-800 certification exam on your
first attempt Go beyond exam prep by working on practical examples
that will prepare you for the work ahead Simplify and automate your
workflows with Windows Admin Center, PowerShell, Azure Arc, and
IaaS VM Book DescriptionWritten by an Azure MVP and Microsoft
Certified Trainer with 20 years of experience in data center
infrastructure, this AZ-800 study guide is an essential preparation
tool for administrators who want to take the exam and acquire key
skills that will help them thrive in their careers. This book will
guide you through all the ways Windows Server can be used to manage
hybrid solutions on-premises and in the cloud, starting with
deploying and managing Active Directory Domain Services (AD DS) in
on-premises and cloud environments. You'll then dive into managing
virtual machines and containers and progress to implementing and
managing an on-premises and hybrid networking infrastructure. The
later parts of the book focus on managing storage and file
services, concluding with a detailed overview of all the knowledge
needed to pass the AZ-800 exam with practical examples throughout
the chapters. In the final chapter, you'll be able to test your
understanding of the topics covered with the help of practice exams
to make sure that you're completely prepared for the contents and
structure of the exam. By the end of the book, you'll have gained
the knowledge, both practical and conceptual, that's required to
administer Windows Server hybrid core infrastructure confidently.
What you will learn Deploy and manage AD DS on-premises and in
cloud environments Implement and manage hybrid core infrastructure
solutions for compute, storage, networking, identity, and
management Discover expert tips and tricks to achieve your
certification in the first go Master the hybrid implementation of
Windows Server running as virtual machines and containers Manage
storage and file services with ease Work through hands-on exercises
to prepare for the real world Who this book is forThis book is for
Windows Server administrators who want to pass the AZ-800 and
implement hybrid infrastructure on premises and in the cloud. Azure
administrators, enterprise architects, Microsoft 365
administrators, and network engineers will also get plenty of
useful insights from this book. You'll need a solid understanding
of the Windows Server to get started with this book, especially if
you're preparing for the exam.
Use over 100 PowerShell 7.2 recipes to deepen your understanding of
Windows Server 2022 and help you learn how to automate common
administrative tasks with ease. Key Features * New edition updated
to the latest version of PowerShell 7.2 and Windows Server 2022 *
Discover new ways to optimize your PowerShell code by working
through easy-to-follow recipes * Learn PowerShell best practices to
automate, manage and administrate Windows Server 2022 Book
Description Windows Server Automation with PowerShell Cookbook is
back with a new edition, featuring over 100 PowerShell recipes that
will make your day-to-day work easier. This book is designed to
help you learn how to install, configure, and use PowerShell 7.2
effectively. To start with, we'll look at how to install and
configure PowerShell 7.2, along with useful new features and
optimizations, and show you how the PowerShell compatibility
solution bridges the gap to older versions of PowerShell. We'll
also be covering a wide range of fundamental and more advanced use
cases, including how to create a VM and setup an Azure VPN as well
as looking at how to backup to Azure. As you progress, you'll
explore topics like using PowerShell to manage networking and DHCP
in Windows Server, objects in Active Directory, Hyper-V, and Azure.
We'll also take a closer look at WSUS, containers and see how to
handle modules that are not directly compatible with PowerShell 7.
Finally, you'll also learn how to use some powerful tools to
diagnose and resolve issues with Windows Server. By the end of this
PowerShell book, you'll know how to use the PowerShell 7.2 to
automate tasks on Windows Server 2022 with ease, helping your
windows environment to run faster and smoother. What you will learn
* Perform key admin tasks on Windows Server * Keep your
organization secure with JEA, group policies, logs, and Windows
Defender * Use the .NET Framework for administrative scripting *
Manage data and storage on Windows, including disks, volumes, and
filesystems * Report system performance using built-in cmdlets and
WMI to obtain single measurements * Apply the right tools and
modules to troubleshoot and debug Windows Server * Create, manage,
and backup a 2nd VM using the subnetwork in Azure * Learn how to
set up a VPN in Azure with PowerShell Who This Book Is For This
book is for systems administrators, software architects,
developers, consultants, and engineers working with Windows Server
2022 who want to automate tasks more effectively with PowerShell
7.2. You'll need have conquered the basics of PowerShell before you
can get started with this book.
