![]() |
![]() |
Your cart is empty |
||
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > Microsoft Windows
The definitive guide to modern Windows internals: new coverage of virtualization, file systems, boot, security, and more. For advanced computing professionals, this is the definitive up-to-date guide to how Windows core components behave "under the hood." Using it, experienced developers can build more powerful and scalable software, administrators can debug complex system and performance problems, and security researchers can harden their systems. This Seventh Edition is fully updated through the May 2021 (21H1/2104) updates to Windows 10 and Windows Server (2022, 2019, and 2016). It adds extensive content on Hyper-V, plus fully rewritten chapters on the boot process, new storage technologies, and Windows system and management mechanisms. As always, it delivers unparalleled insight based on insider access to Microsoft source code, with hands-on experiments using the latest debugging tools to show you Windows' internal behaviors firsthand. With Windows 11 introducing new user interface design elements that build upon the same core technologies as Windows 10, readers will be well-prepared for this new chapter of computing. Leading Windows insiders help you: * Discover system mechanisms for serving device drivers and applications, including ALPC, Object Manager, synchronization, WNF, WoW64, and the processor execution model * Explore underlying hardware architecture, including trap processing, segmentation, and side channel vulnerabilities * Understand Windows virtualization, and how virtualization-based security (VBS) protects against OS vulnerabilities * Delve into key management and configuration mechanisms, including the Registry, Windows services, WMI, and Task Scheduling * Explore diagnostic services such as Event Tracing for Windows (ETW) and DTrace * Learn how the cache manager and file system drivers interact to provide reliable support for files, directories, and disks, including on Persistent Memory (NVDIMM) DAX devices. * Understand NTFS, ReFS, and other Windows file systems * Review Windows startup/shutdown operations, and OS components involved in boot flow * Analyze UEFI-based Secure Boot, Measured Boot, and Secure Launch About This Book * For experienced programmers, architects, software quality and performance specialists, administrators, security practitioners, and support professionals * Assumes you are a Windows power user
Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed, followed by a concise discussion of the core networking skills you need to have to gain a strong handle on the subject matter. Chapters conclude with review questions and suggested labs so you can measure your level of understanding of the chapter's content.Serves as an ideal resource for gaining a solid understanding of fundamental security concepts and skillsOffers a straightforward and direct approach to security basics and covers anti-malware software products, firewalls, network topologies and devices, network ports, and moreReviews all the topics you need to know for taking the MTA 98-367 examProvides an overview of security components, looks at securing access with permissions, addresses audit policies and network auditing, and examines protecting clients and servers If you're new to IT and interested in entering the IT workforce, then "Microsoft Windows Security Essentials" is essential reading.
This book covers the most important topics in the area of pattern recognition, object recognition, computer vision, robot vision, medical computing, computational geometry, and bioinformatics systems. Students and researchers will find a comprehensive treatment of polygonal approximation and its real life applications. The book not only explains the theoretical aspects but also presents applications with detailed design parameters. The systematic development of the concept of polygonal approximation of digital curves and its scale-space analysis are useful and attractive to scholars in many fields.
If you work in an office, you probably don't lose much sleep worrying about whether your files are safe if your PC melts down. Company IT departments handle those things for business networks. But how about all those precious photos, address lists, the family genealogy, and everything else that lives on your home network? Windows Home Server can save the day if one of your personal PCs hiccups, and "Windows Home Server For Dummies" serves up all the stuff you need to know to put it to work. Forget everything you've heard about previous versions of Windows Server; this all-new variation has been designed for people who don't wear white lab coats or pocket protectors. Woody Leonhard has tested it and it passed with flying colors. If you have a home or small business network, this book shows you how Windows Home Server helps youShare files among all the PCs in your homeAccess your files from anywhereMake regular backups automaticallyStore files securelyPlay music, TV shows, or movies on your XboxShare multimedia across your networkKeep your virus protection and system upgrades up to dateGet regular reports on the overall health of your network "Windows Home Server For Dummies" provides sage advice on choosing a version of Windows Home Server, installing it, setting up users and passwords, using remote access, scheduling automatic scans and backups, and having fun with multimedia. Trust Woody-- you'll sleep better.
