System Center 2012 R2 Configuration Manager SCCM

Titre : System Center 2012 R2 Configuration Manager SCCM
Auteur : Jean-Sébastien Duchêne
Éditeur :
ISBN-13 : 2746090104
Libération : 2014-07-09

Télécharger Lire en ligne



Ce livre sur System Center 2012 Configuration Manager SP1 et R2 s'adresse à toute personne qui, confrontée à l'administration de périphériques et de ressources dans son entreprise, participe à un projet de mise en oeuvre ou utilise quotidiennement ce produit. Le suivi des différents chapitres permettra au lecteur la maîtrise des concepts, l'acquisition des compétences pour déployer, administrer et utiliser SCCM 2012 R2. Après une présentation de l'historique du produit et des concepts permettant la conception d'une architecture ConfigMgr, les auteurs détaillent l'installation du produit sous la forme d'un pas à pas. Une fois l'infrastructure en place, le lecteur passe à la planification et à la gestion du client ConfigMgr pour les différents systèmes (Windows, Mac OS et UNIX/Linux). Le chapitre suivant présente les ressources, la planification des limites et groupes de limites nécessaires au fonctionnement des clients. Le lecteur peut ensuite aborder le cycle de vie du client ConfigMgr avec les phases de déploiement, de maintien, de mise à jour et de désinstallation. Dans les chapitres 4 et 5 le lecteur découvre comment exploiter les différents inventaires proposés par ConfigMgr : l'inventaire matériel, logiciel, Asset Intelligence et le contrôle d'usage logiciel. Il s'initie à la création de requêtes, de collections et de rapports pour exploiter l'inventaire et administrer les ressources. Les chapitres de 6 à 10 détaillent des fonctionnalités plus poussées proposées par SCCM 2012 R2 : télédistribution d'applications, modèle hérité (Package), nouveau modèle (Application), sécurité des ressources clientes, mise à jour logicielle, protection avec System Center 2012 Endpoint Protection (SCEP), sécurisation de l'accès au réseau avec Network Access Protection (NAP), déploiement et migration de systèmes d'exploitation avec OSD. Vous retrouverez toutes les informations permettant la gestion des périphériques modernes (MDM) comme Windows 8, Windows RT, iOS, et Android. Vous obtiendrez toutes les informations nécessaires à la gestion de la conformité des systèmes et à la configuration de paramétrages et au déploiement de profils (WiFi, Certificats, VPN, etc.). Le chapitre 11 donne un aperçu de tous les outils de contrôle distant (Wake ON Lan, Remote Tools...) proposés. Le chapitre 12 traite particulièrement de la migration d'environnements System Center Configuration Manager 2007 ou 2012. Les chapitres 13 et 14 sont dédiés à la sécurisation et au maintien d'une infrastructure ConfigMgr 2012. Enfin, le livre fournit des informations primordiales sur l'administration, la supervision et le dépannage de l'infrastructure SCCM 2012 R2.

Zenoss Core Network and System Monitoring

Titre : Zenoss Core Network and System Monitoring
Auteur : Michael Badger
Éditeur : Packt Publishing Ltd
ISBN-13 : 9781847194299
Libération : 2008-06-13

Télécharger Lire en ligne



A step-by-step guide to configuring, using, and adapting this free Open Source network monitoring system - with a Foreword by Mark R. Hinkle, VP of Community Zenoss Inc.

Advanced Computer Architecture and Parallel Processing

Titre : Advanced Computer Architecture and Parallel Processing
Auteur : Hesham El-Rewini
Éditeur : John Wiley & Sons
ISBN-13 : 9780471478393
Libération : 2005-04-08

Télécharger Lire en ligne



Computer architecture deals with the physical configuration, logical structure, formats, protocols, and operational sequences for processing data, controlling the configuration, and controlling the operations over a computer. It also encompasses word lengths, instruction codes, and the interrelationships among the main parts of a computer or group of computers. This two-volume set offers a comprehensive coverage of the field of computer organization and architecture.

