0
Your cart

Your cart is empty

Browse All Departments
Price
  • R50 - R100 (2)
  • R100 - R250 (119)
  • R250 - R500 (496)
  • R500+ (2,684)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)

Kubernetes: Up and Running - Dive Into the Future of Infrastructure (Paperback, 2nd edition): Brendan Burns, Joe Beda, Kelsey... Kubernetes: Up and Running - Dive Into the Future of Infrastructure (Paperback, 2nd edition)
Brendan Burns, Joe Beda, Kelsey Hightower
R1,661 Discovery Miles 16 610 Ships in 7 - 13 working days

Kubernetes radically changes the way applications are built and deployed in the cloud. Since its introduction in 2014, this container orchestrator has become one of the largest and most popular open source projects in the world. The updated edition of this practical book shows developers and ops personnel how Kubernetes and container technology can help you achieve new levels of velocity, agility, reliability, and efficiency. Kelsey Hightower, Brendan Burns, and Joe Beda-who've worked on Kubernetes at Google and beyond-explain how this system fits into the lifecycle of a distributed application. You'll learn how to use tools and APIs to automate scalable distributed systems, whether it's for online services, machine learning applications, or a cluster of Raspberry Pi computers. Create a simple cluster to learn how Kubernetes works Dive into the details of deploying an application using Kubernetes Learn specialized objects in Kubernetes, such as DaemonSets, jobs, ConfigMaps, and secrets Explore deployments that tie together the lifecycle of a complete application Get practical examples of how to develop and deploy real-world applications in Kubernetes

Mastering Modern Linux (Paperback, 2nd edition): Paul S. Wang Mastering Modern Linux (Paperback, 2nd edition)
Paul S. Wang
R1,842 Discovery Miles 18 420 Ships in 9 - 15 working days

Praise for the First Edition: "This outstanding book ... gives the reader robust concepts and implementable knowledge of this environment. Graphical user interface (GUI)-based users and developers do not get short shrift, despite the command-line interface's (CLI) full-power treatment. ... Every programmer should read the introduction's Unix/Linux philosophy section. ... This authoritative and exceptionally well-constructed book has my highest recommendation. It will repay careful and recursive study." --Computing Reviews, August 2011 Mastering Modern Linux, Second Edition retains much of the good material from the previous edition, with extensive updates and new topics added. The book provides a comprehensive and up-to-date guide to Linux concepts, usage, and programming. The text helps the reader master Linux with a well-selected set of topics, and encourages hands-on practice. The first part of the textbook covers interactive use of Linux via the Graphical User Interface (GUI) and the Command-Line Interface (CLI), including comprehensive treatment of the Gnome desktop and the Bash Shell. Using different apps, commands and filters, building pipelines, and matching patterns with regular expressions are major focuses. Next comes Bash scripting, file system structure, organization, and usage. The following chapters present networking, the Internet and the Web, data encryption, basic system admin, as well as Web hosting. The Linux Apache MySQL/MariaDB PHP (LAMP) Web hosting combination is also presented in depth. In the last part of the book, attention is turned to C-level programming. Topics covered include the C compiler, preprocessor, debugger, I/O, file manipulation, process control, inter-process communication, and networking. The book includes many examples and complete programs ready to download and run. A summary and exercises of varying degrees of difficulty can be found at the end of each chapter. A companion website (http://mml.sofpower.com) provides appendices, information updates, an example code package, and other resources for instructors, as well as students.

Understanding the Linux Kernel 3e (Paperback, 3rd Revised edition): Daniel P. Bovet Understanding the Linux Kernel 3e (Paperback, 3rd Revised edition)
Daniel P. Bovet
R1,945 R1,220 Discovery Miles 12 200 Save R725 (37%) Ships in 12 - 17 working days

In order to thoroughly understand what makes Linux tick and why it works so well on a wide variety of systems, you need to delve deep into the heart of the kernel. The kernel handles all interactions between the CPU and the external world, and determines which programs will share processor time, in what order. It manages limited memory so well that hundreds of processes can share the system efficiently, and expertly organizes data transfers so that the CPU isn't kept waiting any longer than necessary for the relatively slow disks.

