|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs)
The Affective Computing domain, term coined by Rosalind Picard in
1997, gathers several scientific areas such as computer science,
cognitive science, psychology, design and art. The humane-machine
interaction systems are no longer solely fast and efficient. They
aim to offer to users affective experiences: user's affective state
is detected and considered within the interaction; the system
displays affective state; it can reason about their implication to
achieve a task or resolve a problem. In this book, we have chosen
to cover various domains of research in emotion-oriented systems.
Our aim is also to highlight the importance to base the
computational model on theoretical foundations and on natural data.
A comprehensive guide to administering and protecting the latest
Windows 11 and Windows server operating system from ongoing cyber
threats using zero-trust security principles Key Features Learn to
protect your Windows environment using zero-trust and a
multi-layered security approach Implement security controls using
Intune, Configuration Manager, Defender for Endpoint, and more
Understand how to onboard modern cyber-threat defense solutions for
Windows clients Book DescriptionAre you looking for the most
current and effective ways to protect Windows-based systems from
being compromised by intruders? This updated second edition is a
detailed guide that helps you gain the expertise to implement
efficient security measures and create robust defense solutions
using modern technologies. The first part of the book covers
security fundamentals with details around building and implementing
baseline controls. As you advance, you'll learn how to effectively
secure and harden your Windows-based systems through hardware,
virtualization, networking, and identity and access management
(IAM). The second section will cover administering security
controls for Windows clients and servers with remote policy
management using Intune, Configuration Manager, Group Policy,
Defender for Endpoint, and other Microsoft 365 and Azure cloud
security technologies. In the last section, you'll discover how to
protect, detect, and respond with security monitoring, reporting,
operations, testing, and auditing. By the end of this book, you'll
have developed an understanding of the processes and tools involved
in enforcing security controls and implementing zero-trust security
principles to protect Windows systems. What you will learn Build a
multi-layered security approach using zero-trust concepts Explore
best practices to implement security baselines successfully Get to
grips with virtualization and networking to harden your devices
Discover the importance of identity and access management Explore
Windows device administration and remote management Become an
expert in hardening your Windows infrastructure Audit, assess, and
test to ensure controls are successfully applied and enforced
Monitor and report activities to stay on top of vulnerabilities Who
this book is forIf you're a cybersecurity or technology
professional, solutions architect, systems engineer, systems
administrator, or anyone interested in learning how to secure the
latest Windows-based systems, this book is for you. A basic
understanding of Windows security concepts, Intune, Configuration
Manager, Windows PowerShell, and Microsoft Azure will help you get
the best out of this book.
Develop cloud applications based on the most popular Azure
services, including hosting web applications, running containers,
storing data using both relational and non-relational databases,
and much more Key Features Take a modern approach to Azure Cloud
development and management Get a detailed introduction to services
such as web hosting, databases, and serverless platforms Get the
hang of cloud services with this practical, developer-centric guide
for Azure developers Book DescriptionMicrosoft Azure is currently
one of the fastest growing public cloud service providers thanks to
its sophisticated set of services for building fault-tolerant and
scalable cloud-based applications. This second edition of Azure for
Developers will take you on a journey through the various PaaS
services available in Azure, including Azure App Service, Azure
Functions, and Azure SQL Databases, showing you how to build a
complete and reliable system with ease. Throughout the book, you'll
discover ways to enhance your skills when building cloud-based
solutions leveraging different SQL/NoSQL databases, serverless and
messaging components, containerized solutions, and even search
engines such as Azure Cognitive Search. That's not all!! The book
also covers more advanced scenarios such as scalability best
practices, serving static content with Azure CDN, and distributing
loads with Azure Traffic Manager, Azure Application Gateway, and
Azure Front Door. By the end of this Azure book, you'll be able to
build modern applications on the Azure cloud using the most popular
and promising technologies to make your solutions reliable, stable,
and efficient. What you will learn Identify the Azure services that
can help you get the results you need Implement PaaS components -
Azure App Service, Azure SQL, Traffic Manager, CDN, Notification
Hubs, and Azure Cognitive Search Work with serverless components
Integrate applications with storage Put together messaging
components (Event Hubs, Service Bus, and Azure Queue Storage) Use
Application Insights to create complete monitoring solutions Secure
solutions using Azure RBAC and manage identities Develop fast and
scalable cloud applications Who this book is forThis book is for
developers and IT professionals who want to learn Microsoft Azure
by developing applications based on various cloud services. Prior
knowledge of software development and the basics of software
architecture and Azure services give you an advantage.