Optimize Windows system reliability and performance with Sysinternals IT pros and power users consider the free Windows Sysinternals tools indispensable for diagnosing, troubleshooting, and deeply understanding the Windows platform. In this extensively updated guide, Sysinternals creator Mark Russinovich and Windows expert Aaron Margosis help you use these powerful tools to optimize any Windows system's reliability, efficiency, performance, and security. The authors first explain Sysinternals' capabilities and help you get started fast. Next, they offer in-depth coverage of each major tool, from Process Explorer and Process Monitor to Sysinternals' security and file utilities. Then, building on this knowledge, they show the tools being used to solve real-world cases involving error messages, hangs, sluggishness, malware infections, and much more. Windows Sysinternals creator Mark Russinovich and Aaron Margosis show you how to: Use Process Explorer to display detailed process and system information Use Process Monitor to capture low-level system events, and quickly filter the output to narrow down root causes List, categorize, and manage software that starts when you start or sign in to your computer, or when you run Microsoft Office or Internet Explorer Verify digital signatures of files, of running programs, and of the modules loaded in those programs Use Autoruns, Process Explorer, Sigcheck, and Process Monitor features that can identify and clean malware infestations Inspect permissions on files, keys, services, shares, and other objects Use Sysmon to monitor security-relevant events across your network Generate memory dumps when a process meets specified criteria Execute processes remotely, and close files that were opened remotely Manage Active Directory objects and trace LDAP API calls Capture detailed data about processors, memory, and clocks Troubleshoot unbootable devices, file-in-use errors, unexplained communication, and many other problems Understand Windows core concepts that aren't well-documented elsewhere
This is the story of Microsoft(R) and how it rose to become the first monopoly of the information Age. The text is assembled from Ted Lewis's columns published in "IEEE Computer" (1994-1998), "IEEE Internet Computing," and "Scientific American," "Microsoft Rising" is a tale of great, emotion, and techno-marketing hype in one of the fastest growing, mainline industries of the world. It is an eye witness account to the changing computer industry and the story of Silicon Valley and how it works, a revisionist history of computing, circa 1990-2000. "Microsoft Rising" is ultimately about Microsoft's domination of the computer industry. This book reports the author's personal history through the early 1990's to the end of the decade. These stories often try to predict or explain the chaos of Silicon Valley. Lewis analyzes the industry and shows how high-technology industry is constantly changing in turmoil and upheaval. He also examines the art of software development and deals with innovation and the emergence of techno-society. The book does not promise any answers, but rather concludes this short journey into the recent past with a number of provoking ideas about the future of hi-tech.
Description A new generation of serverless tools, including Claudia.js, make it radically easier to set up serverless web applications so users can focus on what their app does instead of meddling with infrastructure configuration and deployment. Serverless Apps with Node and Claudia.js walks readers through building serverless apps on AWS using JavaScript. They'll learn to simplify the design and development process so they can focus on getting their application deployed as fast as possible without sacrificing quality. Key features * Create a serverless API using AWS Lambda and Claudia.js * Build a voice assistant with Amazon Alexa * Develop microservices with Node.js, AWS Lambda, S3, and more * Create a chatbot for multiple platforms Audience Written for beginner and intermediate web developers comfortable with JavaScript and Node.js. Some prior experience with AWS is required. About the technology Serverless computing services like AWS Lambda and API Gateway can be tedious to set up, aren't designed to work well with JavaScript and Node, and most of the quirks and gotchas aren't well documented. Claudia doesn't alter your project layout or abstract away the core AWS services; it just makes it easier to get started with them!
Conquer today’s Windows 10–from the inside out!
Barry Kauler explains the exacting details of Windows programming at the systems level, revealing architectural details that Microsoft has never publicly documented. Ideal for software developers who are moving applications from 3.x to Win95, the book gives how-to information and systems programming tips and tricks. The companion disk contains all example programs, source code, and utilities in the book.