Master the art of identifying and exploiting vulnerabilities with
Metasploit, Empire, PowerShell, and Python, turning Kali Linux into
your fighter cockpit Key Features Map your client's attack surface
with Kali Linux Discover the craft of shellcode injection and
managing multiple compromises in the environment Understand both
the attacker and the defender mindset Book DescriptionLet's be
honest-security testing can get repetitive. If you're ready to
break out of the routine and embrace the art of penetration
testing, this book will help you to distinguish yourself to your
clients. This pen testing book is your guide to learning advanced
techniques to attack Windows and Linux environments from the
indispensable platform, Kali Linux. You'll work through core
network hacking concepts and advanced exploitation techniques that
leverage both technical and human factors to maximize success.
You'll also explore how to leverage public resources to learn more
about your target, discover potential targets, analyze them, and
gain a foothold using a variety of exploitation techniques while
dodging defenses like antivirus and firewalls. The book focuses on
leveraging target resources, such as PowerShell, to execute
powerful and difficult-to-detect attacks. Along the way, you'll
enjoy reading about how these methods work so that you walk away
with the necessary knowledge to explain your findings to clients
from all backgrounds. Wrapping up with post-exploitation
strategies, you'll be able to go deeper and keep your access. By
the end of this book, you'll be well-versed in identifying
vulnerabilities within your clients' environments and providing the
necessary insight for proper remediation. What you will learn Get
to know advanced pen testing techniques with Kali Linux Gain an
understanding of Kali Linux tools and methods from behind the
scenes Get to grips with the exploitation of Windows and Linux
clients and servers Understand advanced Windows concepts and
protection and bypass them with Kali and living-off-the-land
methods Get the hang of sophisticated attack frameworks such as
Metasploit and Empire Become adept in generating and analyzing
shellcode Build and tweak attack scripts and modules Who this book
is forThis book is for penetration testers, information technology
professionals, cybersecurity professionals and students, and
individuals breaking into a pentesting role after demonstrating
advanced skills in boot camps. Prior experience with Windows,
Linux, and networking is necessary.
Effectively secure their cloud and hybrid infrastructure, how to
centrally manage security, and improve organizational security
posture Key Features Implement and optimize security posture in
Azure, hybrid, and multi-cloud environments Understand Microsoft
Defender for Cloud and its features Protect workloads using
Microsoft Defender for Cloud's threat detection and prevention
capabilities Book DescriptionMicrosoft Defender for Cloud is a
multi-cloud and hybrid cloud security posture management solution
that enables security administrators to build cyber defense for
their Azure and non-Azure resources by providing both
recommendations and security protection capabilities. This book
will start with a foundational overview of Microsoft Defender for
Cloud and its core capabilities. Then, the reader is taken on a
journey from enabling the service, selecting the correct tier, and
configuring the data collection, to working on remediation. Next,
we will continue with hands-on guidance on how to implement several
security features of Microsoft Defender for Cloud, finishing with
monitoring and maintenance-related topics, gaining visibility in
advanced threat protection in distributed infrastructure and
preventing security failures through automation. By the end of this
book, you will know how to get a view of your security posture and
where to optimize security protection in your environment as well
as the ins and outs of Microsoft Defender for Cloud. What you will
learn Understand Microsoft Defender for Cloud features and
capabilities Understand the fundamentals of building a cloud
security posture and defending your cloud and on-premises resources
Implement and optimize security in Azure, multi-cloud and hybrid
environments through the single pane of glass - Microsoft Defender
for Cloud Harden your security posture, identify, track and
remediate vulnerabilities Improve and harden your security and
services security posture with Microsoft Defender for Cloud
benchmarks and best practices Detect and fix threats to services
and resources Who this book is forThis book is for Security
engineers, systems administrators, security professionals, IT
professionals, system architects, and developers. Anyone whose
responsibilities include maintaining security posture, identifying,
and remediating vulnerabilities, and securing cloud and hybrid
infrastructure. Anyone who is willing to learn about security in
Azure and to build secure Azure and hybrid infrastructure, to
improve their security posture in Azure, hybrid and multi-cloud
environments by leveraging all the features within Microsoft
Defender for Cloud.
