|Browse by Catagory:
Civil Rights & Liberties
War & Peace
Cajun & Creole Cooking
Caribbean & West Indian Cooking
Diabetic & Sugar-Free Cooking
Low Fat Cooking
Middle Eastern Cooking
Pacific Rim Cooking
Home & Garden
Literature & Fiction
Sheet Music & Scores
Environmental & Natural Resources Law
Ethics & Professional Responsibility
Procedures & Litigation
Water Supply & Land Use
Lawyer and Crimal Humor
Outdoors & Nature
Hiking & Camping
Hunting & Fishing
Beer & Beer Making
Health & Fitness
Diets & Weight Loss
Children's Science & Nature
Vitamins & Supplements
Psychology and Counseling
Philosophy of Psychology
Physiological Aspects of Psychology
Psychology of Sexuality
Psychology Testing & Measurement
Chaos & Systems
Geometry & Topology
Logic & Brain Teasers
Chaos & Systems
Geometry & Topology
Probability & Statistics
Experiments, Instruments & Measurement
Chaos & Systems
Fusion & Fission
Nuclear Magnetic Resonance
Waves & Wave Mechanics
Administration & Policy
Allied Health Professions
Medical Education & Training
Endocrinology & Metabolism
Physician & Patient
Insects & Spiders
Fish & Aquariums
Mobile & Wireless Computing: Programming
Linux Kernel & Peripherals
Linux Networking & Administration
State & Local History
Sci Fi Calendars
Bujold, Lois McMaster
Card, Orson Scott
Chalker, Jack L.
Heinlein, Robert A.
McKillip, Patricia A.
Nye, Jody Lynn
|Embedded Linux Systems with the Yocto Project (Pearson Open Source Software Development Series)
Lowest new price: $39.03
Lowest used price: $35.67
List price: $49.99
Author: Rudolf J. Streif
Build Complete Embedded Linux Systems Quickly and Reliably
Developers are increasingly integrating Linux into their embedded systems: It supports virtually all hardware architectures and many peripherals, scales well, offers full source code, and requires no royalties. The Yocto Project makes it much easier to customize Linux for embedded systems. If you’re a developer with working knowledge of Linux, Embedded Linux Systems with the Yocto Project™ will help you make the most of it.
An indispensable companion to the official documentation, this guide starts by offering a solid grounding in the embedded Linux landscape and the challenges of creating custom distributions for embedded systems. You’ll master the Yocto Project’s toolbox hands-on, by working through the entire development lifecycle with a variety of real-life examples that you can incorporate into your own projects.
Author Rudolf Streif offers deep insight into Yocto Project’s build system and engine, and addresses advanced topics ranging from board support to compliance management.
You’ll learn how to
- Overcome key challenges of creating custom embedded distributions
- Jumpstart and iterate OS stack builds with the OpenEmbedded Build System
- Master build workflow, architecture, and the BitBake Build Engine
- Quickly troubleshoot build problems
- Customize new distros with built-in blueprints or from scratch
- Use BitBake recipes to create new software packages
- Build kernels, set configurations, and apply patches
- Support diverse CPU architectures and systems
- Create Board Support Packages (BSP) for hardware-specific adaptations
- Provide Application Development Toolkits (ADT) for round-trip development
- Remotely run and debug applications on actual hardware targets
- Ensure open-source license compliance
- Scale team-based projects with Toaster, Build History, Source Mirrors, and Autobuilder
|Linux in Action
Lowest new price: $32.58
Lowest used price: $28.94
List price: $39.99
Author: David Clinton
Linux in Action is a task-based tutorial that will give you the skills and deep understanding you need to administer a Linux-based system. This hands-on book guides you through 12 real-world projects so you can practice as you learn. Each chapter ends with a review of best practices, new terms, and exercises.
Purchase of the print book includes a free eBook in PDF, Kindle, and ePub formats from Manning Publications.
About the Technology
You can't learn anything without getting your hands dirtyÃ¢â‚¬â€including Linux. Skills like securing files, folders, and servers, safely installing patches and applications, and managing a network are required for any serious user, including developers, administrators, and DevOps professionals. With this hands-on tutorial, you'll roll up your sleeves and learn Linux project by project.