This book/disk set for experienced developers offers alternatives for interfacing Windows applications to hardware. This new edition has been expanded to include Windows 95. The companion disk includes source code and tools. (Computer Books - Languages/Programming)
Software developer and author Karen Hazzah expands her original treatise on device drivers in the second edition of Writing Windows VxDs and Device Drivers. The book and companion disk include the author's library of wrapper functions that allow the progr
Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance. You'll learn how to prepare infrastructure with Microsoft's integrated tools, prebuilt templates, and managed services-and use these to help safely build and manage any enterprise, mobile, web, or Internet of Things (IoT) system. The authors guide you through enforcing, managing, and verifying robust security at physical, network, host, application, and data layers. You'll learn best practices for security-aware deployment, operational management, threat mitigation, and continuous improvement-so you can help protect all your data, make services resilient to attack, and stay in control no matter how your cloud systems evolve. Three Microsoft Azure experts show you how to: * Understand cloud security boundaries and responsibilities * Plan for compliance, risk management, identity/access management, operational security, and endpoint and data protection * Explore Azure's defense-in-depth security architecture * Use Azure network security patterns and best practices * Help safeguard data via encryption, storage redundancy, rights management, database security, and storage security * Help protect virtual machines with Microsoft Antimalware for Azure Cloud Services and Virtual Machines * Use the Microsoft Azure Key Vault service to help secure cryptographic keys and other confidential information * Monitor and help protect Azure and on-premises resources with Azure Security Center and Operations Management Suite * Effectively model threats and plan protection for IoT systems * Use Azure security tools for operations, incident response, and forensic investigation
Windows Registry Forensics: Advanced Digital Forensic Analysis of the Windows Registry, Second Edition, provides the most in-depth guide to forensic investigations involving Windows Registry. This book is one-of-a-kind, giving the background of the Registry to help users develop an understanding of the structure of registry hive files, as well as information stored within keys and values that can have a significant impact on forensic investigations. Tools and techniques for post mortem analysis are discussed at length to take users beyond the current use of viewers and into real analysis of data contained in the Registry. This second edition continues a ground-up approach to understanding so that the treasure trove of the Registry can be mined on a regular and continuing basis.
The first major book on MDM written by Group Policy and Enterprise Mobility MVP and renowned expert, Jeremy Moskowitz! With Windows 10, organizations can create a consistent set of configurations across the modern enterprise desktop--for PCs, tablets, and phones--through the common Mobile Device Management (MDM) layer. MDM gives organizations a way to configure settings that achieve their administrative intent without exposing every possible setting. One benefit of MDM is that it enables organizations to apply broader privacy, security, and application management settings through lighter and more efficient tools. MDM also allows organizations to target Internet-connected devices to manage policies without using Group Policy (GP) that requires on-premises domain-joined devices. This makes MDM the best choice for devices that are constantly on the go. With Microsoft making this shift to using Mobile Device Management (MDM), a cloud-based policy-management system, IT professionals need to know how to do similar tasks they do with Group Policy, but now using MDM, with its differences and pitfalls. What is MDM (and how is it different than GP) Setup Azure AD and MDM Auto-Enrollment New PC Rollouts and Remote Refreshes: Autopilot and Configuration Designer Enterprise State Roaming and OneDrive Documents Roaming Renowned expert and Microsoft Group Policy and Enterprise Mobility MVP Jeremy Moskowitz teaches you MDM fundamentals, essential troubleshooting techniques, and how to manage your enterprise desktops.
Prepare for Microsoft Exam 70-698-and help demonstrate your real-world mastery of installing, configuring, managing, and maintaining Windows 10 core services. Designed for experienced IT professionals ready to advance their status, this Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the MCSA level. Focus on the expertise measured by these objectives: * Implement Windows * Configure and support core services * Manage and maintain Windows This Microsoft Exam Ref: * Organizes its coverage by exam objectives * Features strategic, what-if scenarios to challenge you * Assumes you have experience with installing, configuring, and locally managing and maintaining Windows 10 core services
Description Dependency Injection has become one of the most dominant practices in the past decade, and it's now required knowledge for .NET developers. Dependency Injection in .NET, Second Edition teaches readers to use Dependency Injection to reduce hard-coded dependencies between application components. Readers will dive into thoroughly-explained examples and develop a foundation they can apply to any of the many DI libraries for .NET and .NET Core. Key Features * Integration with common .NET application frameworks * DI patterns and anti-patterns * Aspect-oriented programming * Using Microsoft and open source DI libraries and containers Audience This book is written for intermediate .NET developers and beyond. No previous experience with DI or DI frameworks is required. About the Technology Dependency Injection is an application design pattern where components are loosely-coupled with the objects or data on which they have a dependency.
