![]() |
Welcome to Loot.co.za!
Sign in / Register |Wishlists & Gift Vouchers |Help | Advanced search
|
Your cart is empty |
||
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)
Prepare for the updated version of Microsoft Exam AZ-900 and help demonstrate your real-world knowledge of cloud services and how they can be provided with Microsoft Azure, including high-level concepts that apply throughout Azure, and key concepts specific to individual services. Designed for professionals in both non-technical or technical roles, this Exam Ref focuses on the critical thinking and decision-making acumen needed for success at the Microsoft Certified Fundamentals level. Focus on the expertise measured by these objectives: Describe cloud concepts Describe Azure architecture and services Describe Azure management and governance This Microsoft Exam Ref: Organizes its coverage by exam objectives Features strategic, what-if scenarios to challenge you Assumes you want to show foundational knowledge of cloud services and their delivery with Microsoft Azure About the Exam Exam AZ-900 focuses on knowledge needed to describe cloud computing; the benefits of using cloud services; cloud service types; core Azure architectural components; Azure compute, networking, and storage services; Azure identity, access, and security; Azure cost management; Azure features and tools for governance and compliance, and for managing and deploying resources; and Azure monitoring tools. About Microsoft Certification Passing this exam fulfills your requirements for the Microsoft Certified: Azure Fundamentals credential, validating your basic knowledge of cloud services and how those services are provided with Azure. Whether you're new to the fi eld or a seasoned professional, demonstrating this knowledge can help you jump-start your career and prepare you to dive deeper into the many technical opportunities Azure offers.
"Linux Malware Incident Response" is a "first look" at the "Malware
Forensics Field Guide for Linux Systems," exhibiting the first
steps in investigating Linux-based incidents. The Syngress Digital
Forensics Field Guides series includes companions for any digital
and computer forensic investigator and analyst. Each book is a
"toolkit" with checklists for specific tasks, case studies of
difficult situations, and expert analyst tips. This compendium of
tools for computer forensics analysts and investigators is
presented in a succinct outline format with cross-references to
supplemental appendices. It is designed to provide the digital
investigator clear and concise guidance in an easily accessible
format for responding to an incident or conducting analysis in a
lab.
Written by two experienced penetration testers the material presented discusses the basics of the OS X environment and its vulnerabilities. Including but limited to; application porting, virtualization utilization and offensive tactics at the kernel, OS and wireless level. This book provides a comprehensive in-depth guide to exploiting and compromising the OS X platform while offering the necessary defense and countermeasure techniques that can be used to stop hackers As a resource to the reader, the companion website will provide
links from the authors, commentary and updates. *Provides relevant information including some of the latest OS X threats *Easily accessible to those without any prior OS X experience *Useful tips and strategies for exploiting and compromising OS X systems *Includes discussion of defensive and countermeasure applications and how to use them *Covers mobile IOS vulnerabilities
Intelligent systems are rapidly becoming a central focus of study for researchers as they have the ability to learn and adapt during their existence in order to achieve certain goals and objectives. Intelligent Systems for Automated Learning and Adaptation: Emerging Trends and Applications presents methodologies, architectures, and approaches on experiential automated learning. This critical mass of sought after research assembles the most intriguing and innovative applications, advancements, and leading studies on the methodology of intellectual computing.
Eleventh Hour Linux+: Exam XK0-003 Study Guide offers a practical guide for those preparing for the Linux+ certification exam. The book begins with a review of important concepts that are needed for successful operating system installation. These include computer hardware, environment settings, partitions, and network settings. The book presents the strategies for creating filesystems; different types of filesystems; the tools used to create filesystems; and the tools used to administer filesystems. It explains the Linux boot process; how to configure system and user profiles as well as the common environment variables; and how to use BASH command line interpreter. The remaining chapters discuss how to install, configure, support, and remove applications; the configuration of Linux as a workstation and as a server; securing the Linux system; and common tools for managing a system. Each chapter includes information on exam objectives, exam warnings, and the top five toughest questions along with their answers.
Make the most of your Mac with this witty, authoritative guide to macOS Big Sur. Apple updates its Mac operating system every year, adding new features with every revision. But after twenty years of this updating cycle without a printed user guide to help customers, feature bloat and complexity have begun to weigh down the works. For thirty years, the Mac faithful have turned to David Pogue's Mac books to guide them. With Mac Unlocked, New York Times bestselling author Pogue introduces readers to the most radical Mac software redesign in Apple history, macOS Big Sur. Beginning Mac users and Windows refugees will gain an understanding of the Mac philosophy; Mac veterans will find a concise guide to what's new in Big Sur, including its stunning visual and sonic redesign, the new Control Center for quick settings changes, and the built-in security auditing features. With a 300 annotated illustrations, sparkling humor, and crystal-clear prose, Mac Unlocked is the new gold-standard guide to the Mac.
