Exam Ref AZ-800 Administering Windows Server Hybrid Core Infrastructure

فهرست مطالب کتاب Exam Ref AZ-800:

Introduction

CHAPTER 1 Deploy and manage Active Directory Domain Services in onpremises and cloud environments

CHAPTER 2 Manage Windows Servers and workloads in a hybrid

environment

CHAPTER 3 Manage virtual machines and containers

CHAPTER 4 Implement and manage an on-premises and hybrid networking

infrastructure

CHAPTER 5 Manage storage and file services

Index

 

Exam Ref DP-900 Microsoft Azure Data Fundamentals

فهرست مطالب Exam Ref DP-900:

Introduction

About the author

CHAPTER 1 Describe core data concept

CHAPTER 2 Identify considerations for relational data on Azure

CHAPTER 3 Describe considerations for working with non-relational

data on Azure

CHAPTER 4 Describe an analytics workload on Azure

CHAPTER 5 DP-900 Microsoft Azure Data Fundamentals

Exam Updates

Index

Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals (Second Edition)

فهرست مطالب کتاب Exam Ref SC-900 Microsoft Security, Compliance, and Identity Fundamentals:

Acknowledgments

About the authors

Introduction

CHAPTER 1: Describe the concepts of security, compliance, and identity

CHAPTER 2: Microsoft identity and access management solutions

CHAPTER 3: Capabilities of Microsoft security solutions

CHAPTER 4: Describe the capabilities of Microsoft compliance solutions

CHAPTER 5: SC-900 Microsoft Security, Compliance, and Identity Fundamentals exam updates

Index

Firewalls and Internet Security (Second Edition)

فهرست مطالب کتاب Firewalls and Internet Security:

Getting Started

Introduction

A Security Review of Protocols: Lower Layers

Security Review: The Upper Layers

The Web: Threat or Menace?

The Threats

Classes of Attacks

The Hacker’s Workbench, and Other Munitions

Safer Tools and Services

Authentication

Using Some Tools and Services

Firewalls and VPNs

Kinds of Firewalls

Filtering Services

Firewall Engineering

Tunneling and VPNs

Protecting an Organization

Network Layout

Safe Hosts in a Hostile Environment

Intrusion Detection

Lessons Learned

An Evening with Berferd

The Taking of Clark

Secure Communications over Insecure Networks

Where Do We Go from Here?

Appendixes

Getting Started with Microsoft System Center Operations Manager

فهرست مطالب کتاب Getting Started with Microsoft System Center Operations Manager:

Introduction

Chapter 1 Group Policy Essentials

Chapter 2 Managing Group Policy with the GPMC

Chapter 3 Group Policy Processing Behavior Essentials

Chapter 4 Advanced Group Policy Processing

Chapter 5 Group Policy Preferences

Chapter 6 Managing Applications and Settings Using Group Policy

Chapter 7 Troubleshooting Group Policy

Chapter 8 Implementing Security with Group Policy

Chapter 9 Profiles: Local, Roaming, and Mandatory

Chapter 10 Implementing a Managed Desktop, Part 1: Redirected Folders, Offline Files, and the Synchronization Manager

Chapter 11 The Managed Desktop, Part 2: Software Deployment via Group Policy

Chapter 12 Finishing Touches with Group Policy: Scripts, Internet Explorer, Hardware Control, Deploying

Printers, and Shadow Copies

Appendix A Group Policy Tools

Index

Getting Started With VMware Cloud on AWS

فهرست مطالب کتاب Getting Started With VMware Cloud on AWS:

1 Learn

2 Plan

Resource Planning

Network Planning

Identity and Access Management

3 Prepare

Create or Update Your Broadcom Account

Create and Manage a VMware Cloud on AWS Organization

Purchase Options for VMware Cloud on AWS

View VMware Cloud on AWS Subscriptions

4 Operate

Log In to the VMware Cloud Console

Deploy an SDDC

Sign Up to Receive Service Alerts

Get Support

Git Notes For Professionals

فهرست مطالب Git Notes For Professionals:

Getting started with Git

Browsing the history

Working with Remotes

Staging

Ignoring Files and Folders

Git Diff

Undoing

Merging

Submodules

Committing

Aliases

Rebasing

Configuration

Branching

Rev-List

Squashing

Cherry Picking

Recovering

Git Clean

Using a .gitattributes file

.mailmap file: Associating contributor and email aliases

Analyzing types of workflows

Pulling

Hooks

Cloning Repositories

Stashing

Subtrees

Renaming

Pushing

Internals

git-tfs

Empty directories in Git

git-svn

Archive

Rewriting history with filter-branch

Migrating to Git

Show

Resolving merge conflicts

Bundles

Display commit history graphically with Gitk

Bisecting/Finding faulty commits

Blaming

Git revisions syntax

Worktrees

Git Remote

Git Large File Storage (LFS)

Git Patch

Git statistics

git send-email

Git GUI Clients

Reflog – Restoring commits not shown in git log

TortoiseGit

External merge and difftools

Update Object Name in Reference

Git Branch Name on Bash Ubuntu

Git Client-Side Hooks

Git rerere

Change git repository name

Git Tagging

Tidying up your local and remote repository

diff-tree

GNS3 Network Simulation Guide

فهرست مطالب:

Preface

Clearing the First Hurdle

Creating your First GNS3 Simulation

Enhancing GNS3

Unleashing Other Emulators

The Cisco Connection

Peeking under the GNS3 Hood

Tips for Teachers, Troubleshooters, and Team Leaders

Index

Go Design Patterns

فهرست مطالب کتاب Go Design Patterns:

Ready… Steady… Go

Creational Patterns – Singleton, Builder, Factory, Prototype, Abstract Factory

Structural Patterns – Composite, Adapter, Bridge

Structural Patterns – Proxy, Facade, Decorator, Flyweight

Behavioral Patterns – Strategy, Chain of Responsibility, Command

Behavioral Patterns – Template, Memento, Interpreter

Behavioral Patterns – Visitor, State, Mediator, Observer

Introduction to Go’s Concurrency

Concurrency Patterns – Barrier, Future, Pipeline

Concurrency Patterns – Workers Pool & Publish–Subscribe

Go in Action

فهرست مطالب کتاب Go in Action:

Introducing Go

Go quick-start

Packaging and tooling

Arrays, slices, and maps

Go’s type system

Concurrency

Concurrency patterns

Standard library

Testing and benchmarking

Good to Great: Why Some Companies Make the Leap … and Others Don’t

فهرست مطالب کتاب Good to Great: Why Some Companies Make the Leap … and Others Don’t:

Chapter 1 – Good is the Enemy of Great

Chapter 2 – Level 5 Leadership

Chapter 3 – First Who … Then What

Chapter 4 – Confront The Brutal Facts (Yet Never Lose Faith)

Chapter 5 – The Hedgehog Concept – (Simplicity within the Three Circles)

Chapter 6 – A Culture of Discipline

Chapter 7 – Technology Accelerators

Chapter 8 – The Flywheel and The Doom Loop

Chapter 9 – From Good To Great To Built To Last

Epilogue – Frequently Asked Questions

Appendix 1.A – Selection Process for Good-To-Great Companies

Appendix 1.B – Direct Comparison Selections

Appendix 1.C – Unsustained Comparisons

Appendix 1.D – Overview of Research Steps

Appendix 2.A – Inside Versus Outside CEO Analysis

Appendix 5.A – Industry Analysis Rankings

Appendix 8.A – Doom Loop Behavior in the Comparison Companies

Appendix 8.B – Summary of Acquisition Analysis