Book picks similar to
Troubleshooting with the Windows Sysinternals Tools by Mark E. Russinovich
computer-science
might-read
programming-windows
004
Comptia A+ 220-801 and 220-802 Exam Cram
David L. Prowse - 2012
Limited Time Offer: Buy CompTIA(R) A+ 220-801 and 220-802 Exam Cram and receive a 10% off discount code for the CompTIA A+ 220-801 and 220-802 exams. To receive your 10% off discount code:Register your product at pearsonITcertification.com/registerFollow the instructionsGo to your Account page and click on "Access Bonus Content" CompTIA(R) A+ 220-801 and 220-802 Exam Cram, Sixth Edition is the perfect study guide to help you pass CompTIA's A+ 220-801 and 220-802 exams. It provides coverage and practice questions for every exam topic, including substantial new coverage of Windows 7, new PC hardware, tablets, smartphones, and professional-level networking and security. The book presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Exam Alerts, Sidebars, and Notes interspersed throughout the text keep you focused on what you need to know. Cram Quizzes help you assess your knowledge, and the Cram Sheet tear card is the perfect last minute review. Covers the critical information you'll need to know to score higher on your CompTIA A+ 220-801 and 220-802 exams!Deploy and administer desktops and notebooks running Windows 7, Vista, or XPUnderstand, install, and troubleshoot motherboards, processors, and memoryTest and troubleshoot power-related problemsUse all forms of storage, including new Blu-ray and Solid State (SSD) devicesWork effectively with mobile devices, including tablets and smartphonesInstall, configure, and troubleshoot both visible and internal laptop componentsConfigure Windows components and applications, use Windows administrative tools, and optimize Windows systemsRepair damaged Windows environments and boot errorsWork with audio and video subsystems, I/O devices, and the newest peripheralsInstall and manage both local and network printersConfigure IPv4 and understand TCP/IP protocols and IPv6 changesInstall and configure SOHO wired/wireless networks and troubleshoot connectivityImplement secure authentication, prevent malware attacks, and protect data Companion CDThe companion CD contains a digital edition of the Cram Sheet and the powerful Pearson IT Certification Practice Test engine, complete with hundreds of exam-realistic questions and two complete practice exams. The assessment engine offers you a wealth of customization options and reporting features, laying out a complete assessment of your knowledge to help you focus your study where it is needed most. Pearson IT Certifcation Practice Test Minimum System RequirementsWindows XP (SP3), WIndows Vista (SP2), or Windows 7Microsoft .NET Framework 4.0 ClientPentium-class 1 GHz processor (or equivalent)512 MB RAM650 MB disk space plus 50 MB for each downloaded practice exam David L. Prowse is an author, computer network specialist, and technical trainer. Over the past several years he has authored several titles for Pearson Education, including the well-received CompTIA A+ Exam Cram and CompTIA Security+ Cert Guide. As a consultant, he installs and secures the latest in computer and networking technology. He runs the website www.davidlprowse.com, where he gladly answers questions from students and readers.
Beyond the Twelve-Factor App Exploring the DNA of Highly Scalable, Resilient Cloud Applications
Kevin Hoffman - 2016
Cloud computing is rapidly transitioning from a niche technology embraced by startups and tech-forward companies to the foundation upon which enterprise systems build their future. In order to compete in today’s marketplace, organizations large and small are embracing cloud architectures and practices.