The third edition of "Understanding the Linux Kernel" takes you on a guided tour of the most significant data structures, algorithms, and programming tricks used in the kernel. Probing beyond superficial features, the authors offer valuable insights to people who want to know how things really work inside their machine. Important Intel-specific features are discussed. Relevant segments of code are dissected line by line. But the book covers more than just the functioning of the code; it explains the theoretical underpinnings of why Linux does things the way it does.

This edition of the book covers Version 2.6, which has seen significant changes to nearly every kernel subsystem, particularly in the areas of memory management and block devices. The book focuses on the following topics:

Memory management, including file buffering, process swapping, and Direct memory Access (DMA)

The Virtual Filesystem layer and the Second and Third Extended Filesystems

Process creation and scheduling

Signals, interrupts, and the essential interfaces to device drivers

Timing

Synchronization within the kernel

Interprocess Communication (IPC)

Program execution

"Understanding the Linux Kernel" will acquaint you with all the inner workings of Linux, but it's more than just an academic exercise. You'll learn what conditions bring out Linux's best performance, and you'll see how it meets the challenge of providing good system response during process scheduling, file access, and memory management in a wide variety of environments. This book will help you make the most of your Linux system.

Grokking Deep Learning (Paperback): Andrew W Trask Grokking Deep Learning (Paperback)
Andrew W Trask
R1,183 Discovery Miles 11 830 Ships in 9 - 15 working days

Artificial Intelligence is the most exciting technology of the century, and Deep Learning is, quite literally, the "brain" behind the world's smartest Artificial Intelligence systems out there. Grokking Deep Learning is the perfect place to begin the deep learning journey. Rather than just learning the "black box" API of some library or framework, readers will actually understand how to build these algorithms completely from scratch. Key Features: Build neural networks that can see and understand images Build an A.I. that will learn to defeat you in a classic Atari game Hands-on Learning Written for readers with high school-level math and intermediate programming skills. Experience with Calculus is helpful but not required. ABOUT THE TECHNOLOGY Deep Learning is a subset of Machine Learning, which is a field dedicated to the study and development of machines that can learn, often with the goal of eventually attaining general artificial intelligence.

Windows Me Annoyances (Book, 1st ed): David A. Karp Windows Me Annoyances (Book, 1st ed)
David A. Karp
R771 Discovery Miles 7 710 Ships in 7 - 13 working days

Based on the author's popular Annoyances.org web sites, Windows Me Annoyances is an authoritative collection of techniques for customizing Windows Me. Packed with creative and seldom-documented ways to quickly identify and fix a particular annoyance or customize Windows for individual needs, it's the definitive resource for dealing with crashes, unintelligible error messages, unwanted icons, and much more.

Windows 10 Tips, Tricks & Shortcuts in easy steps - Covers the Windows 10 Anniversary Update (Paperback, 2nd edition): Mike... Windows 10 Tips, Tricks & Shortcuts in easy steps - Covers the Windows 10 Anniversary Update (Paperback, 2nd edition)
Mike McGrath 1
R353 R309 Discovery Miles 3 090 Save R44 (12%) Ships in 12 - 17 working days
Networking Systems Design and Development (Hardcover): Lee Chao Networking Systems Design and Development (Hardcover)
Lee Chao
R3,218 Discovery Miles 32 180 Ships in 12 - 17 working days

Effectively integrating theory and hands-on practice, Networking Systems Design and Development provides students and IT professionals with the knowledge and skills needed to design, implement, and manage fully functioning network systems using readily available Linux networking tools. Recognizing that most students are beginners in the field of networking, the text provides step-by-step instruction for setting up a virtual lab environment at home.

Grounded in real-world applications, this book provides the ideal blend of conceptual instruction and lab work to give students and IT professionals a quick start in developing network systems using the Linux operating system. Leaving nothing to chance, it provides readers with detailed guidance through the many hands-on exercises.

