1 - 20
Next
1. Windows 10 Anniversary update bible [2017]
- Tidrow, Rob, author.
- Indianapolis, IN : Wiley, 2017.
- Description
- Book — 1 online resource
- Summary
-
- Introduction xxxiii Part I: Getting Started 1
- Chapter 1: What's New in Windows 10 3
- Chapter 2: Navigating the Windows 10 Interface 25
- Chapter 3: Getting around the Windows Desktop 37
- Chapter 4: Sharing and Securing with User Accounts 67
- Chapter 5: Troubleshooting Startup Problems 103 Part II: Personalizing Windows 10 113
- Chapter 6: Protecting Yourself with Windows Firewall 115
- Chapter 7: Automatic Updates as Security 131
- Chapter 8: Personalizing the Windows 10 Interface 143
- Chapter 9: Personalizing the Desktop 153
- Chapter 10: Customizing Startup Options 191 Part III: Windows 10 for the Enterprise 211
- Chapter 11: Setting Up Windows 10 Hyper-V 213
- Chapter 12: Confi guring Windows 10 Hyper-V 221
- Chapter 13: Using Computers Remotely 241
- Chapter 14: Managing Windows 10 Hyper-V in an Enterprise 261
- Chapter 15: Working in the Cloud and with Azure 277 Part IV: Managing Your Content 289
- Chapter 16: Searching for Files and Messages on Your Computer 291
- Chapter 17: Using Cortana for Searching 311
- Chapter 18: Metadata and Power Searches 331
- Chapter 19: Protecting Your Files 357 Part V: Printing and Managing Printers 383
- Chapter 20: Installing and Managing Printers 385
- Chapter 21: Managing Print Jobs 405 Part VI: Installing and Removing Programs 415
- Chapter 22: Adding and Managing Windows 10 Applications 417
- Chapter 23: Installing and Upgrading Legacy Programs 427
- Chapter 24: Getting Older Programs to Run 437
- Chapter 25: Repairing and Removing Programs 451
- Chapter 26: Setting Default Programs 459
- Chapter 27: Managing Programs and Processes 475
- Chapter 28: Troubleshooting Software Problems 501 Part VII: Hardware and Performance Tuning 515
- Chapter 29: Installing and Removing Hardware 517
- Chapter 30: Using Wireless Bluetooth Devices 545
- Chapter 31: Performance-Tuning Your System 563
- Chapter 32: Troubleshooting Hardware and Performance 599 Part VIII: Networking and Sharing 611
- Chapter 33: Creating a Small Offi ce or Home Network 613
- Chapter 34: Sharing Resources on a Network 629
- Chapter 35: Using Shared Resources 647 Part IX: Managing Windows 10 in an Enterprise 663
- Chapter 36: Imaging and Deploying Windows 10 665
- Chapter 37: Using Windows 10 Group Policies on a Network 687
- Chapter 38: Securing Windows 10 for the Enterprise 697 Part X: Appendixes 711 Appendix A: Upgrading to Windows 10 713 Appendix B: Installing Windows 10 on a New System 717 Appendix C: Universal Shortcut Keys 721 Appendix D: Windows 10 Touch Gestures 727 Index 729.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
2. Recent advancements in graph theory [2021]
- Boca Raton, FL : CRC Press, 2020.
- Description
- Book — 1 online resource (xviii, 392 pages) : illustrations. Digital: text file.
- Summary
-
- 1. Graph Labeling.
- 2. Domination in Graphs.
- 3. Graph Coloring.
- 4. Graph Algorithm.
- 5. Energy of a Graph.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Gregory, Peter, author.
- 1st edition. - McGraw-Hill, 2020.
- Description
- Book — 1 online resource (304 pages) Digital: text file.