Effectively debug kernel modules, device drivers, and the kernel
itself by gaining a solid understanding of powerful open source
tools and advanced kernel debugging techniques Key Features Fully
understand how to use a variety of kernel and module debugging
tools and techniques using examples Learn to expertly interpret a
kernel Oops and identify underlying defect(s) Use easy-to-look up
tables and clear explanations of kernel-level defects to make this
complex topic easy Book DescriptionThe Linux kernel is at the very
core of arguably the world's best production-quality OS. Debugging
it, though, can be a complex endeavor. Linux Kernel Debugging is a
comprehensive guide to learning all about advanced kernel
debugging. This book covers many areas in-depth, such as
instrumentation-based debugging techniques (printk and the dynamic
debug framework), and shows you how to use Kprobes. Memory-related
bugs tend to be a nightmare - two chapters are packed with tools
and techniques devoted to debugging them. When the kernel gifts you
an Oops, how exactly do you interpret it to be able to debug the
underlying issue? We've got you covered. Concurrency tends to be an
inherently complex topic, so a chapter on lock debugging will help
you to learn precisely what data races are, including using KCSAN
to detect them. Some thorny issues, both debug- and
performance-wise, require detailed kernel-level tracing; you'll
learn to wield the impressive power of Ftrace and its frontends.
You'll also discover how to handle kernel lockups, hangs, and the
dreaded kernel panic, as well as leverage the venerable GDB tool
within the kernel (KGDB), along with much more. By the end of this
book, you will have at your disposal a wide range of powerful
kernel debugging tools and techniques, along with a keen sense of
when to use which. What you will learn Explore
instrumentation-based printk along with the powerful dynamic debug
framework Use static and dynamic Kprobes to trap into kernel/module
functions Catch kernel memory defects with KASAN, UBSAN, SLUB
debug, and kmemleak Interpret an Oops in depth and precisely
identify it's source location Understand data races and use KCSAN
to catch evasive concurrency defects Leverage Ftrace and trace-cmd
to trace the kernel flow in great detail Write a custom kernel
panic handler and detect kernel lockups and hangs Use KGDB to
single-step and debug kernel/module source code Who this book is
forThis book is for Linux kernel developers, module/driver authors,
and testers interested in debugging and enhancing their Linux
systems at the level of the kernel. System administrators who want
to understand and debug the internal infrastructure of their Linux
kernels will also find this book useful. A good grasp on C
programming and the Linux command line is necessary. Some
experience with kernel (module) development will help you follow
along.
Gain practical knowledge of shellcode and leverage it to develop
shellcode for Windows and Linux operating systems, while
understanding the countermeasures in place and how these can be
bypassed Key Features Get up and running with shellcode
fundamentals Develop Shellcode for Windows and Linux Understand the
building blocks of shellcode Book DescriptionShellcoding is a
technique that is executed by many red teams and used in
penetration testing and real-world attacks. Books on shellcode can
be complex, and writing shellcode is perceived as a kind of "dark
art." Offensive Shellcode from Scratch will help you to build a
strong foundation of shellcode knowledge and enable you to use it
with Linux and Windows. This book helps you to explore simple to
more complex examples of shellcode that are used by real advanced
persistent threat (APT) groups. You'll get to grips with the
components of shellcode and understand which tools are used when
building shellcode, along with the automated tools that exist to
create shellcode payloads. As you advance through the chapters,
you'll become well versed in assembly language and its various
components, such as registers, flags, and data types. This
shellcode book also teaches you about the compilers and decoders
that are used when creating shellcode. Finally, the book takes you
through various attacks that entail the use of shellcode in both
Windows and Linux environments. By the end of this shellcode book,
you'll have gained the knowledge needed to understand the workings
of shellcode and build your own exploits by using the concepts
explored. What you will learn Gain a thorough understanding of
shellcode Get to grips with assembly language and its key purpose
in shellcode development Identify key elements of memory registers
Explore debuggers and their use cases Get up and running with
hands-on shellcode creation for both Windows and Linux Exploit
Windows and Linux operating systems using shellcode Assess
countermeasures of Windows and Linux Who this book is forThis book
is for red teamers, penetration testers, and anyone looking to
learn about shellcode and find out how it is used to break into
systems by making use of simple to complex instructions of code in
memory. Basic shellcode knowledge is helpful but not mandatory to
understand the topics covered in this book.
