Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • English  (69)
  • Birmingham, UK : Packt Publishing  (69)
  • Linux  (69)
Datasource
Material
Language
  • English  (69)
Years
Subjects(RVK)
  • 1
    ISBN: 9781789134179 , 178913417X
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Second edition.
    Keywords: Linux ; Penetration testing (Computer security) ; Web applications ; Testing ; Electronic books ; Electronic books ; local
    Abstract: Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security Key Features Familiarize yourself with the most common web vulnerabilities Conduct a preliminary assessment of attack surfaces and run exploits in your lab Explore new tools in the Kali Linux ecosystem for web penetration testing Book Description Web applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure. Kali Linux is a Linux-based penetration testing platform that provides a broad array of testing tools, many of which can be used to execute web penetration testing. Kali Linux Web Penetration Testing Cookbook gives you the skills you need to cover every stage of a penetration test - from gathering information about the system and application, to identifying vulnerabilities through manual testing. You will also cover the use of vulnerability scanners and look at basic and advanced exploitation techniques that may lead to a full system compromise. You will start by setting up a testing laboratory, exploring the latest features of tools included in Kali Linux and performing a wide range of tasks with OWASP ZAP, Burp Suite and other web proxies and security testing tools. As you make your way through the book, you will learn how to use automated scanners to find security ?aws in web applications and understand how to bypass basic security controls. In the concluding chapters, you will look at what you have learned in the context of the Open Web Application Security Project (OWASP) and the top 10 web application vulnerabilities you are most likely to encounter, equipping you with the ability to combat them effectively. By the end of this book, you will have acquired the skills you need to identify, exploit, and prevent web application vulnerabilities. What you will learn Set up a secure penetration testing laboratory Use proxies, crawlers, and spiders to investigate an entire website Identify cross-site scripting and client-side vulnerabilities Exploit vulnerabilities that allow the insertion of code into web applications Exploit vulnerabilities that require complex setups Improve testing efficiency using automated vulnerability scanners Learn how to circumvent security controls put in place to prevent attacks Who this book is for Kali Linux Web Penetration Testing Cookbook is for IT professionals, web developers, security enthusiasts, and ...
    Note: Previous edition published: 2016. - Description based on online resource; title from title page (Safari, viewed October 1, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9781789341461 , 1789341469
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: A concise walk-through of CentOS 7, starting from installation to securing it's environment. Key Features No previous Linux environment experience needed for reading this book Get comfortable with a popular and stable Red Hat Enterprise Linux distribution Most of the command line based concepts are explained with graphics Book Description Linux kernel development has been the worlds largest collaborative project to date. With this practical guide, you will learn Linux through one of its most popular and stable distributions. This book will introduce you to essential Linux skills using CentOS 7. It describes how a Linux system is organized, and will introduce you to key command-line concepts you can practice on your own. It will guide you in performing basic system administration tasks and day-to-day operations in a Linux environment. You will learn core system administration skills for managing a system running CentOS 7 or a similar operating system, such as RHEL 7, Scientific Linux, and Oracle Linux. You will be able to perform installation, establish network connectivity and user and process management, modify file permissions, manage text files using the command line, and implement basic security administration after covering this book. By the end of this book, you will have a solid understanding of working with Linux using the command line. What you will learn Understand file system hierarchy and essential command-line skills Use Vi editor, I/O redirections and how to work with common text manipulating tools Create, delete, modify user accounts and manage passwords and their aging policy Manage file ownership, permissions, and ACL Execute process management and monitoring on the command line Validate and manage network configuration using nmcli Manage remote logins using SSH and file transfer using SCP and Rsync Understand system logging, how to control system services with systemd and systemctl, and manage firewalId Who this book is for Any individual who wants to learn how to use Linux as server or desktop in his environment. Whether you are a developer, budding system administrator, or tech lover with no previous Linux administration background, you will be able to start your journey in Linux using CentOS 7 with this book.
    Note: Description based on online resource; title from title page (viewed February 13, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    ISBN: 9781789340280 , 1789340284
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Linux ; Client/server computing ; Computer networks ; Management ; Electronic books ; Electronic books ; local
    Abstract: Over 100 recipes to get up and running with the modern Linux administration ecosystem Key Features Understand and implement the core system administration tasks in Linux Discover tools and techniques to troubleshoot your Linux system Maintain a healthy system with good security and backup practices Book Description Linux is one of the most widely used operating systems among system administrators,and even modern application and server development is heavily reliant on the Linux platform. The Linux Administration Cookbook is your go-to guide to get started on your Linux journey. It will help you understand what that strange little server is doing in the corner of your office, what the mysterious virtual machine languishing in Azure is crunching through, what that circuit-board-like thing is doing under your office TV, and why the LEDs on it are blinking rapidly. This book will get you started with administering Linux, giving you the knowledge and tools you need to troubleshoot day-to-day problems, ranging from a Raspberry Pi to a server in Azure, while giving you a good understanding of the fundamentals of how GNU/Linux works. Through the course of the book, you'll install and configure a system, while the author regales you with errors and anecdotes from his vast experience as a data center hardware engineer, systems administrator, and DevOps consultant. By the end of the book, you will have gained practical knowledge of Linux, which will serve as a bedrock for learning Linux administration and aid you in your Linux journey. What you will learn Install and manage a Linux server, both locally and in the cloud Understand how to perform administration across all Linux distros Work through evolving concepts such as IaaS versus PaaS, containers, and automation Explore security and configuration best practices Troubleshoot your system if something goes wrong Discover and mitigate hardware issues, such as faulty memory and failing drives Who this book is for If you are a system engineer or system administrator with basic experience of working with Linux, this book is for you.
    Note: Description based on online resource; title from title page (Safari, viewed February 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    ISBN: 9781789135107 , 1789135109
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Linux ; Windows Azure ; Cloud computing ; Database management ; Electronic books ; Electronic books ; local
    Abstract: Learn to efficiently run Linux-based workloads in Azure Key Features Manage and deploy virtual machines in your Azure environment Explore various open source tools to integrate automation and orchestration Leverage Linux features to create, run, and manage containers Book Description Azure's market share has increased massively and enterprises are adopting it rapidly. Linux is a widely-used operating system and has proven to be one of the most popular workloads on Azure. It has become crucial for Linux administrators and Microsoft professionals to be well versed with the concepts of managing Linux workloads in an Azure environment. Hands-On Linux Administration on Azure starts by introducing you to the fundamentals of Linux and Azure, after which you will explore advanced Linux features and see how they are managed in an Azure environment. Next, with the help of real-world scenarios, you will learn how to deploy virtual machines(VMs) in Azure, along with extending Azure VMs capabilities and managing them efficiently. You will then understand continuous configuration automation and use Ansible, SaltStack and Powershell DSC for orchestration. As you make your way through the chapters, you will understand containers and how they work, along with managing containers and the various tasks you can perform with them. In the concluding chapters, you will cover some Linux troubleshooting techniques on Azure, and you will also be able to monitor Linux in Azure using different open source tools. By the end of this book, you will be able to administer Linux on Azure and make the most of the important tools required for deployment. What you will learn Understand why Azure is the ideal solution for your open source workloads Master essential Linux skills and learn to find your way around the Linux environment Deploy Linux in an Azure environment Use configuration management to manage Linux in Azure Manage containers in an Azure environment Enhance Linux security and use Azure's identity management systems Automate deployment with Azure Resource Manager (ARM) and Powershell Employ Ansible to manage Linux instances in an Azure cloud environment Who this book is for Hands-On Linux Administration on Azure is for Linux administrators and Microsoft professionals that need to deploy and manage their workloads in Azure. Prior knowledge of Linux and Azure isn't necessary.
    Note: Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed October 1, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    ISBN: 9781788997263 , 1788997263
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Third edition.
    Keywords: Linux ; Application software ; Development ; Virtual computer systems ; Open source software ; Electronic books ; Electronic books ; local
    Abstract: Schedule and run application containers using Kubernetes Key Features Get to grips with a wide range of tools to monitor and secure your deployments Manage your container clusters and networks using Kubernetes Get well-versed with the fundamentals of Kubernetes Book Description Kubernetes has continued to grow and achieve broad adoption across various industries, helping you to orchestrate and automate container deployments on a massive scale. Based on the recent release of Kubernetes 1.12, Getting Started with Kubernetes gives you a complete understanding of how to install a Kubernetes cluster. The book focuses on core Kubernetes constructs, such as pods, services, replica sets, replication controllers, and labels. You will understand cluster-level networking in Kubernetes, and learn to set up external access to applications running in the cluster. As you make your way through the book, you'll understand how to manage deployments and perform updates with minimal downtime. In addition to this, you will explore operational aspects of Kubernetes , such as monitoring and logging, later moving on to advanced concepts such as container security and cluster federation. You'll get to grips with integrating your build pipeline and deployments within a Kubernetes cluster, and be able to understand and interact with open source projects. In the concluding chapters, you'll orchestrate updates behind the scenes, avoid downtime on your cluster, and deal with underlying cloud provider instability within your cluster. By the end of this book, you'll have a complete understanding of the Kubernetes platform and will start deploying applications on it. What you will learn Download, install, and configure the Kubernetes code base Set up and access monitoring and logging for Kubernetes clusters Set up external access to applications running in the cluster Learn how to manage and scale kubernetes with hosted platforms on AWS, Azure, and GCP Run multiple clusters and manage them from a single control plane Discover top tools for deploying and managing a Kubernetes cluster Learn how to get production ready and harden Kubernetes operations, networking, and storage Who this book is for Getting Started with Kubernetes is for developers, system administrators, and DevOps engineers who want to automate the deployment process and scale their applications. No prior knowledge of Kubernetes is required.
    Note: Description based on online resource; title from title page (viewed January 7, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    ISBN: 9781788836876 , 1788836871
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Second edition.
    Keywords: Linux ; Application software ; Development ; Virtual computer systems ; Open source software ; Electronic books ; Electronic books ; local
    Abstract: Learn how to automate and manage your containers and reduce the overall operation burden on your system. About This Book Use containers to manage, scale and orchestrate apps in your organization Transform the latest concept of Kubernetes 1.10 into examples Expert techniques for orchestrating containers effectively Who This Book Is For This book is for system administrators, developers, DevOps engineers, or any stakeholder who wants to understand how Kubernetes works using a recipe-based approach. Basic knowledge of Kubernetes and Containers is required. What You Will Learn Build your own container cluster Deploy and manage highly scalable, containerized applications with Kubernetes Build high-availability Kubernetes clusters Build a continuous delivery pipeline for your application Track metrics and logs for every container running in your cluster Streamline the way you deploy and manage your applications with large-scale container orchestration In Detail Kubernetes is an open source orchestration platform to manage containers in a cluster environment. With Kubernetes, you can configure and deploy containerized applications easily. This book gives you a quick brush up on how Kubernetes works with containers, and an overview of main Kubernetes concepts, such as Pods, Deployments, Services and etc. This book explains how to create Kubernetes clusters and run applications with proper authentication and authorization configurations. With real-world recipes, you'll learn how to create high availability Kubernetes clusters on AWS, GCP and in on-premise datacenters with proper logging and monitoring setup. You'll also learn some useful tips about how to build a continuous delivery pipeline for your application. Upon completion of this book, you will be able to use Kubernetes in production and will have a better understanding of how to manage containers using Kubernetes. Style and approach This recipe-based book will teach you how to use Kubernetes in production and will help you discover various steps involved in managing your containers using Kubernetes Downloading the example code for this book You can download the example code files for all Packt books you have purchased from your account at http://www.PacktPub.com. If you purchased this book elsewhere, you can visit http://www.PacktPub.com/support and register to have the files e-mailed directly to you.
    Note: Previous edition published: 2016. - Description based on online resource; title from title page (Safari, viewed July 31, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    ISBN: 9781788625982 , 1788625986
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Second edition.
    Keywords: Linux ; Computer networks ; Management ; Open source software ; Virtual computer systems ; Electronic books ; Electronic books ; local
    Abstract: Leverage Docker to deploying software at scale Key Features Leverage practical examples to manage containers efficiently Integrate with orchestration tools such as Kubernetes for controlled deployments Learn to implement best practices on improving efficiency and security of containers Book Description Docker is an open source platform for building, shipping, managing, and securing containers. Docker has become the tool of choice for people willing to work with containers. Since the market is moving toward containerization, Docker will definitely have a big role to play in the future tech market. This book starts with setting up Docker in different environment, and helps you learn how to work with Docker images. Then, you will take a deep dive into network and data management for containers. The book explores the RESTful APIs provided by Docker to perform different actions, such as image/container operations. The book then explores logs and troubleshooting Docker to solve issues and bottlenecks. You will gain an understanding of Docker use cases, orchestration, security, ecosystems, and hosting platforms to make your applications easy to deploy, build, and collaborate on. The book covers the new features of Docker 18.xx (or later), such as working with AWS and Azure, Docker Engine, Docker Swarm, Docker Compose, and so on. By the end of this book, you will have gained hands-on experience of finding quick solutions to different problems encountered while working with Docker. What you will learn Install Docker on various platforms Work with Docker images and containers Container networking and data sharing Docker APIs and language bindings Various PaaS solutions for Docker Implement container orchestration using Docker Swarm and Kubernetes Container security Docker on various clouds Who this book is for Book is targeted towards developers, system administrators, and DevOps engineers who want to use Docker in his/her development, QA, or production environments. It is expected that the reader has basic Linux/Unix skills such as installing packages, editing files, managing services, and so on. Any experience in virtualization technologies such as KVM, XEN, and VMware will be an added advantage Downloading the example code for this book You can download the example code files for all Packt books you have purchased from your account at http://www.PacktPub.com. If you purchased this book elsewhere, you can visit http://www.PacktPub.com/support and regi...
    Note: Previous edition published: 2015. - Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed October 1, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    ISBN: 9781788991537 , 1788991532
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Second edition
    Parallel Title: Erscheint auch als
    RVK:
    Keywords: Linux ; Command languages (Computer science)
    Note: Description based on online resource; title from title page (Safari, viewed June 14, 2018). - Previous edition published: 2015
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    ISBN: 9781788999977 , 1788999975
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Second edition
    Parallel Title: Erscheint auch als
    Keywords: Linux ; Application software Development ; Virtual computer systems ; Cloud computing ; Open source software
    Note: Description based on online resource; title from title page (Safari, viewed May 31, 2018)
    URL: Volltext  (URL des Erstveröffentlichers)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Birmingham, UK : Packt Publishing
    ISBN: 9781789537529 , 1789537525
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Linux ; Electronic books ; Electronic books ; local
    Abstract: Develop a solid understanding of the important command-line tools and utilities in Linux About This Book Delve into the fundamentals of Linux Explore and work with virtualization, command lines, and Bash shell scripts Use special file permission flags such as setuid and setgid Who This Book Is For Fundamentals of Linux is for individuals looking to work as a Linux system administrator. What You Will Learn Explore basic and advanced command-line concepts Install Linux, work with VirtualBox, and install CentOS 7 in VirtualBox Work with the command line efficiently and learn how to navigate through the Linux filesystem Create file and user group permissions and edit files Use Sticky bit to secure your Linux filesystem Define and remove ACL from Linux files In Detail Linux is a Unix-like operating system assembled under the model of free and open source software development and distribution. Fundamentals of Linux will help you learn all the essentials of the Linux command line required to get you started. The book will start by teaching you how to work with virtualization software and install CentOS 7 Linux as a VM. Then, you will get to grips with the workings of various command line operations, such as cursor movement, commands, options, and arguments. As you make your way through the chapters, the book will not only focus on the most essential Linux commands but also give an introduction to Bash shell scripting. Finally, you will explore advanced topics, such as networking and troubleshooting your system, and you will get familiar with the advanced file permissions: ACL, setuid, and setgid. Fundamentals of Linux includes real-world tasks, use cases, and problems that, as a system administrator, you might encounter in your day-to-day activities. Style and approach A step-by-step guide filled with real-world examples that will cover the fundamentals of Linux
    Note: Description based on online resource; title from title page (Safari, viewed August 1, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 11
    ISBN: 9781789346626 , 1789346622
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Second edition.