Kindle Fire How To
Michael Gallagher - 2011
This guide will take you step-by-step with all of the Kindle Fire’s features including setup, navigating each tab, play music and videos, read eBooks, and download and use apps.Each chapter contains detailed instructions complete with screenshots, tips, tricks, and shortcuts to quickly get up to speed and more. Additionally, this guide shows you how to and where to receive FREE books, music, videos, and apps you can immediately start using on your Kindle Fire: you may never pay another cent for Kindle content again – download this guide to your Kindle Fire today!Michael Gallagher is the author of several bestselling Kindle “how-to” guides, and his title “Free Kindle Books and How to Find Them” has been the #1 Kindle reference guide for over two years, garnering #53 and #72 on the Top 100 Kindle bestseller lists for all Kindle book titles in 2010 and 2011, respectively. His “Kindle Books and Tips” blog has been the #1 bestselling subscription blog in the Amazon Kindle Store since 2010. You can visit his author page on the Amazon website at http://www.amazon.com/author/gallagher
The Art of Monitoring
James Turnbull - 2016
We start small and then build on what you learn to scale out to multi-site, multi-tier applications. The book is written for both developers and sysadmins. We focus on building monitored and measurable applications. We also use tools that are designed to handle the challenges of managing Cloud, containerised and distributed applications and infrastructure.In the book we'll deliver:* An introduction to monitoring, metrics and measurement.* A scalable framework for monitoring hosts (including Docker and containers), services and applications built on top of the Riemann event stream processor. * Graphing and metric storage using Graphite and Grafana.* Logging with Logstash.* A framework for high quality and useful notifications* Techniques for developing and building monitorable applications* A capstone that puts all the pieces together to monitor a multi-tier application.
SSH, The Secure Shell: The Definitive Guide
Daniel J. Barrett - 2001
It supports secure remote logins, secure file transfer between computers, and a unique "tunneling" capability that adds encryption to otherwise insecure network applications. Best of all, SSH is free, with feature-filled commercial versions available as well.SSH: The Secure Shell: The Definitive Guide covers the Secure Shell in detail for both system administrators and end users. It demystifies the SSH man pages and includes thorough coverage of:SSH1, SSH2, OpenSSH, and F-Secure SSH for Unix, plus Windows and Macintosh products: the basics, the internals, and complex applications.Configuring SSH servers and clients, both system-wide and per user, with recommended settings to maximize security.Advanced key management using agents, agent forwarding, and forced commands.Forwarding (tunneling) of TCP and X11 applications in depth, even in the presence of firewalls and network address translation (NAT).Undocumented behaviors of popular SSH implementations.Installing and maintaining SSH systems.Whether you're communicating on a small LAN or across the Internet, SSH can ship your data from "here" to "there" efficiently and securely. So throw away those insecure .rhosts and hosts.equiv files, move up to SSH, and make your network a safe place to live and work.
Operating Systems Design and Implementation
Andrew S. Tanenbaum - 1974
Written by the creator of Minux, professional programmers will now have the most up-to-date tutorial and reference available today. Revised to address the latest version of MINIX (MINIX 3), this streamlined, simplified new edition remains the only operating systems text to first explain relevant principles, then demonstrate their applications using a Unix-like operating system as a detailed example. It has been especially designed for high reliability, for use in embedded systems, and for ease of teaching.
Docker in Action
Jeff Nickoloff - 2015
Create a tiny virtual environment, called a container, for your application that includes only its particular set of dependencies. The Docker engine accounts for, manages, and builds these containers through functionality provided by the host operating system. Software running inside containers share the Linux OS and other resources, such as libraries, making their footprints radically smaller, and the containerized applications are easy to install, manage, and remove. Developers can package their applications without worrying about environment-specific deployment concerns, and the operations team gets cleaner, more efficient systems across the board. Better still, Docker is free and open source.Docker in Action teaches readers how to create, deploy, and manage applications hosted in Docker containers. The book starts with a clear explanation of the Docker model of virtualization, comparing this approach to the traditional hypervisor model. Developers will learn how to package applications in containers, including specific techniques for testing and distributing applications via Docker Hub and other registries. Readers will learn how to take advantage of the Linux OS features that Docker uses to run programs securely, and how to manage shared resources. Using carefully-designed examples, the book teaches you how to orchestrate containers and applications from installation to removal. Along the way, you'll learn techniques for using Docker on systems ranging from your personal dev-and-test machine to full-scale cloud deployments.
