Find the most productive way to work in Linux. Linux: DesktopsandRemoteAccess covers the most popular desktop environments, terminal emulators, and shells used to accessand administer Linux systems, both locally andremotely. Instructor GrantMcWilliams reviews GUI options such as KDE...
Bash scripting can help you automate routine tasks and save valuable time, whether you're a Linux user, sys admin, or software developer. Kevin Dankwardt has written thousands of bash scripts, short and long. Here he teaches you how to read and write scripts, and provides a series of scripting...
[Linkedin] OWASP Top 10: #7 Identification and Authentication Failures and #8 Software and Data Integrity Failures, 2023 (Caroline Wong)
Failures related to identity, authentication, and software and data integrity loom large in web application development. You need to keep security...
Raspberry Pi: Home Monitoring and Control
Help your home keep up with you—and stay connected to what's going on when you're away—with a custom home monitoring system built with a Raspberry Pi. With some inexpensive hardware and simple web services, you can monitor your house remotely via photo...
Linux. Уровень 1. Основы администрирования систем
Debian, Ubuntu, CentOS. Михаил Соколов
На данном курсе Вы получите базовые знания по операционной системе Linux. Вы освоите особенности установки, настройки и администрирования данной ОС. Вы сможете устанавливать и настраивать операционную...
Первый в рунете практический курс. Без лишней воды и сложной теории.
Давайте начистоту. В 2020 году, админить Windows берут людей чуть-ли не с улицы: студентов последних курсов ВУЗов, сомнительных лиц с непрофильным образование, эникейщиков-самоучек и т.д. По большей части их работа состоит в...
OWASP Top 10: #5 Broken Access Control and #6 Security Misconfiguration
Security vulnerabilities should be top of mind when it comes to safely accessing web applications within an organization. There’s always something that can go wrong if you’re not careful, but how do you prepare for a...
OWASP Top 10: #1 Broken Access Control and #2 Cryptographic Failures
No one is immune to security vulnerabilities when it comes to web applications. We all live with the looming possibility that something could go wrong in any instant. That’s why the Open Web Application Security Project...
[Linkedin] OWASP Top 10: #9 Security Logging and Monitoring Failures and #10 Server-Side Request Forgery, 2023 (Caroline Wong)
It’s important to protect your organization against security vulnerabilities, but how do you prepare for a possible attack? In this course, join instructor and...
Learning Bitcoin and Other Cryptocurrencies
Bitcoin is a form of money that only exists online. It's making headlines around the world, but many people don't really understand how bitcoin and other cryptocurrencies work. In this course, Tom Geller demystifies bitcoin, revealing the promise and...
Building an Ethereum Blockchain App: 7 Smart Contracts
Have you wondered how blockchain can help you create applications that offer greater transparency, traceability, efficiency, and resilience while lowering your costs? This course, seventh in a series of eleven, goes in-depth on smart...
Node.js: Testing and Code Quality
Most software engineers would agree that clean code is easier to maintain than messy code, but what exactly does that look like, and how do go about cleaning up messy code? In this course, Jon Peck shows how to measure quality, implement testing, and measure...
Building an Ethereum Blockchain App: 10 Deployment and Maintenance
Have you wondered how blockchain can help you create applications that offer greater transparency, traceability, efficiency, and resilience while lowering your costs? This course, tenth in a series of eleven, shows you how to...
Build a Raspberry Pi Media Server
The most popular use of Raspberry Pi is for custom media servers. All you need is a Pi that has access to your entertainment system and a copy of OSMC, an open-source media center "built for the people, by the people." In these tutorials, Brad Wheeler shows how...
Описание
Рассмотрены вопросы настройки ОС Linux на максимальную производительность и безопасность. Описано базовое администрирование и управление доступом, настройка Firewall, файлообменный сервер, WEB-, FTP- и Proxy-сервера, программы для доставки электронной почты, службы DNS, а также...
Описание книги
В книги дается описание требований к системам обеспечения, выбору компонентов ИТ-инфраструктуры, расчет стоимости комплексного решения, на примере таких решений как Windows 10/2016, Hyper-V, Microsoft SQL Server 2016, SharePoint 2016, Exchange 2016, Skype for Business 2015, System...
OWASP Top 10: #3 Injection and #4 Insecure Design
The Open Web Application Security Project (OWASP) was formed to provide the public with the resources needed to understandand enhance software security. The OWASP Top 10 list describes the ten biggest vulnerabilities. In this course, Caroline...
Building Web3 Decentralized Apps in Ethereum
Suggested prerequisites
Familiarity with JavaScript and React
Comfortable with command-line interfaces
Familiarity working in IDEs
Blockchain and cryptocurrency technology has exploded in recent years, and the types of things you can now do with...
Linux. От новичка к профессионалу (7-е издание) (Денис Колисниченко)
Даны ответы на все вопросы, возникающие при работе с Linux: от установки и настройки этой ОС до настройки сервера на базе Linux. Материал книги мак-симально охватывает все сферы применения Linux: от запуска Windows-игр под...
Building an Ethereum Blockchain App: 4 Ethereum Development
Have you wondered how blockchain can help you create applications that offer greater transparency, traceability, efficiency, and resilience while lowering your costs? This course, fourth in a series of eleven, goes in-depth on the...