    Keywords: Linux ; Penetration testing (Computer security) ; Web applications ; Testing ; Electronic books ; Electronic books ; local
    Abstract: Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its fourth edition Key Features Rely on the most updated version of Kali to formulate your pentesting strategies Test your corporate network against threats Explore new cutting-edge wireless penetration tools and features Book Description Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply the appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in successful penetration testing project engagement. This fourth edition of Kali Linux 2018: Assuring Security by Penetration Testing starts with the installation of Kali Linux. You will be able to create a full test environment to safely practice scanning, vulnerability assessment, and exploitation. You'll explore the essentials of penetration testing by collecting relevant data on the target network with the use of several footprinting and discovery tools. As you make your way through the chapters, you'll focus on specific hosts and services via scanning and run vulnerability scans to discover various risks and threats within the target, which can then be exploited. In the concluding chapters, you'll apply techniques to exploit target systems in order to gain access and find a way to maintain that access. You'll also discover techniques and tools for assessing and attacking devices that are not physically connected to the network, including wireless networks. By the end of this book, you will be able to use NetHunter, the mobile version of Kali Linux, and write a detailed report based on your findings. What you will learn Conduct the initial stages of a penetration test and understand its scope Perform reconnaissance and enumeration of target networks Obtain and crack passwords Use Kali Linux NetHunter to conduct wireless penetration testing Create proper penetration testing reports Understand the PCI-DSS framework and tools used to carry out segmentation scans and penetration testing Carry out wireless auditing assessments and penetration testing Understand how a social engineering attack such as phishing works Who this book is for This fourth edition of Kali Linux 2018: Assuring Security by Penetration Testing is for pentesters, ethical hackers, and IT security professionals with basic knowledge of Unix/Linu...
    Note: Description based on online resource; title from title page (Safari, viewed December 3, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 12
    ISBN: 9781789136005 , 1789136008
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Second edition.
    Keywords: Linux ; Computer security ; Electronic books ; Electronic books ; local
    Abstract: Enhance file system security and learn about network attack, security tools and different versions of Linux build. Key Features Hands-on recipes to create and administer a secure Linux system Enhance file system security and local and remote user authentication Use various security tools and different versions of Linux for different tasks Book Description Over the last few years, system security has gained a lot of momentum and software professionals are focusing heavily on it. Linux is often treated as a highly secure operating system. However, the reality is that Linux has its share of security ?aws, and these security ?aws allow attackers to get into your system and modify or even destroy your important data. But there's no need to panic, since there are various mechanisms by which these ?aws can be removed, and this book will help you learn about different types of Linux security to create a more secure Linux system. With a step-by-step recipe approach, the book starts by introducing you to various threats to Linux systems. Then, this book will walk you through customizing the Linux kernel and securing local files. Next, you will move on to managing user authentication both locally and remotely and mitigating network attacks. Later, you will learn about application security and kernel vulnerabilities. You will also learn about patching Bash vulnerability, packet filtering, handling incidents, and monitoring system logs. Finally, you will learn about auditing using system services and performing vulnerability scanning on Linux. By the end of this book, you will be able to secure your Linux systems and create a robust environment. What you will learn Learn about vulnerabilities and exploits in relation to Linux systems Configure and build a secure kernel and test it Learn about file permissions and how to securely modify files Authenticate users remotely and securely copy files on remote systems Review different network security methods and tools Perform vulnerability scanning on Linux machines using tools Learn about malware scanning and read through logs Who this book is for This book is intended for all those Linux users who already have knowledge of Linux file systems and administration. You should be familiar with basic Linux commands. Understanding information security and its risks to a Linux system is also helpful in understanding the recipes more easily.
    Note: Previous edition published: 2016. - Description based on online resource; title from title page (Safari, viewed October 1, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 13
    ISBN: 9781789131772 , 1789131774
    Language: English
    Pages: 1 online resource (1 volume)
    Keywords: Linux ; UNIX (Computer file) ; C++ (Computer program language) ; Computer programming ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: A hands-on guide to making system programming with C++ easy Key Features Write system-level code leveraging C++17 Learn the internals of the Linux Application Binary Interface (ABI) and apply it to system programming Explore C++ concurrency to take advantage of server-level constructs Book Description C++ is a general-purpose programming language with a bias toward system programming as it provides ready access to hardware-level resources, efficient compilation, and a versatile approach to higher-level abstractions. This book will help you understand the benefits of system programming with C++17. You will gain a firm understanding of various C, C++, and POSIX standards, as well as their respective system types for both C++ and POSIX. After a brief refresher on C++, Resource Acquisition Is Initialization (RAII), and the new C++ Guideline Support Library (GSL), you will learn to program Linux and Unix systems along with process management. As you progress through the chapters, you will become acquainted with C++'s support for IO. You will then study various memory management methods, including a chapter on allocators and how they benefit system programming. You will also explore how to program file input and output and learn about POSIX sockets. This book will help you get to grips with safely setting up a UDP and TCP server/client. Finally, you will be guided through Unix time interfaces, multithreading, and error handling with C++ exceptions. By the end of this book, you will be comfortable with using C++ to program high-quality systems. What you will learn Understand the benefits of using C++ for system programming Program Linux/Unix systems using C++ Discover the advantages of Resource Acquisition Is Initialization (RAII) Program both console and file input and output Uncover the POSIX socket APIs and understand how to program them Explore advanced system programming topics, such as C++ allocators Use POSIX and C++ threads to program concurrent systems Grasp how C++ can be used to create performant system applications Who this book is for If you are a fresh developer with intermediate knowledge of C++ but little or no knowledge of Unix and Linux system programming, this book will help you learn system programming with C++ in a practical way.
    Note: Description based on online resource; title from title page (viewed February 13, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 14
    ISBN: 9781788996747 , 1788996747
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Linux ; Computer programming ; Electronic books ; Electronic books ; local
    Abstract: Get up and running with system programming concepts in Linux Key Features Acquire insight on Linux system architecture and its programming interfaces Get to grips with core concepts such as process management, signalling and pthreads Packed with industry best practices and dozens of code examples Book Description The Linux OS and its embedded and server applications are critical components of today's software infrastructure in a decentralized, networked universe. The industry's demand for proficient Linux developers is only rising with time. Hands-On System Programming with Linux gives you a solid theoretical base and practical industry-relevant descriptions, and covers the Linux system programming domain. It delves into the art and science of Linux application programming - system architecture, process memory and management, signaling, timers, pthreads, and file IO. This book goes beyond the use API X to do Y approach; it explains the concepts and theories required to understand programming interfaces and design decisions, the tradeoffs made by experienced developers when using them, and the rationale behind them. Troubleshooting tips and techniques are included in the concluding chapter. By the end of this book, you will have gained essential conceptual design knowledge and hands-on experience working with Linux system programming interfaces. What you will learn Explore the theoretical underpinnings of Linux system architecture Understand why modern OSes use virtual memory and dynamic memory APIs Get to grips with dynamic memory issues and effectively debug them Learn key concepts and powerful system APIs related to process management Effectively perform file IO and use signaling and timers Deeply understand multithreading concepts, pthreads APIs, synchronization and scheduling Who this book is for Hands-On System Programming with Linux is for Linux system engineers, programmers, or anyone who wants to go beyond using an API set to understanding the theoretical underpinnings and concepts behind powerful Linux system programming APIs. To get the most out of this book, you should be familiar with Linux at the user-level logging in, using shell via the command line interface, the ability to use tools such as find, grep, and sort. Working knowledge of the C programming language is required. No prior experience with Linux systems programming is assumed.
    Note: Description based on online resource; title from title page (Safari, viewed December 11, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 15
    ISBN: 9781788990240 , 1788990242
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Linux ; Command languages (Computer science) ; Virtual computer systems ; Information technology ; Management ; Electronic books ; Electronic books ; local
    Abstract: Create and maintain powerful Bash scripts for automation and administration. Key Features Get up and running with Linux shell scripting using real-world examples Leverage command-line techniques and methodologies to automate common yet complex administration tasks A practical guide with exposure to scripting constructs and common scripting patterns Book Description Shell scripts allow us to program commands in chains and have the system execute them as a scripted event, just like batch files. This book will start with an overview of Linux and Bash shell scripting, and then quickly deep dive into helping you set up your local environment, before introducing you to tools that are used to write shell scripts. The next set of chapters will focus on helping you understand Linux under the hood and what Bash provides the user. Soon, you will have embarked on your journey along the command line. You will now begin writing actual scripts instead of commands, and will be introduced to practical applications for scripts. The final set of chapters will deep dive into the more advanced topics in shell scripting. These advanced topics will take you from simple scripts to reusable, valuable programs that exist in the real world. The final chapter will leave you with some handy tips and tricks and, as regards the most frequently used commands, a cheat sheet containing the most interesting flags and options will also be provided. After completing this book, you should feel confident about starting your own shell scripting projects, no matter how simple or complex the task previously seemed. We aim to teach you how to script and what to consider, to complement the clear-cut patterns that you can use in your daily scripting challenges. What you will learn Understand Linux and Bash basics as well as shell scripting fundamentals Learn to write simple shell scripts that interact with Linux operating system Build, maintain, and deploy scripts in a Linux environment Learn best practices for writing shell scripts Avoid common pitfalls associated with Bash scripting Gain experience and the right toolset to write your own complex shell scripts Who this book is for This book targets new and existing Linux system administrators, Windows system administrators or developers who are interested in automating administrative tasks. No prior shell scripting experience is needed but in case you do this book will make a pro quickly. Readers should have a basic understanding of the...
    Note: Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed January 25, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 16
    ISBN: 9781788990158 , 1788990153
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Second edition.
    Keywords: Linux ; UNIX Shells ; Python (Computer program language) ; Electronic books ; Electronic books ; local
    Abstract: Master the complexities of Bash shell scripting and unlock the power of shell for your enterprise About This Book Identify high-level steps such as verifying user input Using the command line and conditional statements in creating/executing simple shell scripts Create and edit dynamic shell scripts to manage complex and repetitive tasks Leverage the command-line to bypass GUI and automate common tasks Who This Book Is For If you are a Linux administrator or a system administrator and are interested in automating tasks in your daily lives, saving time and effort, this book is for you. Basic shell scripting and command-line experience will be required. Familiarity with the tasks you need to automate will be helpful. What You Will Learn Make, execute, and debug your first Bash script Create interactive scripts that prompt for user input Foster menu structures for operators with little command-line experience Develop scripts that dynamically edit web configuration files to produce a new virtual host Write scripts that use AWK to search and reports on log files Draft effective scripts using functions as building blocks, reducing maintenance and build time Make informed choices by comparing different script languages such as Python with BASH In Detail In this book, you'll discover everything you need to know to master shell scripting and make informed choices about the elements you employ. Grab your favorite editor and start writing your best Bash scripts step by step. Get to grips with the fundamentals of creating and running a script in normal mode, and in debug mode. Learn about various conditional statements' code snippets, and realize the power of repetition and loops in your shell script. You will also learn to write complex shell scripts. This book will also deep dive into file system administration, directories, and system administration like networking, process management, user authentications, and package installation and regular expressions. Towards the end of the book, you will learn how to use Python as a BASH Scripting alternative. By the end of this book, you will know shell scripts at the snap of your fingers and will be able to automate and communicate with your system with keyboard expressions. Style and approach The book will capture your attention and keep you engaged with the simplicity and clarity of each explanation. Every step is accompanied by screenshots so you can cross-check the results before moving on. Downloading the e...
    Note: Includes bibliographical references. - Description based on online resource; title from title page (Safari, viewed May 21, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 17
    Online Resource
    Online Resource
    Birmingham, UK : Packt Publishing
    ISBN: 9781789803525 , 1789803527
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Linux ; UNIX (Computer file) ; Graphical user interfaces (Computer systems) ; Computer programming ; Electronic books ; Electronic books ; local
    Abstract: Master shell basics and Unix tools and discover easy commands to perform complex tasks with speed Key Features Learn why the Bash shell is widely used on Linux and iOS Explore advanced shell concepts, such as pipes and redirection Understand how to use Unix command-line tools as building blocks for different tasks Book Description The most basic interface to a computer - the command line - remains the most flexible and powerful way of processing data and performing and automating various day-to-day tasks. Command Line Fundamentals begins by exploring the basics, and then focuses on the most common tool, the Bash shell (which is standard on all Linux and iOS systems). As you make your way through the book, you'll explore the traditional Unix command-line programs as implemented by the GNU project. You'll also learn to use redirection and pipelines to assemble these programs to solve complex problems. By the end of this book, you'll have explored the basics of shell scripting, allowing you to easily and quickly automate tasks. What you will learn Use the Bash shell to run commands Utilize basic Unix utilities such as cat, tr, sort, and uniq Explore shell wildcards to manage groups of files Apply useful keyboard shortcuts in shell Employ redirection and pipes to process data Write both basic and advanced shell scripts to automate tasks Who this book is for Command Line Fundamentals is for programmers who use GUIs but want to understand how to use the command line to complete tasks faster.
    Note: Includes bibliographical references. - Description based on online resource; title from copyright (Safari, viewed February 18, 2019)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 18
    Online Resource
    Online Resource
    Birmingham, UK : Packt Publishing
    ISBN: 9781789534085 , 1789534089
    Language: English
    Pages: 1 online resource (1 volume)
    Keywords: Linux ; Scripting languages (Computer science) ; Application software ; Development ; Electronic books ; Electronic books ; local
    Abstract: Learn how to write shell script effectively with Bash, to quickly and easily write powerful scripts to manage processes, automate tasks, and to redirect and filter program input and output in useful and novel ways. Key Features Demystify the Bash command line Write shell scripts safely and effectively Speed up and automate your daily work Book Description Bash and shell script programming is central to using Linux, but it has many peculiar properties that are hard to understand and unfamiliar to many programmers, with a lot of misleading and even risky information online. Bash Quick Start Guide tackles these problems head on, and shows you the best practices of shell script programming. This book teaches effective shell script programming with Bash, and is ideal for people who may have used its command line but never really learned it in depth. This book will show you how even simple programming constructs in the shell can speed up and automate any kind of daily command-line work. For people who need to use the command line regularly in their daily work, this book provides practical advice for using the command-line shell beyond merely typing or copy-pasting commands into the shell. Readers will learn techniques suitable for automating processes and controlling processes, on both servers and workstations, whether for single command lines or long and complex scripts. The book even includes information on configuring your own shell environment to suit your workflow, and provides a running start for interpreting Bash scripts written by others. What you will learn Understand where the Bash shell fits in the system administration and programming worlds Use the interactive Bash command line effectively Get to grips with the structure of a Bash command line Master pattern-matching and transforming text with Bash Filter and redirect program input and output Write shell scripts safely and effectively Who this book is for People who use the command line on Unix and Linux servers already, but don't write primarily in Bash. This book is ideal for people who've been using a scripting language such as Python, JavaScript or PHP, and would like to understand and use Bash more effectively.
    Note: Description based on online resource; title from title page (viewed November 5, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 19
    ISBN: 9781789130775 , 1789130778
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Second edition.
    Keywords: Linux ; Penetration testing (Computer security) ; Web applications ; Testing ; Electronic books ; Electronic books ; local
    Abstract: Become the ethical hacker you need to be to protect your network Key Features Set up, configure, and run a newly installed Kali-Linux 2018.x Footprint, monitor, and audit your network and investigate any ongoing infestations Customize Kali Linux with this professional guide so it becomes your pen testing toolkit Book Description Microsoft Windows is one of the two most common OSes, and managing its security has spawned the discipline of IT security. Kali Linux is the premier platform for testing and maintaining Windows security. Kali is built on the Debian distribution of Linux and shares the legendary stability of that OS. This lets you focus on using the network penetration, password cracking, and forensics tools, and not the OS. This book has the most advanced tools and techniques to reproduce the methods used by sophisticated hackers to make you an expert in Kali Linux penetration testing. You will start by learning about the various desktop environments that now come with Kali. The book covers network sniffers and analysis tools to uncover the Windows protocols in use on the network. You will see several tools designed to improve your average in password acquisition, from hash cracking, online attacks, offline attacks, and rainbow tables to social engineering. It also demonstrates several use cases for Kali Linux tools like Social Engineering Toolkit, and Metasploit, to exploit Windows vulnerabilities. Finally, you will learn how to gain full system-level access to your compromised system and then maintain that access. By the end of this book, you will be able to quickly pen test your system and network using easy-to-follow instructions and support images. What you will learn Learn advanced set up techniques for Kali and the Linux operating system Understand footprinting and reconnaissance of networks Discover new advances and improvements to the Kali operating system Map and enumerate your Windows network Exploit several common Windows network vulnerabilities Attack and defeat password schemes on Windows Debug and reverse engineer Windows programs Recover lost files, investigate successful hacks, and discover hidden data Who this book is for If you are a working ethical hacker who is looking to expand the offensive skillset with a thorough understanding of Kali Linux, then this is the book for you. Prior knowledge about Linux operating systems, BASH terminal, and Windows command line would be highly beneficial.