The Season: The Secret Life of Palm Beach and America's Richest Society
Ronald Kessler - 1999
With their beautiful 3.75 square-island constantly in the media glare, Palm Beachers protect their impossibly rich society from outside scrutiny with vigilant police, ubiquitous personal security staffs, and screens of tall hedges encircling every mansion.To this bizarre suspicious, exclusive world, New York Times bestselling author Ronald Kessler brought his charm, insight, and award-winning investigative skills, and came to know Palm Beach, its celebrated and powerful residents, and its exotic social rituals as no outside writer ever has. In this colorful, entertaining, and compulsively readable book. Kessler reveals the inside story of Palm Beach society as it moves languidly through the summer months, quickens in the fall, and shifts into frenetic high speed as the season begins in December, peaks in January and February, and continues into April.When unimaginable wealth combines with unlimited leisure time oil an island barely three times the size of New York's Central Park, human foibles and desires, lust and greed, passion and avarice, become magnified and intensified. Like laboratory rats fed growth hormones, the 9,800 Palm Beach residents—87 percent of whom are millionaires—exhibit the most outlandish extremes of their breed.To tell the story, Kessler follows four Palm Beachers through the season. These four characters—the reigning queen of Palm Beach society, the night manager of Palm Beach's trendiest bar, a gay "walker" who escorts wealthy women to balls, and a thirty—six-year-old gorgeous blonde who says she "can't find a guy in Palm Beach"—know practically everyone on the island and tell what goes on behind the scenes.Interweaving the yarns of these unfor-gettable figures with the lifestyle, history, scandals, lore, and rituals of a unique island of excess, The Season creates a powerful, seamless, juicy narrative that no novelist could dream up.
The Title: The Story of the First Division
Scott Murray - 2017
They may even have a point. But to build something so successful, so popular, so inescapable, you've got to have mighty strong foundations.Prior to 1992, the old First Division was England's premier prize. Its rich tapestry winds back to 1888 and the formation of the Football League. A grand century-long tradition in danger of being lost in the wake of Premier League year zero.No more! In The Title Scott Murray tells the lively, cherry-picked story of English football through the prism of the First Division. Rich with humour yet underpinned with solid research, this is a glorious meander across our national sport's varied terrain.With as much about Burnley, Wolves, West Brom and Portsmouth as the likes of Arsenal, Liverpool and Manchester United, we learn the less well-known stories the sport has to tell, such as the plight of Glossop, the smallest club to ever play top-flight football, and final day drama involving Huddersfield and Cardiff that knocks Michael Thomas into a cocked hat. We bask in the managerial genius of Tom Watson, the bowler-hatted Victorian Mourinho; celebrate the joy of the Busby Babes; discover the shameless showmanship of George Allison; embark on righteous escapades with Hughie Gallacher; and meet some old favourites in Don Revie, Bill Shankly, Alex Ferguson and Brian Clough.At turns exciting, surprising, witty and bittersweet, The Title is a highly informed, fresh and affectionate love-letter to the English game, and a delight for any football fan.
Practical Packet Analysis: Using Wireshark to Solve Real-World Network Problems
Chris Sanders - 2007
But how do you interpret those packets once you've captured them? And how can those packets help you to better understand what's going on under the hood of your network? Practical Packet Analysis shows how to use Wireshark to capture and then analyze packets as you take an indepth look at real-world packet analysis and network troubleshooting. The way the pros do it.Wireshark (derived from the Ethereal project), has become the world's most popular network sniffing application. But while Wireshark comes with documentation, there's not a whole lot of information to show you how to use it in real-world scenarios. Practical Packet Analysis shows you how to:Use packet analysis to tackle common network problems, such as loss of connectivity, slow networks, malware infections, and more Build customized capture and display filters Tap into live network communication Graph traffic patterns to visualize the data flowing across your network Use advanced Wireshark features to understand confusing packets Build statistics and reports to help you better explain technical network information to non-technical usersBecause net-centric computing requires a deep understanding of network communication at the packet level, Practical Packet Analysis is a must have for any network technician, administrator, or engineer troubleshooting network problems of any kind.