Windows XP can be a great tool, but it is all too easy to trip over
Windows XP's annoying traits more often than you leverage its
productivity. Windows XP power-users troll online resources,
documentation, and the expertise (or lucky finds) of friends for
valuable tips and tricks--a keyboard shortcut here, an undocumented
double-click there--to eliminate annoyances, save time, and take
control of their Windows XP. But what if there was an easier way?
This new book presents literally hundreds of problems and
solutions, amazing power tips, cool tricks, and clever workarounds
in one clearly organized, easy to use, and portable resource. Truly
insightful and amusing, Windows XP Hints gives Windows XP users
practical hints for everything from the desktop to Office programs
to the registry, and includes documented (but little-known) tips as
well as previously undocumented tricks. Windows XP Hints moves far
beyond mere productivity and explores what's possible with Windows
XP--including cool things you probably never thought of doing. An
understanding of Windows XP basics will get the job done. But
discovering the most useful I didn t know that! tips and shortcuts
will make using Windows
Discover and apply the Azure platform's most powerful data
solutions Cloud technologies are advancing at an accelerating pace,
supplanting traditional relational and data warehouse storage
solutions with novel, high-value alternatives. Now, three
pioneering Azure Data consultants offer an expert introduction to
the relational, non-relational, and data warehouse solutions
offered by the Azure platform. Drawing on their extensive
experience helping organizations get more value from the Microsoft
Data Platform, the authors guide you through decision-making,
implementation, operations, security, and more. Throughout,
step-by-step tutorials and hands-on exercises prepare you to
succeed, even if you have no cloud data experience. Three leading
experts in Microsoft Azure Data Solutions show how to: Master
essential concepts of data storage and processing in cloud
environments Handle the changing responsibilities of data engineers
moving to the cloud Get started with Azure data storage accounts
and other data facilities Walk through implementing relational and
non-relational data stores in Azure Secure data using the
least-permissions principle, Azure Active Directory, role-based
access control, and other methods Develop efficient Azure batch
processing and streaming solutions Monitor Azure SQL databases,
blob storage, data lakes, Azure Synapse Analytics, and Cosmos DB
Optimize Azure data solutions by solving problems with storage,
management, and service interactions About This Book For data
engineers, systems engineers, IT managers, developers, database
administrators, cloud architects, and other IT professionals
Requires little or no knowledge about Azure tools and services for
data analysis
Deploy, set up, and deliver network services with Windows Server
2022, along with exploring Microsoft's role-based certifications
Key Features Get started with server installation, performance
monitoring, and server maintenance Develop the skills necessary to
manage an enterprise environment Implement networking and security
best practices in your Windows Server environment Book
DescriptionThis third edition gets you up and running with Windows
Server 2022, Microsoft's new server operating system, as part of
the Windows NT family of operating systems, developed concurrently
with Windows 10, version 21H2. The book begins by introducing
computer networking and Windows Server concepts, gradually moving
towards Windows Server 2022. With the help of step-by-step
instructions and easy-to-understand graphics, you'll become well
versed with the roles, features, and functionalities of Windows
Server 2022. Topics such as the installation process, upgrades,
post-installation tasks, and initial server configuration are
covered in detail. As you make progress, you'll explore roles,
features, and role services such as Active Directory, DNS, Hyper-V,
remote access, storage, and printers, among others. The book then
takes you through maintenance and troubleshooting tasks to guide
you in efficiently managing Windows Server 2022. Finally, by
working with numerous questions in each chapter and detailed
answers at the end, you can test your understanding of the concepts
covered. By the end of this Windows Server book, you'll be equipped
with the knowledge needed to update, maintain, and troubleshoot
servers to ensure business continuity by relying on best practices
and using step-by-step graphic-driven examples. What you will learn
Grasp the fundamentals of Windows Server 2022 Understand how to
deploy Windows Server 2022 Discover Windows Server
post-installation tasks Add roles to your Windows Server
environment Apply Windows Server 2022 GPOs to your network Delve
into virtualization and Hyper-V concepts Tune, maintain, update,
and troubleshoot Windows Server 2022 Get familiar with Microsoft's
role-based certifications Who this book is forIf you are an IT
professional who wants to deploy and configure Windows Server 2022,
then this book is for you. You can also use this book to learn
about Microsoft's role-based certifications if you're planning to
enroll in a course. No prior experience with Windows Server
operating systems or familiarity with networking concepts is
required.