    Note: Description based on online resource; title from title page (Safari, viewed December 3, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 20
    ISBN: 9781788839174 , 178883917X
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Linux ; Application software ; Development ; Electronic books ; Electronic books ; local
    Abstract: Create simple to advanced shell scripts and enhance your system functionality with effective recipes Key Features Automate tedious and repetitive tasks Create several novel applications ranging from a simple IRC logger to a Web Scraper Manage your system efficiently by becoming a seasoned Bash user Book Description In Linux, one of the most commonly used and most powerful tools is the Bash shell. With its collection of engaging recipes, Bash Cookbook takes you through a series of exercises designed to teach you how to effectively use the Bash shell in order to create and execute your own scripts. The book starts by introducing you to the basics of using the Bash shell, also teaching you the fundamentals of generating any input from a command. With the help of a number of exercises, you will get to grips with the automation of daily tasks for sysadmins and power users. Once you have a hands-on understanding of the subject, you will move on to exploring more advanced projects that can solve real-world problems comprehensively on a Linux system. In addition to this, you will discover projects such as creating an application with a menu, beginning scripts on startup, parsing and displaying human-readable information, and executing remote commands with authentication using self-generated Secure Shell (SSH) keys. By the end of this book, you will have gained significant experience of solving real-world problems, from automating routine tasks to managing your systems and creating your own scripts. What you will learn Understand the basics of Bash shell scripting on a Linux system Gain working knowledge of how redirections and pipes interact Retrieve and parse input or output of any command Automate tasks such as data collection and creating and applying a patch Create a script that acts like a program with different features Customize your Bash shell and discover neat tricks to extend your programs Compile and install shell and log commands on your system's console using Syslog Who this book is for The Bash Cookbook is for you if you are a power user or system administrator involved in writing Bash scripts in order to automate tasks. This book is also ideal if you are interested in learning how to automate complex daily tasks.
    Note: Description based on online resource; title from title page (Safari, viewed August 27, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 21
    ISBN: 9781788625067 , 1788625064
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Linux ; Computer security ; Electronic books ; Electronic books ; local
    Abstract: A comprehensive guide to mastering the art of preventing your Linux system from getting compromised. About This Book Leverage this guide to confidently deliver a system that reduces the risk of being hacked Perform a number of advanced Linux security techniques such as network service detection, user authentication, controlling special permissions, encrypting file systems, and much more Master the art of securing a Linux environment with this end-to-end practical guide Who This Book Is For If you are a systems administrator or a network engineer interested in making your Linux environment more secure, then this book is for you. Security consultants wanting to enhance their Linux security skills will also benefit from this book. Prior knowledge of Linux is mandatory. What You Will Learn Use various techniques to prevent intruders from accessing sensitive data Prevent intruders from planting malware, and detect whether malware has been planted Prevent insiders from accessing data that they aren't authorized to access Do quick checks to see whether a computer is running network services that it doesn't need to run Learn security techniques that are common to all Linux distros, and some that are distro-specific In Detail This book has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. You will learn various security techniques such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, protecting user accounts, authentication processes, and so on. Moving forward, you will also develop hands-on skills with advanced Linux permissions, access control, special modes, and more. Lastly, this book will also cover best practices and troubleshooting techniques to get your work done efficiently. By the end of this book, you will be confident in delivering a system that will be much harder to compromise. Style and approach An advanced-level guide filled with real-world examples that will help you secure your Linux system
    Note: Description based on online resource; title from title page (viewed February 6, 2018)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 22
    ISBN: 9781787122277 , 1787122271
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Linux ; Computer programming ; Computer networks ; Electronic books ; Electronic books ; local
    Abstract: Say goodbye to unproductive Linux habits and switch to the express lane About This Book Improve your terminal and command-line productivity by using powerful tools Sharpen your existing command-line skills and achieve complex tasks faster Save time and money by creating customized commands that automate day-to-day tasks Who This Book Is For This book is for system administrators and developers who know the basics of Linux and want to brush up and sharpen their skills. Prior experience with Linux shell is required. What You Will Learn Optimize the power of Guake by integrating it with ClipIt Deep dive into the workings of the console editor - Vim Explore the advanced concepts and best practices of shell scripting Edit large amounts of data quickly using Sed Use pipes and subshells to create customized commands Get to know how you can speed up the software development and make the terminal a handy companion In Detail Websites, online services, databases, and pretty much every other computer that offers public services runs on Linux. From small servers to clusters, Linux is anywhere and everywhere. With such a broad usage, the demand for Linux specialists is ever growing. For the engineers out there, this means being able to develop, interconnect, and maintain Linux environments. This book will help you increase your terminal productivity by using Terminator, Guake and other tools. It will start by installing Ubuntu and will explore tools and techniques that will help you to achieve more work with less effort. Next, it will then focus on Terminator, the ultimate terminal, and vim, one of the most intelligent console editors. Futhermore, the readers will see how they can increase their command line productivity by using sed, find, tmux, network, autoenv. The readers will also see how they can edit files without leaving the terminal and use the screen space efficiently and copy-paste like a pro. Towards the end, we focus on network settings, Git hacks, and creating portable environments for development and production using Docker. Through this book, you will improve your terminal productivity by seeing how to use different tools. Style and Approach This book takes a step-by-step approach using examples that show you how to automate tasks using terminal commands. You'll work through easy-to-follow instructions so you learn to use the various Linux commands and tools such as Terminator, Guake, and others.
    Note: Description based on online resource; title from title page (Safari, viewed June 21, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 23
    ISBN: 9781787288850 , 1787288854
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Second edition.
    Keywords: Linux ; Electronic books ; Electronic books ; local
    Abstract: Master the techniques needed to build great, efficient embedded devices on Linux About This Book Discover how to build and configure reliable embedded Linux devices This book has been updated to include Linux 4.9 and Yocto Project 2.2 (Morty) This comprehensive guide covers the remote update of devices in the field and power management Who This Book Is For If you are an engineer who wishes to understand and use Linux in embedded devices, this book is for you. It is also for Linux developers and system programmers who are familiar with embedded systems and want to learn and program the best in class devices. It is appropriate for students studying embedded techniques, for developers implementing embedded Linux devices, and engineers supporting existing Linux devices. What You Will Learn Evaluate the Board Support Packages offered by most manufacturers of a system on chip or embedded module Use Buildroot and the Yocto Project to create embedded Linux systems quickly and efficiently Update IoT devices in the field without compromising security Reduce the power budget of devices to make batteries last longer Interact with the hardware without having to write kernel device drivers Debug devices remotely using GDB, and see how to measure the performance of the systems using powerful tools such as perk, ftrace, and valgrind Find out how to configure Linux as a real-time operating system In Detail Embedded Linux runs many of the devices we use every day, from smart TVs to WiFi routers, test equipment to industrial controllers - all of them have Linux at their heart. Linux is a core technology in the implementation of the inter-connected world of the Internet of Things. The comprehensive guide shows you the technologies and techniques required to build Linux into embedded systems. You will begin by learning about the fundamental elements that underpin all embedded Linux projects: the toolchain, the bootloader, the kernel, and the root filesystem. You'll see how to create each of these elements from scratch, and how to automate the process using Buildroot and the Yocto Project. Moving on, you'll find out how to implement an effective storage strategy for flash memory chips, and how to install updates to the device remotely once it is deployed. You'll also get to know the key aspects of writing code for embedded Linux, such as how to access hardware from applications, the implications of writing multi-threaded code, and techniques to manage memory in an ...
    Note: Previous edition published: 2015. - Description based on online resource; title from title page (Safari, viewed July 24, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 24
    ISBN: 9781787125414 , 1787125416
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Linux ; Scripting languages (Computer science) ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: A quick and straightforward approach to writing shell scripts to accomplish different types of tasks on a Linux system. About This Book Understand expressions and variables and how to use them practically Familiarize yourself with the various text filtering tools available in Linux A fast-paced and concise guide that gets you well versed with linux shell scripting. Who This Book Is For This book is for both GNU/Linux users who want to do amazing things with the shell and for advanced users looking for ways to make their lives with the shell more productive. What You Will Learn Get acquainted with the basics of a shell script to serve as a refresher for more advanced topics Learn different ways to create and run a script Discuss the passing and verification of parameters, along with the verification of other items. Understand the different forms of conditions and loops, and go over the sleep command in detail Learn about different ways to handle the reporting of return codes Create an interactive script by reading the keyboard and use subroutines and interrupts Create scripts to perform backups and go over the use of encryption tools and checksums Use wget and curl in scripts to get data directly from the Internet In Detail Linux Shell Scripting Bootcamp is all about learning the essentials of script creation, validating parameters, and checking for the existence of files and other items needed by the script. We will use scripts to explore iterative operations using loops and learn different types of loop statements, with their differences. Along with this, we will also create a numbered backup script for backup files. Further, you will get well-versed with how variables work on a Linux system and how they relate to scripts. You'll also learn how to create and call subroutines in a script and create interactive scripts. The most important archive commands, zip and tar, are also discussed for performing backups. Later, you will dive deeper by understanding the use of wget and curl scripts and the use of checksum and file encryption in further chapters. Finally, you will learn how to debug scripts and scripting best practices that will enable you to write a great code every time! By the end of the book, you will be able to write shell scripts that can dig data from the web and process it efficiently. Style and approach This book is all about fast and intensive learning. This means we don't waste time in helping readers get started. The new conten...
    Note: Includes index. - Description based on online resource; title from cover (Safari, viewed August 4, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 25
    ISBN: 9781787123151 , 1787123154
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: UNIX (Computer file) ; Linux ; Go (Computer program language) ; Computer programming ; Electronic books ; Electronic books ; local
    Abstract: Learning the new system's programming language for all Unix-type systems About This Book Learn how to write system's level code in Golang, similar to Unix/Linux systems code Ramp up in Go quickly Deep dive into Goroutines and Go concurrency to be able to take advantage of Go server-level constructs Who This Book Is For Intermediate Linux and general Unix programmers. Network programmers from beginners to advanced practitioners. C and C++ programmers interested in different approaches to concurrency and Linux systems programming. What You Will Learn Explore the Go language from the standpoint of a developer conversant with Unix, Linux, and so on Understand Goroutines, the lightweight threads used for systems and concurrent applications Learn how to translate Unix and Linux systems code in C to Golang code How to write fast and lightweight server code Dive into concurrency with Go Write low-level networking code In Detail Go is the new systems programming language for Linux and Unix systems. It is also the language in which some of the most prominent cloud-level systems have been written, such as Docker. Where C programmers used to rule, Go programmers are in demand to write highly optimized systems programming code. Created by some of the original designers of C and Unix, Go expands the systems programmers toolkit and adds a mature, clear programming language. Traditional system applications become easier to write since pointers are not relevant and garbage collection has taken away the most problematic area for low-level systems code: memory management. This book opens up the world of high-performance Unix system applications to the beginning Go programmer. It does not get stuck on single systems or even system types, but tries to expand the original teachings from Unix system level programming to all types of servers, the cloud, and the web. Style and approach This is the first book to introduce Linux and Unix systems programming in Go, a field for which Go has actually been developed in the first place. Downloading the example code for this book. You can download the example code files for all Packt books you have purchased from your account at http://www.PacktPub.com. If you purchased this book elsewhere, you can visit http://www.PacktPub.com/support and register to have the code file.
    Note: Description based on online resource; title from title page (Safari, viewed October 24, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 26
    ISBN: 9781788297424 , 1788297423
    Language: English
    Pages: 1 online resource (1 volume)
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: Get hands-on recipes to make the most of Ubuntu Server, CentOS 7 Linux Server and RHEL 7 Server About This Book Get Linux servers up and running in seconds, In-depth guide to explore new features and solutions in server administration Maintain performance and security of your server solution by deploying expert configuration advice Who This Book Is For This Learning Path is intended for system administrators with a basic understanding of Linux operating systems and written with the novice-to-intermediate Linux user in mind. To get the most of this Learning Path, you should have a working knowledge of basic system administration and management tools. What You Will Learn Set up high performance, scalable, and fault-tolerant back ends with web and database servers Facilitate team communication with a real-time chat service and collaboration tools Monitor, manage and develop your server's file system to maintain a stable performance Gain best practice methods on sharing files and resources through a network Install and configure common standard services such as web, mail, FTP, database and domain name server technologies Create kickstart scripts to automatically deploy RHEL 7 systems Use Orchestration and configuration management tools to manage your environment In Detail Linux servers are frequently selected over other server operating systems for their stability, security and flexibility advantages.This Learning Path will teach you how to get up and running with three of the most popular Linux server distros: Ubuntu Server, CentOS 7 Server, and RHEL 7 Server. We will begin with the Ubuntu Server and show you how to make the most of Ubuntu's advanced functionalities. Moving on, we will provide you with all the knowledge that will give you access to the inner workings of the latest CentOS version 7. Finally, touching RHEL 7, we will provide you with solutions to common RHEL 7 Server challenges.This Learning Path combines some of the best that Packt has to offer in one complete, curated package. It includes content from the following Packt products: 1) Ubuntu Server Cookbook 2) CentOS 7 Linux Server Cookbook, Second Edition 3) Red Hat Enterprise Linux Server Cookbook Style and approach This easy-to-follow practical guide contains hands on examples and solutions to real word administration problems and problems faced when building your RHEL 7 system from scratch using orchestration tools. Downloading the example code for this book. You can download ...
    Note: "Uday R. Sawant, Oliver Pelz, Jonathan Hobson, William Leemans"--Cover. - Includes bibliographical references and index. - Description based on online resource; title from title page (viewed May 16, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 27
    Online Resource
    Online Resource
    Birmingham, UK : Packt Publishing
    ISBN: 9781783985685 , 1783985682
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Linux ; Abstract data types (Computer science) ; Application software ; Development ; Open source software ; Electronic books ; Electronic books ; local
    Abstract: Get acquainted with the world of LXC About This Book Get the most practical and up-to-date resource on LXC and take full advantage of what Linux containers can offer in the day-to-day operations of large-scale applications Learn how to deploy and administer various workloads such as web applications inside LXC Save your organization time and money by building robust and secure containers and by speeding the deployment process of your software Who This Book Is For This book is for Linux engineers and software developers who are looking to deploy applications in a fast, secure, and scalable way for use in testing and production. What You Will Learn Deep dive into the foundations of Linux containers with kernel namespaces and cgroups Install, configure, and administer Linux containers with LXC and libvirt Begin writing applications using Python libvirt bindings Take an in-depth look at container networking Set up monitoring and security with LXC Build and deploy a highly available application with LXC in the cloud In Detail In recent years, containers have gained wide adoption by businesses running a variety of application loads. This became possible largely due to the advent of kernel namespaces and better resource management with control groups (cgroups). Linux containers (LXC) are a direct implementation of those kernel features that provide operating system level virtualization without the overhead of a hypervisor layer. This book starts by introducing the foundational concepts behind the implementation of LXC, then moves into the practical aspects of installing and configuring LXC containers. Moving on, you will explore container networking, security, and backups. You will also learn how to deploy LXC with technologies like Open Stack and Vagrant. By the end of the book, you will have a solid grasp of how LXC is implemented and how to run production applications in a highly available and scalable way. Style and approach A practical guide that introduces the core technologies behind Linux containers and provides a deep dive into installation, configuration, and operations of LXC.
