IT eBooks
Download, Read, Use
Exam Ref 70-742 Identity with Windows Server 2016
Exam Ref 70-742 Identity with Windows Server 2016

Prepare for Microsoft Exam 70-742 - and help demonstrate your real-world mastery of Windows Server 2016 identity features and functionality. Designed for experienced IT professionals ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the MCSA level. Focus on the expertise measured by these objectives: Install and configure Active Directory Domain Services (AD DS); Manage and maintain AD DS; Create and manage Group Policy; Implement Active Directory Certificate Services (AD CS); Implement identity federation and access solutions. This Microsoft Exam Ref: Organizes its coverage by exam objectives; Features strategic, what-if scenarios to challenge you; Assumes you have experience working with Windows Server, Windows clients, and virtualization; are familiar with core networking technologies, and are aware of basic security best practices. ...
Exam Ref 70-743 Upgrading Your Skills to MCSA
Exam Ref 70-743 Upgrading Your Skills to MCSA

Prepare for Microsoft Exam 70-743 - and demonstrate that your skills are upgraded for Windows Server 2016. Designed for experienced IT pros ready to advance their status, this Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the MCSA level. Focus on the skills measured on the exam: Install Windows servers in host and compute environments; Implement storage solutions; Implement Hyper-V; Implement Windows containers; Implement high availability; Implement Domain Name System (DNS); Implement IP Address Management (IPAM); Implement network connectivity and remote access solutions; Implement an advanced network infrastructure; Install and configure Active Directory Domain Services (AD DS); Implement identity federation and access solutions. This Microsoft Exam Ref: Organizes its coverage by the "Skills measured" posted on the exam webpage; Features strategic, what-if scenarios to challenge you; Points to in-depth material by topic for exam can ...
Exam Ref 70-744 Securing Windows Server 2016
Exam Ref 70-744 Securing Windows Server 2016

Prepare for Microsoft Exam 70-744 - and help demonstrate your real-world mastery of securing Windows Server 2016 environments. Designed for experienced IT professionals ready to advance their status, Exam Ref focuses on the critical-thinking and decision-making acumen needed for success at the MCSE level. Focus on the expertise measured by these objectives: Implement server hardening solutions; Secure a virtualization infrastructure; Secure a network infrastructure; Manage privileged identities; Implement threat detection solutions; Implement workload-specific security. This Microsoft Exam Ref: Organizes its coverage by exam objectives; Features strategic, what-if scenarios to challenge you; Assumes you have experience as a Windows Server administrator and an understanding of basic networking and Hyper-V virtualization fundamentals, Active Directory Domain Services principles, and Windows Server security principles. ...
Windows Server 2016 Inside Out
Windows Server 2016 Inside Out

Dive into Windows Server 2016 - and really put your Windows Server expertise to work. Focusing on Windows Server 2016's most powerful and innovative features, this supremely organized reference packs hundreds of timesaving solutions, tips, and workarounds - all you need to plan, implement, or manage Windows Server in enterprise, data center, cloud, and hybrid environments. Fully reflecting Windows Server new capabilities for the cloud-first era, Orin covers everything from Nano Server to Windows Server and Hyper-V Containers. You'll discover how experts tackle today's essential tasks - and challenge yourself to new levels of mastery. Optimize the full Windows Server 2016 lifecycle, from planning and configuration through rollout and administration; Ensure fast, reliable upgrades and migrations; Seamlessly deliver core DNS, DHCP, file, print, storage, and Internet services; Use IPAM to centrally manage all enterprise DNS and DHCP infrastructure; Gain dramatic storage utilization impr ...
Practical Network Scanning
Practical Network Scanning