A comprehensive guide to administering and protecting the latest
Windows 11 and Windows server operating system from ongoing cyber
threats using zero-trust security principles Key Features Learn to
protect your Windows environment using zero-trust and a
multi-layered security approach Implement security controls using
Intune, Configuration Manager, Defender for Endpoint, and more
Understand how to onboard modern cyber-threat defense solutions for
Windows clients Book DescriptionAre you looking for the most
current and effective ways to protect Windows-based systems from
being compromised by intruders? This updated second edition is a
detailed guide that helps you gain the expertise to implement
efficient security measures and create robust defense solutions
using modern technologies. The first part of the book covers
security fundamentals with details around building and implementing
baseline controls. As you advance, you'll learn how to effectively
secure and harden your Windows-based systems through hardware,
virtualization, networking, and identity and access management
(IAM). The second section will cover administering security
controls for Windows clients and servers with remote policy
management using Intune, Configuration Manager, Group Policy,
Defender for Endpoint, and other Microsoft 365 and Azure cloud
security technologies. In the last section, you'll discover how to
protect, detect, and respond with security monitoring, reporting,
operations, testing, and auditing. By the end of this book, you'll
have developed an understanding of the processes and tools involved
in enforcing security controls and implementing zero-trust security
principles to protect Windows systems. What you will learn Build a
multi-layered security approach using zero-trust concepts Explore
best practices to implement security baselines successfully Get to
grips with virtualization and networking to harden your devices
Discover the importance of identity and access management Explore
Windows device administration and remote management Become an
expert in hardening your Windows infrastructure Audit, assess, and
test to ensure controls are successfully applied and enforced
Monitor and report activities to stay on top of vulnerabilities Who
this book is forIf you're a cybersecurity or technology
professional, solutions architect, systems engineer, systems
administrator, or anyone interested in learning how to secure the
latest Windows-based systems, this book is for you. A basic
understanding of Windows security concepts, Intune, Configuration
Manager, Windows PowerShell, and Microsoft Azure will help you get
the best out of this book.
Simplified actionable recipes for managing Active Directory and
Azure AD, as well as Azure AD Connect, for administration
on-premise and in the cloud with Windows Server 2022 Key Features
Expert solutions for name resolution, federation, certificates, and
security with Active Directory Explore Microsoft Azure AD and Azure
AD Connect for effective administration on the cloud Automate
security tasks using Active Directory tools and PowerShell Book
DescriptionUpdated to the Windows Server 2022, this second edition
covers effective recipes for Active Directory administration that
will help you leverage AD's capabilities for automating network,
security, and access management tasks in the Windows
infrastructure. Starting with a detailed focus on forests, domains,
trusts, schemas, and partitions, this book will help you manage
domain controllers, organizational units, and default containers.