    Note: Description based on online resource; title from cover (viewed April 18, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 28
    Online Resource
    Online Resource
    Birmingham, UK : Packt Publishing
    ISBN: 9781782174752 , 1782174753
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Linux ; Embedded computer systems ; Programming ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: Learn to develop customized device drivers for your embedded Linux system About This Book Learn to develop customized Linux device drivers Learn the core concepts of device drivers such as memory management, kernel caching, advanced IRQ management, and so on. Practical experience on the embedded side of Linux Who This Book Is For This book will help anyone who wants to get started with developing their own Linux device drivers for embedded systems. Embedded Linux users will benefit highly from this book. This book covers all about device driver development, from char drivers to network device drivers to memory management. What You Will Learn Use kernel facilities to develop powerful drivers Develop drivers for widely used I2C and SPI devices and use the regmap API Write and support devicetree from within your drivers Program advanced drivers for network and frame buffer devices Delve into the Linux irqdomain API and write interrupt controller drivers Enhance your skills with regulator and PWM frameworks Develop measurement system drivers with IIO framework Get the best from memory management and the DMA subsystem Access and manage GPIO subsystems and develop GPIO controller drivers In Detail Linux kernel is a complex, portable, modular and widely used piece of software, running on around 80% of servers and embedded systems in more than half of devices throughout the World. Device drivers play a critical role in how well a Linux system performs. As Linux has turned out to be one of the most popular operating systems used, the interest in developing proprietary device drivers is also increasing steadily. This book will initially help you understand the basics of drivers as well as prepare for the long journey through the Linux Kernel. This book then covers drivers development based on various Linux subsystems such as memory management, PWM, RTC, IIO, IRQ management, and so on. The book also offers a practical approach on direct memory access and network device drivers. By the end of this book, you will be comfortable with the concept of device driver development and will be in a position to write any device driver from scratch using the latest kernel version (v4.13 at the time of writing this book). Style and approach A set of engaging examples to develop Linux device drivers Downloading the example code for this book. You can download the example code files for all Packt books you have purchased from your account at http://www.PacktPub.com . If...
    Note: Description based on online resource; title from title page (Safari, viewed December 11, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 29
    ISBN: 9781787284135 , 1787284131
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Second edition.
    Keywords: Linux ; Application software ; Development ; Virtual computer systems ; Open source software ; Electronic books ; Electronic books ; local
    Abstract: Learn how to schedule and run application containers using Kubernetes. About This Book Get well-versed with the fundamentals of Kubernetes and get it production-ready for deployments Confidently manage your container clusters and networks using Kubernetes This practical guide will show you container application examples throughout to illustrate the concepts and features of Kubernetes Who This Book Is For This book is for developers, sys admins, and DevOps engineers who want to automate the deployment process and scale their applications. You do not need any knowledge about Kubernetes. What You Will Learn Download, install, and configure the Kubernetes codebase Understand the core concepts of a Kubernetes cluster Be able to set up and access monitoring and logging for Kubernetes clusters Set up external access to applications running in the cluster Understand how CoreOS and Kubernetes can help you achieve greater performance and container implementation agility Run multiple clusters and manage from a single control plane Explore container security as well as securing Kubernetes clusters Work with third-party extensions and tools In Detail Kubernetes has continued to grow and achieve broad adoption across various industries, helping you to orchestrate and automate container deployments on a massive scale. This book will give you a complete understanding of Kubernetes and how to get a cluster up and running. You will develop an understanding of the installation and configuration process. The book will then focus on the core Kubernetes constructs such as pods, services, replica sets, replication controllers, and labels. You will also understand how cluster level networking is done in Kubernetes. The book will also show you how to manage deployments and perform updates with minimal downtime. Additionally, you will learn about operational aspects of Kubernetes such as monitoring and logging. Advanced concepts such as container security and cluster federation will also be covered. Finally, you will learn about the wider Kubernetes ecosystem with OCP, CoreOS, and Tectonic and explore the third-party extensions and tools that can be used with Kubernetes. By the end of the book, you will have a complete understanding of the Kubernetes platform and will start deploying applications on it. Style and approach This straightforward guide will help you understand how to move your container applications into production through best practices and a step-by-step...
    Note: Previous edition published: 2015. - Description based on online resource; title from title page (Safari, viewed June 30, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 30
    ISBN: 9781786462015 , 178646201X
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Second edition.
    Keywords: Linux ; Application software ; Development ; Computer software ; Development ; Open source software ; Electronic books ; Electronic books ; local
    Abstract: Docker lets you create, deploy, and manage your applications anywhere at anytime ? flexibility is key so you can deploy stable, secure, and scalable app containers across a wide variety of platforms and delve into microservices architecture About This Book This up-to-date edition shows how to leverage Docker's features to deploy your existing applications Learn how to package your applications with Docker and build, ship, and scale your containers Explore real-world examples of securing and managing Docker containers Who This Book Is For This book is ideal for developers, operations managers, and IT professionals who would like to learn about Docker and use it to build and deploy container-based apps. No prior knowledge of Docker is expected. What You Will Learn Develop containerized applications using the Docker version 17.03 Build Docker images from containers and launch them Develop Docker images and containers leveraging Dockerfiles Use Docker volumes to share data Get to know how data is shared between containers Understand Docker Jenkins integration Gain the power of container orchestration Familiarize yourself with the frequently used commands such as docker exec, docker ps, docker top, and docker stats In Detail Docker is an open source containerization engine that offers a simple and faster way for developing and running software. Docker containers wrap software in a complete filesystem that contains everything it needs to run, enabling any application to be run anywhere ? this flexibily and portabily means that you can run apps in the cloud, on virtual machines, or on dedicated servers. This book will give you a tour of the new features of Docker and help you get started with Docker by building and deploying a simple application. It will walk you through the commands required to manage Docker images and containers. You'll be shown how to download new images, run containers, list the containers running on the Docker host, and kill them. You'll learn how to leverage Docker's volumes feature to share data between the Docker host and its containers ? this data management feature is also useful for persistent data. This book also covers how to orchestrate containers using Docker compose, debug containers, and secure containers using the AppArmor and SELinux security modules. Style and approach This step-by-step guide will walk you through the features and use of Docker, from Docker software installation to the impenetrable security of con...
    Note: Previous edition published: 2015. - Description based on online resource; title from title page (Safari, viewed June 23, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 31
    ISBN: 9781785285363 , 178528536X
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Linux ; Application software ; Development ; Computer software ; Development ; Open source software ; Electronic books ; Electronic books ; local
    Abstract: Strategically design, troubleshoot, and automate Docker containers from development to deployment About This Book Utilize current and emergent technologies for effective Docker orchestration and management A step-by-step guide to diagnosing and fixing problems with Docker containers. Who This Book Is For This book is intended for seasoned solutions architects, developers, and programmers, system engineers, and administrators to help you troubleshoot common areas of Docker containerization. If you are looking to build production-ready Docker containers for automated deployment, you will be able to master and troubleshoot both the basic functions and the advanced features of Docker. Advanced familiarity with the Linux command line syntax, unit testing, the Docker Registry, Github, and leading container hosting platforms and Cloud Service Providers (CSP) are the prerequisites. What You Will Learn Install Docker ecosystem tools and services, Microservices and N-tier applications Create re-usable, portable containers with help of automation tools Network and inter-link containers Attach volumes securely to containers Consume and troubleshoot Docker APIs Troubleshooting issue of Docker deployment in Public cloud Ease the process of container management with Kubernetes In Detail This book will traverse some common best practices to for complex application scenarios where troubleshooting can be successfully employed to provide the repeatable processes and advantages that containers can deliver. This book will be a practical guide showing how to fix real-life issues related to installation, memory, Dockerfile syntax, connection, authorization, networking and so on in Docker. This book will also teach how to solve errors that occur during advanced setup and administration and deployment in a step-by-step fashion. By sequentially working through the real-world production scenarios in each chapter throughout the book, you will gain insight into and mastery of common areas not only for effective troubleshooting, but ways and means to avoid troubleshooting in the first place. This book will also cover tips and tricks that make the workflow easier. Style and approach An easy-to-follow guide full of interactive examples of real-world development and deployment scenarios. Ample screenshots, workflows, complementary tools, and related terminal commands are provided to address a wide range of practical and situational applications. Downloading the example code f...
    Note: Description based on online resource; title from cover (Safari, viewed April 19, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 32
    ISBN: 9781786463289 , 1786463288
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Linux ; Debian (Computer system) ; Computer programming ; Electronic books ; Electronic books ; local
    Abstract: An annotated guide to program and develop GNU/Linux Embedded systems quickly About This Book Rapidly design and build powerful prototypes for GNU/Linux Embedded systems Become familiar with the workings of GNU/Linux Embedded systems and how to manage its peripherals Write, monitor, and configure applications quickly and effectively, manage an external micro-controller, and use it as co-processor for real-time tasks Who This Book Is For This book targets Embedded System developers and GNU/Linux programmers who would like to program Embedded Systems and perform Embedded development. The book focuses on quick and efficient prototype building. Some experience with hardware and Embedded Systems is assumed, as is having done some previous work on GNU/Linux systems. Knowledge of scripting on GNU/Linux is expected as well. What You Will Learn Use embedded systems to implement your projects Access and manage peripherals for embedded systems Program embedded systems using languages such as C, Python, Bash, and PHP Use a complete distribution, such as Debian or Ubuntu, or an embedded one, such as OpenWrt or Yocto Harness device driver capabilities to optimize device communications Access data through several kinds of devices such as GPIO's, serial ports, PWM, ADC, Ethernet, WiFi, audio, video, I2C, SPI, One Wire, USB and CAN Practical example usage of several devices such as RFID readers, Smart card readers, barcode readers, z-Wave devices, GSM/GPRS modems Usage of several sensors such as light, pressure, moisture, temperature, infrared, power, motion In Detail Embedded computers have become very complex in the last few years and developers need to be able to easily manage embedded computer projects by focusing on problem solving; they should not have to waste time finding supported peripherals or learning how to manage them. This book shows you how to interact with external environments through specific peripherals used in the industry. It focuses on the latest Linux kernel release 4 and Debian/Ubuntu distributions (with embedded distributions such as OpenWRT and Yocto). This book presents popular and user-friendly boards in the industry - such as Beaglebone Black, Atmel Xplained, Wandboard, and system-on-chip manufacturers - and lets you explore corresponding projects that make use of these boards. You will first program the embedded platforms using the C, Bash, and Python/PHP languages in order to get access to the external peripherals. You will gain ...
    Note: Description based on online resource; title from cover (Safari, viewed April 19, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 33
    Online Resource
    Online Resource
    Birmingham, UK : Packt Publishing
    ISBN: 9781786469854 , 1786469855
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Linux ; Application software ; Development ; Virtual computer systems ; Open source software ; Electronic books ; Electronic books ; local
    Abstract: Master the art of container management utilizing the power of Kubernetes. About This Book This practical guide demystifies Kubernetes and ensures that your clusters are always available, scalable, and up to date Discover new features such as autoscaling, rolling updates, resource quotas, and cluster size Master the skills of designing and deploying large clusters on various cloud platforms Who This Book Is For The book is for system administrators and developers who have intermediate level of knowledge with Kubernetes and are now waiting to master its advanced features. You should also have basic networking knowledge. This advanced-level book provides a pathway to master Kubernetes. What You Will Learn Architect a robust Kubernetes cluster for long-time operation Discover the advantages of running Kubernetes on GCE, AWS, Azure, and bare metal See the identity model of Kubernetes and options for cluster federation Monitor and troubleshoot Kubernetes clusters and run a highly available Kubernetes Create and configure custom Kubernetes resources and use third-party resources in your automation workflows Discover the art of running complex stateful applications in your container environment Deliver applications as standard packages In Detail Kubernetes is an open source system to automate the deployment, scaling, and management of containerized applications. If you are running more than just a few containers or want automated management of your containers, you need Kubernetes. This book mainly focuses on the advanced management of Kubernetes clusters. It covers problems that arise when you start using container orchestration in production. We start by giving you an overview of the guiding principles in Kubernetes design and show you the best practises in the fields of security, high availability, and cluster federation. You will discover how to run complex stateful microservices on Kubernetes including advanced features as horizontal pod autoscaling, rolling updates, resource quotas, and persistent storage back ends. Using real-world use cases, we explain the options for network configuration and provides guidelines on how to set up, operate, and troubleshoot various Kubernetes networking plugins. Finally, we cover custom resource development and utilization in automation and maintenance workflows. By the end of this book, you'll know everything you need to know to go from intermediate to advanced level. Style and approach Delving into the design ...
    Note: Includes index. - Description based on online resource; title from cover (Safari, viewed June 15, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 34
    Online Resource
    Online Resource
    Birmingham, UK : Packt Publishing
    ISBN: 9781785886133 , 1785886134
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Linux ; Virtual computer systems ; Computer networks ; Management ; Electronic books ; Electronic books ; local
    Abstract: Explore Implementation of core kernel subsystems About This Book Master the design, components, and structures of core kernel subsystems Explore kernel programming interfaces and related algorithms under the hood Completely updated material for the 4.12.10 kernel Who This Book Is For If you are a kernel programmer with a knowledge of kernel APIs and are looking to build a comprehensive understanding, and eager to explore the implementation, of kernel subsystems, this book is for you. It sets out to unravel the underlying details of kernel APIs and data structures, piercing through the complex kernel layers and gives you the edge you need to take your skills to the next level. What You Will Learn Comprehend processes and fles - the core abstraction mechanisms of the Linux kernel that promote effective simplification and dynamism Decipher process scheduling and understand effective capacity utilization under general and real-time dispositions Simplify and learn more about process communication techniques through signals and IPC mechanisms Capture the rudiments of memory by grasping the key concepts and principles of physical and virtual memory management Take a sharp and precise look at all the key aspects of interrupt management and the clock subsystem Understand concurrent execution on SMP platforms through kernel synchronization and locking techniques In Detail Mastering Linux Kernel Development looks at the Linux kernel, its internal arrangement and design, and various core subsystems, helping you to gain significant understanding of this open source marvel. You will look at how the Linux kernel, which possesses a kind of collective intelligence thanks to its scores of contributors, remains so elegant owing to its great design. This book also looks at all the key kernel code, core data structures, functions, and macros, giving you a comprehensive foundation of the implementation details of the kernel's core services and mechanisms. You will also look at the Linux kernel as well-designed software, which gives us insights into software design in general that are easily scalable yet fundamentally strong and safe. By the end of this book, you will have considerable understanding of and appreciation for the Linux kernel. Style and approach Each chapter begins with the basic conceptual know-how for a subsystem and extends into the details of its implementation. We use appropriate code excerpts of critical routines and data structures for subsystems.
    Note: Description based on online resource; title from title page (Safari, viewed November 2, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 35
    ISBN: 9781785882388 , 1785882384
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Third edition.
    Keywords: Linux ; Scripting languages (Computer science) ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: Do amazing things with the shell About This Book Become an expert in creating powerful shell scripts and explore the full possibilities of the shell Automate any administrative task you could imagine, with shell scripts Packed with easy-to-follow recipes on new features on Linux, particularly, Debian-based, to help you accomplish even the most complex tasks with ease Who This Book Is For If you are a beginner or an intermediate Linux user who wants to master the skill of quickly writing scripts and automate tasks without reading the entire man pages, then this book is for you. You can start writing scripts and one-liners by simply looking at the relevant recipe and its descriptions without any working knowledge of shell scripting or Linux. Intermediate / advanced users, system administrators / developers, and programmers can use this book as a reference when they face problems while coding. What You Will Learn Interact with websites via scripts Write shell scripts to mine and process data from the Web Automate system backups and other repetitive tasks with crontab Create, compress, and encrypt archives of your critical data. Configure and monitor Ethernet and wireless networks Monitor and log network and system activity Tune your system for optimal performance Improve your system's security Identify resource hogs and network bottlenecks Extract audio from video files Create web photo albums Use git or fossil to manage revision control and interact with FOSS projects Create and maintain Linux containers and Virtual Machines Run a private Cloud server In Detail The shell is the most powerful tool your computer provides. Despite having it at their fingertips, many users are unaware of how much the shell can accomplish. Using the shell, you can generate databases and web pages from sets of files, automate monotonous admin tasks such as system backups, monitor your system's health and activity, identify network bottlenecks and system resource hogs, and more. This book will show you how to do all this and much more. This book, now in its third edition, describes the exciting new features in the newest Linux distributions to help you accomplish more than you imagine. It shows how to use simple commands to automate complex tasks, automate web interactions, download videos, set up containers and cloud servers, and even get free SSL certificates. Starting with the basics of the shell, you will learn simple commands and how to apply them to real-world is...
