System Center 2012 R2 Configuration Manager SCCM

Titre : System Center 2012 R2 Configuration Manager SCCM
Auteur : Jean-Sébastien Duchêne
Éditeur :
ISBN-13 : 2746090104
Libération : 2014-07-09

Télécharger Lire en ligne



Ce livre sur System Center 2012 Configuration Manager SP1 et R2 s'adresse à toute personne qui, confrontée à l'administration de périphériques et de ressources dans son entreprise, participe à un projet de mise en oeuvre ou utilise quotidiennement ce produit. Le suivi des différents chapitres permettra au lecteur la maîtrise des concepts, l'acquisition des compétences pour déployer, administrer et utiliser SCCM 2012 R2. Après une présentation de l'historique du produit et des concepts permettant la conception d'une architecture ConfigMgr, les auteurs détaillent l'installation du produit sous la forme d'un pas à pas. Une fois l'infrastructure en place, le lecteur passe à la planification et à la gestion du client ConfigMgr pour les différents systèmes (Windows, Mac OS et UNIX/Linux). Le chapitre suivant présente les ressources, la planification des limites et groupes de limites nécessaires au fonctionnement des clients. Le lecteur peut ensuite aborder le cycle de vie du client ConfigMgr avec les phases de déploiement, de maintien, de mise à jour et de désinstallation. Dans les chapitres 4 et 5 le lecteur découvre comment exploiter les différents inventaires proposés par ConfigMgr : l'inventaire matériel, logiciel, Asset Intelligence et le contrôle d'usage logiciel. Il s'initie à la création de requêtes, de collections et de rapports pour exploiter l'inventaire et administrer les ressources. Les chapitres de 6 à 10 détaillent des fonctionnalités plus poussées proposées par SCCM 2012 R2 : télédistribution d'applications, modèle hérité (Package), nouveau modèle (Application), sécurité des ressources clientes, mise à jour logicielle, protection avec System Center 2012 Endpoint Protection (SCEP), sécurisation de l'accès au réseau avec Network Access Protection (NAP), déploiement et migration de systèmes d'exploitation avec OSD. Vous retrouverez toutes les informations permettant la gestion des périphériques modernes (MDM) comme Windows 8, Windows RT, iOS, et Android. Vous obtiendrez toutes les informations nécessaires à la gestion de la conformité des systèmes et à la configuration de paramétrages et au déploiement de profils (WiFi, Certificats, VPN, etc.). Le chapitre 11 donne un aperçu de tous les outils de contrôle distant (Wake ON Lan, Remote Tools...) proposés. Le chapitre 12 traite particulièrement de la migration d'environnements System Center Configuration Manager 2007 ou 2012. Les chapitres 13 et 14 sont dédiés à la sécurisation et au maintien d'une infrastructure ConfigMgr 2012. Enfin, le livre fournit des informations primordiales sur l'administration, la supervision et le dépannage de l'infrastructure SCCM 2012 R2.

Advanced Computer Architecture and Parallel Processing

Titre : Advanced Computer Architecture and Parallel Processing
Auteur : Hesham El-Rewini
Éditeur : John Wiley & Sons
ISBN-13 : 9780471478393
Libération : 2005-04-08

Télécharger Lire en ligne



Computer architecture deals with the physical configuration, logical structure, formats, protocols, and operational sequences for processing data, controlling the configuration, and controlling the operations over a computer. It also encompasses word lengths, instruction codes, and the interrelationships among the main parts of a computer or group of computers. This two-volume set offers a comprehensive coverage of the field of computer organization and architecture.

Zenoss Core Network and System Monitoring

Titre : Zenoss Core Network and System Monitoring
Auteur : Michael Badger
Éditeur : Packt Publishing Ltd
ISBN-13 : 9781847194299
Libération : 2008-06-13

Télécharger Lire en ligne



A step-by-step guide to configuring, using, and adapting this free Open Source network monitoring system - with a Foreword by Mark R. Hinkle, VP of Community Zenoss Inc.