- Summary
-
- Acknowledgments
- Introduction
- Chapter 1 Becoming a CISA
- Benefits of CISA Certification
- The CISA Certification Process
- Experience Requirements
- ISACA IS Standards
- The Certification Exam
- Exam Preparation
- Before the Exam
- Day of the Exam
- After the Exam
- Applying for CISA Certification
- Retaining Your CISA Certification
- CISA Exam Preparation Pointers
- Summary
- Chapter 2 IT Governance and Management
- Questions
- Quick Answer Key
- Answers
- Chapter 3 The Audit Process
- Questions
- Quick Answer Key
- Answers
- Chapter 4 IT Life Cycle Management
- Questions
- Quick Answer Key
- Answers
- Chapter 5 IT Service Management and Continuity
- Questions
- Quick Answer Key
- Answers
- Chapter 6 Information Asset Protection
- Questions
- Quick Answer Key
- Answers
- Appendix About the Online Content
- System Requirements
- Your Total Seminars Training Hub Account
- Privacy Notice
- Single User License Terms and Conditions
- TotalTester Online
- Technical Support.
- Ryder, Tom, author.
- Second edition. - Birmingham, UK : Packt Publishing, 2016.
- Description
- Book — 1 online resource (1 volume) : illustrations Digital: text file.
- Summary
-
Over 90 hands-on recipes that will employ Nagios Core as the anchor of monitoring on your network About This Book * Master the advanced configuration techniques of Nagios Core to model your network better by improving hosts, services, and contacts * Filter and improve the notifications that Nagios Core sends in response to failed checks, which can greatly assist you when diagnosing problems * Pull Nagios Core's data into a database to write clever custom reports of your own devise Who This Book Is For If you are a network or system administrator and are looking for instructions and examples on working with Nagios Core, then this book is for you. Some basic shell command-line experience is required, and some knowledge of scripting would be helpful when we discuss how plugins work. What You Will Learn * Manage the configuration of Nagios Core with advanced techniques to achieve fine detail in your checks * Find, install, and even write your own check plugins * Filter notifications to send them to the right people or programs at the right time * Work around difficult network accessibility issues and delegate checks to other machines * Tweak a Nagios Core server to achieve both high performance and redundancy in case of disaster * Process the results of checks performed by other machines to monitor backups and similar processes * Extend Nagios Core to allow advanced scripting, reporting, and network visualization behavior In Detail Nagios Core is an open source monitoring framework suitable for any network that ensures both internal and customer-facing services are running correctly and manages notification and reporting behavior to diagnose and fix outages promptly. It allows very fine configuration of exactly when, where, what, and how to check network services to meet both the uptime goals of your network and systems team and the needs of your users. This book shows system and network administrators how to use Nagios Core to its fullest as a monitoring framework for checks on any kind of network services, from the smallest home network to much larger production multi-site services. You will discover that Nagios Core is capable of doing much more than pinging a host or to see whether websites respond. The recipes in this book will demonstrate how to leverage Nagios Core's advanced configuration, scripting hooks, reports, data retrieval, and extensibility to integrate it with your existing systems, and to make it the rock-solid center of your network monitoring world. Style and approach Each chapter contains a set of step-by-step recipes to perform an example of a commonly performed task related to network administration. The book begins by focusing closely on the properties and configuration of Nagios Core itself, and gradually moves on to other pieces of software that can support, manage, and extend the system.
(source: Nielsen Book Data)
5. Operating system forensics [2016]
- Messier, Ric, author.
- Waltham, MA : Elsevier : Syngress, [2016]
- Description
- Book — 1 online resource (vii, 374 pages)
- Summary
-
- Introduction File Systems Data Recovery Memory Forensics System Configuration Internet Access Tracking Artifacts Log Files Executable Layouts Malware Mobile Operating Systems New Technologies Reporting.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Ventresco, Jason, author.
- Birmingham : Packt Pub., 2013.
- Description
- Book — 1 online resource (ix, 367 pages) : color illustrations.