    Note: Description based on online resource; title from title page (viewed June 28, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 36
    ISBN: 9781787124455 , 1787124452
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Linux ; Embedded computer systems ; Programming ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: Leverage the power of Linux to develop captivating and powerful embedded Linux projects About This Book Explore the best practices for all embedded product development stages Learn about the compelling features offered by the Yocto Project, such as customization, virtualization, and many more Minimize project costs by using open source tools and programs Who This Book Is For If you are a developer who wants to build embedded systems using Linux, this book is for you. It is the ideal guide for you if you want to become proficient and broaden your knowledge. A basic understanding of C programming and experience with systems programming is needed. Experienced embedded Yocto developers will find new insight into working methodologies and ARM specific development competence. What You Will Learn Use the Yocto Project in the embedded Linux development process Get familiar with and customize the bootloader for a board Discover more about real-time layer, security, virtualization, CGL, and LSB See development workflows for the U-Boot and the Linux kernel, including debugging and optimization Understand the open source licensing requirements and how to comply with them when cohabiting with proprietary programs Optimize your production systems by reducing the size of both the Linux kernel and root filesystems Understand device trees and make changes to accommodate new hardware on your device Design and write multi-threaded applications using POSIX threads Measure real-time latencies and tune the Linux kernel to minimize them In Detail Embedded Linux is a complete Linux distribution employed to operate embedded devices such as smartphones, tablets, PDAs, set-top boxes, and many more. An example of an embedded Linux distribution is Android, developed by Google. This learning path starts with the module Learning Embedded Linux Using the Yocto Project. It introduces embedded Linux software and hardware architecture and presents information about the bootloader. You will go through Linux kernel features and source code and get an overview of the Yocto Project components available. The next module Embedded Linux Projects Using Yocto Project Cookbook takes you through the installation of a professional embedded Yocto setup, then advises you on best practices. Finally, it explains how to quickly get hands-on with the Freescale ARM ecosystem and community layer using the affordable and open source Wandboard embedded board. Moving ahead, the final module Mastering...
    Note: Authors: Alexandru Vaduva, Alex González, Chris Simmonds. Cf. Credits page. - Includes bibliographical references and index. - Description based on online resource; title from title page (Safari, viewed October 11, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 37
    ISBN: 9781785284342 , 1785284347
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Community experience distilled
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: Create high availability clusters to enhance system performance using CentOS 7 About This Book Master the concepts of high performance and high availability to eliminate performance bottlenecks Maximize the uptime of services running in a CentOS 7 cluster A step-by-step guide that will provide knowledge of methods and approaches to optimize the performance of CentOS clusters Who This Book Is For This book is targeted at system administrators: those who want a detailed, step-by-step guide to learn how to set up a high-availability CentOS 7 cluster, and those who are looking for a reference book to help them learn or refresh the necessary skills to ensure their systems and respective resources are utilized optimally. No previous knowledge of high-availability systems is needed, though the reader is expected to have at least some degree of familiarity with any spin-off of the Fedora family of Linux distributions, preferably CentOS. What You Will Learn Install a CentOS 7 cluster and network infrastructure Configure firewall, networking, and clustering services and settings Set up and test a HAC (high-availability cluster) to host an Apache web server and a MariaDB database server Monitor performance and availability Identify bottlenecks and troubleshoot issues Improve performance and ensure high availability In Detail CentOS is the enterprise level Linux OS, which is 100% binary compatible to Red Hat Enterprise Linux (RHEL). It acts as a free alternative to RedHat's commercial Linux offering, with only a change in the branding. A high performance cluster consists in a group of computers that work together as one set parallel, hence minimizing or eliminating the downtime of critical services and enhancing the performance of the application. Starting with the basic principles of clustering, you will learn the necessary steps to install a cluster with two CentOS 7 servers. We will then set up and configure the basic required network infrastructure and clustering services. Further, you will learn how to take a proactive approach to the split-brain issue by configuring the failover and fencing of the cluster as a whole and the quorum of each node individually. Further, we will be setting up HAC and HPC clusters as a web server and a database server. You will also master the art of monitoring performance and availability, identifying bottlenecks, and exploring troubleshooting techniques. At the end of the book, you'll review performance-tuning technique...
    Note: Includes index. - Description based on online resource; title from cover (Safari, viewed February 12, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 38
    ISBN: 9781784390853 , 1784390852
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Quick answers to common problems
    Keywords: Linux ; Penetration testing (Computer security) ; Electronic books ; Electronic books ; local
    Abstract: Over 80 recipes on how to identify, exploit, and test web application security with Kali Linux 2 About This Book Familiarize yourself with the most common web vulnerabilities a web application faces, and understand how attackers take advantage of them Set up a penetration testing lab to conduct a preliminary assessment of attack surfaces and run exploits Learn how to prevent vulnerabilities in web applications before an attacker can make the most of it Who This Book Is For This book is for IT professionals, web developers, security enthusiasts, and security professionals who want an accessible reference on how to find, exploit, and prevent security vulnerabilities in web applications. You should know the basics of operating a Linux environment and have some exposure to security technologies and tools. What You Will Learn Set up a penetration testing laboratory in a secure way Find out what information is useful to gather when performing penetration tests and where to look for it Use crawlers and spiders to investigate an entire website in minutes Discover security vulnerabilities in web applications in the web browser and using command-line tools Improve your testing efficiency with the use of automated vulnerability scanners Exploit vulnerabilities that require a complex setup, run custom-made exploits, and prepare for extraordinary scenarios Set up Man in the Middle attacks and use them to identify and exploit security flaws within the communication between users and the web server Create a malicious site that will find and exploit vulnerabilities in the user's web browser Repair the most common web vulnerabilities and understand how to prevent them becoming a threat to a site's security In Detail Web applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure. Kali Linux is a Linux-based penetration testing platform and operating system that provides a huge array of testing tools, many of which can be used specifically to execute web penetration testing. This book will teach you, in the form step-by-step recipes, how to detect a wide array of vulnerabilities, exploit them to analyze their consequences, and ultimately buffer attackable surfaces so applications are more secure, for you and your users. Starting from the setup of a testing laboratory, this book will give you the skills you need to cover every stage of a penetration test: from gather...
    Note: Includes index. - Description based on online resource; title from cover page (Safari, viewed March 24, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 39
    ISBN: 9781787127067 , 1787127060
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Second edition.
    Keywords: Linux ; Computer networks ; Security measures ; Electronic books ; Electronic books ; local
    Abstract: Ward off traditional security permissions and effectively secure your Linux systems with SELinux About This Book Leverage SELinux to improve the secure state of your Linux system A clear approach to adopting SELinux within your organization Essential skills and techniques to help further your system administration career Who This Book Is For This book is for Linux administrators who want to control the secure state of their systems. It's packed with the latest information on SELinux operations and administrative procedures so you'll be able to further harden your system through mandatory access control (MAC) ? a security strategy that has been shaping Linux security for years. What You Will Learn Analyze SELinux events and selectively enable or disable SELinux enforcement Manage Linux users and associate them with the right role and permission set Secure network communications through SELinux access controls Tune the full service flexibility by dynamically assigning resource labels Handle SELinux access patterns enforced through the system Query the SELinux policy in depth In Detail Do you have the crucial job of protecting your private and company systems from malicious attacks and undefined application behavior? Are you looking to secure your Linux systems with improved access controls? Look no further, intrepid administrator! This book will show you how to enhance your system's secure state across Linux distributions, helping you keep application vulnerabilities at bay. This book covers the core SELinux concepts and shows you how to leverage SELinux to improve the protection measures of a Linux system. You will learn the SELinux fundamentals and all of SELinux's configuration handles including conditional policies, constraints, policy types, and audit capabilities. These topics are paired with genuine examples of situations and issues you may come across as an administrator. In addition, you will learn how to further harden the virtualization offering of both libvirt (sVirt) and Docker through SELinux. By the end of the book you will know how SELinux works and how you can tune it to meet your needs. Style and approach This book offers a complete overview of SELinux administration and how it integrates with other components on a Linux system. It covers the majority of SELinux features with a mix of real life scenarios, descriptions, and examples. This book contains everything an administrator needs to customize SELinux.
    Note: Description based on online resource; title from cover (viewed January 18, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 40
    ISBN: 9781787128675 , 1787128679
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Linux ; Computer software ; Development ; Agile software development ; Electronic books ; Electronic books ; local
    Abstract: Learn to use some of the most exciting and powerful tools to deliver world-class quality software with continuous delivery and DevOps About This Book Get to know the background of DevOps so you understand the collaboration between different aspects of an IT organization and a software developer Deploy top-quality software and ensure software maintenance and release management with this practical guide This course covers some of the most exciting technology available to DevOps engineers, and demonstrates multiple techniques for using them Real-world and realistic examples are provided to help you as you go about the implementation and adoption of continuous delivery and DevOps Who This Book Is For This course is for developers who want to understand how the infrastructure that builds today's enterprises works, and how to painlessly and regularly ship quality software. What You Will Learn Set up and familiarize yourself with all the tools you need to be efficient with DevOps Design an application that is suitable for continuous deployment systems with DevOps in mind Test the code using automated regression testing with Jenkins Selenium Managing the lifecycle of hosts, from creation to ongoing management using Puppet Razor Find out how to manage, use, and work with Code in the Git version management system See what traps, pitfalls, and hurdles to look out for as you implement continuous delivery and DevOps In Detail Harness the power of DevOps to boost your skill set and make your IT organization perform better. If you're keen to employ DevOps techniques to better your software development, this course contains all you need to overcome the day-to-day complications of managing complex infrastructures the DevOps way. Start with your first module ? Practical DevOps - that encompasses the entire flow from code from testing to production. Get a solid ground-level knowledge of how to monitor code for any anomalies, perform code testing, and make sure the code is running smoothly through a series of real-world exercise, and develop practical skills by creating a sample enterprise Java application. In the second module, run through a series of tailored mini-tutorials designed to give you a complete understanding of every DevOps automation technique. Create real change in the way you deliver your projects by utilizing some of the most commendable software available today. Go from your first steps of managing code in Git to configuration management in Pupp...
    Note: Authors: Joakim Verona, Michael Duffy, Paul Swartout. Cf. Credits page. - Includes bibliographical references and index. - Description based on online resource; title from title page (Safari, viewed October 11, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 41
    ISBN: 9781787126237 , 1787126234
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Second edition.
    Keywords: Linux ; Raspberry Pi (Computer) ; Penetration testing (Computer security) ; Electronic books ; Electronic books ; local
    Abstract: Learn the art of building a low-cost, portable hacking arsenal using Raspberry Pi 3 and Kali Linux 2 About This Book Quickly turn your Raspberry Pi 3 into a low-cost hacking tool using Kali Linux 2 Protect your confidential data by deftly preventing various network security attacks Use Raspberry Pi 3 as honeypots to warn you that hackers are on your wire Who This Book Is For If you are a computer enthusiast who wants to learn advanced hacking techniques using the Raspberry Pi 3 as your pentesting toolbox, then this book is for you. Prior knowledge of networking and Linux would be an advantage. What You Will Learn Install and tune Kali Linux 2 on a Raspberry Pi 3 for hacking Learn how to store and offload pentest data from the Raspberry Pi 3 Plan and perform man-in-the-middle attacks and bypass advanced encryption techniques Compromise systems using various exploits and tools using Kali Linux 2 Bypass security defenses and remove data off a target network Develop a command and control system to manage remotely placed Raspberry Pis Turn a Raspberry Pi 3 into a honeypot to capture sensitive information In Detail This book will show you how to utilize the latest credit card sized Raspberry Pi 3 and create a portable, low-cost hacking tool using Kali Linux 2. You'll begin by installing and tuning Kali Linux 2 on Raspberry Pi 3 and then get started with penetration testing. You will be exposed to various network security scenarios such as wireless security, scanning network packets in order to detect any issues in the network, and capturing sensitive data. You will also learn how to plan and perform various attacks such as man-in-the-middle, password cracking, bypassing SSL encryption, compromising systems using various toolkits, and many more. Finally, you'll see how to bypass security defenses and avoid detection, turn your Pi 3 into a honeypot, and develop a command and control system to manage a remotely-placed Raspberry Pi 3. By the end of this book you will be able to turn Raspberry Pi 3 into a hacking arsenal to leverage the most popular open source toolkit, Kali Linux 2.0. Style and approach This concise and fast-paced guide will ensure you get hands-on with penetration testing right from the start. You will quickly install the powerful Kali Linux 2 on your Raspberry Pi 3 and then learn how to use and conduct fundamental penetration techniques and attacks.
    Note: Description based on online resource; title from title page (viewed January 4, 2017)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 42
    ISBN: 9781784396916 , 1784396915
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Series Statement: Community experience distilled
    Keywords: Linux ; Virtual computer systems ; Electronic books ; Electronic books ; local
    Abstract: Dive in to the cutting edge techniques of Linux KVM virtualization, and build the virtualization solutions your datacentre demands About This Book Become an expert in Linux virtualization Migrate your virtualized datacenter to the cloud Find out how to build a large scale virtualization solution that will transform your organization Who This Book Is For Linux administrators ? if you want to build incredible, yet manageable virtualization solutions with KVM this is the book to get you there. It will help you apply what you already know to some tricky virtualization tasks. What You Will Learn Explore the ecosystem of tools that support Linux virtualization Find out why KVM offers you a smarter way to unlock the potential of virtualization Implement KVM virtualization using oVirt Explore the KVM architecture ? so you can manage, scale and optimize it with ease Migrate your virtualized datacenter to the cloud for truly resource-efficient computing Find out how to integrate OpenStack with KVM to take full control of the cloud In Detail A robust datacenter is essential for any organization ? but you don't want to waste resources. With KVM you can virtualize your datacenter, transforming a Linux operating system into a powerful hypervisor that allows you to manage multiple OS with minimal fuss. This book doesn't just show you how to virtualize with KVM ? it shows you how to do it well. Written to make you an expert on KVM, you'll learn to manage the three essential pillars of scalability, performance and security ? as well as some useful integrations with cloud services such as OpenStack. From the fundamentals of setting up a standalone KVM virtualization platform, and the best tools to harness it effectively, including virt-manager, and kimchi-project, everything you do is built around making KVM work for you in the real-world, helping you to interact and customize it as you need it. With further guidance on performance optimization for Microsoft Windows and RHEL virtual machines, as well as proven strategies for backup and disaster recovery, you'll can be confident that your virtualized data center is working for your organization ? not hampering it. Finally, the book will empower you to unlock the full potential of cloud through KVM. Migrating your physical machines to the cloud can be challenging, but once you've mastered KVM, it's a little easie. Style and approach Combining advanced insights with practical solutions, Mastering KVM Virtualizatio...
