Apparel & AccessoriesBooksClassical MusicDVDElectronics & PhotoGourmet Food and GroceriesHealth & Personal CareHome & GardenIndustrial & ScientificKitchen
Popular MusicMusical InstrumentsOutdoor LivingComputer HardwareComputer SoftwareSporting GoodsToolsToys and GamesVHS VideoVideo Games

Search:

Browse by Catagory:

Books

Linux Networking & Administration


Bash Pocket Reference: Help for Power Users and Sys Admins

Bash Pocket Reference: Help for Power Users and Sys Admins Lowest new price: $6.02
Lowest used price: $4.65
List price: $12.99
Author: Arnold Robbins
Brand: Arnold Robbins

It’s simple: if you want to interact deeply with Mac OS X, Linux, and other Unix-like systems, you need to know how to work with the Bash shell. This concise little book puts all of the essential information about Bash right at your fingertips.

You’ll quickly find answers to the annoying questions that generally come up when you’re writing shell scripts: What characters do you need to quote? How do you get variable substitution to do exactly what you want? How do you use arrays? Updated for Bash version 4.4, this book has the answers to these and other problems in a format that makes browsing quick and easy.

Topics include:

  • Invoking the shell
  • Syntax
  • Functions and variables
  • Arithmetic expressions
  • Command history
  • Programmable completion
  • Job control
  • Shell options
  • Command execution
  • Coprocesses
  • Restricted shells
  • Built-in commands

Features:

  • Bash Pocket Reference Help for Power Users and Sys Admins

Similar Products:


Mastering Kubernetes: Large scale container deployment and management

Mastering Kubernetes: Large scale container deployment and management Lowest new price: $46.23
Lowest used price: $39.35
List price: $49.99
Author: Gigi Sayfan

Key Features

  • This practical guide demystifies Kubernetes and ensures that your clusters are always available, scalable, and up to date
  • Discover new features such as autoscaling, rolling updates, resource quotas, and cluster size
  • Master the skills of designing and deploying large clusters on various cloud platforms

Book Description

Kubernetes is an open source system to automate the deployment, scaling, and management of containerized applications. If you are running more than just a few containers or want automated management of your containers, you need Kubernetes.

This book mainly focuses on the advanced management of Kubernetes clusters. It covers problems that arise when you start using container orchestration in production. We start by giving you an overview of the guiding principles in Kubernetes design and show you the best practises in the fields of security, high availability, and cluster federation.

You will discover how to run complex stateful microservices on Kubernetes including advanced features as horizontal pod autoscaling, rolling updates, resource quotas, and persistent storage back ends. Using real-world use cases, we explain the options for network configuration and provides guidelines on how to set up, operate, and troubleshoot various Kubernetes networking plugins. Finally, we cover custom resource development and utilization in automation and maintenance workflows.

By the end of this book, you'll know everything you need to know to go from intermediate to advanced level.

What you will learn

  • Architect a robust Kubernetes cluster for long-time operation
  • Discover the advantages of running Kubernetes on GCE, AWS, Azure, and bare metal
  • See the identity model of Kubernetes and options for cluster federation
  • Monitor and troubleshoot Kubernetes clusters and run a highly available Kubernetes
  • Create and configure custom Kubernetes resources and use third-party resources in your automation workflows
  • Discover the art of running complex stateful applications in your container environment
  • Deliver applications as standard packages

About the Author

Gigi Sayfan is the chief system architect of VRVIU―a stealth virtual reality start-up. Gigi has been developing software professionally for more than 20 years in domains as diverse as instant messaging, morphing, chip fabrication process control, embedded multi-media application for game consoles, brain-inspired machine learning, custom browser development, web services for 3D distributed game platforms, and most recently IoT/sensors.

He has written production code every day in many programming languages such as C, C++, C#, Python, Java, Delphi, JavaScript, and even Cobol and PowerBuilder for operating systems such as Windows (3.11 through 7), Linux, Mac OSX, Lynx (embedded), and Sony Playstation. His technical expertise includes databases, low-level networking, distributed systems, unorthodox user interfaces, and the general software development lifecycle.

Table of Contents

  1. Understanding Kubernetes Architecture
  2. Creating Kubernetes Clusters
  3. Monitoring, Logging, and Troubleshooting
  4. High Availability and Reliability
  5. Configuring Kubernetes Security, Limits, and Accounts
  6. Using Critical Kubernetes Resources
  7. Handling Kubernetes Storage
  8. Running Stateful Application with Kubernetes
  9. Rolling Updates, Scalability and Quotas
  10. Advanced Kubernetes Networking
  11. Running Kubernetes on Multiple Clouds and Cluster Federation
  12. Customizing Kubernetes - API and Plugins
  13. Handling the Kubernetes Package Manager
  14. The Future of Kubernetes

Similar Products:


Ansible for DevOps: Server and configuration management for humans

Ansible for DevOps: Server and configuration management for humans Lowest new price: $18.97
Lowest used price: $17.17
List price: $19.99
Author: Jeff Geerling
Brand: Ingramcontent

Covers Ansible 2.0! 

Ansible is a simple, but powerful, server and configuration management tool (with a few other tricks up its sleeve). This book helps those familiar with the command line and basic shell scripting start using Ansible to provision and manage anywhere from one to thousands of servers. 