- Summary
-
- Designing a VMware Horizon view infrastructure
- Implementing VMware Horizon view connection server
- Implementing VMware Horizon view composer
- Implementing VMware Horizon view transfer server
- Implementing VMware Horizon view security server
- Using VMware ThinApp
- Implementing view persona management
- Creating VMware Horizon view desktop pools
- VMware Horizon view client options
- Performing view desktop maintenance
- Creating a master virtual desktop image
- Managing view SSL certificates
- Implementing VMware Horizon view group policies
- Advanced details about key Horizon view features.
(source: Nielsen Book Data)
7. Nagios Core Administration Cookbook [2013]
- Ryder, Tom.
- Birmingham : Packt Pub., 2013.
- Description
- Book — 1 online resource (786 pages) Digital: text file.
- Summary
-
- Table of Contents; Nagios Core Administration Cookbook; Nagios Core Administration Cookbook; Credits; About the Author; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Downloading the example code; Errata; Piracy; Questions;
- 1. Understanding Hosts, Services, and Contacts; Introduction; Creating a new network host; Getting ready; How to do it ... ; How it works ...
- There's more ... See also; Creating a new HTTP service; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Creating a new e-mail contact; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Verifying configuration; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Creating a new hostgroup; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Creating a new servicegroup; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Creating a new contactgroup; Getting ready.
- How to do it ... How it works ... ; There's more ... ; See also; Creating a new time period; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Running a service on all hosts in a group; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also;
- 2. Working with Commands and Plugins; Introduction; Finding a plugin; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Installing a plugin; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Removing a plugin; Getting ready; How to do it ... ; How it works ...
- There's more ... See also; Creating a new command; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Customizing an existing command; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Using an alternative check command for hosts; Getting ready; How to do it ... ; How it works; There's more ... ; See also; Writing a new plugin from scratch; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also;
- 3. Working with Checks and States; Introduction; Specifying how frequently to check a host or service; Getting ready; How to do it ...
- How it works ... There's more ... ; See also; Changing thresholds for PING RTT and packet loss; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Changing thresholds for disk usage; Getting ready; How to do it ... ; How it works; There's more ... ; See also; Scheduling downtime for a host or service; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Managing brief outages with flapping; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Adjusting flapping percentage thresholds for a service; Getting ready; How to do it ...
8. Arduino internals [2011]
- Wheat, Dale.
- [Berkeley, CA] : Apress, ©2011.
- Description
- Book — 1 online resource (xx, 372 pages) : illustrations Digital: text file; PDF.
- Summary
-
- Hardware
- Software
- Atmel AVR
- Supporting Hardware
- Arduino Software
- Optimizations
- Hardware Plus Software
- Example Projects
- Project Management
- Hardware Design
- Software Design
- Networking
- More Example Projects.
(source: Nielsen Book Data)
- Singh, Amresh, author.
- Birmingham, UK : Packt Publishing, 2013.
- Description
- Book — 1 online resource
- Summary
-
- Cover; Copyright; Credits; About the Author; About the Reviewers; www.packtpub.com; packtlib.packtpub.com; Table of Contents; Instant Cassandra Query Language; So, what is CQL?; Where will you use CQL; Installation; Step 1
- what do I need?; Step 2
- download Cassandra; Step 3
- install Cassandra; Step 4
- configure Cassandra; Step 5
- start Cassandra server; What may go wrong?; And that's it; Quick start
- running CQL queries; Step 1
- start CQL shell (cqlsh); On Unix; On Windows; Step 2
- create and use a keyspace; Step 3
- Describe and list keyspace.
- Step 4
- create table and insert recordsStep 5
- display records; How is data actually stored?; Step 6
- deleting data; DELETE; TRUNCATE; USING TTL; Dropping TABLE and KEYSPACE; CQL versions; Step 7
- building facebook; Creating keyspace for facebook; Storing facebook data using tables; Storing user profiles; Create table; Insert records; Update row; View rows; Alter table (add collections columns); Storing facebook posts; Create table; Add records; Creating table for user wall (timeline); How data is stored; Connecting users with their friends; Counting friends and posts.