Elasticsearch: The Definitive Guide: A Distributed Real-Time Search and Analytics Engine
Clinton Gormley - 2014
This practical guide not only shows you how to search, analyze, and explore data with Elasticsearch, but also helps you deal with the complexities of human language, geolocation, and relationships.If you're a newcomer to both search and distributed systems, you'll quickly learn how to integrate Elasticsearch into your application. More experienced users will pick up lots of advanced techniques. Throughout the book, you'll follow a problem-based approach to learn why, when, and how to use Elasticsearch features.Understand how Elasticsearch interprets data in your documentsIndex and query your data to take advantage of search concepts such as relevance and word proximityHandle human language through the effective use of analyzers and queriesSummarize and group data to show overall trends, with aggregations and analyticsUse geo-points and geo-shapes--Elasticsearch's approaches to geolocationModel your data to take advantage of Elasticsearch's horizontal scalabilityLearn how to configure and monitor your cluster in production
Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
Bruce Dang - 2014
Reverse engineering is not about reading assembly code, but actually understanding how different pieces/components in a system work. To reverse engineer a system is to understand how it is constructed and how it works. The book provides: Coverage of x86, x64, and ARM. In the past x86 was the most common architecture on the PC; however, times have changed and x64 is becoming the dominant architecture. It brings new complexity and constructs previously not present in x86. ARM ("Advanced RISC Machine) "is very common in embedded / consumer electronic devices; for example, most if not all cell phones run on ARM. All of apple's i-devices run on ARM. This book will be the first book to cover all three.Discussion of Windows kernel-mode code (rootkits/drivers). This topic has a steep learning curve so most practitioners stay away from this area because it is highly complex. However, this book will provide a concise treatment of this topic and explain how to analyze drivers step-by-step.The book uses real world examples from the public domain. The best way to learn is through a combination of concept discussions, examples, and exercises. This book uses real-world trojans / rootkits as examples congruent with real-life scenariosHands-on exercises. End-of-chapter exercises in the form of conceptual questions and hands-on analysis so so readers can solidify their understanding of the concepts and build confidence. The exercises are also meant to teach readers about topics not covered in the book.
CLR via C# (Pro-Developer)
Jeffrey Richter - 2006
This guide is suitable for developers building various kinds of application - including Microsoft[registered] ASP.NET, Windows[registered] Forms, Microsoft[registered] SQL Server[registered], Web services, and console applications.
Assembly Language: Step-By-Step
Jeff Duntemann - 1992
It then builds systematically to cover all the steps involved in writing, testing, and debugging assembly programs. It also provides valuable how-to information on using procedures and macros. The only guide to assembly programming covering both DOS and Linux, the book presents working example programs for both operating system, and introduces Conditional Assembly -- a technique for assembling for both DOS and Linux systems from a single source file.
Mastering Emacs
Mickey Petersen - 2015
In the Mastering Emacs ebook you will learn the answers to all the concepts that take weeks, months or even years to truly learn, all in one place.“Emacs is such a hard editor to learn”But why is it so hard to learn? As it turns out, it's almost always the same handful of issues that everyone faces.If you have tried to learn Emacs you will have struggled with the same problems everyone faces, and few tutorials to see you through it.I have dedicated the first half of the book to explaining the essence of Emacs — and in doing so, how to overcome these issues:Memorizing Emacs’s keys: You will learn Emacs one key at a time, starting with the arrow keys. To feel productive in Emacs, it’s important you start on an equal footing — without too many new concepts and keys to memorize. Each chapter will introduce more keys and concepts so you can learn at your own pace. Discovering new modes and features: Emacs is a self-documenting editor, and I will teach you how to use the apropos, info, and describe system to discover new modes and features, or help you find things you forgot! Customizing Emacs: You don’t have to learn Emacs Lisp to alter a lot of Emacs’s functionality. Most changes you want to make are possible using Emacs’s Customize interface and I will show you how to use it efficiently. Understanding the terminology: Emacs is so old it predates almost every other editor and all modern user interfaces. I have an entire chapter dedicated to the unique terminology in Emacs; how it is different from other editors, and what that means to you.