Linux Pocket Guide

Titre : Linux Pocket Guide
Auteur : Daniel Barrett
Éditeur : "O'Reilly Media, Inc."
ISBN-13 : 9781449316693
Libération : 2012-03-20

Télécharger Lire en ligne



Describes the general concepts of the Linux operating system along with information on such topics as the file system, the shell, network connections, email, and programming.

TCP IP Illustrated

Titre : TCP IP Illustrated
Auteur : Kevin R. Fall
Éditeur : Addison-Wesley Professional
ISBN-13 : 9780321336316
Libération : 2011-11-01

Télécharger Lire en ligne



A major revision of the classic TCP/IP bestseller that has sold more than 162,000 units! * *W. Richard Stevens' legendary TCP/IP guide, now updated by top network protocol developer and instructor Kevin Fall. *Shows how each protocol actually operates, and explains why they work that way. *New coverage includes RPC, access control, authentication, privacy, NFS, SMB/CIFS, DHCP, NAT, firewalls, email, Web, web services, wireless, wireless security, and much more More than 162,000 networking professionals have relied on W. Richard Stevens' classic TCP/IP Illustrated, Volume 1 to gain the detailed understanding of TCP/IP they need to be effective. Now, the world's leading TCP/IP bestseller has been thoroughly updated to reflect a new generation of TCP/IPbased networking technologies. TCP/IP Illustrated, Volume 1, Second Edition doesn't just describe protocols: it enables readers to observe how these protocols operate under different conditions, using publicly available tools, and explains why key design decisions were made. The result: readers gain a deep understanding of how TCP/IP protocols function, and why they function that way. Now thoroughly updated by long-time networking expert Kevin Fall, this brand-new second edition's extensive new coverage includes: * *Remote procedure call. *Identity management (access control / authentication). *Network and transport layer security (authentication / privacy). *File access protocols, including NFS and SMB/CIFS. *Host initialization and DHCP. *NAT and firewalls. *E-mail. *Web and web services. *Wireless and wireless security. *New tools, including Ethereal, nmap and netcat

Raspberry Pi Cookbook

Titre : Raspberry Pi Cookbook
Auteur : Simon Monk
Éditeur : "O'Reilly Media, Inc."
ISBN-13 : 9781491939055
Libération : 2016-05-18

Télécharger Lire en ligne



With millions of new users and several new models, the Raspberry Pi ecosystem continues to expand—along with a lot of new questions about the Pi’s capabilities. The second edition of this popular cookbook provides more than 240 hands-on recipes for running this tiny low-cost computer with Linux, programming it with Python, and hooking up sensors, motors, and other hardware—including Arduino and the Internet of Things. Prolific hacker and author Simon Monk also teaches basic principles to help you use new technologies with Raspberry Pi as its ecosystem continues to develop. This cookbook is ideal for programmers and hobbyists familiar with the Pi through resources, including Getting Started with Raspberry Pi (O’Reilly). Python and other code examples from the book are available on GitHub. Set up your Raspberry Pi and connect to a network Work with its Linux-based operating system Program Raspberry Pi with Python Give your Pi "eyes" with computer vision Control hardware through the GPIO connector Use Raspberry Pi to run different types of motors Work with switches, keypads, and other digital inputs Use sensors to measure temperature, light, and distance Connect to IoT devices in various ways Create dynamic projects with Arduino

Advanced Linux Programming Portable Documents

Titre : Advanced Linux Programming Portable Documents
Auteur : CodeSourcery LLC
Éditeur : Sams Publishing
ISBN-13 : 9780672333620
Libération : 2001-06-11

Télécharger Lire en ligne



This is the eBook version of the printed book. If the print book includes a CD-ROM, this content is not included within the eBook version. Advanced Linux Programming is divided into two parts. The first covers generic UNIX system services, but with a particular eye towards Linux specific information. This portion of the book will be of use even to advanced programmers who have worked with other Linux systems since it will cover Linux specific details and differences. For programmers without UNIX experience, it will be even more valuable. The second section covers material that is entirely Linux specific. These are truly advanced topics, and are the techniques that the gurus use to build great applications. While this book will focus mostly on the Application Programming Interface (API) provided by the Linux kernel and the C library, a preliminary introduction to the development tools available will allow all who purchase the book to make immediate use of Linux.