- Top 3 features you need to know aboutTTL (time to live); Syntax; Gone in 60 seconds!; CQL for client applications; Using the Thrift API; Using the Datastax Java driver; Using high-level clients; Batch operations; Syntax; Three flavors of the batch operation; People and places you should get to know; Official sites; Articles and tutorials; Community; Blogs; Twitter.
(source: Nielsen Book Data)
10. Future direction of the Android platform [2012]
- [Place of publication not identified] : Mind Commerce, [2012]
- Description
- Book — 1 online resource
- Lee, Thomas,
- [Place of publication not identified] Packt Publishing, 2017.
- Description
- Book — 1 online resource
- Summary
-
Over 100 recipes to help you leverage PowerShell to automate Windows Server 2016 manual tasks About This Book * Automate Windows server tasks with the powerful features of the PowerShell Language * Master new features such as DevOps, containers, and Nano servers, and speed up their performance using PowerShell * Improve PowerShell's usability, and control and manage Windows-based environments by working through inviting recipes Who This Book Is For If you are a systems administrator, engineer, or an architect working with Windows Server 2016 and want to automate tasks with PowerShell, then this book is for you. A basic knowledge of PowerShell is expected. What You Will Learn * Streamline routine administration processes * Improve the performance and storage of your Windows server with enhanced large-scale PowerShell scripts * Use DSC to leverage Windows server features * Generate automatic reports that highlight unexpected changes in your environment * Monitor performance and report on system utilization using detailed graphs and analysis * Create and manage a reliable and redundant Hyper-V environment * Manage your enterprise's patch level * Utilize multiple tools and protocols to manage your environment In Detail This book showcases several ways that Windows administrators can use to automate and streamline their job. You'll start with the PowerShell and Windows Server fundamentals, where you'll become well versed with PowerShell and Windows Server features. In the next module, Core Windows Server 2016, you'll implement Nano Server, manage Windows updates, and implement troubleshooting and server inventories. You'll then move on to the Networking module, where you'll manage Windows network services and network shares. The last module covers Azure and DSC, where you will use Azure on PowerShell and DSC to easily maintain Windows servers. Style and approach This is a practical guide packed with attractive recipes to help you effectively use PowerShell to accelerate your daily administrative tasks with Windows server.
(source: Nielsen Book Data)
- Pollei, Rich Pinkall, author.
- Birmingham : Packt Publishing, [2013]
- Description
- Book — 1 online resource
- Hester, Matthew, 1971-
- 1st ed. - Indianapolis, Ind. : Wiley Pub., ©2010.
- Description
- Book — 1 online resource (xx, 580 pages) : illustrations.
- Summary
-
- 1 Getting Started with Windows Server 2008
- R2. 2 Add Server Roles and Functionality. 3 Automating Administrative Tasks with Windows Server 2008
- R2. 4 User and Group Maintenance. 5 Directory Management and Replication. 6 Maintaining and Controlling the Centralized Desktop. 7 Folder Security, Access and Replication. 8 Backup and Recovery. 9 Disk Management and Storage. 10 Web Server and Maintenance. 11 Administrating DNS. 12 IP Troubleshooting. 13 Managing Server Remote Access. 14 Maintaining Your Virtual Servers. 15 Performance Tuning and Monitoring. 16 Keeping Your Servers Up to Date.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Barber, Brian.
- Rockland, Mass. : Syngress, ©2005.
- Description
- Book — 1 online resource (xxii, 369 pages) : illustrations Digital: data file.
- Summary
-
- Chapter 1. Windows Server Update Services Essentials
- Chapter 2. Preparing for WSUS
- Chapter 3. Installing Windows Server Update Services
- Chapter 4. Upgrading from SUS to WSUS
- Chapter 5. Deploying WSUS in the Enterprise
- Chapter 6. Administering WSUS Servers
- Chapter 7. Configuring and Administering WSUS Clients
- Chapter 8. Managing the WSUS Environment
- Chapter 9. Troubleshooting WSUS
- Chapter 10. Securing WSUS
- Chapter 11. The Role of WSUS in IT Service Management.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
- Redmond, Tony, 1959-
- Amsterdam ; Boston : Elsevier/Digital Press, ©2005.