EXAM MD-100 AND MD-101 Provides 1,000 practice questions covering all exam objectives. Compliments the MCA Modern Desktop Administrator Complete Study Guide: Exam MD-100 and Exam MD-101 Quick, focused review for MD-100 and MD-101 Microsoft's new Certified Associate Modern Desktop qualification verifies your skill as an administrator of Windows 10 technologies and modern desktop management. With a focus on the intricacies of Microsoft 365, this certification is in high demand. The 2 practice exams PLUS domain-by-domain questions in this book will help you target your study and sharpen your focus 1000 questions total! So now tackle the certification exam with confidence. Expertly crafted questions cover 100% of the objectives for both the MD-100 and MD-101 exams, enabling you to be fully prepared. Coverage of 100% of all exam objectives in these practice tests means you'll be ready for: Desktop and Device Deployment Windows Management and Monitoring OS Updates and Upgrades Core Services Support Data Access and Usage Networking Security Driver and Device Installation Remote Access Configuration System Backup and Restore Interactive learning environment Take your exam prep to the next level with Sybex's superior interactive online study tools. To access our learning environment, simply visit www.wiley.com/go/sybextestprep, register to receive your unique PIN, and instantly gain one year of FREE access to the interactive test bank with two practice exams and domain-by-domain questions. 1000 questions total! Interactive test bank Use the interactive online version of the book's 2 practice exams to help you identify areas where further review is needed. Get more than 90% of the answers correct, and you're ready to take the certification exam. 100 questions total! ABOUT THE MCA PROGRAM The MCA Microsoft 365 Certified: Modern Desktop Administrator Associate certification helps Modern Desktop Administrators deploy, configure, secure, manage, and monitor devices and client applications in an enterprise environment. Exam MD-100, Windows 10, measures your ability to accomplish the following technical tasks: deploy Windows; manage devices and data; configure connectivity; and maintain Windows. Exam MD-101, Managing Modern Desktops, measures your ability to accomplish the following technical tasks: deploy and update operating systems; manage policies and profiles; manage and protect devices; and manage apps and data. Visit www.microsoft.com/en-us/ learning/modern-desktop.aspx for more information.
"Who says you can't bottle experience? Between these covers is a wealth of information: a clear, logical approach to finding and eliminating bugs. This is an absolute must-have book for anyone who develops, tests, or supports software for Microsoft Windows." "-- Bob Wilton, Escalation Engineer, Critical Problem Resolution Team, Microsoft" "An excellent reference for both intermediate and advanced debuggers: highly practical, and filled with tricks and strategies. This book stands out from all other Win32 debugging literature, thanks to its in-depth examples-including resolving intricate problems like stack and heap corruptions." "-- Kinshuman, Development Lead, Windows Core OS Division, Microsoft" The First In-Depth, Real-World, Insider's Guide to Powerful Windows Debugging For Windows developers, few tasks are more challenging than debugging--or more crucial. Reliable and realistic information about Windows debugging has always been scarce. Now, with over 15 years of experience two of Microsoft's system-level developers present a thorough and practical guide to Windows debugging ever written. Mario Hewardt and Daniel Pravat cover debugging throughout the entire application lifecycle and show how to make the most of the tools currently available--including Microsoft's powerful native debuggers and third-party solutions. To help you find real solutions "fast," this book is organized around real-world debugging scenarios. Hewardt and Pravat use detailed code examples to illuminate the complex debugging challenges professional developers actually face. From core Windows operating system concepts to security, Windows(R) Vista(TM) and 64-bit debugging, they address emerging topicshead-on-and "nothing" is ever oversimplified or glossed over! This book enables you to
"Raymond Chen is the original raconteur of Windows." --Scott Hanselman, ComputerZen.com "Raymond has been at Microsoft for many years and has seen many nuances of Windows that others could only ever hope to get a glimpse of. With this book, Raymond shares his knowledge, experience, and anecdotal stories, allowing all of us to get a better understanding of the operating system that affects millions of people every day. This book has something for everyone, is a casual read, and I highly recommend it!" --Jeffrey Richter, Author/Consultant, Cofounder of Wintellect "Very interesting read. Raymond tells the inside story of why Windows is the way it is." --Eric Gunnerson, Program Manager, Microsoft Corporation "Absolutely essential reading for understanding the history of Windows, its intricacies and quirks, and why they came about." --Matt Pietrek, MSDN Magazine's Under the Hood Columnist "Raymond Chen has become something of a legend in the software industry, and in this book you'll discover why. From his high-level reminiscences on the design of the Windows Start button to his low-level discussions of GlobalAlloc that only your inner-geek could love, The Old New Thing is a captivating collection of anecdotes that will help you to truly appreciate the difficulty inherent in designing and writing quality software." --Stephen Toub, Technical Editor, MSDN Magazine Why does Windows work the way it does? Why is Shut Down on the Start menu? (And why is there a Start button, anyway?) How can I tap into the dialog loop? Why does the GetWindowText function behave so