About the Book
Linux in Action guides you through 12 real-world projects, including automating a backup-and-restore system, setting up a private Dropbox-style file cloud, and building your own MediaWiki server. You'll try out interesting examples as you lock in core practices like virtualization, disaster recovery, security, backup, DevOps, and system troubleshooting. Each chapter ends with a review of best practices, new terms, and exercises.
- Setting up a safe Linux environment
- Managing secure remote connectivity
- Building a system recovery device
- Patching and upgrading your system
About the Reader
No prior Linux admin experience is required.
About the Author
David Clinton is a certified Linux Server Professional, seasoned instructor, and author of Manning's bestselling Learn Amazon Web Services in a Month of Lunches.
Table of Contents
- Welcome to Linux
- Linux virtualization: Building a Linux working environment
- Remote connectivity: Safely accessing networked machines
- Archive management: Backing up or copying entire file systems
- Automated administration: Configuring automated offsite backups
- Emergency tools: Building a system recovery device
- Web servers: Building a MediaWiki server
- Networked file sharing: Building a Nextcloud file-sharing server
- Securing your web server
- Securing network connections: Creating a VPN or DMZ
- System monitoring: Working with log files
- Sharing data over a private network
- Troubleshooting system performance issues
- Troubleshooting network issues
- Troubleshooting peripheral devices
- DevOps tools: Deploying a scripted server environment using Ansible
|Kali Linux Web Penetration Testing Cookbook: Identify, exploit, and prevent web application vulnerabilities with Kali Linux 2018.x, 2nd Edition
Lowest new price: $21.00
Lowest used price: $36.93
List price: $49.99
Author: Gilberto Najera-Gutierrez
Discover the most common web vulnerabilities and prevent them from becoming a threat to your site's security
- Familiarize yourself with the most common web vulnerabilities
- Conduct a preliminary assessment of attack surfaces and run exploits in your lab
- Explore new tools in the Kali Linux ecosystem for web penetration testing
Web applications are a huge point of attack for malicious hackers and a critical area for security professionals and penetration testers to lock down and secure. Kali Linux is a Linux-based penetration testing platform that provides a broad array of testing tools, many of which can be used to execute web penetration testing.
Kali Linux Web Penetration Testing Cookbook gives you the skills you need to cover every stage of a penetration test – from gathering information about the system and application, to identifying vulnerabilities through manual testing. You will also cover the use of vulnerability scanners and look at basic and advanced exploitation techniques that may lead to a full system compromise. You will start by setting up a testing laboratory, exploring the latest features of tools included in Kali Linux and performing a wide range of tasks with OWASP ZAP, Burp Suite and other web proxies and security testing tools.
As you make your way through the book, you will learn how to use automated scanners to find security ﬂaws in web applications and understand how to bypass basic security controls. In the concluding chapters, you will look at what you have learned in the context of the Open Web Application Security Project (OWASP) and the top 10 web application vulnerabilities you are most likely to encounter, equipping you with the ability to combat them effectively.
By the end of this book, you will have acquired the skills you need to identify, exploit, and prevent web application vulnerabilities.
What you will learn
- Set up a secure penetration testing laboratory
- Use proxies, crawlers, and spiders to investigate an entire website
- Identify cross-site scripting and client-side vulnerabilities
- Exploit vulnerabilities that allow the insertion of code into web applications
- Exploit vulnerabilities that require complex setups
- Improve testing efficiency using automated vulnerability scanners
- Learn how to circumvent security controls put in place to prevent attacks
Who this book is for
Kali Linux Web Penetration Testing Cookbook is for IT professionals, web developers, security enthusiasts, and security professionals who want an accessible reference on how to find, exploit, and prevent security vulnerabilities in web applications. The basics of operating a Linux environment and prior exposure to security technologies and tools are necessary.