Linux Pocket Guide

Titre : Linux Pocket Guide
Auteur : Daniel J. Barrett
Éditeur : "O'Reilly Media, Inc."
ISBN-13 : 9781491927519
Libération : 2016-06-01

Télécharger Lire en ligne



If you use Linux in your day-to-day work, this popular pocket guide is the perfect on-the-job reference. The third edition features new commands for processing image files and audio files, running and killing programs, reading and modifying the system clipboard, and manipulating PDF files, as well as other commands requested by readers. You’ll also find powerful command-line idioms you might not be familiar with, such as process substitution and piping into bash. Linux Pocket Guide provides an organized learning path to help you gain mastery of the most useful and important commands. Whether you’re a novice who needs to get up to speed on Linux or an experienced user who wants a concise and functional reference, this guide provides quick answers. Selected topics include: The filesystem and shell File creation and editing Text manipulation and pipelines Backups and remote storage Viewing and controlling processes User account management Becoming the superuser Network connections Audio and video Installing software Programming with shell scripts

TCP IP Illustrated

Titre : TCP IP Illustrated
Auteur : Kevin R. Fall
Éditeur : Addison-Wesley Professional
ISBN-13 : 9780321336316
Libération : 2011-11-01

Télécharger Lire en ligne



A major revision of the classic TCP/IP bestseller that has sold more than 162,000 units! * *W. Richard Stevens' legendary TCP/IP guide, now updated by top network protocol developer and instructor Kevin Fall. *Shows how each protocol actually operates, and explains why they work that way. *New coverage includes RPC, access control, authentication, privacy, NFS, SMB/CIFS, DHCP, NAT, firewalls, email, Web, web services, wireless, wireless security, and much more More than 162,000 networking professionals have relied on W. Richard Stevens' classic TCP/IP Illustrated, Volume 1 to gain the detailed understanding of TCP/IP they need to be effective. Now, the world's leading TCP/IP bestseller has been thoroughly updated to reflect a new generation of TCP/IPbased networking technologies. TCP/IP Illustrated, Volume 1, Second Edition doesn't just describe protocols: it enables readers to observe how these protocols operate under different conditions, using publicly available tools, and explains why key design decisions were made. The result: readers gain a deep understanding of how TCP/IP protocols function, and why they function that way. Now thoroughly updated by long-time networking expert Kevin Fall, this brand-new second edition's extensive new coverage includes: * *Remote procedure call. *Identity management (access control / authentication). *Network and transport layer security (authentication / privacy). *File access protocols, including NFS and SMB/CIFS. *Host initialization and DHCP. *NAT and firewalls. *E-mail. *Web and web services. *Wireless and wireless security. *New tools, including Ethereal, nmap and netcat

Python for Unix and Linux System Administration

Titre : Python for Unix and Linux System Administration
Auteur : Noah Gift
Éditeur : "O'Reilly Media, Inc."
ISBN-13 : 9781449367183
Libération : 2008-08-22

Télécharger Lire en ligne



Python is an ideal language for solving problems, especially in Linux and Unix networks. With this pragmatic book, administrators can review various tasks that often occur in the management of these systems, and learn how Python can provide a more efficient and less painful way to handle them. Each chapter in Python for Unix and Linux System Administration presents a particular administrative issue, such as concurrency or data backup, and presents Python solutions through hands-on examples. Once you finish this book, you'll be able to develop your own set of command-line utilities with Python to tackle a wide range of problems. Discover how this language can help you: Read text files and extract information Run tasks concurrently using the threading and forking options Get information from one process to another using network facilities Create clickable GUIs to handle large and complex utilities Monitor large clusters of machines by interacting with SNMP programmatically Master the IPython Interactive Python shell to replace or augment Bash, Korn, or Z-Shell Integrate Cloud Computing into your infrastructure, and learn to write a Google App Engine Application Solve unique data backup challenges with customized scripts Interact with MySQL, SQLite, Oracle, Postgres, Django ORM, and SQLAlchemy With this book, you'll learn how to package and deploy your Python applications and libraries, and write code that runs equally well on multiple Unix platforms. You'll also learn about several Python-related technologies that will make your life much easier.