"Windows Server 2012 Security from End to Edge and Beyond" shows you how to architect, design, plan, and deploy Microsoft security technologies for Windows 8/Server 2012 in the enterprise. The book covers security technologies that apply to both client and server and enables you to identify and deploy Windows 8 security features in your systems based on different business and deployment scenarios. The book is a single source for learning how to secure Windows 8 in many systems, including core, endpoint, and anywhere access. Authors Tom Shinder and Yuri Diogenes, both Microsoft employees, bring you insider knowledge of the Windows 8 platform, discussing how to deploy Windows security technologies effectively in both the traditional datacenter and in new cloud-based solutions. With this book, you will understand the conceptual underpinnings of Windows 8 security and how to deploy these features in a test lab and in pilot and production environments. The book's revolutionary "Test Lab Guide" approach lets you test
every subject in a predefined test lab environment. This, combined
with conceptual and deployment guidance, enables you to understand
the technologies and move from lab to production faster than ever
before. Critical material is also presented in key concepts and
scenario-based approaches to evaluation, planning, deployment, and
management. Videos illustrating the functionality in the Test Lab
can be downloaded from the authors blog http:
//blogs.technet.com.b.security_talk/. Each chapter wraps up with a
bullet list summary of key concepts discussed in the chapter.
As technology expands and evolves, one-dimensional, graphical user
interface (GUI) design becomes increasingly limiting and
simplistic. Designers must meet the challenge of developing new and
creative interfaces that adapt to meet human needs and
technological trends. HCI Beyond the GUI provides designers with
this know how by exploring new ways to reach users that involve all
of the human senses. Dr. Kortum gathers contributions from leading
human factors designers to present a single reference for
professionals, researchers, and students.
Microsoft Forefront is a comprehensive suite of security products
that will provide companies with multiple layers of defense against
threats. Computer and Network Security is a paramount issue for
companies in the global marketplace. Businesses can no longer
afford for their systems to go down because of viruses, malware,
bugs, trojans, or other attacks. Running a Microsoft Forefront
Suite within your environment brings many different benefits.
Forefront allows you to achieve comprehensive, integrated, and
simplified infrastructure security. This comprehensive suite of
tools provides end-to-end security stretching from Web servers back
to the desktop. This book will provide system administrators
familiar with Syngress' existing Microsoft networking and security
titles with a complete reference to Microsoft's flagship security
products.
The Second Edition of the Best Damn Windows Server Book Period is
completely revised and updated to Windows Server 2008.
Contrary to popular belief, there has never been any shortage of
Macintosh-related security issues. OS9 had issues that warranted
attention. However, due to both ignorance and a lack of research,
many of these issues never saw the light of day. No solid
techniques were published for executing arbitrary code on OS9, and
there are no notable legacy Macintosh exploits. Due to the combined
lack of obvious vulnerabilities and accompanying exploits,
Macintosh appeared to be a solid platform. Threats to Macintosh's
OS X operating system are increasing in sophistication and number.
Whether it is the exploitation of an increasing number of holes,
use of rootkits for post-compromise concealment or disturbed denial
of service, knowing why the system is vulnerable and understanding
how to defend it is critical to computer security.
A virtual evolution in IT shops large and small has begun. VMware s
ESX Server is the enterprise tool to free your infrastructure from
its physical limitations providing the great transformation into a
virtual environment--this book shows you how. Use Syngress proven
How to Cheat methodology to configure and build VMware s ESX Server
version 3. This clear, concise guide provides all the information
you need to become a virtual whiz
Digital signal processing is now a growing area of study invading all walks of organizational life, from consumer products to database management. ""Web-Based Supply Chain Management and Digital Signal Processing: Methods for Effective Information Administration and Transmission"" presents trends and techniques for successful intelligent decision-making and transfer of products through digital signal processing. A defining collection of field advancements, this publication provides the latest and most complete research in supply chain management with examples and case studies useful for those involved with various levels of management.
" Biometric Technologies and Verification Systems" is organized
into nine parts composed of 30 chapters, including an extensive
glossary of biometric terms and acronyms. It discusses the current
state-of-the-art in biometric verification/authentication,
identification and system design principles. It also provides a
step-by-step discussion of how biometrics works; how biometric data
in human beings can be collected and analyzed in a number of ways;
how biometrics are currently being used as a method of personal
identification in which people are recognized by their own unique
corporal or behavioral characteristics; and how to create detailed
menus for designing a biometric verification system.
This second edition is not only a thorough update of the first
edition, it is also a marriage of the best-known RISC
architecture--MIPS--with the best-known open-source OS--Linux. The
first part of the book begins with MIPS design principles and then
describes the MIPS instruction set and programmers resources. It
uses the MIPS32 standard as a baseline (the 1st edition used the
R3000) from which to compare all other versions of the architecture
and assumes that MIPS64 is the main option. The second part is a
significant change from the first edition. It provides concrete
examples of operating system low level code, by using Linux as the
example operating system. It describes how Linux is built on the
foundations the MIPS hardware provides and summarizes the Linux
application environment, describing the libraries, kernel
device-drivers and CPU-specific code. It then digs deep into
application code and library support, protection and memory
management, interrupts in the Linux kernel and multiprocessor
Linux.