You'll then explore Active Directory sites management as well as
identify and solve replication problems. As you progress, you'll
work through recipes that show you how to manage your AD domains as
well as user and group objects and computer accounts, expiring
group memberships, and Group Managed Service Accounts (gMSAs) with
PowerShell. Once you've covered DNS and certificates, you'll work
with Group Policy and then focus on federation and security before
advancing to Azure Active Directory and how to integrate on-premise
Active Directory with Azure AD. Finally, you'll discover how
Microsoft Azure AD Connect synchronization works and how to harden
Azure AD. By the end of this AD book, you'll be able to make the
most of Active Directory and Azure AD Connect. What you will learn
Manage the Recycle Bin, gMSAs, and fine-grained password policies
Work with Active Directory from both the graphical user interface
(GUI) and command line Use Windows PowerShell to automate tasks
Create and remove forests, domains, domain controllers, and trusts
Create groups, modify group scope and type, and manage memberships
Delegate, view, and modify permissions Set up, manage, and
optionally decommission certificate authorities Optimize Active
Directory and Azure AD for security Who this book is forThis book
is for administrators of existing Active Directory Domain Service
environments as well as for Azure AD tenants looking for guidance
to optimize their day-to-day tasks. Basic networking and Windows
Server Operating System knowledge will be useful for getting the
most out of this book.
Direct from Microsoft, these Exam Refs are the official study
guides for the new Microsoft 70-767 Implementing a SQL Data
Warehouse and the new Microsoft 70-768 Developing SQL Data Models
certification exams. Exam Ref 70-767 Implementing a SQL Data
Warehouse, the first book in this bundle (ISBN 978150936473),
offers professional-level preparation that helps candidates
maximize their exam performance and sharpen their skills on the
job. It focuses on the specific areas of expertise modern IT
professionals need to successfully build modern data warehouses to
support advanced business intelligence solutions. Written by
Microsoft Data Platform MVP Stacia Varga, Exam Ref 70-768
Developing SQL Data Models, the second book in this bundle (ISBN
9781509305155), offers professional-level preparation that helps
candidates maximize their exam performance and sharpen their skills
on the job. It focuses on the specific areas of expertise modern
database and business intelligence professionals need to succeed
with SQL Server 2016 Analysis Services.
Develop secure applications using different features of Azure
Active Directory along with modern authentication techniques and
protocols Key Features Confidently secure your Azure applications
using the tools offered by Azure AD Get to grips with the most
modern and effective authorization and authentication protocols
Unlock the potential of Azure AD's most advanced features including
Microsoft Graph and Azure AD B2C Book DescriptionAzure Active
Directory for Secure Application Development is your one-stop shop
for learning how to develop secure applications using modern
authentication techniques with Microsoft Azure AD. Whether you're
working with single-tenant, multi-tenant, or line-of-business
applications, this book contains everything you need to secure
them. The book wastes no time in diving into the practicalities of
Azure AD. Right from the start, you'll be setting up tenants,
adding users, and registering your first application in Azure AD.
The balance between grasping and applying theory is maintained as
you move from the intermediate to the advanced: from the basics of
OAuth to getting your hands dirty with building applications and
registering them in Azure AD. Want to pin down the Microsoft Graph,
Azure AD B2C, or authentication protocol best practices? We've got
you covered. The full range of Azure AD functionality from a
developer perspective is here for you to explore with confidence.
By the end of this secure app development book, you'll have
developed the skill set that so many organizations are clamoring
for. Security is mission-critical, and after reading this book, you
will be too. What you will learn Get an overview of Azure AD and
set up your Azure AD instance Master application configuration and
the use of service principals Understand new authentication
protocols Explore the Microsoft Identity libraries Use OpenID
Connect, OAuth 2.0, and MSAL to make sign-in fully secure Build a
custom app that leverages the Microsoft Graph API Deploy Azure AD
B2C to meet your security requirements Create user flows and
policies in Azure AD B2C Who this book is forIf you are a developer
or architect who has basic knowledge of Azure Active Directory and
are looking to gain expertise in the application security domain,
this is the book for you. Basic Azure knowledge and experience in
building web applications and web APIs in C# will help you get the
most out of this book.
|
|