  • Highlights fundamental networking concepts and theories
  • Addresses the server and client sides of Linux-based networking
  • Includes comprehensive lab exercises that use Ubuntu GUN/Linux
  • Supplies professors with instructions and resources to create and manage online computer labs as well as supplemental instructional materials
  • Provides an effective, low-cost alternative to traditional proprietary-based network systems

Creating and maintaining a fully functioning enterprise network system doesn?t have to be expensive. This self-contained text provides readers with the tools to create their own networks using open source materials?and the virtual lab environment to develop problem-solving skills that will serve them well in their careers.

bash Cookbook 2e - Solutions and Examples for bash Users (Paperback, 2nd New edition): Carl Albing, Vossen, Cameron Newham bash Cookbook 2e - Solutions and Examples for bash Users (Paperback, 2nd New edition)
Carl Albing, Vossen, Cameron Newham
R1,624 R1,017 Discovery Miles 10 170 Save R607 (37%) Ships in 12 - 17 working days

For system administrators, programmers, and end users, shell command or carefully crafted shell script can save you time and effort, or facilitate consistency and repeatability for a variety of common tasks. This cookbook provides more than 300 practical recipes for using bash, the popular Unix shell that enables you to harness and customize the power of any Unix or Linux system. Ideal for new and experienced users alike-including proficient Windows users and sysadmins-this updated second edition helps you solve a wide range of problems. You'll learn ways to handle input/output, file manipulation, program execution, administrative tasks, and many other challenges. Each recipe includes one or more scripting examples and a discussion of why the solution works. You'll find recipes for problems including: Standard output and input, and executing commands Shell variables, shell logic, and arithmetic Intermediate shell tools and advanced scripting Searching for files with find, locate, and slocate Working with dates and times Creating shell scripts for various end-user tasks Working with tasks that require parsing Writing secure shell scripts Configuring and customizing bash

Shell Scripting - Expert Recipes for Linux, Bash, and More (Paperback): S. Parker Shell Scripting - Expert Recipes for Linux, Bash, and More (Paperback)
S. Parker
R1,172 R927 Discovery Miles 9 270 Save R245 (21%) Ships in 12 - 17 working days

A compendium of shell scripting recipes that can immediately be used, adjusted, and applied

The shell is the primary way of communicating with the Unix and Linux systems, providing a direct way to program by automating simple-to-intermediate tasks. With this book, Linux expert Steve Parker shares a collection of shell scripting recipes that can be used as is or easily modified for a variety of environments or situations. The book covers shell programming, with a focus on Linux and the Bash shell; it provides credible, real-world relevance, as well as providing the flexible tools to get started immediately.Shares a collection of helpful shell scripting recipes that can immediately be used for various of real-world challenges Features recipes for system tools, shell features, and systems administration Provides a host of plug and play recipes for to immediately apply and easily modify so the wheel doesn't have to be reinvented with each challenge faced

Come out of your shell and dive into this collection of tried and tested shell scripting recipes that you can start using right away

The Best Damn Windows Server 2008 Book Period (Paperback, 2nd edition): Anthony Piltzecker The Best Damn Windows Server 2008 Book Period (Paperback, 2nd edition)
Anthony Piltzecker
R1,392 R1,311 Discovery Miles 13 110 Save R81 (6%) Ships in 12 - 17 working days

The Second Edition of the Best Damn Windows Server Book Period is completely revised and updated to Windows Server 2008.
This book will show you how to increase the reliability and flexibility of your server infrastructure with built-in Web and virtualization technologies; have more control over your servers and web sites using new tools like IIS7, Windows Server Manager, and Windows PowerShell; and secure your network with Network Access Protection and the Read-Only Domain Controller.
New to this Edition:
* Web server management with Internet Information Services 7.0
* Virtualize multiple operating systems on a single server
* Hardening Security, including Network Access Protection, Federated Rights Management, and Read-Only Domain Controller

OS X Exploits and Defense - Own it...Just Like Windows or Linux! (Paperback): Paul Baccas, Kevin Finisterre, Larry H, David... OS X Exploits and Defense - Own it...Just Like Windows or Linux! (Paperback)
Paul Baccas, Kevin Finisterre, Larry H, David Harley, Gary Porteus, …
R1,394 R1,305 Discovery Miles 13 050 Save R89 (6%) Ships in 12 - 17 working days