Improve current or new projects with top notch testability and
maintainability. Writing tests improves the design of your apps, as
it pushes you to have a more modularized design. This in turn
improves the maintainability and sustainability of your apps. This
book is for iOS developers who already know the basics of iOS and
Swift development but want to learn all the testing pro features in
iOS. You'll start by reviewing the TDD Cycle and how to implement
these concepts on a legacy project or a new one. You'll then walk
through TDD step-by-step on a blank project, including setting up
test targets, assertions, and expectations. You'll follow that with
all levels of testing such as unit tests, integration tests, and
end-to-end tests, and also tackle fairly complex, yet badly written
legacy code. The book will take you through the journey of
modularizing a legacy app using TDD. Throughout this journey, you
will be introduced to multiple testing concepts and techniques,
like writing tests for network and core data layers. You will write
tests to ensure the thread safety of your app. And you'll add a new
feature while you are in the middle of refactoring, which is an
important skill so you can keep adding features while you are
fixing your technical debt. By the end of this book, you will have
all the tools needed to become a testing master. What You'll Learn
Use mocking and dependency injection to make components more
testable Write tests for asynchronous code like network code Add
new features to existing legacy apps using TDD Who This Book Is For
Experienced iOS developers who care about software quality and
meeting customer expectations.
Create a complete continuous delivery process using modern DevOps
tools such as Docker, Jenkins, Kubernetes, Ansible, Terraform, and
many more Key Features Build reliable and secure applications using
Docker containers Create a highly available environment to scale
Jenkins and your services using Kubernetes Automate your release
process end-to-end Book DescriptionThis updated third edition of
Continuous Delivery with Docker and Jenkins will explain the
advantages of combining Jenkins and Docker to improve the
continuous integration and delivery process of app development.
You'll start by setting up a Docker server and configuring Jenkins
on it. Next, you'll discover steps for building applications and
microservices on Dockerfiles and integrating them with Jenkins
using continuous delivery processes such as continuous integration,
automated acceptance testing, configuration management, and
Infrastructure as Code. Moving ahead, you'll learn how to ensure
quick application deployment with Docker containers, along with
scaling Jenkins using Kubernetes. Later, you'll explore how to
deploy applications using Docker images and test them with Jenkins.
Toward the concluding chapters, the book will focus on missing
parts of the CD pipeline, such as the environments and
infrastructure, application versioning, and non-functional testing.
By the end of this continuous integration and continuous delivery
book, you'll have gained the skills you need to enhance the DevOps
workflow by integrating the functionalities of Docker and Jenkins.
What you will learn Grasp Docker fundamentals and dockerize
applications for the CD process Understand how to use Jenkins
on-premises and in the cloud Scale a pool of Docker servers using
Kubernetes Write acceptance tests using Cucumber Run tests in the
Docker ecosystem using Jenkins Provision your servers and
infrastructure using Ansible and Terraform Publish a built Docker
image to a Docker registry Deploy cycles of Jenkins pipelines using
community best practices Who this book is forThe book is for DevOps
engineers, system administrators, Docker professionals, or anyone
who wants to explore the power of working with Docker and Jenkins
together. No prior knowledge of DevOps is required to get started.