    Note: Includes index. - Description based on online resource; title from cover (viewed September 1, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 43
    ISBN: 9781783288892 , 1783288892
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Linux ; Client/server computing ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: Deploy and manage today's essential services on an enterprise-class, open operating system About This Book Configure and manage Linux servers in varying scenarios and for a range of business requirements Explore the up-to-date features of CentOS using real-world scenarios See practical and extensive recipes to deploy and manage CentOS Who This Book Is For This book is for Linux professionals with basic Unix/Linux functionality experience, perhaps even having set up a server before, who want to advance their knowledge in administering various services. What You Will Learn See how to deploy CentOS easily and painlessly, even in multi-server environments Configure various methods of remote access to the server so you don't always have to be in the data center Make changes to the default configuration of many services to harden them and increase the security of the system Learn to manage DNS, emails and web servers Protect yourself from threats by monitoring and logging network intrusion and system intrusion attempts, rootkits, and viruses Take advantage of today's powerful hardware by running multiple systems using virtualization In Detail CentOS is derived from Red Hat Enterprise Linux (RHEL) sources and is widely used as a Linux server. This book will help you to better configure and manage Linux servers in varying scenarios and business requirements. Starting with installing CentOS, this book will walk you through the networking aspects of CentOS. You will then learn how to manage users and their permissions, software installs, disks, filesystems, and so on. You'll then see how to secure connection to remotely access a desktop and work with databases. Toward the end, you will find out how to manage DNS, e-mails, web servers, and more. You will also learn to detect threats by monitoring network intrusion. Finally, the book will cover virtualization techniques that will help you make the most of CentOS. Style and approach This easy-to-read cookbook is filled with practical recipes. Hands-on, task-based exercises will present you with real-world solutions to deploy and manage CentOS in varying business scenarios.
    Note: Description based on online resource; title from cover (Safari, viewed October 28, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 44
    ISBN: 9781785285301 , 1785285300
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Quick answers to common problems
    Keywords: Linux ; Operating systems (Computers) ; Security measures ; Computer security ; Electronic books ; Electronic books ; local
    Abstract: Secure your Linux machines and keep them secured with the help of exciting recipes About This Book This book provides code-intensive discussions with detailed recipes that help you understand better and learn faster. More than 50 hands-on recipes to create and administer a secure Linux system locally as well as on a network Enhance file system security and local and remote user authentication by using various security tools and different versions of Linux for different tasks Who This Book Is For Practical Linux Security Cookbook is intended for all those Linux users who already have knowledge of Linux File systems and administration. You should be familiar with basic Linux commands. Understanding Information security and its risks to a Linux system is also helpful in understanding the recipes more easily. However, even if you are unfamiliar with Information security, you will be able to easily follow and understand the recipes discussed. Since Linux Security Cookbook follows a practical approach, following the steps is very easy. What You Will Learn Learn about various vulnerabilities and exploits in relation to Linux systems Configure and build a secure kernel and test it Learn about file permissions and security and how to securely modify files Explore various ways to authenticate local users while monitoring their activities. Authenticate users remotely and securely copy files on remote systems Review various network security methods including firewalls using iptables and TCP Wrapper Explore various security tools including Port Sentry, Squid Proxy, Shorewall, and many more Understand Bash vulnerability/security and patch management In Detail With the growing popularity of Linux, more and more administrators have started moving to the system to create networks or servers for any task. This also makes Linux the first choice for any attacker now. Due to the lack of information about security-related attacks, administrators now face issues in dealing with these attackers as quickly as possible. Learning about the different types of Linux security will help create a more secure Linux system. Whether you are new to Linux administration or experienced, this book will provide you with the skills to make systems more secure. With lots of step-by-step recipes, the book starts by introducing you to various threats to Linux systems. You then get to walk through customizing the Linux kernel and securing local files. Next you will move on to manage user...
    Note: Includes index. - Description based on online resource; title from cover (Safari, viewed May 17, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 45
    ISBN: 9781785285103 , 1785285106
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Community experience distilled
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: Configure, manage, and secure a CentOS 7 Linux server to serve a variety of services provided in a sustainable computer's infrastructure. About This Book Learn how to efficiently set up and manage a Linux server using one of the best suited technologies for this purpose, CentOS 7 Personalize your Linux server and familiarize yourself with the latest tools and utilities setup provided by the new CentOS distribution Follow a step-by-step tutorial through the configuration of the requested services with the capacity to personalize them as per your needs Who This Book Is For If you are a Linux system administrator with an intermediate administration level, this is your opportunity to master the brand new distribution of CentOS. If you wish to possess a fully sustainable Linux server, with all its new tools and tweaks, that serves a variety of services to your users and customers, this book is ideal for you. It is your ticket to easily adapt to all the changes made in the latest shift. What You Will Learn Manage CentOS 7 users, groups, and root access privileges Enhance the server's security through its firewall and prevent the most common attacks from penetrating or disabling the server Explore and implement the common, useful services that a CentOS 7 server can provide Monitor your server infrastructure for system or hardware issues Create and configure a virtual machine using virtualization technologies Implement a cloud computing solution on a single node system Get an introduction to the configuration management tools and their usage Discover the importance of the tools that provide remote connection, server service security, and system and process monitoring tools In Detail Most server infrastructures are equipped with at least one Linux server that provides many essential services, both for a user's demands and for the infrastructure itself. Setting up a sustainable Linux server is one of the most demanding tasks for a system administrator to perform. However, learning multiple, new technologies to meet all of their needs is time-consuming. CentOS 7 is the brand new version of the CentOS Linux system under the RPM (Red Hat) family. It is one of the most widely-used operating systems, being the choice of many organizations across the world. With the help of this book, you will explore the best practices and administration tools of CentOS 7 Linux server along with implementing some of the most common Linux services. We start by explaining the ...
    Note: Includes index. - Description based on online resource; title from cover page (Safari, viewed February 12, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 46
    ISBN: 9781785886935 , 1785886932
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Community experience distilled
    Keywords: Linux ; Computer networks ; Computer programs ; Application software ; Development ; Client/server computing ; Electronic books ; Electronic books ; local
    Abstract: Your one-stop guide for building, configuring, maintaining, and deploying one of the world's fastest growing OSes About This Book Understand the features of CoreOS and learn to administrate and secure a CoreOS environment Develop, test, and deploy cloud services and applications more quickly and efficiently inside lightweight containers using CoreOS This is a complete tutorial on CoreOS, which is the preferred OS for cloud computing as it contains components that facilitate cloud management Who This Book Is For This book is for cloud or enterprise administrators and application developers who would like to gain knowledge about CoreOS to deploy a cloud application or micro-services on a cluster of cloud servers. It is also aimed at administrators with basic networking experience. You do not need to have any knowledge of CoreOS. What You Will Learn Understand the benefits of CoreOS as a cloud orchestration platform Learn about lightweight containers and various container frameworks such as Docker and RKT in CoreOS Manage services and containers across cluster using Fleet and systemd Set up a CoreOS environment using Vagrant Create and manage CoreOS clusters Discover the service parameters using etcd Find out about chaining services running on the cluster using Flannel / Rudder and Weave Create a virtual tenant network and service chaining using OVS In Detail CoreOS is an open source operating system developed upon the Linux kernel. The rise of CoreOS is directly related to the rise of Docker (a Linux container management system). It is a minimal operating system layer and takes a different approach to automating the deployment of containers. The major difference between CoreOS and other Linux distributions is that CoreOS was designed to deploy hundreds of servers. CoreOS immensely helps the users to create systems, which are easy to scale and manage, making life easier for all, be it developer, QA, or deployer. This book is all about setting up, deploying, and using CoreOS to manage clusters and clouds. It will help you understand what CoreOS is and its benefits as a cloud orchestration platform. First, we'll show you how to set up a simple CoreOS instance with single node in the cluster and how to run a Docker container inside the CoreOS instance. Next, you'll be introduced to Fleet and systemd, and will deploy and distribute Docker services across different nodes in cluster using Fleet. Later, you'll be briefed about running services in a clus...
    Note: Includes index. - Description based on online resource; title from cover page (Safari, viewed April 5, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 47
    ISBN: 9781785883989 , 1785883984
    Language: English
    Pages: 1 online resource (1 volume)
    Edition: Second edition.
    Series Statement: Quick answers to common problems
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: Over 80 recipes to get up and running with CentOS 7 Linux server About This Book A practical guide to install, configure, administer and maintain CentOS 7 servers An in-depth guide to the CentOS 7 operating system, exploring its various new features and changes in server administration Presents tricks and solutions to tackle common server issues with the help of practical examples and real-life scenarios Who This Book Is For This book is targeted at beginner and more experienced system administrators alike who want to use CentOS as their server solution. Readers do not need much pre-knowledge or experience at all to work with this book. What You Will Learn Install and configure CentOS 7 Linux server system from scratch using normal and advanced methods Maintain a performance-based and secure server solution by deploying expert configuration advice and managing software packages Monitor, manage and develop your server's file system to maintain a stable performance Gain best practice methods on sharing files and resources through a network Install and configure common standard services such as web, mail, FTP, database and domain name server technologies Introduce you to the world of operating-system-level virtualization using the Docker platform. Understand the fundamentals of the Security-Enhanced Linux access control architecture Monitor your IT infrastructure using Nagios In Detail This book will provide you with a comprehensive series of starting points that will give you direct access to the inner workings of the latest CentOS version 7 and help you trim the learning curve to master your server. You will begin with the installation and basic configuration of CentOS 7, followed by learning how to manage your system, services and software packages. You will then gain an understanding of how to administer the file system, secure access to your server and configure various resource sharing services M42such as file, printer and DHCP servers across your network. Further on, we cover advanced topics such as FTP services, building your own DNS server, running database servers, and providing mail and web services. Finally, you will get a deep understanding of SELinux and you will learn how to work with Docker operating-system virtualization and how to monitor your IT infrastructure with Nagios. By the end of this book, you will have a fair understanding of all the aspects of configuring, implementing and administering CentOS 7 Linux server and how t...
    Note: Includes index. - Description based on online resource; title from cover page (Safari, viewed February 12, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 48
    ISBN: 9781786461773 , 1786461773
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Keywords: Linux ; Application software ; Development ; Computer software ; Development ; Open source software ; Electronic books ; Electronic books ; local
    Abstract: 60 practical recipes that help you gain expertise with Docker networking and understand the underlying constructs that make it all work About This Book Enhance your Docker networking skills and protect your organization using advanced networking functions Learn how to use third party tools to extend Docker networking This practical and recipe-based book demonstrates the different ways in which you can network containers leveraging the Docker engine. Who This Book Is For The book is for system administrators as well as developers who are well versed with the concepts of Docker and have basic knowledge of Docker networking. You should also have sound knowledge of networking in general. What You Will Learn Configure Linux networking primitives used by Docker networking Build and deploy user-defined Docker networks Examine the different options for resolving and linking containers Implement custom networks for Docker to consume Discover third-party networking plugins such as Weave and Flannel Work through solutions to secure Docker containers and networks Observe methodologies for troubleshooting container networks Explore advanced and experimental Docker networking features In Detail Networking functionality in Docker has changed considerably since its first release, evolving to offer a rich set of built-in networking features, as well as an extensible plugin model allowing for a wide variety of networking functionality. This book explores Docker networking capabilities from end to end. Begin by examining the building blocks used by Docker to implement fundamental containing networking before learning how to consume built-in networking constructs as well as custom networks you create on your own. Next, explore common third-party networking plugins, including detailed information on how these plugins inter-operate with the Docker engine. Consider available options for securing container networks, as well as a process for troubleshooting container connectivity. Finally, examine advanced Docker networking functions and their relevant use cases, tying together everything you need to succeed with your own projects. Style and approach This practical recipe-based book will take readers to next level of Docker networking. It covers relevant use cases and the advanced features of Docker
    Note: Includes index. - Description based on online resource; title from title page (Safari, viewed December 22, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 49
    ISBN: 9781782167112 , 1782167110
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Series Statement: Community experience distilled
    Keywords: Linux ; UNIX (Computer file) ; Operating systems (Computers) ; Software engineering ; Electronic books ; Electronic books ; local
    Abstract: Uncover the secrets of Linux binary analysis with this handy guide About This Book Grasp the intricacies of the ELF binary format of UNIX and Linux Design tools for reverse engineering and binary forensic analysis Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes Who This Book Is For If you are a software engineer or reverse engineer and want to learn more about Linux binary analysis, this book will provide you with all you need to implement solutions for binary analysis in areas of security, forensics, and antivirus. This book is great for both security enthusiasts and system level engineers. Some experience with the C programming language and the Linux command line is assumed. What You Will Learn Explore the internal workings of the ELF binary format Discover techniques for UNIX Virus infection and analysis Work with binary hardening and software anti-tamper methods Patch executables and process memory Bypass anti-debugging measures used in malware Perform advanced forensic analysis of binaries Design ELF-related tools in the C language Learn to operate on memory with ptrace In Detail Learning Linux Binary Analysis is packed with knowledge and code that will teach you the inner workings of the ELF format, and the methods used by hackers and security analysts for virus analysis, binary patching, software protection and more. This book will start by taking you through UNIX/Linux object utilities, and will move on to teaching you all about the ELF specimen. You will learn about process tracing, and will explore the different types of Linux and UNIX viruses, and how you can make use of ELF Virus Technology to deal with them. The latter half of the book discusses the usage of Kprobe instrumentation for kernel hacking, code patching, and debugging. You will discover how to detect and disinfect kernel-mode rootkits, and move on to analyze static code. Finally, you will be walked through complex userspace memory infection analysis. This book will lead you into territory that is uncharted even by some experts; right into the world of the computer hacker. Style and approach The material in this book provides detailed insight into the arcane arts of hacking, coding, reverse engineering Linux executables, and dissecting process memory. In the computer security industry these skills are priceless, and scarce. The tutorials are filled with knowledge gained through first hand experience, and are complemented with fr...
    Note: Includes index. - Description based on online resource; title from cover (viewed March 24, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 50
    ISBN: 9781785285974 , 1785285971
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Series Statement: Quick answers to common problems
    Keywords: Linux ; Operating systems (Computers) ; Computer networks ; Electronic books ; Electronic books ; local
    Abstract: Over 40 recipes to help you set up and configure Linux networks About This Book Move beyond the basics of how a Linux machine works and gain a better understanding of Linux networks and their configuration Impress your peers by setting up and configuring a Linux server and its various network elements like a pro This is a hands-on solution guide to building, maintaining, and securing a network using Linux Who This Book Is For This book is targeted at Linux systems administrators who have a good basic understanding and some prior experience of how a Linux machine operates, but want to better understand how various network services function, how to set them up, and how to secure them. You should be familiar with how to set up a Linux server and how to install additional software on them. What You Will Learn Route an IPv6 netblock to your local network Modify your named instance to support setting hostnames for your IPv6 addresses Use SSH for remote console access Configure NGINX with TLS Secure XMPP with TLS Leverage iptables6 to firewall your IPv6 traffic Configure Samba as an Active Directory compatible directory service In Detail Linux can be configured as a networked workstation, a DNS server, a mail server, a firewall, a gateway router, and many other things. These are all part of administration tasks, hence network administration is one of the main tasks of Linux system administration. By knowing how to configure system network interfaces in a reliable and optimal manner, Linux administrators can deploy and configure several network services including file, web, mail, and servers while working in large enterprise environments. Starting with a simple Linux router that passes traffic between two private networks, you will see how to enable NAT on the router in order to allow Internet access from the network, and will also enable DHCP on the network to ease configuration of client systems. You will then move on to configuring your own DNS server on your local network using bind9 and tying it into your DHCP server to allow automatic configuration of local hostnames. You will then future enable your network by setting up IPv6 via tunnel providers. Moving on, we'll configure Samba to centralize authentication for your network services; we will also configure Linux client to leverage it for authentication, and set up a RADIUS server that uses the directory server for authentication. Toward the end, you will have a network with a number of service...
