Posted on

Cassandra

Cassandra logo

Cassandra is a NoSQL database. It is a database management system designed for use with large volumes of data across multiple computers. It prioritizes availability and scalability. It is well suited to systems with high write requirements. Cassandra is maintained by Apache.

Data Model Comparison

FeatureCassandraRDBMS
OrganizationKeyspace → Table → RowDatabase → Table → Row
Row StructureDynamic columnsFixed schema
Column DataName, type, value, timestampName, type, value
Schema ChangesRuntime modificationsUsually requires downtime
Data ModelDenormalizedNormalized with JOINs
Source: https://en.wikipedia.org/wiki/Apache_Cassandra
Posted on

PowerShell Cookbook, 4th Edition

book cover

Copyright © 2021 Lee Holmes. All rights reserved.

ISBN: 978-1-098-10160-2

Online Searchable Edition: https://www.powershellcookbook.com
GitHub: https://github.com/LeeHolmes/PowerShellCookbook

How do you use PowerShell to navigate the filesystem, manage files and folders, or retrieve a web page? This introduction to the PowerShell language and scripting environment provides more than 400 task-oriented recipes to help you solve all kinds of problems. Intermediate to advanced system administrators will find more than 100 tried-and-tested scripts they can copy and use immediately.

Updated for PowerShell 5.1 and Open Source PowerShell up to 7.0 and beyond, this comprehensive cookbook includes hands-on recipes for common tasks and administrative jobs that you can apply whether you’re on the client or server version of Windows. You also get quick references to technologies used in conjunction with PowerShell, including regular expressions, the XPath language, format specifiers, and frequently referenced .NET, COM, and WMI classes.

  • Learn how to use PowerShell on Windows 10 and Windows Server 2019
  • Tour PowerShell’s core features, including the command model, object-based pipeline, and ubiquitous scripting
  • Master fundamentals such as the interactive shell, pipeline, and object concepts
  • Perform common tasks that involve working with files, internet-connected scripts, user interaction, and more
  • Solve tasks in systems and enterprise management, such as working with Active Directory and the filesystem
Posted on

Zabbix 6 IT Infrastructure Monitoring Cookbook – Second Edition

book cover

Copyright © 2022 Packt Publishing

ISBN 978-1-80324-691-8

Discover practical recipes to help you efficiently monitor enterprise IT infrastructure for Microsoft Windows, Linux, networking, and more

Key Features

  • Find out how you can leverage some of the most exciting features of Zabbix 6
  • Perform professional IT infrastructure and application monitoring on multiple platforms
  • Discover easy-to-follow, practical solutions to problems in network monitoring with Zabbix

Book Description

This updated second edition of the Zabbix 6 IT Infrastructure Monitoring Cookbook brings you new recipes, updated with Zabbix 6 functionality. You’ll learn how to set up Zabbix with built-in high availability, use the improved Business Service Monitoring, set up automatic reporting, and create advanced triggers. Zabbix offers useful insights into your infrastructure performance and issues and enables you to enhance your monitoring setup with its powerful features. This book covers hands-on, easy-to-follow recipes for using Zabbix 6 to monitor effectively the performance of devices and applications over the network.

You’ll start by working your way through the installation and most prominent features of Zabbix and make the right design choices for building a scalable and easily manageable environment. This Zabbix book contains recipes for building items and triggers for different types of monitoring, building templates, and using Zabbix proxies. Next, you’ll use the Zabbix API for customization and manage your Zabbix server and database efficiently. Finally, you’ll find quick solutions to the common and not-so-common problems that you may encounter in your Zabbix monitoring work.

By the end of this book, you’ll be able to use Zabbix for all your monitoring needs and build a solid Zabbix setup by leveraging its key functionalities.

What you will learn

  • Implement your high-availability Zabbix setup
  • Build templates and explore the different types of monitoring available in Zabbix 6
  • Use Zabbix proxies to scale your environment effectively
  • Work with custom integrations and the Zabbix API
  • Set up advanced triggers and effective alerting
  • Maintain your Zabbix setup for scaling, backups, and upgrades
  • Discover how to perform advanced Zabbix database management
  • Monitor cloud-based products such as Amazon Web Services (AWS), Azure, and Docker

Who this book is for

This book is for IT engineers who want to get started with Zabbix and anyone with an intermediate-level understanding of Zabbix looking to extend their knowledge. Although not necessary, prior experience with Zabbix will help you to make the most of this book.