Contrary to popular belief, there has never been any shortage of Macintosh-related security issues. OS9 had issues that warranted attention. However, due to both ignorance and a lack of research, many of these issues never saw the light of day. No solid techniques were published for executing arbitrary code on OS9, and there are no notable legacy Macintosh exploits. Due to the combined lack of obvious vulnerabilities and accompanying exploits, Macintosh appeared to be a solid platform. Threats to Macintosh's OS X operating system are increasing in sophistication and number. Whether it is the exploitation of an increasing number of holes, use of rootkits for post-compromise concealment or disturbed denial of service, knowing why the system is vulnerable and understanding how to defend it is critical to computer security.
* Macintosh OS X Boot Process and Forensic Software All the power, all the tools, and all the geekery of Linux is present in Mac OS X. Shell scripts, X11 apps, processes, kernel extensions...it's a UNIX platform....Now, you can master the boot process, and Macintosh forensic software.
* Look Back Before the Flood and Forward Through the 21st Century Threatscape Back in the day, a misunderstanding of Macintosh security was more or less industry-wide. Neither the administrators nor the attackers knew much about the platform. Learn from Kevin Finisterre how and why that has all changed
* Malicious Macs: Malware and the Mac As OS X moves further from desktops, laptops, and servers into the world of consumer technology (iPhones, iPods, and so on), what are the implications for the further spread of malware and other security breaches? Find out from David Harley.
* Malware Detection and the Mac Understand why the continuing insistence of vociferous Mac zealots that it "can't happen here" is likely to aid OS X exploitationg
* Mac OS X for Pen Testers With its BSD roots, super-slick graphical interface, and near-bulletproof reliability, Apple's Mac OS X provides a great platform for pen testing.
* WarDriving and Wireless Penetration Testing with OS X Configure and utilize the KisMAC WLAN discovery tool to WarDrive. Next, use the information obtained during a WarDrive, to successfully penetrate a customer's wireless network.
* Leopard and Tiger Evasion Follow Larry Hernandez through exploitation techniques, tricks, and features of both OS X Tiger and Leopard, using real-world scenarios for explaining and demonstrating the concepts behind them.
* Encryption Technologies and OS X Apple has come a long way from the bleak days of OS9. THere is now a wide array of encryption choices within Mac OS X. Let Gareth Poreus show you what they are.
* Cuts through the hype with a serious discussion of the security
vulnerabilities of the Mac OS X operating system
* Reveals techniques by which OS X can be "owned"
* Details procedures to defeat these techniques
* Offers a sober look at emerging threats and trends

Linux Iptables Pocket Reference (Paperback): Gregor N. Purdy Linux Iptables Pocket Reference (Paperback)
Gregor N. Purdy
R265 R174 Discovery Miles 1 740 Save R91 (34%) Ships in 12 - 17 working days

Firewalls, Network Address Translation (NAT), network logging and accounting are all provided by Linux's Netfilter system, also known by the name of the command used to administer it, iptables. The iptables interface is the most sophisticated ever offered on

Linux and makes Linux an extremely flexible system for any kind of network filtering you might do. Large sets of filtering rules can be grouped in ways that makes it easy to test them and turn them on and off.

Do you watch for all types of ICMP traffic--some of them quite dangerous? Can you take advantage of stateful filtering to simplify the management of TCP connections? Would you like to track how much traffic of various types you get?

This pocket reference will help you at those critical moments when someone asks you to open or close a port in a hurry, either to enable some important traffic or to block an attack. The book will keep the subtle syntax straight and help you remember all the values you have to enter in order to be as secure as possible. The book has an introductory section that describes applications, followed by a reference/encyclopaedic section with all the matches and targets arranged alphabetically.

Exam Ref 70-774 Perform Cloud Data Science with Azure Machine Learning (Paperback): Ginger Grant, Julio Granados, Guillermo... Exam Ref 70-774 Perform Cloud Data Science with Azure Machine Learning (Paperback)
Ginger Grant, Julio Granados, Guillermo Fernandez, Pau Sempere, Javier Torrenteras, … 1
R892 R165 Discovery Miles 1 650 Save R727 (82%) Ships in 9 - 15 working days

Prepare for Microsoft Exam 70-774-and help demonstrate your real-world mastery of performing key data science activities with Azure Machine Learning services. Designed for experienced IT professionals ready to advance their status, Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the MCSA level. Focus on the expertise measured by these objectives: Prepare data for analysis in Azure Machine Learning and export from Azure Machine Learning Develop machine learning models Operationalize and manage Azure Machine Learning Services Use other services for machine learning This Microsoft Exam Ref: Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you are familiar with Azure data services, machine learning concepts, and common data science processes About the Exam Exam 70-774 focuses on skills and knowledge needed to prepare data for analysis with Azure Machine Learning; find key variables describing your data's behavior; develop models and identify optimal algorithms; train, validate, deploy, manage, and consume Azure Machine Learning Models; and leverage related services and APIs. About Microsoft Certification Passing this exam as well as Exam 70-773: Analyzing Big Data with Microsoft R earns your MCSA: Machine Learning certifi?cation, demonstrating your expertise in operationalizing Microsoft Azure machine learning and Big Data with R Server and SQL R Services. See full details at: microsoft.com/learning