strangely? Why are registry files called "hives"? Many of Windows' quirks have perfectly logical explanations, rooted in history. Understand them, and you'll be more productive and a lot less frustrated. Raymond Chen--who's spent more than a decade on Microsoft's Windows development team--reveals the "hidden Windows" you need to know. Chen's engaging style, deep insight, and thoughtful humor have made him one of the world's premier technology bloggers. Here he brings together behind-the-scenes explanations, invaluable technical advice, and illuminating anecdotes that bring Windows to life--and help you make the most of it. A few of the things you'll find inside: What vending machines can teach you about effective user interfaces A deeper understanding of window and dialog management Why performance optimization can be so counterintuitive A peek at the underbelly of COM objects and the Visual C++ compiler Key details about backwards compatibility--what Windows does and why Windows program security holes most developers don't know about How to make your program a better Windows citizen
Prepare for Microsoft Exam AZ-500: Demonstrate your real-world knowledge of Microsoft Azure security, including tools and techniques for protecting identity, access, platforms, data, and applications, and for effectively managing security operations. Designed for professionals with Azure security experience, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified: Azure Security Engineer Associate level. Focus on the expertise measured by these objectives: Manage identity and access Implement platform protection Manage security operations Secure data and applications This Microsoft Exam Ref: Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you have expertise implementing security controls and threat protection, managing identity and access, and protecting assets in cloud and hybrid environments About the Exam Exam AZ-500 focuses on the knowledge needed to manage Azure Active Directory identities; configure secure access with Azure AD; manage application access and access control; implement advanced network security; configure advanced security for compute; monitor security with Azure Monitor, Azure Firewall manager, Azure Security Center, Azure Defender, and Azure Sentinel; configure security policies; configure security for storage and databases; and configure and manage Key Vault. About Microsoft Certification Passing this exam fulfills your requirements for the Microsoft Certified: Azure Security Engineer Associate credential, demonstrating your expertise as an Azure Security Engineer capable of maintaining security posture, identifying and remediating vulnerabilities, implementing threat protection, and responding to incident escalations as part of a cloud-based management and security team. See full details at: microsoft.com/learn
Basic Computer Skills Made Simple XP Version presents all the necessary computer skills an individual may need in a straightforward and intelligent way. It demystifies computers and is ideal for those wishing to develop their skills and confidence in the subject whilst working at their own pace. By using the text the reader will be able to produce a wide range of word-processed documents, prepare illustrated slides to aid talks, store and search for information systematically, and gain confidence handling simple numbers or charts. They will also learn how to connect to the Internet, surf the Web, and send and receive emails.
Create music CDs and photo DVDs or even watch TV Move your files to a new computer, or get your old PC ready for Vista The thing that's made "Windows For Dummies" so successful is that it's packed with the basics you need to make Windows work. This book gets you through all the Windows Vista tasks and tripwires, including starting programs, finding files, navigating the new see-through interface, staying safe while you cruise the Internet, and much more. Discover how to Find files when they?re hiding Hook up with another computer Make Vista work like XP Block Internet bad guys Share a PC without sharing your files Fix problems yourself
The book Executing Windows Command Line Investigations targets the needs of cyber security practitioners who focus on digital forensics and incident response. These are the individuals who are ultimately responsible for executing critical tasks such as incident response; forensic analysis and triage; damage assessments; espionage or other criminal investigations; malware analysis; and responding to human resource violations. The authors lead readers through the importance of Windows CLI, as well as optimal configuration and usage. Readers will then learn the importance of maintaining evidentiary integrity, evidence volatility, and gain appropriate insight into methodologies that limit the potential of inadvertently destroying or otherwise altering evidence. Next, readers will be given an overview on how to use the proprietary software that accompanies the book as a download from the companion website. This software, called Proactive Incident Response Command Shell (PIRCS), developed by Harris Corporation provides an interface similar to that of a Windows CLI that automates evidentiary chain of custody and reduces human error and documentation gaps during incident response. |
![]() ![]() You may like...
Interprofessional Care and Mental Health…
Cordet Smart, Timothy Auburn
Hardcover
R4,385
Discovery Miles 43 850
Older Women and Well-Being - A Global…
Mala Kapur Shankardass
Hardcover
R3,679
Discovery Miles 36 790
A Cultural Safety Approach to Health…
Pauline B. Thompson, Kerry Taylor
Hardcover
R3,387
Discovery Miles 33 870
Social and Interpersonal Dynamics in…
Tine Vervoort, Kai Karos, …
Hardcover
R4,453
Discovery Miles 44 530
Handbook of Military Psychology…
Stephen V. Bowles, Paul T. Bartone
Hardcover
R5,371
Discovery Miles 53 710
|