Penetration Testing

Titre : Penetration Testing
Auteur : Georgia Weidman
Éditeur : No Starch Press
ISBN-13 : 9781593275648
Libération : 2014-06-14

Télécharger Lire en ligne



Penetration testers simulate cyber attacks to find security weaknesses in networks, operating systems, and applications. Information security experts worldwide use penetration techniques to evaluate enterprise defenses. In Penetration Testing, security expert, researcher, and trainer Georgia Weidman introduces you to the core skills and techniques that every pentester needs. Using a virtual machine–based lab that includes Kali Linux and vulnerable operating systems, you’ll run through a series of practical lessons with tools like Wireshark, Nmap, and Burp Suite. As you follow along with the labs and launch attacks, you’ll experience the key stages of an actual assessment—including information gathering, finding exploitable vulnerabilities, gaining access to systems, post exploitation, and more. Learn how to: * Crack passwords and wireless network keys with brute-forcing and wordlists * Test web applications for vulnerabilities * Use the Metasploit Framework to launch exploits and write your own Metasploit modules * Automate social-engineering attacks * Bypass antivirus software * Turn access to one machine into total control of the enterprise in the post exploitation phase You’ll even explore writing your own exploits. Then it’s on to mobile hacking—Weidman’s particular area of research—with her tool, the Smartphone Pentest Framework. With its collection of hands-on lessons that cover key tools and strategies, Penetration Testing is the introduction that every aspiring hacker needs.

Pro Git

Titre : Pro Git
Auteur : Scott Chacon
Éditeur : Apress
ISBN-13 : 9781484200766
Libération : 2014-11-18

Télécharger Lire en ligne



Pro Git (Second Edition) is your fully-updated guide to Git and its usage in the modern world. Git has come a long way since it was first developed by Linus Torvalds for Linux kernel development. It has taken the open source world by storm since its inception in 2005, and this book teaches you how to use it like a pro. Effective and well-implemented version control is a necessity for successful web projects, whether large or small. With this book you’ll learn how to master the world of distributed version workflow, use the distributed features of Git to the full, and extend Git to meet your every need. Written by Git pros Scott Chacon and Ben Straub, Pro Git (Second Edition) builds on the hugely successful first edition, and is now fully updated for Git version 2.0, as well as including an indispensable chapter on GitHub. It’s the best book for all your Git needs.

PHP and MySQL Web Development

Titre : PHP and MySQL Web Development
Auteur : Luke Welling
Éditeur : Pearson Education
ISBN-13 : 0768686431
Libération : 2008-10-01

Télécharger Lire en ligne



PHP and MySQL Web Development, Fourth Edition The definitive guide to building database-drive Web applications with PHP and MySQL and MySQL are popular open-source technologies that are ideal for quickly developing database-driven Web applications. PHP is a powerful scripting language designed to enable developers to create highly featured Web applications quickly, and MySQL is a fast, reliable database that integrates well with PHP and is suited for dynamic Internet-based applications. PHP and MySQL Web Development shows how to use these tools together to produce effective, interactive Web applications. It clearly describes the basics of the PHP language, explains how to set up and work with a MySQL database, and then shows how to use PHP to interact with the database and the server. The fourth edition of PHP and MySQL Web Development has been thoroughly updated, revised, and expanded to cover developments in PHP 5 through version 5.3, such as namespaces and closures, as well as features introduced in MySQL 5.1. This is the eBook version of the title. To gain access to the contents on the CD bundled with the printed book, please register your product at informit.com/register