Table of Contents
- Setting up Kali Linux and the Testing Lab
- Using Proxies, Crawlers and Spiders
- Testing Authentication and Session Management
- Cross-Site Scripting and Client-Side Attacks
- Exploiting Injection Vulnerabilities
- Exploiting Platform Vulnerabilities
- Using Automated Scanners
- Bypassing Basic Security Controls
- Mitigation of OWASP Top 10 Vulnerabilities
|ASP.NET Core 2 High Performance - Second Edition: Learn the secrets of developing high performance web applications using C# and ASP.NET Core 2 on Windows, Mac, and Linux
Lowest new price: $40.91
Lowest used price: $29.79
List price: $49.99
Author: James Singleton
Learn how to develop web applications that deploy cross-platform and are optimized for high performance using ASP.NET Core 2
About This Book
- Master high-level web app performance improvement techniques using ASP.NET Core 2.0
- Find the right balance between premature optimization and inefficient code
- Design workflows that run asynchronously and are resilient to transient performance issues
Who This Book Is For
This book is aimed for readers who can build a web application and have some experience with ASP.NET or some other web application framework (such as Ruby on Rails or Django). They can be people who are happy learning details independently but who struggle to discover the topics that they should be researching. The reader should be interested in improving the performance of their web app and in learning about ASP.NET Core and modern C#.
What You Will Learn
- Understand ASP.NET Core 2 and how it differs from its predecessor
- Address performance issues at the early stages of development
- Set up development environments on Windows, Mac, and Linux
- Measure, profile and find the most significant problems
- Identify the differences between development workstations and production infrastructures, and how these can exacerbate problems
- Boost the performance of your application but with an eye to how it affects complexity and maintenance
- Explore a few cutting-edge techniques such as advanced hashing and custom transports
The ASP.NET Core 2 framework is used to develop high-performance and cross-platform web applications. It is built on .NET Core 2 and includes significantly more framework APIs than version 1.
This book addresses high-level performance improvement techniques. It starts by showing you how to locate and measure problems and then shows you how to solve some of the most common ones. Next, it shows you how to get started with ASP.NET Core 2 on Windows, Mac, Linux, and with Docker containers.
The book illustrates what problems can occur as latency increases when deploying to a cloud infrastructure. It also shows you how to optimize C# code and choose the best data structures for the job. It covers new features in C# 6 and 7, along with parallel programming and distributed architectures.
By the end of this book, you will be fixing latency issues and optimizing performance problems, but you will also know how this affects the complexity and maintenance of your application. Finally, we will explore a few highly advanced techniques for further optimization.
Style and approach
A step-by-step practical guide filled with real-world use cases and examples
- Modern API Design with ASP.NET Core 2: Building Cross-Platform Back-End Systems
- Pro Entity Framework Core 2 for ASP.NET Core MVC
- Pro ASP.NET Core MVC 2
- Fullstack Vue: The Complete Guide to Vue.js
- Dependency Injection in .NET Core 2.0: Make use of constructors, parameters, setters, and interface injection to write reusable and loosely-coupled code
- ASP.NET Core 2 and Angular 5: Full-Stack Web Development with .NET Core and Angular
- Front-end Development with ASP.NET Core, Angular, and Bootstrap
- Mastering ASP.NET Core 2.0: MVC patterns, configuration, routing, deployment, and more
- C# 7.1 and .NET Core 2.0 - Modern Cross-Platform Development - Third Edition: Create powerful applications with .NET Standard 2.0, ASP.NET Core 2.0, ... Visual Studio 2017 or Visual Studio Code
- Learning ASP.NET Core 2.0: Build modern web apps with ASP.NET Core 2.0, MVC, and EF Core 2
|Internetworking with TCP/IP, Vol. III: Client-Server Programming and Applications, Linux/Posix Sockets Version
Lowest new price: $17.22
Lowest used price: $5.73
List price: $90.00
Author: Douglas E. Comer
Internetworking with TCP/IP, Volume III describes the fundamental concepts of client-server computing used to build all distributed computing systems, and presents an in-depth guide to the Posix sockets standard utilized by Linux and other operating systems. Dr. Douglas E. Comer compares leading server designs, and describes the key tools and techniques used to build clients and servers, including Remote Procedure Call (RPC). The book contains examples of running programs that illustrate each approach. Comer introduces the client-server model and its software design implications; the role of concurrent processing and threads; the Socket API, and differences that impact Linux programmers. Understand the key algorithms and issues associated with client and server software design; then review three leading approaches: iterative, connectionless servers (UPD); and both iterative and concurrent connection-oriented servers (TCP). The book contains extensive coverage of threading, including a new chapter on using threads for concurrency; as well as coverage of single-threaded and multi-threaded concurrent servers. Comer introduces multi-protocol and multi-service services; reviews client concurrency; tunneling at the transport and application levels; and external data representation (XDR). He reviews RPC, distributed program generation, NFS concepts and protocol; Telnet; streaming media transport; and finally, techniques for avoiding deadlock and starvation in client-server systems. For everyone who wants to master TCP/IP and understand how the Internet works.