Over 95% of computers around the world are running at least one
Microsoft product. Microsoft Windows Software Update Service is
designed to provide patches and updates to every one of these
computers.
As advances in technology continue to generate the collective knowledge of an organization and its operations, strategic models for information systems are developed in order to arrange business processes and business data. Frameworks for Developing Efficient Information Systems: Models, Theory, and Practice presents research and practices on the advancements in systems analysis and design. These theoretical frameworks and practical solutions are useful for researchers, practitioners, and academicians as this book aims to bridge the communication gap between business managers and system designers.
This book is designed to cover three objectives. One, to provide a comprehensive resource to individuals (including novice, IT/Non-HP-UX administrators, HP-UX administrators) who intend to take the Certified System Administrator for HP-UX certification exam and pass it. Two, to provide a quick and valuable on-the-job resource to HP-UX administrators, administrators of other UNIX operating system software, IT managers, programmers, and DBAs working in the HP-UX environment. Three, to provide an easy-to-understand guide to novice and IT/non-HP-UX administrators who intend to learn HP-UX from the beginning. This book contains 33 chapters. The book is organized in such a way that it helps its audience understand concepts, implementation procedures, some basic troubleshooting, command syntax, configuration files, and daemons involved. There are three key areas: UNIX fundamentals, HP-UX system administration, and HP-UX network administration. 1.UNIX Fundamentals covers the basics of UNIX. Most information is not specific to a particular UNIX flavor, but rather includes general UNIX concepts, file manipulation and security techniques, shell and awk programming, vi editor, basic commands, and other topics. Chapters 01 through 06 and chapter 21 cover this area. Unlike many other similar books, a chapter on shell scripting is presented after covering HP-UX System Administration chapters. This is done intentionally to provide readers with some practical examples based on the knowledge they have gained from UNIX Fundamentals and HP-UX System Administration chapters. 2.HP-UX System Administration covers the HP-UX-specific system administration concepts and topics including HP-UX installation methods; software and patch management; user and group account administration; disk and device file management; LVM and file system administration; swap space and printer management; system startup and shutdown procedures; kernel reconfiguration techniques; backup, restore, and system recovery functions; job automation and process control; system logging and performance monitoring; and so on. Chapters 07 through 20 cover this area. 3.HP-UX Network Administration covers HP-UX network administration concepts and topics such as OSI and TCP/IP models; network hardware overview; LAN card administration; IP subnetting and routing techniques; network troubleshooting tools; system startup services; naming services such as DNS, NIS, and LDAP; File sharing tools viz. NFS and AutoFS; Time synchronization using NTP; internet services administration; BootP/TFTP services; system security; and so on. Chapters 22 through 33 cover this area. The beginning of each chapter highlights objectives covered. The end of each chapter includes a summary as to what is learnt in the chapter. Throughout the book tables, figures, screen shots, and examples are given to explain concepts and tasks. The output generated as a result of running commands is highlighted in light grey background to differentiate it with surrounding text. The book includes several appendices one of which contains more than 550 practice exam questions. Tables of commands, important files, and service daemons are included in separate appendices.
This bestselling on-the-job reference and test preparation guide has been fully revised for new 2022 exam objectives This fully revised and updated resource offers complete coverage of the latest release of CompTIA A+ exams 220-1101 & 220-1102. You'll find learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth explanations. Designed to help you pass the CompTIA A+ exams with ease, this definitive guide also serves as an essential on-the-job IT reference. Covers all exam topics, including how to: Work with CPUs, RAM, BIOS, motherboards, power supplies, and other personal computer components Install, configure, and maintain hard drives Manage input devices and removable media Set up, upgrade, and maintain Microsoft Windows Troubleshoot and fix computer problems Install printers and other peripherals Configure and secure mobile devices >Connect to the Internet Set up wired and wireless networks Protect your personal computer and your network Implement virtualization and cloud-based technologies Online content includes: Practice exams for 1101 & 1102 with hundreds of questions One hour of video training from Mike Meyers TotalSim simulations of performance-based questions A collection of Mike Meyers' favorite shareware and freeware PC tools and utilities
Windows Server 2003 Security Infrastructures is a must for anyone
that wants to know the nuts and bolts of Windows Server 2003
security and wants to leverage the operating system's security
infrastructure components to build a more secure I.T.
infrastructure. The primary goal of this book is to provide
insights into the security features and technologies of the Windows
Server 2003 operating system. It also highlights the security
principles an architect should remember when designing an
infrastructure that is rooted on the Windows Server 2003 OS. |
You may like...
Field Responsive Fluids as Smart…
Abdollah Hajalilou, Saiful Amri Mazlan, …
Hardcover
R3,204
Discovery Miles 32 040
Cerebral Lateralization and Cognition…
Gillian Forrester, Kristelle Hudry, …
Hardcover
R6,207
Discovery Miles 62 070
The Oxford Handbook of Philosophy of…
Eric Margolis, Richard Samuels, …
Hardcover
R5,411
Discovery Miles 54 110
Environment - An Interdisciplinary…
Glenn Adelson, James Engell, …
Paperback
R829
Discovery Miles 8 290
|