Microsoft Forefront Security Administration Guide (Paperback): Jesse Varsalone Microsoft Forefront Security Administration Guide (Paperback)
Jesse Varsalone
R1,201 R891 Discovery Miles 8 910 Save R310 (26%) Ships in 12 - 17 working days

Microsoft Forefront is a comprehensive suite of security products that will provide companies with multiple layers of defense against threats. Computer and Network Security is a paramount issue for companies in the global marketplace. Businesses can no longer afford for their systems to go down because of viruses, malware, bugs, trojans, or other attacks. Running a Microsoft Forefront Suite within your environment brings many different benefits. Forefront allows you to achieve comprehensive, integrated, and simplified infrastructure security. This comprehensive suite of tools provides end-to-end security stretching from Web servers back to the desktop. This book will provide system administrators familiar with Syngress' existing Microsoft networking and security titles with a complete reference to Microsoft's flagship security products.
* First book to address securing an entire Microsoft network from Web servers all the way back to the desktop.
* Companion Web site provides best practices checklists for securing Microsoft operating systems, applications, servers, and databases.
* Companion Web site provides special chapter on designing and implementing a disaster recover plan for a Microsoft network.

How to Cheat at Configuring VmWare ESX Server (Paperback): David Rule How to Cheat at Configuring VmWare ESX Server (Paperback)
David Rule
R1,153 R853 Discovery Miles 8 530 Save R300 (26%) Ships in 12 - 17 working days

A virtual evolution in IT shops large and small has begun. VMware s ESX Server is the enterprise tool to free your infrastructure from its physical limitations providing the great transformation into a virtual environment--this book shows you how. Use Syngress proven How to Cheat methodology to configure and build VMware s ESX Server version 3. This clear, concise guide provides all the information you need to become a virtual whiz
This book will detail the default and custom installation of VMware s ESX server as well as basic and advanced virtual machine configurations. It will then walk the reader through post installation configurations including installation and configuration of VirtualCenter. From here, readers will learn to efficiently create and deploy virtual machine templates. Best practices for securing and backing up your virtual environment are also provided. The book concludes with a series of handy, time-saving command and configuration for: bash shell keystrokes, Linux commands, configuration files, common/proc files, VMware ESX commands, and troubleshooting.
Reap the Benefits of Server Virtualization
Realize improved ROI, ensure efficient mergers and acquisitions, and reduce compliance risk exposure through server virtualization and consolidation.
Build a Virtual Machine
Create a Gold Master and use your VMlibrary to leverage the power and flexibility of VMware.
Manage Your Virtual Infrastructure
Use VMware tools to partition physical servers and manage virtual machines.
Set Up Scripted Installation
See how a scripted installation method can be a fast and efficient way to provision ESX hosts.
Master ESX Native Tools
Use tools like Esxtop to diagnose performance issues and vmkfstools to import and export
Install and Use VMware Scripting APIs
Develop programs to help automate and ease administration even with a limited background in scripting or programming.
Learn the Fundamentals of a VM Backup
VMware ESX ships with three scripts that work together to create a backup and restore system: vmsnap.pl, vmsnap_all.pl, and vmres.pl.
Extend a Cloned Windows VM s Root Partition
Use Microsoft s Sysprep utility to extend a newly deployed virtual machine s root partition from the original clone size to a larger size."

Android Hacker's Handbook (Paperback): J S Drake Android Hacker's Handbook (Paperback)
J S Drake
R1,211 R1,018 Discovery Miles 10 180 Save R193 (16%) Ships in 7 - 13 working days

The first comprehensive guide to discovering and preventing attacks on the Android OS As the Android operating system continues to increase its share of the smartphone market, smartphone hacking remains a growing threat. Written by experts who rank among the world's foremost Android security researchers, this book presents vulnerability discovery, analysis, and exploitation tools for the good guys. Following a detailed explanation of how the Android OS works and its overall security architecture, the authors examine how vulnerabilities can be discovered and exploits developed for various system components, preparing you to defend against them. If you are a mobile device administrator, security researcher, Android app developer, or consultant responsible for evaluating Android security, you will find this guide is essential to your toolbox. * A crack team of leading Android security researchers explain Android security risks, security design and architecture, rooting, fuzz testing, and vulnerability analysis * Covers Android application building blocks and security as well as debugging and auditing Android apps * Prepares mobile device administrators, security researchers, Android app developers, and security consultants to defend Android systems against attack Android Hacker's Handbook is the first comprehensive resource for IT professionals charged with smartphone security.