- Description
- Book — 1 online resource (xxviii, 979 pages) : illustrations
- Summary
-
- A brief history of Exchange
- Exchange and the active directory
- Exchange basics
- Outlook : the client
- Outlook web access
- Internet and other clients
- The store
- Performance and clusters
- Getting the mail through : routing and message delivery
- Managing Exchange : users
- Managing Exchange : servers.
(source: Nielsen Book Data)
16. OpenVMS with Apache, OSU and WASD [2003]
- Winston, Alan.
- Burlington, MA : Digital Press, ©2003.
- Description
- Book — 1 online resource (xi, 454 pages) : illustrations
- Summary
-
- Introduction; Why Run a Web Server on VMS?; VMS and the Web; Web Options; Installation Issues; Basic Configuration and Server Control; Encrypted/Secure Communications: HTTPS Protocol Support; Managing Access to your Server Resources; Providing User Personal Web Directories; Multihosting and Multihoming; Indexing and Searching Your Site; Cache and Proxy; Managing and Understanding Your Server Logs; Dynamic Content: Directory Browsing and Server-Side Includes; Running CGI Programs; RDB Database Access from CGI Scripts; Useful Freeware CGI Scripts; High-Performance Scripting Options; User-Edited Web Pages; User-Developed CGI Scripts; Appendices: Perl; Python; PHP; Apache; Annotated Sample Configuration Files; Index.
- Ryder, Tom, author.
- Second edition. - Birmingham, UK : Packt Publishing, 2016.
- Description
- Book — 1 online resource (1 volume) : illustrations Digital: text file.
- Summary
-
- Cover; Copyright; Credits; About the Author; About the Reviewer; www.PacktPub.com; Table of Contents; Preface;
- Chapter 1: Understanding Hosts, Services, and Contacts; Introduction; Creating a new network host; Creating a new HTTP service; Creating a new e-mail contact; Verifying configuration; Creating a new hostgroup; Creating a new servicegroup; Creating a new contactgroup; Creating a new time period; Running a service on all hosts on a group;
- Chapter 2: Working with Commands and Plugins; Introduction; Finding a plugin; Installing a plugin; Removing a plugin; Creating a new command
- Customizing an existing commandUsing an alternative check command for hosts; Writing a new plugin from scratch; Implementing threshold checks in a plugin; Using macros as environment variables in a plugin;
- Chapter 3: Working with Checks and States; Introduction; Specifying how frequently to check a host or service; Changing thresholds for PING RTT and packet loss; Changing thresholds for disk usage; Scheduling downtime for a host or service; Managing brief outages with flapping; Adjusting flapping percentage thresholds for a service;
- Chapter 4: Configuring Notifications; Introduction
- Configuring notification periodsConfiguring notifications for groups; Choosing states for notification; Specifying the number of failed checks before notification; Automating contact rotation; Defining an escalation for repeated notifications; Defining a custom notification method; Filtering notifications based on a host or service value;
- Chapter 5: Monitoring Methods; Introduction; Monitoring PING for any host; Monitoring SSH for any host; Checking an alternative SSH port; Monitoring mail services; Monitoring web services; Checking that a website returns a given string
- Monitoring database servicesMonitoring the output of an SNMP query; Monitoring a RAID or other hardware device; Creating an SNMP OID for monitoring;
- Chapter 6: Enabling Remote Execution; Introduction; Monitoring local services on a remote machine with NRPE; Setting the listening address for NRPE; Setting allowed client hosts for NRPE; Creating new NRPE command definitions securely; Giving limited sudo(8) privileges to NRPE; Using check_by_ssh with key authentication instead of NRPE; Using check_mk instead of NRPE;
- Chapter 7: Using the Web Interface; Introduction; Using the Tactical Overview
- Viewing and interpreting availability reportsViewing and interpreting trends; Viewing and interpreting notification history; Adding comments on hosts or services in the web interface; Viewing configuration in the web interface; Scheduling checks from the web interface; Acknowledging a problem via the web interface;
- Chapter 8: Managing Network Layout; Introduction; Creating a network host hierarchy; Using the network map; Choosing icons for hosts; Establishing a host dependency; Establishing a service dependency; Monitoring individual nodes in a cluster; Using the network map as an overlay
(source: Nielsen Book Data)
18. Nagios Core Administration Cookbook [2013]
- Ryder, Tom.
