Get ready to make SQL easy
Updated for the latest version of SQL, the new edition of this perennial bestseller shows programmers and web developers how to use SQL to build relational databases and get valuable information from them. Covering everything you need to know to make working with SQL easier than ever, topics include how to use SQL to structure a DBMS and implement a database design; secure a database; and retrieve information from a database; and much more.
SQL is the international standard database language used to create, access, manipulate, maintain, and store information in relational database management systems (DBMS) such as Access, Oracle, SQL Server, and MySQL. SQL adds powerful data manipulation and retrieval capabilities to conventional languages--and this book shows you how to harness the core element of relational databases with ease.
- Server platform that gives you choices of development languages, data types, on-premises or cloud, and operating systems
- Find great examples on the use of temporal data
- Jump right in--without previous knowledge of database programming or SQL
As database-driven websites continue to grow in popularity--and complexity--SQL For Dummies is the easy-to-understand, go-to resource you need to use it seamlessly.
Set up a secure network at home or the office
Fully revised to cover Windows 10 and Windows Server 2019, this new edition of the trusted Networking For Dummies helps both beginning network administrators and home users to set up and maintain a network. Updated coverage of broadband and wireless technologies, as well as storage and back-up procedures, ensures that you'll learn how to build a wired or wireless network, secure and optimize it, troubleshoot problems, and much more.
From connecting to the Internet and setting up a wireless network to solving networking problems and backing up your data--this #1 bestselling guide covers it all.
- Build a wired or wireless network
- Secure and optimize your network
- Set up a server and manage Windows user accounts
- Use the cloud--safely
Written by a seasoned technology author--and jam-packed with tons of helpful step-by-step instructions--this is the book network administrators and everyday computer users will turn to again and again.
Target, test, analyze, and report on security vulnerabilities with pen testing
Pen Testing is necessary for companies looking to target, test, analyze, and patch the security vulnerabilities from hackers attempting to break into and compromise their organizations data. It takes a person with hacking skills to look for the weaknesses that make an organization susceptible to hacking.
Pen Testing For Dummies aims to equip IT enthusiasts at various levels with the basic knowledge of pen testing. It is the go-to book for those who have some IT experience but desire more knowledge of how to gather intelligence on a target, learn the steps for mapping out a test, and discover best practices for analyzing, solving, and reporting on vulnerabilities.
- The different phases of a pen test from pre-engagement to completion
- Threat modeling and understanding risk
- When to apply vulnerability management vs penetration testing
- Ways to keep your pen testing skills sharp, relevant, and at the top of the game
Get ready to gather intelligence, discover the steps for mapping out tests, and analyze and report results
Cut hardware costs, expand your capacity, and manage an entire fleet of virtual machines in your enterprise with the leading virtualization solution, VMware Infrastructure 3 (VI3), by applying the step-by-step instructions in Mastering VMware(R) Infrastructure 3. Packed with the technical details, best practices, and how-tos you need to install, configure, and run a virtual infrastructure at maximum efficiency, this guide is comprehensive and essential. Learn how to create and manage virtual networks and machines, configure every product in the VI3 suite, monitor resources and performance, maintain security, and much more.
This updated study guide by two security experts will help you prepare for the CompTIA CySA+ certification exam. Position yourself for success with coverage of crucial security topics
Where can you find 100% coverage of the revised CompTIA Cybersecurity Analyst+ (CySA+) exam objectives? It's all in the CompTIA CySA+ Study Guide Exam CS0-002, Second Edition This guide provides clear and concise information on crucial security topics. You'll be able to gain insight from practical, real-world examples, plus chapter reviews and exam highlights. Turn to this comprehensive resource to gain authoritative coverage of a range of security subject areas.
- Review threat and vulnerability management topics
- Expand your knowledge of software and systems security
- Gain greater understanding of security operations and monitoring
- Study incident response information
- Get guidance on compliance and assessment
The CompTIA CySA+ Study Guide, Second Edition connects you to useful study tools that help you prepare for the exam. Gain confidence by using its interactive online test bank with hundreds of bonus practice questions, electronic flashcards, and a searchable glossary of key cybersecurity terms. You also get access to hands-on labs and have the opportunity to create a cybersecurity toolkit.
Leading security experts, Mike Chapple and David Seidl, wrote this valuable guide to help you prepare to be CompTIA Security+ certified. If you're an IT professional who has earned your CompTIA Security+ certification, success on the CySA+ (Cybersecurity Analyst) exam stands as an impressive addition to your professional credentials. Preparing and taking the CS0-002exam can also help you plan for advanced certifications, such as the CompTIA Advanced Security Practitioner (CASP+).
This TECHNICAL REFERENCE delivers must-know information on TCP/IP for any IT professional working with Windows .NET Server. The book focuses on core TCP/IP protocols such as IP, ICMP, IGMP, and UDP; physical protocols such as Ethernet; and application protocols such as DNS, DHCP and WINS. It also provides details on NDIS and Windows NT(r)-based networking architecture. The book starts with the fundamentals and builds comprehension layer by layer. Companion CD-ROM contains supplemental materials, including technical white papers. Provides practical and in-depth information on the entire TCP/IP protocols suite for Windows .NET Server Builds comprehension of TCP/IP protocols layer by layer Features ample illustrations, tables, and real-world examples CD-ROM includes Microsoft white papers on TCP/IP
Network security is not simply about building impenetrable walls--determined attackers will eventually overcome traditional defenses. The most effective computer security strategies integrate network security monitoring (NSM): the collection and analysis of data to help you detect and respond to intrusions.In The Practice of Network Security Monitoring, Mandiant CSO Richard Bejtlich shows you how to use NSM to add a robust layer of protection around your networks--no prior experience required. To help you avoid costly and inflexible solutions, he teaches you how to deploy, build, and run an NSM operation using open source software and vendor-neutral tools. You'll learn how to:
-Determine where to deploy NSM platforms, and size them for the monitored networks
-Deploy stand-alone or distributed NSM installations
-Use command line and graphical packet analysis tools, and NSM consoles
-Interpret network evidence from server-side and client-side intrusions
-Integrate threat intelligence into NSM software to identify sophisticated adversaries There's no foolproof way to keep attackers out of your network. But when they get in, you'll be prepared. The Practice of Network Security Monitoring will show you how to build a security net to detect, contain, and control them. Attacks are inevitable, but losing sensitive data shouldn't be.