Network scanning is the process of assessing a network to identify an active host network; same methods can be used by an attacker or network administrator for security assessment. This procedure plays a vital role in risk assessment programs or while preparing a security plan for your organization. Practical Network Scanning starts with the concept of network scanning and how organizations can benefit from it. Then, going forward, we delve into the different scanning steps, such as service detection, firewall detection, TCP/IP port detection, and OS detection. We also implement these concepts using a few of the most prominent tools on the market, such as Nessus and Nmap. In the concluding chapters, we prepare a complete vulnerability assessment plan for your organization. By the end of this book, you will have hands-on experience in performing network scanning using different tools and in choosing the best tools for your system. ...
Co-evolution of Intelligent Socio-technical Systems
Co-evolution of Intelligent Socio-technical Systems

As the interconnectivity between humans through technical devices is becoming ubiquitous, the next step is already in the making: ambient intelligence, i.e. smart (technical) environments, which will eventually play the same active role in communication as the human players, leading to a co-evolution in all domains where real-time communication is essential. This topical volume, based on the findings of the Socionical European research project, gives equal attention to two highly relevant domains of applications: transport, specifically traffic, dynamics from the viewpoint of a socio-technical interaction and evacuation scenarios for large-scale emergency situations. ...
Windows Phone 8 in Action
Windows Phone 8 in Action

With 10 million (and climbing) active handsets, Windows Phone 8 has become a real alternative to Android and iOS. WP users are hungry for great apps, so it's time for you to start creating them! Windows Phone 8 in Action teaches you how to design, build, and sell WP8 apps. In it, you'll learn to use the WP Runtime and .NET APIs to control key features like the accelerometer, camera, GPS, and microphone. This example-driven book also shows you how to write applications that use location and push notification, enhanced navigation services, and WP8's deep multimedia capabilities. ...
Practical Guide to Salesforce Communities
Practical Guide to Salesforce Communities

Whether you are brand new to the world of Salesforce communities or you are looking to take your Community Cloud knowledge to the next level, this detailed guide will help you to build and manage a Salesforce community by leveraging the declarative power of the platform with clicks, not code. Each Salesforce community is a part of a widespread ecosystem, with thousands of communities and millions of users active today on Community Cloud. Through valuable social and business tools, this online platform enables companies to empower and equip their customers, partners, and employees in new, powerful ways. In this book, Philip Weinmeister, a Salesforce MVP and the first-ever recipient of the "Community Cloud MVP" Trailblazer award, leads you through the ins and outs of Salesforce communities and provides you with an array of best practices to deliver top-notch business portals on the Salesforce platform. Practical Guide to Salesforce Communities is the first book to comprehensivel ...
Asset Attack Vectors
Asset Attack Vectors

Build an effective vulnerability management strategy to protect your organization's assets, applications, and data. Today's network environments are dynamic, requiring multiple defenses to mitigate vulnerabilities and stop data breaches. In the modern enterprise, everything connected to the network is a target. Attack surfaces are rapidly expanding to include not only traditional servers and desktops, but also routers, printers, cameras, and other IOT devices. It doesn't matter whether an organization uses LAN, WAN, wireless, or even a modern PAN—savvy criminals have more potential entry points than ever before. To stay ahead of these threats, IT and security leaders must be aware of exposures and understand their potential impact. Asset Attack Vectors will help you build a vulnerability management program designed to work in the modern threat environment. Drawing on years of combined experience, the authors detail the latest techniques for threat analysis, risk measurement, and ...
Hands-On Red Team Tactics
Hands-On Red Team Tactics

Red Teaming is used to enhance security by performing simulated attacks on an organization in order to detect network and system vulnerabilities. Hands-On Red Team Tactics starts with an overview of pentesting and Red Teaming, before giving you an introduction to few of the latest pentesting tools. We will then move on to exploring Metasploit and getting to grips with Armitage. Once you have studied the fundamentals, you will learn how to use Cobalt Strike and how to set up its team server. The book introduces some common lesser known techniques for pivoting and how to pivot over SSH, before using Cobalt Strike to pivot. This comprehensive guide demonstrates advanced methods of post-exploitation using Cobalt Strike and introduces you to Command and Control (C2) servers and redirectors. All this will help you achieve persistence using beacons and data exfiltration, and will also give you the chance to run through the methodology to use Red Team activity tools such as Empire during a ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025