    Note: Includes index. - Description based on online resource; title from cover (Safari, viewed July 13, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 51
    ISBN: 9781785281778 , 1785281771
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Community experience distilled
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: A practical guide to troubleshooting the CentOS 7 community-based enterprise server In Detail CentOS is the enterprise-grade Linux operating system built using the same source code as Red Hat Enterprise Linux (RHEL) to provide a free-to-use alternative to Red Hat's commercial Linux offering. The purpose of this book is to build on your understanding of CentOS and to explore those mission-critical services you are entrusted to manage and maintain. Starting with a brief introduction to the overall subject of troubleshooting a CentOS server, this book will take you on a journey across the whole spectrum of issue-based problem solving, which includes active processes, the networking environment, package management, users, folders, files, shared resources, security, databases, and web-based services. By the end of the book, you will have expert-level competency in identifying and diagnosing the root causes of CentOS storage, network, and administration issues and resolving them. What You Will Learn Consider the need to understand, manipulate, and make use of the relevant system log files Analyze, review, and make decisions regarding how and what to do with troublesome active processes on a CentOS server Discover how to approach issues regarding the network environment Approach issues regarding package management and learn how to make the necessary steps to diagnose and fix the problems found in relation to their YUM- and RPM-based needs Diagnose and troubleshoot issues related to Samba, NFS, and various external storage methods Diagnose and troubleshoot issues related to iptables, SELinux, some common firewalls, shell access, and SSH
    Note: Includes bibliographical references and index. - Description based on online resource; title from cover (Safari, viewed July 6, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 52
    ISBN: 9781782175216 , 1782175210
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Community experience distilled
    Keywords: Linux ; Command languages (Computer science) ; Electronic books ; Electronic books ; local
    Abstract: Unleash the power of shell scripts to solve real-world problems by breaking through the practice of writing tedious code About This Book Learn how to efficiently and effectively build shell scripts and develop advanced applications with this handy book Develop high quality and efficient solutions by writing professional and real-world scripts, and debug scripts by checking and shell tracing A step-by-step tutorial to automate routine tasks by developing scripts from a basic level to very advanced functionality Who This Book Is For This book is ideal for those who are proficient at working with Linux and who want to learn about shell scripting to improve their efficiency and practical skills. By the end of this book, you will be able to confidently use your own shell scripts in the real world. What You Will Learn Familiarize yourself with the various text filtering tools available in Linux Combine the fundamental text and file processing commands to process data and automate repetitive tasks Understand expressions and variables and how to use them practically Automate decision-making and save a lot of time and effort of revisiting code Get to grips with advanced functionality such as using traps and signals and using dialogs to develop screens Start up a system and customize a Linux system Take an in-depth look at regular expressions and pattern matching to understand the capabilities of scripting In Detail Linux is the one of the most powerful and universally adopted OSes. Shell is a program that gives the user direct interaction with the operating system. Scripts are collections of commands that are stored in a file. The shell can read this file and act on the commands as if they were typed on the keyboard. Shell scripting is used to automate day-to-day administration, and for testing or product development tasks. This book covers Bash, GNU Bourne Again SHell, preparing you to work in the exciting world of Linux shell scripting. We start with an introduction to the Shell environment and explain basic commands used in Shell. Next we move on to check, kill, and control the execution of processes in Linux OS. Further, we teach you about the filter tools available in Linux and explain standard output and standard errors devices. Then we will ensure you understand Shell's interpretation of commands and get a firmer grasp so you use them in practice. Next, you'll experience some real-world essentials such as debugging and perform Shell arithmetic f...
    Note: Includes index. - Description based on online resource; title from cover page (Safari, viewed January 19, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 53
    ISBN: 9781785885501 , 1785885502
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Community experience distilled
    Keywords: Linux ; Virtual computer systems ; Computer software ; Development ; Client/server computing ; Electronic books ; Electronic books ; local
    Abstract: Monitor your Docker containers and their apps using various native and third-party tools with the help of this exclusive guide! About This Book Get the only book that covers multiple methods to monitoring Docker Containers -your one-stop solution to all your Docker monitoring needs Learn how to implement third-party tools such as Datalog, cAdvisor, and more with this example-rich, hands-on guide Learn how to efficiently monitor Docker containers and get an edge over other administrators while maintaining apps on these containers Who This Book Is For This book is for DevOps engineers and system administrators who manage Docker containers and want to better manage these containers using expert techniques and methods and better maintain applications built on Docker. What You Will Learn Discover the tools built into Docker to gain an insight into your containers' performance Augment Docker's built-in tools with modern tools such as cAdvisor from Google, SysDig by Draios, and Soundcloud's Prometheus Integrate the monitoring of your containers with more traditional monitoring solutions such as Zabbix Take advantage of the various SaaS offerings from third parties to move monitoring away from your local infrastructure and into the cloud Discover the various ways to ship your applications' logs from the container to a central logging service Get the most out of your application and resources with the right implementation of your monitoring method In Detail This book will show you how monitoring containers and keeping a keen eye on the working of applications helps improve the overall performance of the applications that run on Docker. With the increased adoption of Docker containers, the need to monitor which containers are running, what resources they are consuming, and how these factors affect the overall performance of the system has become the need of the moment. This book covers monitoring containers using Docker's native monitoring functions, various plugins, as well as third-party tools that help in monitoring. Well start with how to obtain detailed stats for active containers, resources consumed, and container behavior. We also show you how to use these stats to improve the overall performance of the system. Next, you will learn how to use SysDig to both view your containers performance metrics in real time and record sessions to query later. By the end of this book, you will have a complete knowledge of how to implement monitoring for your co...
    Note: Includes index. - Description based on online resource; title from cover page (Safari, viewed December 31, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 54
    ISBN: 9781783552375 , 1783552379
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Community experience distilled
    Keywords: Linux ; Operating systems (Computers) ; Command languages (Computer science) ; Electronic books ; Electronic books ; local
    Abstract: Learn shell scripting to solve complex shell-related problems and to efficiently automate your day-to-day tasks About This Book Familiarize yourself with the terminal by learning about powerful shell features Automate tasks by writing shell scripts for repetitive work Packed with easy-to-follow, hands-on examples to help you write any type of shell script with confidence Who This Book Is For This book is aimed at administrators and those who have a basic knowledge of shell scripting and who want to learn how to get the most out of writing shell scripts. What You Will Learn Write effective shell scripts easily Perform search operations and manipulate large text data with a single shell command Modularize reusable shell scripts by creating shell libraries Redirect input, output, and errors of a command or script execution to other streams Debug code with different shell debugging techniques to make your scripts bug-free Manage processes, along with the environment variables needed to execute them properly Execute and embed other languages in your scripts Manage creation, deletion, and search operations in files In Detail Shell scripting is a quick method to prototype complex applications or problems. Shell scripts are a collection of commands to automate tasks, usually those for which the user has a repeated need, when working on Linux-based systems. Using simple commands or a combination of them in a shell can solve complex problems easily. This book starts with the basics, including essential commands that can be executed on Linux systems to perform tasks within a few nanoseconds. You'll learn to use outputs from commands and transform them to show the data you require. Discover how to write shell scripts easily, execute script files, debug, and handle errors. Next, you'll explore environment variables in shell programming and learn how to customize them and add a new environment. Finally, the book walks you through processes and how these interact with your shell scripts, along with how to use scripts to automate tasks and how to embed other languages and execute them. Style and approach This book is a pragmatic guide to writing efficient shell programs, complete with hands-on examples and tips.
    Note: Includes index. - Description based on online resource; title from cover (Safari, viewed December 4, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 55
    ISBN: 9781784395193 , 1784395196
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Community experience distilled
    Keywords: Linux ; Embedded computer systems ; Programming ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: Develop powerful embedded Linux systems with the Yocto Project components A hands-on guide to enhance your ability to develop captivating embedded Linux projects Learn about the compelling features offered by the Yocto Project, such as customization, virtualization, and many more Illustrates concepts such device-emulation and cross-compiling in a pragmatic and lucid way In Detail This book offers readers an idea of what embedded Linux software and hardware architecture looks like, cross-compiling, and also presents information about the bootloader and how it can be built for a specific board. This book will go through Linux kernel features and source code, present information on how to build a kernel source, modules, and the Linux root filesystem. You'll be given an overview of the available Yocto Project components, how to set up Yocto Project Eclipse IDE, and how to use tools such as Wic and Swabber that are still under development. It will present the meta-realtime layer and the newly created meta-cgl layer, its purpose, and how it can add value to poky. What You Will Learn Interact with and customize the bootloader for a board Use the Yocto Project in the embedded Linux development process Familiarize yourself with and customize the bootloader for a board Explore and work with toolchain components such as binutils, gcc, glibc (C libraries), and kernel headers Interact with a root filesystem for your project and also with meta layers Discover more about real-time layer, security, virtualization, CGL, and LSB Identify the Yocto Project components such as Eclipse ADT plug-ins, and Toaster
    Note: Includes index. - Description based on online resource; title from cover (Safari, viewed July 20, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 56
    ISBN: 9781784399023 , 1784399027
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Community experience distilled
    Keywords: Linux ; Computer programming ; Electronic books ; Electronic books ; local
    Abstract: Harness the power of Linux to create versatile and robust embedded solutions About This Book Create efficient and secure embedded devices using Linux Minimize project costs by using open source tools and programs Explore each component technology in depth, using sample implementations as a guide Who This Book Is For This book is ideal for Linux developers and system programmers who are already familiar with embedded systems and who want to know how to create best-in-class devices. A basic understanding of C programming and experience with systems programming is needed. What You Will Learn Understand the role of the Linux kernel and select an appropriate role for your application Use Buildroot and Yocto to create embedded Linux systems quickly and efficiently Create customized bootloaders using U-Boot Employ perf and ftrace to identify performance bottlenecks Understand device trees and make changes to accommodate new hardware on your device Write applications that interact with Linux device drivers Design and write multi-threaded applications using POSIX threads Measure real-time latencies and tune the Linux kernel to minimize them In Detail Mastering Embedded Linux Programming takes you through the product cycle and gives you an in-depth description of the components and options that are available at each stage. You will begin by learning about toolchains, bootloaders, the Linux kernel, and how to configure a root filesystem to create a basic working device. You will then learn how to use the two most commonly used build systems, Buildroot and Yocto, to speed up and simplify the development process. Building on this solid base, the next section considers how to make best use of raw NAND/NOR flash memory and managed flash eMMC chips, including mechanisms for increasing the lifetime of the devices and to perform reliable in-field updates. Next, you need to consider what techniques are best suited to writing applications for your device. We will then see how functions are split between processes and the usage of POSIX threads, which have a big impact on the responsiveness and performance of the final device The closing sections look at the techniques available to developers for profiling and tracing applications and kernel code using perf and ftrace. Style and approach This book is an easy-to-follow and pragmatic guide consisting of an in-depth analysis of the implementation of embedded devices. Each topic has a logical approach to it; this coup...
    Note: Includes index. - Description based on online resource; title from cover page (Safari, viewed January 18, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 57
    ISBN: 9781784391935 , 178439193X
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Community Experience Distilled
    Keywords: Linux ; Application software ; Development ; Computer software ; Development ; Open source software ; Electronic books ; Electronic books ; local
    Abstract: Optimize the power of Docker to run your applications quickly and easily Learn to compose, use, and publish the Docker containers Leverage the features of Docker to deploy your existing applications Explore real world examples of securing and managing Docker containers In Detail Docker is a next-generation platform for simplifying application containerization life-cycle. Docker allows you to create a robust and resilient environment in which you can generate portable, composable, scalable, and stable application containers. This book is a step-by-step guide that will walk you through the various features of Docker from Docker software installation to the impenetrable security of containers. The book starts off by elucidating the installation procedure for Docker and a few troubleshooting techniques. You will be introduced to the process of downloading Docker images and running them as containers. You'll learn how to run containers as a service (CaaS) and also discover how to share data among containers. Later on, you'll explore how to establish the link between containers and orchestrate containers using Docker Compose. You will also come across relevant details about application testing inside a container. You will discover how to debug a container using the docker exec command and the nsenter tool. Finally, you will learn how to secure your containers with SELinux and other proven methods. What You Will Learn Build a Docker image using Dockerfiles Push and publish images on Docker Hub Run your own private Docker Hub and upload images onto it Create and run services inside a container to deploy your applications with ease Share data between the Docker host and containers Orchestrate multiple containers with Docker Compose Test and debug applications inside a Docker container Secure your Docker containers with SELinux
    Note: Includes index. - Description based on online resource; title from cover (Safari, viewed July 20, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 58
    ISBN: 9781783554003 , 1783554002
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Edition: Second edition.
    Series Statement: Community experience distilled
    Keywords: Linux ; Penetration testing (Computer security) ; Electronic books ; Electronic books ; local
    Abstract: Build your defense against web attacks with Kali Linux 2.0 About This Book Gain a deep understanding of the flaws in web applications and exploit them in a practical manner Get hands-on web application hacking experience with a range of tools in Kali Linux 2.0 Develop the practical skills required to master multiple tools in the Kali Linux 2.0 toolkit Who This Book Is For If you are already working as a network penetration tester and want to expand your knowledge of web application hacking, then this book tailored for you. Those who are interested in learning more about the Kali Sana tools that are used to test web applications will find this book a thoroughly useful and interesting guide. What You Will Learn Set up your lab with Kali Linux 2.0 Identify the difference between hacking a web application and network hacking Understand the different techniques used to identify the flavor of web applications Expose vulnerabilities present in web servers and their applications using server-side attacks Use SQL and cross-site scripting (XSS) attacks Check for XSS flaws using the burp suite proxy Find out about the mitigation techniques used to negate the effects of the Injection and Blind SQL attacks In Detail Kali Linux 2.0 is the new generation of the industry-leading BackTrack Linux penetration testing and security auditing Linux distribution. It contains several hundred tools aimed at various information security tasks such as penetration testing, forensics, and reverse engineering. At the beginning of the book, you will be introduced to the concepts of hacking and penetration testing and will get to know about the tools used in Kali Linux 2.0 that relate to web application hacking. Then, you will gain a deep understanding of SQL and command injection flaws and ways to exploit the flaws. Moving on, you will get to know more about scripting and input validation flaws, AJAX, and the security issues related to AJAX. At the end of the book, you will use an automated technique called fuzzing to be able to identify flaws in a web application. Finally, you will understand the web application vulnerabilities and the ways in which they can be exploited using the tools in Kali Linux 2.0. Style and approach This step-by-step guide covers each topic with detailed practical examples. Every concept is explained with the help of illustrations using the tools available in Kali Linux 2.0.