macOS Catalina: The Missing Manual - The Book That Should Have Been in the Box (Paperback): David Pogue macOS Catalina: The Missing Manual - The Book That Should Have Been in the Box (Paperback)
David Pogue
R696 Discovery Miles 6 960 Ships in 12 - 17 working days

Apple gives macOS new features and improvements right on your desktop and under the hood with Catalina-aka OS X 10.15. With this updated guide, you'll learn how to use your iPad as a second screen, work with iPad apps on your Mac, and use Screen Time on your Mac. This new edition of the #1 bestselling Mac book shows you how to use the revamped apps for Music, Podcasts, and TV. Loaded with illustrations, step-by-step instructions, tips, and tricks, this book from David Pogue-Missing Manual series creator, New York Times columnist, and Emmy-winning tech correspondent for CNBC, CBS, and NPR-covers everything Catalina has to offer with lots of humor and technical insight.

Biometric Technologies and Verification Systems (Paperback): John Vacca Biometric Technologies and Verification Systems (Paperback)
John Vacca
R1,752 R1,627 Discovery Miles 16 270 Save R125 (7%) Ships in 12 - 17 working days

" Biometric Technologies and Verification Systems" is organized into nine parts composed of 30 chapters, including an extensive glossary of biometric terms and acronyms. It discusses the current state-of-the-art in biometric verification/authentication, identification and system design principles. It also provides a step-by-step discussion of how biometrics works; how biometric data in human beings can be collected and analyzed in a number of ways; how biometrics are currently being used as a method of personal identification in which people are recognized by their own unique corporal or behavioral characteristics; and how to create detailed menus for designing a biometric verification system.
Only biometrics verification/authentication is based on the identification of an intrinsic part of a human being. Tokens, such as smart cards, magnetic stripe cards, and physical keys can be lost, stolen, or duplicated. Passwords can be forgotten, shared, or unintentionally observed by a third party. Forgotten passwords and lost "smart cards" are a nuisance for users and an expensive time-waster for system administrators. Biometric security solutions offer some unique advantages for identifying and verifying/ authenticating human beings over more traditional security methods. This book will serve to identify the various security applications biometrics can play a highly secure and specific role in.
* Contains elements such as Sidebars, Tips, Notes and URL links
* Heavily illustrated with over 150 illustrations, screen captures, and photographs
* Details the various biometric technologies and how they work while providing a discussion of the economics, privacy issues and challenges of implementing biometric security solutions

Queueing Systems - Problems and Solutions (Paperback): L Kleinrock Queueing Systems - Problems and Solutions (Paperback)
L Kleinrock
R2,651 R2,133 Discovery Miles 21 330 Save R518 (20%) Ships in 7 - 13 working days

This manual contains all the problems to Leonard Kleinrock's Queueing Systems, Volume One, and their solutions. The manual offers a concise introduction so that it can be used independently from the text. Contents include:

  • A Queueing Theory Primer
  • Random Processes
  • Birth-Death Queueing Systems
  • Markovian Queues
  • The Queue M/G/1
  • The Queue G/M/m
  • The Queue G/G/1
How to Cheat at Managing Windows Server Update Services, Volume 1 (Paperback): B. Barber How to Cheat at Managing Windows Server Update Services, Volume 1 (Paperback)
B. Barber
R935 R740 Discovery Miles 7 400 Save R195 (21%) Ships in 12 - 17 working days