|Security Strategies in Linux Platforms and Applications (Jones & Bartlett Learning Information Systems Security & Assurance)
Lowest new price: $82.03
Lowest used price: $48.65
List price: $99.95
Author: Michael Jang
PART OF THE NEW JONES & BARTLETT LEARNING INFORMATION SYSTEMS SECURITY & ASSURANCE SERIES - Click here to learn more: http://www.issaseries.com/
The Second Edition of Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Written by an industry expert, this book is divided into three natural parts to illustrate key concepts in the field. It opens with a discussion of the risks, threats, and vulnerabilities associated with Linux as an operating system using current examples and cases. Part 2 discusses how to take advantage of the layers of security available to Linux--user and group options, filesystems, and security options for important services, as well as the security modules associated with AppArmor and SELinux. The book closes with a look at the use of both open source and proprietary tools when building a layered security strategy for Linux operating system environments. Using real-world examples and exercises, this useful resource incorporates hands-on activities to walk readers through the fundamentals of security strategies related to the Linux system.
Instructor Materials for Security Strategies in Linux Platforms and Applications include:
PowerPoint Lecture Slides
About the Series
This book is part of the Information Systems Security and Assurance Series from Jones and Bartlett Learning. Designed for courses and curriculums in IT Security, Cybersecurity, Information Assurance, and Information Systems Security, this series features a comprehensive, consistent treatment of the most current thinking and trends in this critical subject area. These titles deliver fundamental information-security principles packed with real-world applications and examples. Authored by Certified Information Systems Security Professionals (CISSPs), they deliver comprehensive information on all aspects of information security. Reviewed word for word by leading technical experts in the field, these books are not just current, but forward-thinking--putting you in the position to solve the cybersecurity challenges not just of today, but of tomorrow, as well.
- Jones Bartlett Publishers
|Learning Embedded Linux using the Yocto Project
Lowest new price: $44.97
Lowest used price: $30.90
List price: $44.99
Author: Alexandru Vaduva
Develop powerful embedded Linux systems with the Yocto Project components
About This Book
- A hands-on guide to enhance your ability to develop captivating embedded Linux projects
- Learn about the compelling features offered by the Yocto Project, such as customization, virtualization, and many more
- Illustrates concepts such device-emulation and cross-compiling in a pragmatic and lucid way
Who This Book Is For
If you are a Yocto and Linux enthusiast who wants to build embedded Linux systems but do not have the knowledge to do it, this is the book for you. It will also help those of you who have a bit of knowledge about Linux and the embedded world and are keen on learning more about the technology. This book will provide you with the skills needed to successfully interact with the Yocto Project components regardless of the fact that you are new to embedded development or an expert.
What You Will Learn
- Interact with and customize the bootloader for a board
- Use the Yocto Project in the embedded Linux development process
- Familiarize yourself with and customize the bootloader for a board
- Explore and work with toolchain components such as binutils, gcc, glibc (C libraries), and kernel headers
- Interact with a root filesystem for your project and also with meta layers
- Discover more about real-time layer, security, virtualization, CGL, and LSB
- Identify the Yocto Project components such as Eclipse ADT plug-ins, and Toaster
This book offers readers an idea of what embedded Linux software and hardware architecture looks like, cross-compiling, and also presents information about the bootloader and how it can be built for a specific board. This book will go through Linux kernel features and source code, present information on how to build a kernel source, modules, and the Linux root filesystem. You'll be given an overview of the available Yocto Project components, how to set up Yocto Project Eclipse IDE, and how to use tools such as Wic and Swabber that are still under development. It will present the meta-realtime layer and the newly created meta-cgl layer, its purpose, and how it can add value to poky.
|Introduction to Linux (Second Edition) (Fultus Technical Library)
Lowest new price: $30.83
Lowest used price: $12.99
List price: $26.99
Author: Machtelt Garrels
Brand: Brand: Fultus Corporation
Whether you're just starting out with Linux or looking to hone your existing skills, this book will provide you with the knowledge you need.