Advanced Linux Programming Portable Documents

Titre : Advanced Linux Programming Portable Documents
Auteur : CodeSourcery LLC
Éditeur : Sams Publishing
ISBN-13 : 9780672333620
Libération : 2001-06-11

Télécharger Lire en ligne



This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. Advanced Linux Programming is divided into two parts. The first covers generic UNIX system services, but with a particular eye towards Linux specific information. This portion of the book will be of use even to advanced programmers who have worked with other Linux systems since it will cover Linux specific details and differences. For programmers without UNIX experience, it will be even more valuable. The second section covers material that is entirely Linux specific. These are truly advanced topics, and are the techniques that the gurus use to build great applications. While this book will focus mostly on the Application Programming Interface (API) provided by the Linux kernel and the C library, a preliminary introduction to the development tools available will allow all who purchase the book to make immediate use of Linux.

Raspberry Pi Cookbook

Titre : Raspberry Pi Cookbook
Auteur : Simon Monk
Éditeur : "O'Reilly Media, Inc."
ISBN-13 : 9781491939055
Libération : 2016-05-18

Télécharger Lire en ligne



With millions of new users and several new models, the Raspberry Pi ecosystem continues to expand—along with a lot of new questions about the Pi’s capabilities. The second edition of this popular cookbook provides more than 240 hands-on recipes for running this tiny low-cost computer with Linux, programming it with Python, and hooking up sensors, motors, and other hardware—including Arduino and the Internet of Things. Prolific hacker and author Simon Monk also teaches basic principles to help you use new technologies with Raspberry Pi as its ecosystem continues to develop. This cookbook is ideal for programmers and hobbyists familiar with the Pi through resources, including Getting Started with Raspberry Pi (O’Reilly). Python and other code examples from the book are available on GitHub. Set up your Raspberry Pi and connect to a network Work with its Linux-based operating system Program Raspberry Pi with Python Give your Pi "eyes" with computer vision Control hardware through the GPIO connector Use Raspberry Pi to run different types of motors Work with switches, keypads, and other digital inputs Use sensors to measure temperature, light, and distance Connect to IoT devices in various ways Create dynamic projects with Arduino

Penetration Testing

Titre : Penetration Testing
Auteur : Georgia Weidman
Éditeur : No Starch Press
ISBN-13 : 9781593275648
Libération : 2014-06-14

Télécharger Lire en ligne



Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine–based lab that includes Kali Linux and vulnerable operating systems, you’ll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you’ll experience the key stages of an actual assessment—including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more. Learn how to: * Crack passwords and wireless network keys with brute-forcing and wordlists * Test web applications for vulnerabilities * Use the Metasploit Framework to launch exploits and write your own Metasploit modules * Automate social-engineering attacks * Bypass antivirus software * Turn access to one machine into total control of the enterprise in the post exploitation phase You’ll even explore writing your own exploits. Then it’s on to mobile hacking—Weidman’s particular area of research—with her tool, the Smartphone Pentest Framework. With its collection of hands-on lessons that cover key tools and strategies, Penetration Testing is the introduction that every aspiring hacker needs.

JUNOS Enterprise Routing

Titre : JUNOS Enterprise Routing
Auteur : Doug Marschke
Éditeur : "O'Reilly Media, Inc."
ISBN-13 : 9780596551704
Libération : 2008-03-27

Télécharger Lire en ligne



Written by the instructors and creators of the JNTCP-ER Certification Exams, JUNOS Enterprise Routing is the only comprehensive book for Juniper enterprise and edge routing environments. It offers complete coverage of all the services available to the JUNOS administrator, including JUNOS Enhanced Services (ES). This book is the official study guide for all three Juniper Enterprise Routing certification exams, and is highly recommended reading to pass the exams. With its field-guide emphasis on practical solutions, you can easily take the book beyond the classroom and into working networks as a design, maintenance, and troubleshooting reference par excellence. JUNOS Enterprise Routing covers all three certification exams in this track: Juniper Networks Certified Internet Associate (JNCIA-ER) Juniper Networks Certified Internet Specialist (JNCIS-ER) Juniper Networks Certified Internet Expert (JNCIE-ER) With more services such as voice, conference, and multicast on the IP router platform, the market for enterprise routers is growing exponentially, and the need for certified engineers to keep up with network developments in protocols and security is paramount. For everyone who works with Juniper enterprise and edge routing environments, this is a must-have book.