Over 95% of computers around the world are running at least one Microsoft product. Microsoft Windows Software Update Service is designed to provide patches and updates to every one of these computers.
The book will begin by describing the feature set of WSUS, and the benefits it provides to system administrators. Next, the reader will learn the steps that must be taken to configure their servers and workstations to make the compatible with WSUS. A special section then follows to help readers migrate from Microsoft s earlier update service, Software Update Service (SUS) to WSUS. The next chapters will then address the particular needs and complexities of managing WSUS on an enterprise network. Although WSUS is designed to streamline the update process, this service can still be a challenge for administrators to use effectively. To address these issues, the next chapters deal specifically with common problems that occur and the reader is provides with invaluable troubleshooting information. One of the other primary objectives of WSUS is to improve the overall security of Windows networks by ensuring that all systems have the most recent security updates and patches. To help achieve this goal, the next sections cover securing WSUS itself, so that critical security patches are always applied and cannot be compromised by malicious hackers.
* Only book available on Microsoft's brand new, Windows Server Update Services
* Employs Syngress' proven "How to Cheat" methodology providing readers with everything they need and nothing they don't
* WSUS works with every Microsoft product, meaning any system administrator running a Windows-based network is a potential customer for this book"

Linux Security Fundamentals (Paperback): D. Clinton Linux Security Fundamentals (Paperback)
D. Clinton
R962 R759 Discovery Miles 7 590 Save R203 (21%) Ships in 7 - 13 working days

Linux Security Fundamentals provides basic foundational concepts of securing a Linux environment. The focus is the digital self-defense of an individual user. This includes a general understanding of major threats against individual computing systems, networks, services and identity as well as approaches to prevent and mitigate them. This book is useful for anyone considering a career as a Linux administrator or for those administrators who need to learn more about Linux security issues. Topics include: Security Concepts Encryption Node, Device and Storage Security Network and Service Security Identity and Privacy Readers will also have access to Sybex's superior online interactive learning environment and test bank, including chapter tests, a practice exam, electronic flashcards, a glossary of key terms.

Inside .Mac (Paperback): Chuck Toporek Inside .Mac (Paperback)
Chuck Toporek
R536 Discovery Miles 5 360 Ships in 7 - 13 working days

Apple's .Mac service (pronounced dot Mac) offers everything Mac OS X users have come to expect: an attractive, intuitive interface and a wealth of features with all the underlying power you'll ever need. .Mac includes web mail, an online contact management system, storage space, a fully customizable web site of your own, and much more. On your first tour of this suite of subscriber-based services, you'll be delighted by how easy and convenient .Mac is to use. But you'll soon discover that there's a lot more to .Mac than meets the eye! Inside .Mac will help you get the most out of Apple's new Internet services. This handy, quick reference offers a clear overview of the entire .Mac package and many of its not-so-obvious features. You'll learn how to set up and manage your account quickly and without fuss. Each .Mac service is discussed in an objective, no-frills fashion that'll show you how to use--and what to expect from--iDisk, web mail, your personal web site, and everything else that .Mac offers. The book covers: Setting up your .Mac account: a guided tour to getting started with .Mac, Using your iDisk: a detailed look at using iDisk, its directories, the iDisk utility and more, Mac Software: a look at what's included in the software directory, including Virex anti-virus software, the Backup utility, Mac Slides Publisher, and third-party software, . Mac Email: everything you need to know, on configuring your settings to adding additional email accounts, Building a HomePage: an overview of HomePage options that covers uploading files, publishing iPhoto libraries, protecting your site, and publishing and announcing your site, Synchronizing Your Mac with .Mac: learn how to set up and sync your Address Book, iCal Calendars, and more using iSync. From enthusiastic new users to hardcore Mac geeks, anyone who uses .Mac will want to get the most from their subscription service. Inside .Mac is the only book that shows you how. There's no better way take control than with this handy guide.

Windows 8.1 For Dummies (Paperback): Andy Rathbone Windows 8.1 For Dummies (Paperback)
Andy Rathbone 1
R620 R502 Discovery Miles 5 020 Save R118 (19%) Ships in 7 - 13 working days

The bestselling book on Windows, now updated for the new 8.1 features Microsoft has fine-tuned Windows 8 with some important new features, and veteran author Andy Rathbone explains every one in this all-new edition of a long-time bestseller. Whether you're using Windows for the first time, upgrading from an older version, or just moving from Windows 8 to 8.1, here's what you need to know. Learn about the dual interfaces, the new Start button, how to customize the interface and boot operations, and how to work with programs and files, use the web and social media, manage music and photos, and much more. You'll even find troubleshooting tips! * This edition covers the upgrades in Windows 8.1, including the dual interfaces, basic mechanics, file storage, and how to get the free upgrade to Windows 8.1 * Shows how to manipulate app tiles, give Windows the look you choose, set up boot-to-desktop capabilities, connect to a network, and create user accounts * Covers working with programs, apps, and files; using the Internet and social media; new apps and capabilities for working with onboard and online media; and how to move files to a new PC * Written by Andy Rathbone, author of every edition of the bestselling Windows For Dummies Windows 8.1 For Dummies is exactly what you need to get going and be productive with the newest Windows update.