- Birmingham : Packt Pub., 2013.
- Description
- Book — 1 online resource (786 pages) Digital: text file.
- Summary
-
- Table of Contents; Nagios Core Administration Cookbook; Nagios Core Administration Cookbook; Credits; About the Author; About the Reviewers; www.PacktPub.com; Support files, eBooks, discount offers and more; Why Subscribe?; Free Access for Packt account holders; Preface; What this book covers; What you need for this book; Who this book is for; Conventions; Reader feedback; Customer support; Downloading the example code; Errata; Piracy; Questions;
- 1. Understanding Hosts, Services, and Contacts; Introduction; Creating a new network host; Getting ready; How to do it ... ; How it works ...
- There's more ... See also; Creating a new HTTP service; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Creating a new e-mail contact; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Verifying configuration; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Creating a new hostgroup; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Creating a new servicegroup; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Creating a new contactgroup; Getting ready.
- How to do it ... How it works ... ; There's more ... ; See also; Creating a new time period; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Running a service on all hosts in a group; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also;
- 2. Working with Commands and Plugins; Introduction; Finding a plugin; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Installing a plugin; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Removing a plugin; Getting ready; How to do it ... ; How it works ...
- There's more ... See also; Creating a new command; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Customizing an existing command; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Using an alternative check command for hosts; Getting ready; How to do it ... ; How it works; There's more ... ; See also; Writing a new plugin from scratch; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also;
- 3. Working with Checks and States; Introduction; Specifying how frequently to check a host or service; Getting ready; How to do it ...
- How it works ... There's more ... ; See also; Changing thresholds for PING RTT and packet loss; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Changing thresholds for disk usage; Getting ready; How to do it ... ; How it works; There's more ... ; See also; Scheduling downtime for a host or service; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Managing brief outages with flapping; Getting ready; How to do it ... ; How it works ... ; There's more ... ; See also; Adjusting flapping percentage thresholds for a service; Getting ready; How to do it ...
- Kelbley, John, 1967-
- Indianapolis, Ind. : [Sybex]/Wiley Pub., ©2010.
- Description
- Book — 1 online resource (xxii, 385 pages) : illustrations.
- Summary
-
- Introduction.
- Chapter 1: Introducing Hyper-V.
- Chapter 2: Installing Hyper-V and Server Core.
- Chapter 3: Configuring Hyper-V.
- Chapter 4: Virtualization Best Practices.
- Chapter 5: Hyper-V Security.
- Chapter 6: Virtual Machine Migration.
- Chapter 7: Backing Up and Recovering VMs.
- Chapter 8: High Availability.
- Chapter 9: Understanding WMI, Scripting, and Hyper-V.
- Chapter 10: Automating Tasks.
- Chapter 11: Using System Center Virtual Machine Manager 2008.
- Chapter 12: Protecting Virtualized Environments with System Center Data Protection Manager.
- Chapter 13: Using System Center Operations Manager 2007. Index.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
20. Operating system forensics [2016]
- Messier, Ric, author.
- Waltham, MA : Elsevier : Syngress, [2016]
- Description
- Book — 1 online resource (vii, 374 pages)
- Summary
-
- Introduction File Systems Data Recovery Memory Forensics System Configuration Internet Access Tracking Artifacts Log Files Executable Layouts Malware Mobile Operating Systems New Technologies Reporting.
- (source: Nielsen Book Data)
(source: Nielsen Book Data)
Articles+
Journal articles, e-books, & other e-resources
Guides
Course- and topic-based guides to collections, tools, and services.