Posted on

Microsoft Defender for Cloud

book cover

Copyright © 2023 by Pearson Education, Inc.

ISBN-13: 978-0-13-787845-1
ISBN-10: 0-13-787845-1
Library of Congress Control Number: 2022944665

The definitive practical guide to Microsoft Defender for Cloud Fully covers new components and multi-cloud enhancements!

Microsoft Defender for Cloud offers comprehensive tools for hardening resources, tracking security posture, protecting against attacks, and streamlining security management all in one natively integrated toolset. Now, leading Microsoft security experts Yuri Diogenes and Tom Janetscheck help you apply its robust protection, detection, and response capabilities throughout your operations, protecting workloads running on all your cloud, hybrid, and on-premises platforms.

This guide shows how to make the most of new components, enhancements, and deployment scenarios, as you address todays latest threat vectors. Sharing best practices, expert tips, and optimizations only available from Microsofts Defender for Cloud team, the authors walk through improving everything from policies and governance to incident response and risk management. Whatever your role or experience, theyll help you address new security challenges far more effectively — and save hours, days, or even weeks.

Two of Microsofts leading cloud security experts show how to:

  • Assess new threat landscapes, the MITRE ATT&CK framework, and the implications of assume-breach
  • Explore Defender for Cloud architecture, use cases, and adoption considerations including multicloud with AWS and GCP
  • Plan for effective governance, successful onboarding, and maximum value
  • Fully visualize complex cloud estates and systematically reduce their attack surfaces
  • Prioritize risks with Secure Score, and leverage at-scale tools to build secure cloud-native apps
  • Establish consistent policy enforcement to avoid drift
  • Use advanced analytics and machine learning to identify attacks based on signals from all cloud workloads
  • Enhance security posture by integrating with the Microsoft Sentinel SIEM/SOAR, Microsoft Purview, and Microsoft Defender for Endpoint
  • Leverage just-in-time VM access and other enhanced security capabilities

About This Book

  • For architects, designers, implementers, SecOps professionals, developers, and security specialists working in Microsoft Azure environments
  • For all IT professionals and decision-makers concerned with securing modern hybrid/multicloud environments, cloud-native apps, and PaaS services
Posted on

Network Protocols for Security Professionals

book cover

Copyright © 2022 Packt Publishing

ISBN 978-1-78995-348-0

Get to grips with network-based attacks and learn to defend your organization’s network and network devices

Key Features

  • Exploit vulnerabilities and use custom modules and scripts to crack authentication protocols
  • Safeguard against web, mail, database, DNS, voice, video, and collaboration server attacks
  • Monitor and protect against brute-force attacks by implementing defense mechanisms

Book Description

With the increased demand for computer systems and the ever-evolving internet, network security now plays an even bigger role in securing IT infrastructures against attacks. Equipped with the knowledge of how to find vulnerabilities and infiltrate organizations through their networks, you’ll be able to think like a hacker and safeguard your organization’s network and networking devices. Network Protocols for Security Professionals will show you how.

This comprehensive guide gradually increases in complexity, taking you from the basics to advanced concepts. Starting with the structure of data network protocols, devices, and breaches, you’ll become familiar with attacking tools and scripts that take advantage of these breaches. Once you’ve covered the basics, you’ll learn about attacks that target networks and network devices. Your learning journey will get more exciting as you perform eavesdropping, learn data analysis, and use behavior analysis for network forensics. As you progress, you’ll develop a thorough understanding of network protocols and how to use methods and tools you learned in the previous parts to attack and protect these protocols.

By the end of this network security book, you’ll be well versed in network protocol security and security countermeasures to protect network protocols.

What you will learn

  • Understand security breaches, weaknesses, and protection techniques
  • Attack and defend wired as well as wireless networks
  • Discover how to attack and defend LAN-, IP-, and TCP/UDP-based vulnerabilities
  • Focus on encryption, authorization, and authentication principles
  • Gain insights into implementing security protocols the right way
  • Use tools and scripts to perform attacks on network devices
  • Wield Python, PyShark, and other scripting tools for packet analysis
  • Identify attacks on web servers to secure web and email services

Who this book is for

This book is for red team and blue team pentesters, security professionals, or bug hunters. Anyone involved in network protocol management and security will also benefit from this book. Basic experience in network security will be an added advantage.