    Note: Includes index. - Description based on online resource; title from cover (Safari, viewed December 14, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 59
    ISBN: 9781785285325 , 1785285327
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Community experience distilled
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: Leverage the power of high availability clusters on CentOS Linux, the enterprise-class, open source operating system In Detail The high performance and stability of CentOS Linux are the key factors that make CentOS Linux the right Linux distribution to build high availability solutions on. This book introduces you to high availability before briefly walking you through the cluster stack and its layers. The book is then divided into two parts, part A and part B, based on CentOS versions 6 and 7 respectively. Each part begins with the installation and configuration of the Corosync cluster messaging software with CMAN or with the Pacemaker cluster resource management software. You will also be introduced to cluster service configuration and cluster service management before you configure fencing or STONITH on CentOS 6 and CentOS 7. By the end of this book, you will have the skills required to independently design, implement, and maintain a CentOS high availability multinode cluster environment. What You Will Learn Prepare the CentOS 6 and CentOS 7 operating systems for cluster software installation Install, configure, and test cluster stacks on CentOS 6 (Corosync, CMAN, and RGManager) and CentOS 7 (Corosync and Pacemaker) Configure failover domains, cluster resources, cluster services, and cluster resource groups Start, stop, add, and remove cluster nodes from a cluster on CentOS 6 and CentOS 7 Place a cluster on standby mode to perform maintenance work on the cluster node Configure fencing on CentOS 6 and STONITH on CentOS 7 Successfully test cluster failovers
    Note: Includes index. - Description based on online resource; title from cover (Safari, viewed May 13, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 60
    ISBN: 9781785284816 , 1785284819
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Community experience distilled
    Keywords: Linux ; Penetration testing (Computer security) ; Wireless Internet ; Electronic books ; Electronic books ; local
    Abstract: Plan and execute penetration tests on wireless networks with the Kali Linux distribution In Detail Kali Linux is the most popular distribution dedicated to penetration testing that includes a set of free, open source tools. This book introduces you to wireless penetration testing and describes how to conduct its various phases. After showing you how to install Kali Linux on your laptop, you will verify the requirements of the wireless adapter and configure it. Next, the book covers the wireless LAN reconnaissance phase, explains the WEP and WPA/WPA2 security protocols and demonstrates practical attacks against them using the tools provided in Kali Linux, Aircrack-ng in particular. You will then discover the advanced and latest attacks targeting access points and wireless clients and learn how to create a professionally written and effective report. What You Will Learn Explore the penetration testing methodology and its various phases Install Kali Linux on your laptop and configure the wireless adapter Scan and enumerate wireless LANs and point out their vulnerabilities Understand the WEP security protocol and the techniques to crack the authentication keys and break it Become proficient with the WPA/WPA2 protocol and use Kali Linux tools to attack it Attack the access points and take control of the wireless network Launch advanced attacks against clients Produce stunning and effective reports
    Note: Includes bibliographical references and index. - Description based on online resource; title from cover (Safari, viewed August 12, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 61
    ISBN: 9781784390686 , 1784390682
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Community experience distilled
    Keywords: Linux ; Computer networks ; Administration ; Electronic books ; Electronic books ; local
    Abstract: Master the skills and techniques that are required to design, deploy, and administer real Linux-based networks About This Book Master the art of using Linux and administering network services for enterprise environments Perform hands-on activities to reinforce expert-level knowledge Get full coverage of both the CentOS and Debian systems, including how networking concepts differ for each Who This Book Is For Mastering Linux Network Administration is recommended for those who already understand the basics of using Linux and networking, and would like to push those skills to a higher level through real-world Linux networking scenarios. Whether you intend to run a home office consisting of Linux nodes or a rollout of a Linux network within your organization, this book is a great fit for those that desire to learn how to manage networked systems with the power of Linux. What You Will Learn Install and configure the Debian and CentOS systems Set up and configure file servers Administer networked nodes remotely Discover how to monitor system performance for peak health Configure network services such as DNS and DHCP Host HTTP content via Apache Troubleshoot Linux networking issues In Detail Linux is everywhere. Whether you run a home office, a small business, or manage enterprise systems, Linux can empower your network to perform at its very best. Armed with the advanced tools and best practice guidance of this practical guide, you'll be able to mold Linux networks to your will, empowering your systems and their users to take advantage of all that Linux-based networks have to offer. Understand how Linux networks function and get to grips with essential tips and tricks to manage them - whether you're already managing a networks, or even just starting out. With Debian and CentOS as its source, this book will divulge all the details you need to manage a real Linux-based network. With detailed activities and instructions based on real-world scenarios, this book will be your guide to the exciting world of Linux networking. Style and approach This practical guide will walk you through all the core concepts required to manage real Linux-based networks. Downloading the example code for this book. You can download the example code files for all Packt books you have purchased from your account at http://www.PacktPub.com. If you purchased this book elsewhere, you can visit http://www.PacktPub.com/support and register to have the code file.
    Note: Includes index. - Description based on online resource; title from cover page (Safari, viewed November 23, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 62
    ISBN: 9781784392253 , 1784392251
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Quick answers to common problems
    Keywords: Linux ; Computer networks ; Management ; Software ; Electronic books ; Electronic books ; local
    Abstract: Over 70 hands-on recipes to get your infrastructure up and running with Zabbix In Detail This book will teach you the skills required to successfully set up and configure a Zabbix server. We will guide you through the interface setup and explain all the features available in Zabbix. You will begin with learning the Zabbix installation and configuration steps in detail, and then move on to exploring its interface and architecture. You will then work with groups, users, and permissions. The book will then take you through monitoring and testing with Zabbix. Followed by this, you will gain insights into using templates, and also create impressive graphs and maps for data visualization and reporting. Towards the end of the book, you will learn how to maintain, upgrade, and troubleshoot your Zabbix infrastructure. What You Will Learn Set up your Zabbix infrastructure efficiently Customize the Zabbix interface to suit your system needs Create and customize your own user settings Add groups, hosts, and items in Zabbix to accurately monitor your environment Automate Zabbix to gather data from your inventory Build maps with an overview of the entire IT infrastructure Monitor websites and get statistics about access time, latency, and data usage Monitor your VMware infrastructure in a quick and easy way with Zabbix
    Note: Includes index. - Description based on online resource; title from cover page (Safari, viewed April 15, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 63
    ISBN: 9781784397593 , 1784397598
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Community experience distilled
    Keywords: Linux ; UNIX (Computer file) ; UNIX Shells ; Electronic books ; Electronic books ; local
    Abstract: Master the complexities of Bash shell scripting and unlock the power of shell for your enterprise About This Book Identify the high level steps such as verifying user input, using command lines and conditional statements in creating and executing simple shell scripts Create and edit dynamic shell scripts to manage complex and repetitive tasks Learn about scripting in Perl and programming in Python as a BASH scripting alternative with this practical, step-by-step guide Who This Book Is For Mastering Linux Shell Scripting has been written for Linux administrators who want to automate tasks in their daily lives, saving time and effort. You'll need to have command-line experience and be familiar with the tasks that you need to automate. What You Will Learn Use the type command to identify the order of command evaluation Create interactive scripts that prompt for user input Foster menu structures for operators with little command-line experience Develop scripts that dynamically edit web configuration files to produce a new virtual host Write scripts that use AWK to search and reports on log files Draft effective scripts using functions as building blocks, reducing maintenance and build time Make informed choices by comparing different script languages such as Perl and Python with BASH In Detail Shell scripting is a quick method to prototype a complex application or a problem by automating tasks when working on Linux-based systems. Using both simple one-line commands and command sequences complex problems can be solved with ease, from text processing to backing up sysadmin tools. In this book, you'll discover everything you need to know to master shell scripting and make informed choices about the elements you employ. Get to grips with the fundamentals of creating and running a script in normal mode, and in debug mode. Learn about various conditional statements' code snippets, and realize the power of repetition and loops in your shell script. Implement functions and edit files using the Stream Editor, script in Perl, program in Python ? as well as complete coverage of other scripting languages to ensure you can choose the best tool for your project. Style and approach The book will capture your attention and keep you engaged with the simplicity and clarity of each explanation. Every step is accompanied with screen captures so you can cross-check the results before moving on.
    Note: Includes index. - Description based on online resource; title from cover page (Safari, viewed January 14, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 64
    ISBN: 9781785289002 , 1785289004
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Community experience distilled
    Keywords: Linux ; Computer networks ; Management ; Electronic books ; Electronic books ; local
    Abstract: Gain Linux administration skills by learning new networking concepts in Red Hat Enterprise Linux 7 In Detail Red Hat Enterprise Linux (RHEL) is the most popular Linux distribution currently being used and can be deployed on many platforms. Enterprises that have a large number of systems need to be interconnected, configured, and managed effectively. RHEL networking lets you accomplish these tasks easily. This is a highly-detailed guide to help with your deployments on RHEL 7 or CentOS 7. This book, based on RHEL 7.1, will introduce to you the fundamentals of networking your systems. You will learn the use of new consistent names to identify your network cards. Soon, you will move on to configuring the basic plumbing of your network, setting up time, network address assignment, and name resolution. Last, the focus moves to configuring the new kernel-based iSCSI target services on RHEL 7 and using the service to host storage area networks. What You Will Learn Master the new time daemon, chronyd, and understand why it is used over the more traditional NTP Delve inside the workings of the kernel-based iSCSI target that shares disks on your network Share data with your Windows network and make use of their users and groups for authentication, without the need to replace your existing infrastructure Shield your users and data from the ever-present dangers that exist on the Internet by implementing and understanding SELinux Deploy Apache 2.4 and make use of its new features Provide saleable and fault-tolerant file systems with btrfs, more quickly than you could ever imagine Protect your investment using the new firewalld process, enabling you to deploy firewall changes while the firewall is in place
    Note: Includes index. - Description based on online resource; title from cover (Safari, viewed July 6, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 65
    ISBN: 9781785287879 , 1785287877
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Professional expertise distilled
    Keywords: Red Hat, Inc ; Linux ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: Identify, capture and resolve common issues faced by Red Hat Enterprise Linux administrators using best practices and advanced troubleshooting techniques About This Book Develop a strong understanding of the base tools available within Red Hat Enterprise Linux (RHEL) and how to utilize these tools to troubleshoot and resolve real-world issues Gain hidden tips and techniques to help you quickly detect the reason for poor network/storage performance Troubleshoot your RHEL to isolate problems using this example-oriented guide full of real-world solutions Who This Book Is For If you have a basic knowledge of Linux from administration or consultant experience and wish to add to your Red Hat Enterprise Linux troubleshooting skills, then this book is ideal for you. The ability to navigate and use basic Linux commands is expected. What You Will Learn Identify issues that need rapid resolution against long term root cause analysis Discover commands for testing network connectivity such as telnet, netstat, ping, ip and curl Spot performance issues with commands such as top, ps, free, iostat, and vmstat Use tcpdump for traffic analysis Repair a degraded file system and rebuild a software raid Identify and troubleshoot hardware issues using dmesg Troubleshoot custom applications with strace and knowledge of Linux resource limitations In Detail Red Hat Enterprise Linux is an operating system that allows you to modernize your infrastructure, boost efficiency through virtualization, and finally prepare your data center for an open, hybrid cloud IT architecture. It provides the stability to take on today's challenges and the flexibility to adapt to tomorrow's demands. In this book, you begin with simple troubleshooting best practices and get an overview of the Linux commands used for troubleshooting. The book will cover the troubleshooting methods for web applications and services such as Apache and MySQL. Then, you will learn to identify system performance bottlenecks and troubleshoot network issues; all while learning about vital troubleshooting steps such as understanding the problem statement, establishing a hypothesis, and understanding trial, error, and documentation. Next, the book will show you how to capture and analyze network traffic, use advanced system troubleshooting tools such as strace, tcpdump & dmesg, and discover common issues with system defaults. Finally, the book will take you through a detailed root cause analysis of an unexpected reboo...
    Note: Includes index. - Description based on online resource; title from cover page (Safari, viewed November 9, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 66
    ISBN: 9781784393519 , 1784393517
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Quick answers to common problems
    Keywords: Linux ; Computer networks ; Maintenance and repair ; Client/server computing ; Electronic books ; Electronic books ; local
    Abstract: Over 60 recipes to help you build, configure, and orchestrate RHEL 7 Server to make your everyday administration experience seamless About This Book Create fully unattended installations and deploy configurations without breaking a sweat Discover and kick-start the newest RHEL 7 configuration and management tools through an easy-to-follow, practical approach for a lazy system management Be guided by an experienced RHEL expert who is a certified Linux engineer with a passion for open source and open standards Who This Book Is For Red Hat Enterprise Linux Server Cookbook is for RHEL 7 system administrators and DevOps in need of a practical reference guide to troubleshoot common issues and quickly perform tasks. What You Will Learn Set up and configure RHEL 7 Server Use NetworkManager to configure all aspects of your network Manage virtual environments using libvirt Set up software repositories Secure and monitor your RHEL environment Configure SELinux, and create and apply its policies Create kickstart scripts to automatically deploy RHEL 7 systems Use Orchestration and configuration management tools to manage your environment In Detail Dominating the server market, the Red Hat Enterprise Linux operating system gives you the support you need to modernize your infrastructure and boost your organization's efficiency. Combining both stability and flexibility, RHEL helps you meet the challenges of today and adapt to the demands of tomorrow. This practical Cookbook guide will help you get to grips with RHEL 7 Server and automating its installation. Designed to provide targeted assistance through hands-on recipe guidance, it will introduce you to everything you need to know about KVM guests and deploying multiple standardized RHEL systems effortlessly. Get practical reference advice that will make complex networks setups look like child's play, and dive into in-depth coverage of configuring a RHEL system. Also including full recipe coverage of how to set up, configuring, and troubleshoot SELinux, you'll also discover how secure your operating system, as well as how to monitor it. Style and approach This practical guide is packed full of hands-on recipes that provide quick solutions to the problems faced when building your RHEL 7 system from scratch using orchestration tools. Each topic is explained sequentially in the process of setting up a system and binding everything together.
    Note: Includes index. - Description based on online resource; title from cover page (Safari, viewed January 20, 2016)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 67
    ISBN: 9781784394127 , 1784394122
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Community experience distilled
    Keywords: Linux ; Raspberry Pi (Computer) ; Penetration testing (Computer security) ; Electronic books ; Electronic books ; local
    Abstract: Construct a hacking arsenal for penetration testers or hacking enthusiasts using Kali Linux on a Raspberry Pi In Detail The Raspberry Pi is a low-cost credit-card sized computing system that can be customized for just about anything including penetration testing. Raspberry Pi is the best known platform not because it is cheap but because it is very powerful. Kali is a pentesting/security auditing Linux distribution. Kali Linux has many penetration-testing programs, including nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), Aircrack-ng (a software suite for the penetration-testing of wireless LANs), and Burp suite and OWASP ZAP (both web application security scanners). This book covers how to turn a Raspberry Pi into a hacking arsenal to leverage the most popular open source toolkit, Kali Linux. You will learn how to use various tools to breach networks and steal data. What You Will Learn Install and tune Kali Linux on a Raspberry Pi for hacking Use a Raspberry Pi for pentests such as breaking wireless security, scanning networks, and capturing sensitive data Perform man-in-the-middle attacks and bypass SSL encryption Compromise systems using various exploits and toolkits Bypass security defenses and remove data off a target network Develop a command and control system to manage remotely placed Raspberry Pis Turn a Raspberry Pi into a honeypot to capture sensitive information Grasp professional penetration testing through proper documentation
    Note: Includes index. - Description based on online resource; title from cover (Safari, viewed February 13, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 68
    ISBN: 9781783280421 , 1783280425
    Language: English
    Pages: 1 online resource (1 volume) , illustrations
    Edition: Second edition.
    Keywords: Linux ; Wireless communication systems ; Wireless Internet ; Electronic books ; Electronic books ; local
    Abstract: Master wireless testing techniques to survey and attack wireless networks with Kali Linux In Detail As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. The Kali Linux security distribution comes with a myriad of tools used for networking attacks and detecting security loopholes. Kali Linux Wireless Penetration Testing Beginner's Guide presents wireless pentesting from the ground up, introducing all elements of penetration testing with each new technology. Learn various wireless testing methodologies by example, from the basics of wireless routing and encryption through to detailed coverage of hacking methods and attacks such as the Hirte and Caffe Latte. What You Will Learn Create a wireless lab for your experiments Sniff out wireless packets and hidden networks Capture and crack WPA-2 keys Discover hidden SSIDs Explore the ins and outs of wireless technologies Sniff probe requests and track users through SSID history Attack radius authentication systems Sniff wireless traffic and collect interesting data Decrypt encrypted traffic with stolen keys
    Note: "Learn by doing: less theory, more results"--Cover. - Includes index. - Description based on online resource; title from cover (Safari, viewed April 16, 2015)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 69
    ISBN: 9781783985937 , 1783985933
    Language: English
    Pages: 1 online resource (1 volume) , illustrations.
    Series Statement: Community experience distilled
    Keywords: Linux ; Operating systems (Computers) ; Electronic books ; Electronic books ; local
    Abstract: Become an efficient CentOS administrator by acquiring real-world knowledge of system setup and configuration In Detail CentOS is widely respected as a very powerful and flexible Linux distribution, and it can be used as a web server, file server, FTP server, domain server, or a multirole solution. It is designed to handle the more demanding needs of business applications such as network and system administration, database management, and web services. CentOS is self-sufficient and fast while working, with the added benefit of global acceptance as a large number of the world's web servers run on it. This book not only concentrates on the basics, but also supplements your existing knowledge on subject areas that are important in the Enterprise market, such as directory services, security configuration management, and web-based architecture. By the end of this book, you will be able to manage an Enterprise Linux network focused on management-centralized configuration, user management, and filesystem enhancements by covering everything from the latest filesystem advances with BTRFS through to learning about the new web server on the block - Nginx. What You Will Learn Conquer the command line using shortcuts in the shell and within the editor Vim Analyze the booting of CentOS utilizing MBR, GRUB, and Plymouth Gain an understanding of the filesystem structure of hard links, inodes, and data using stat and ls Manage your software installations with YUM Handle your services as they begin to migrate from System V scripts Establish centralized account information using openLDAP directory services Centralize the configuration management of CentOS using Puppet, enabling updates from Puppet Master to be distributed to the clients
    Note: Includes index. - Description based on online resource; title from cover (Safari, viewed December 18, 2014)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...