- Used Book in Good Condition
|Google Apps Deciphered: Compute in the Cloud to Streamline Your Desktop
Lowest new price: $5.00
Lowest used price: $2.92
List price: $39.99
Author: Scott Granneman
Google Apps Deciphered
Compute in the Cloud to Streamline Your Desktop
Use Google Apps to Improve Productivity and Collaboration, Reduce Costs, and Eliminate Technology Hassles!
Google Apps gives you virtually all the business and productivity software you need–all of it free, or available at extremely low cost. Because the suite of Google Apps runs on Google’s network in the cloud, you avoid the hassles that go with desktop software. Getting started with Google Apps is easy–but if you want to make the most of it, you’ll need expert guidance that Google’s online help doesn’t provide. Get all the help you need, right here.
This is your start-to-finish guide to setting up Google Apps, migrating to it, customizing it, and using it to improve productivity, communications, and collaboration. Scott Granneman introduces every leading component individually, and shows exactly how to make them work together for you on the web or by integrating them with your favorite desktop apps. You’ll find practical insights on Google Apps email, calendaring, contacts, wikis, word processing, spreadsheets, presentations, video, and even Google’s new web browser Chrome. And, drawing on his extensive experience helping companies move to Google Apps, Granneman presents tips and tricks you simply won’t find anywhere else. Coverage includes
• Choosing the right edition of Google Apps for you
• Setting up Google Apps so it will be easier to use and manage
• Migrating your email, contacts, and calendars to Google Apps
• Administering and securing Google Apps
• Integrating Google Apps with other software and services
• Leveraging Google Sites to collaborate across teams, organizations, or the entire world
• Making the most of Google Talk voice calls and instant messaging
• Implementing Google’s office productivity tools, including Docs, Spreadsheets, and Presentations
• Using policy management and message recovery to control and secure your messaging
• Customizing efficient Google Apps Start Pages for you and your colleagues
• Sharing important and useful videos with your colleagues
• Maximizing the innovative features of Google’s new web browser, Chrome
SCOTT GRANNEMAN is an author, teacher, and entrepreneur with extensive experience in Google Apps migration, setup, and training. As Adjunct Professor at Washington University, he teaches popular courses on technology, security, and the Internet. A monthly columnist for SecurityFocus and Linux Magazine, he has authored four books on open source technologies, including The Linux Phrasebook. As a principal at WebSanity, he manages the firm’s UNIX server environment, and helps develop its Content Management System, which is used by educational, business, and non-profit clients nationwide.
|User Mode Linux
Lowest new price: $52.96
Lowest used price: $9.01
List price: $64.99
Author: Jeff Dike
With User Mode Linux you can create virtual Linux machines within a Linux computer and use them to safely test and debug applications, network services, and even kernels. You can try out new distributions, experiment with buggy software, and even test security. Now, for the first time, the creator and maintainer of User Mode Linux shows how to put it to work hands-on. Jeff Dike covers everything from getting started through running enterprise-class User Mode Linux servers. You'll find authoritative advice on bootup, compilation, administration, specialized configurations, and much more.
- What User Mode Linux is, how it works, and its uses in Linux networks
- Key applications, including server consolidation, development, and disaster recovery
- Booting and exploration: logins, consoles, swap space, partitioned disks, and more
- Copy-On-Write (COW): UML's efficient approach to storing filesystem changes
- In-depth discussion of User Mode Linux networking and security
- Centrally managing User Mode Linux instances, and controlling their hardware resources
- Implementing clusters and other specialized configurations
- Setting up User Mode Linux servers, step-by-step: small-scale and large-scale examples
- The future of virtualization and User Mode Linux
Whether you're a netadmin, sysadmin, teacher, student, or programmer, User Mode Linux® --the technology and this book--is indispensable.
Page 1 of 30
CERTAIN CONTENT THAT APPEARS ON THIS SITE COMES FROM AMAZON SERVICES LLC. THIS CONTENT IS PROVIDED AS IS AND IS SUBJECT TO CHANGE OR REMOVAL AT ANY TIME.