Simplified actionable recipes for managing Active Directory and
Azure AD, as well as Azure AD Connect, for administration
on-premise and in the cloud with Windows Server 2022 Key Features
Expert solutions for name resolution, federation, certificates, and
security with Active Directory Explore Microsoft Azure AD and Azure
AD Connect for effective administration on the cloud Automate
security tasks using Active Directory tools and PowerShell Book
DescriptionUpdated to the Windows Server 2022, this second edition
covers effective recipes for Active Directory administration that
will help you leverage AD's capabilities for automating network,
security, and access management tasks in the Windows
infrastructure. Starting with a detailed focus on forests, domains,
trusts, schemas, and partitions, this book will help you manage
domain controllers, organizational units, and default containers.
You'll then explore Active Directory sites management as well as
identify and solve replication problems. As you progress, you'll
work through recipes that show you how to manage your AD domains as
well as user and group objects and computer accounts, expiring
group memberships, and Group Managed Service Accounts (gMSAs) with
PowerShell. Once you've covered DNS and certificates, you'll work
with Group Policy and then focus on federation and security before
advancing to Azure Active Directory and how to integrate on-premise
Active Directory with Azure AD. Finally, you'll discover how
Microsoft Azure AD Connect synchronization works and how to harden
Azure AD. By the end of this AD book, you'll be able to make the
most of Active Directory and Azure AD Connect. What you will learn
Manage the Recycle Bin, gMSAs, and fine-grained password policies
Work with Active Directory from both the graphical user interface
(GUI) and command line Use Windows PowerShell to automate tasks
Create and remove forests, domains, domain controllers, and trusts
Create groups, modify group scope and type, and manage memberships
Delegate, view, and modify permissions Set up, manage, and
optionally decommission certificate authorities Optimize Active
Directory and Azure AD for security Who this book is forThis book
is for administrators of existing Active Directory Domain Service
environments as well as for Azure AD tenants looking for guidance
to optimize their day-to-day tasks. Basic networking and Windows
Server Operating System knowledge will be useful for getting the
most out of this book.
This book is the sixth volume of the successful book series on
Robot Operating System: The Complete Reference. The objective of
the book is to provide the reader with comprehensive coverage of
the Robot Operating Systems (ROS) and the latest trends and
contributed systems. ROS is currently considered as the primary
development framework for robotics applications. There are seven
chapters organized into three parts. Part I presents two chapters
on the emerging ROS 2.0 framework; in particular, ROS 2.0 is become
increasingly mature to be integrated into the industry. The first
chapter from Amazon AWS deals with the challenges that ROS 2
developers will face as they transition their system to be
commercial-grade. The second chapter deals with reactive
programming for both ROS1 and ROS. In Part II, two chapters deal
with advanced robotics, namely on the usage of robots in farms, and
the second deals with platooning systems. Part III provides three
chapters on ROS navigation. The first chapter deals with the use of
deep learning for ROS navigation. The second chapter presents a
detailed tuning guide on ROS navigation and the last chapter
discusses SLAM for ROS applications. I believe that this book is a
valuable companion for ROS users and developers to learn more ROS
capabilities and features.
Direct from Microsoft, these Exam Refs are the official study
guides for the new Microsoft 70-767 Implementing a SQL Data
Warehouse and the new Microsoft 70-768 Developing SQL Data Models
certification exams. Exam Ref 70-767 Implementing a SQL Data
Warehouse, the first book in this bundle (ISBN 978150936473),
offers professional-level preparation that helps candidates
maximize their exam performance and sharpen their skills on the
job. It focuses on the specific areas of expertise modern IT
professionals need to successfully build modern data warehouses to
support advanced business intelligence solutions. Written by
Microsoft Data Platform MVP Stacia Varga, Exam Ref 70-768
Developing SQL Data Models, the second book in this bundle (ISBN
9781509305155), offers professional-level preparation that helps
candidates maximize their exam performance and sharpen their skills
on the job. It focuses on the specific areas of expertise modern
database and business intelligence professionals need to succeed
with SQL Server 2016 Analysis Services.
|
|