UNIX and Linux System Administration Handbook (Paperback, 5th edition): Evi Nemeth, Garth Snyder, Trent Hein, Ben Whaley, Dan... UNIX and Linux System Administration Handbook (Paperback, 5th edition)
Evi Nemeth, Garth Snyder, Trent Hein, Ben Whaley, Dan Mackin
R1,613 R1,441 Discovery Miles 14 410 Save R172 (11%) Ships in 12 - 17 working days

UNIX and Linux System Administration Handbook, Fifth Edition is today's definitive guide to installing, configuring and maintaining any Unix or Linux system -- including the systems that provide core Internet and cloud infrastructure. Now fully updated for today's Linux distributions and cloud environments, it details best practices for every facet of system administration, including storage management, network design and administration, web hosting and scale-out, automation, configuration management, performance analysis, virtualization, DNS, security, management of IT service organizations, and much more. For modern system and network administrators, this edition contains indispensable new coverage of cloud deployments, continuous delivery, Docker and other containerization solutions, and much more.

MDM - Fundamentals, Security and the Modern Desktop - Using Intune, Autopilot and Azure to Manage, Deploy and Secure Windows 10... MDM - Fundamentals, Security and the Modern Desktop - Using Intune, Autopilot and Azure to Manage, Deploy and Secure Windows 10 (Paperback)
J Moskowitz
R1,164 R879 Discovery Miles 8 790 Save R285 (24%) Ships in 12 - 17 working days

The first major book on MDM written by Group Policy and Enterprise Mobility MVP and renowned expert, Jeremy Moskowitz! With Windows 10, organizations can create a consistent set of configurations across the modern enterprise desktop--for PCs, tablets, and phones--through the common Mobile Device Management (MDM) layer. MDM gives organizations a way to configure settings that achieve their administrative intent without exposing every possible setting. One benefit of MDM is that it enables organizations to apply broader privacy, security, and application management settings through lighter and more efficient tools. MDM also allows organizations to target Internet-connected devices to manage policies without using Group Policy (GP) that requires on-premises domain-joined devices. This makes MDM the best choice for devices that are constantly on the go. With Microsoft making this shift to using Mobile Device Management (MDM), a cloud-based policy-management system, IT professionals need to know how to do similar tasks they do with Group Policy, but now using MDM, with its differences and pitfalls. What is MDM (and how is it different than GP) Setup Azure AD and MDM Auto-Enrollment New PC Rollouts and Remote Refreshes: Autopilot and Configuration Designer Enterprise State Roaming and OneDrive Documents Roaming Renowned expert and Microsoft Group Policy and Enterprise Mobility MVP Jeremy Moskowitz teaches you MDM fundamentals, essential troubleshooting techniques, and how to manage your enterprise desktops.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Windows 11 For Dummies
A Rathbone Paperback R671 R489 Discovery Miles 4 890
Windows 10 For Dummies, 4th Edition
A Rathbone Paperback  (1)
R637 R463 Discovery Miles 4 630
macOS Big Sur For Dummies
B LeVitus Paperback R560 Discovery Miles 5 600
Windows 11 For Seniors For Dummies
C. Simmons Paperback R708 R506 Discovery Miles 5 060
Mike Meyers' CompTIA A+ Guide to 802…
Mike Meyers Paperback R1,297 Discovery Miles 12 970
My Windows 11 Computer for Seniors
Michael Miller Paperback R577 Discovery Miles 5 770
Linux All-in-One For Dummies, 7th…
R. Blum Paperback R866 R620 Discovery Miles 6 200
BTEC Nationals Information Technology…
Jenny Phillips, Alan Jarvis, … Paperback R1,036 Discovery Miles 10 360
iOS 14 Programming Fundamentals with…
Matt Neuberg Paperback R1,467 Discovery Miles 14 670
macOS in easy steps - Illustrated using…
Nick Vandome Paperback R341 Discovery Miles 3 410

 

Partners