A Guide to Kernel Exploitation: Attacking the Core discusses the theoretical techniques and approaches needed to develop reliable and effective kernel-level exploits, and applies them to different operating systems, namely, UNIX derivatives, Mac OS X, and Windows.
Malware Forensics Field Guide for Linux Systems is a handy reference that shows students the essential tools needed to do computer forensics analysis at the crime scene.
Android Forensics: Investigation, Analysis, and Mobile Security for Google Android provides the background, techniques and analysis tools you need to effectively investigate an Android phone.
Microsoft Windows Server 2008 R2: The Administrators Essential Reference introduces the Windows Server 2008 R2, which is Microsofts flagship server operating systems latest release.
Microsoft Windows 7 Administrators Reference covers various aspects of Windows 7 systems, including its general information as well as installation and upgrades.
Blockchain, a technology originally developed for cryptocurrency, has evolved into a versatile tool capable of driving significant change across industries and communities.
'Kocienda reveals the real secret of Steve Jobs's leadership and Apple's magic' - Kim Scott, bestselling author of Radical CandorA Wall Street Journal bestseller.
Your hands-on guide to Windows PowerShell scripting fundamentals Expand your expertise--and teach yourself the fundamentals of Windows PowerShell scripting, including features available in Windows PowerShell 5.
Prepare for Microsoft Exam 70-698-and help demonstrate your real-world mastery of installing, configuring, managing, and maintaining Windows 10 core services.
Prepare for Microsoft Exam 70-698-and help demonstrate your real-world mastery of installing, configuring, managing, and maintaining Windows 10 core services.
Build, operate, and orchestrate scalable microservices applications in the cloud This book combines a comprehensive guide to success with Microsoft Azure Service Fabric and a practical catalog of design patterns and best practices for microservices design, implementation, and operation.
Learn the simplest ways to get things done with Windows 10 Here's WHAT you'll learn * Navigate Windows 10 Fall Creators Update quickly, easily, and efficiently * Get online with the sleek Microsoft Edge web browser * Make the most of the Cortana personal assistant * Efficiently manage your email, calendar, photos, and more * Access your files from anywhere with Microsoft OneDrive * Help secure your computer and protect your data Here's HOW you'll learn * Jump in wherever you need answers * Follow easy steps and screenshots to see exactly what to do * Get handy tips for new techniques and shortcuts * Use Try This!
Learn the simplest ways to get things done with Windows 10 Here's WHAT you'll learn * Navigate Windows 10 Fall Creators Update quickly, easily, and efficiently * Get online with the sleek Microsoft Edge web browser * Make the most of the Cortana personal assistant * Efficiently manage your email, calendar, photos, and more * Access your files from anywhere with Microsoft OneDrive * Help secure your computer and protect your data Here's HOW you'll learn * Jump in wherever you need answers * Follow easy steps and screenshots to see exactly what to do * Get handy tips for new techniques and shortcuts * Use Try This!
Prepare for Microsoft Exam 70-745-and help demonstrate your real-world mastery of skills needed to build and manage software-defined infrastructure with Windows Server 2016 and System Center 2016 Virtual Machine Manager (SC VMM).
Prepare for Microsoft Exam 70-745-and help demonstrate your real-world mastery of skills needed to build and manage software-defined infrastructure with Windows Server 2016 and System Center 2016 Virtual Machine Manager (SC VMM).
Implement maximum control, security, and compliance processes in Azure cloud environments In Microsoft Azure Security Infrastructure, three leading experts show how to plan, deploy, and operate Microsoft Azure with outstanding levels of control, security, and compliance.
This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book.
Prepare for Microsoft Exam 70-398-and help demonstrate your real-world mastery of planning and designing cloud and hybrid identities and supporting identity infrastructure for managing devices.
Rapidly implement Internet of Things solutions Creating programs for the Internet of Things offers you an opportunity to build and program custom devices whose functionality is limited only by your imagination.
Rapidly implement Internet of Things solutions Creating programs for the Internet of Things offers you an opportunity to build and program custom devices whose functionality is limited only by your imagination.
Streamline and modernize the way you manage Active Directory Use Windows PowerShell to simplify and accelerate Active Directory domain controller management, whether you're running Active Directory entirely in the cloud, on-premises, or in a hybrid environment.
Streamline and modernize the way you manage Active Directory Use Windows PowerShell to simplify and accelerate Active Directory domain controller management, whether you're running Active Directory entirely in the cloud, on-premises, or in a hybrid environment.
This is the eBook of the printed book and may not include any media, website access codes, or print supplements that may come packaged with the bound book.
Discover how easy it is to create multi-user, cross-platform custom solutions with FileMaker Pro, the relational database platform published by Apple subsidiary Claris International, Inc.
Examine business problems and use a practical analytical approach to solve them by implementing predictive models and machine learning techniques using SAS and the R analytical language.
Master every aspect of orchestrating/managing Docker including creating a Swarm, creating services, using mounts, scheduling, scaling, resource management, rolling updates, load balancing, high availability, logging and monitoring, using multiple zones, and networking.