The book begins with fundamentals, like installing Ansible, setting up a basic inventory file, and basic concepts, then guides you through Ansible's many uses, including ad-hoc commands, basic and advanced playbooks, application deployments, multiple-provider server provisioning, and even Docker orchestration! Everything is explained with pertinent real-world examples, often using Vagrant-managed virtual machines.

Features:

  • Ansible for Devops Server and Configuration Management for Humans

Similar Products:


Hacking: The Underground Guide to Computer Hacking, Including Wireless Networks, Security, Windows, Kali Linux and Penetration Testing

Hacking: The Underground Guide to Computer Hacking, Including Wireless Networks, Security, Windows, Kali Linux and Penetration Testing Lowest new price: $14.08
List price: $14.99
Author: Abraham K White

Learn to hack!
Below are sample topics covered in the book:

- Hacking into Computers and Smartphones
- Ethical Hacking
- Scanning Your Systems
- Pinpointing Specific Vulnerabilities
- The best tools for each kind of hacking
- Cracking Encryption
- Flaws in Websites and Applications
- Attacking with Frameworks
- Penetration Testing
- Linux
- Step by Step Commands to perform
- Phishing
- Advantages and Disadvantages of WEP, WPA, WPA2, etc
- Other Wireless Hacking Resources
- And various other subjects related to hacking
If you really want to learn more about hacking, then this book will definitely provide you with detailed information as well as other resources you can learn from.

Similar Products:


Mastering Kali Linux for Advanced Penetration Testing - Second Edition: Secure your network with Kali Linux - the ultimate white hat hackers' toolkit

Mastering Kali Linux for Advanced Penetration Testing - Second Edition: Secure your network with Kali Linux - the ultimate white hat hackers' toolkit Lowest new price: $49.98
Lowest used price: $45.66
List price: $49.99
Author: Vijay Kumar Velu

A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers.

About This Book

  • Employ advanced pentesting techniques with Kali Linux to build highly-secured systems
  • Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches
  • Select and configure the most effective tools from Kali Linux to test network security and prepare your business against malicious threats and save costs

Who This Book Is For

Penetration Testers, IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you.Some prior exposure to basics of penetration testing/ethical hacking would be helpful in making the most out of this title.

What You Will Learn

  • Select and configure the most effective tools from Kali Linux to test network security
  • Employ stealth to avoid detection in the network being tested
  • Recognize when stealth attacks are being used against your network
  • Exploit networks and data systems using wired and wireless networks as well as web services
  • Identify and download valuable data from target systems
  • Maintain access to compromised systems
  • Use social engineering to compromise the weakest part of the network-the end users

In Detail

This book will take you, as a tester or security practitioner through the journey of reconnaissance, vulnerability assessment, exploitation, and post-exploitation activities used by penetration testers and hackers.

We will start off by using a laboratory environment to validate tools and techniques, and using an application that supports a collaborative approach to penetration testing. Further we will get acquainted with passive reconnaissance with open source intelligence and active reconnaissance of the external and internal networks. We will also focus on how to select, use, customize, and interpret the results from a variety of different vulnerability scanners. Specific routes to the target will also be examined, including bypassing physical security and exfiltration of data using different techniques. You will also get to grips with concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections. Later you will learn the practical aspects of attacking user client systems by backdooring executable files. You will focus on the most vulnerable part of the network-directly and bypassing the controls, attacking the end user and maintaining persistence access through social media.

You will also explore approaches to carrying out advanced penetration testing in tightly secured environments, and the book's hands-on approach will help you understand everything you need to know during a Red teaming exercise or penetration testing

Style and approach

An advanced level tutorial that follows a practical approach and proven methods to maintain top notch security of your networks.

Table of Contents

  1. Goal-Based Penetration Testing with Kali Linux
  2. Open Source Intelligence and Passive Reconnaissance
  3. Active Reconnaissance of the External and Internal Networks
  4. Vulnerability Assessment
  5. Physical Security and Social Engineering
  6. Wireless Attacks
  7. Reconnaissance and Exploitation of Web-Based Applications
  8. Attacking Remote Access
  9. Client-Side Exploitation
  10. Bypassing Security Controls
  11. Exploitation
  12. Action on the Objective
  13. Privilege Escalation
  14. Command and Control

Similar Products:


SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys (IT Mastery) (Volume 12)

SSH Mastery: OpenSSH, PuTTY, Tunnels and Keys (IT Mastery) (Volume 12) Lowest new price: $20.15
Lowest used price: $31.05
List price: $24.99
Author: Michael W Lucas

Secure Shell (SSH) lets sysadmins securely manage remote systems. It’s powerful, complicated, and confusing. Lose the confusion. SSH Mastery rescues you from sifting through decades of obsolete online tutorials and quickly makes you an SSH journeyman. You’ll learn to

  • eliminate passwords
  • manage access by users, groups, addresses, and more
  • securely move files around your network
  • forward graphic displays
  • proxy TCP connections
  • build SOCKS proxies
  • centrally manage and distribute keys and configurations
  • use SSH as secure transport for other applications
  • build virtual private networks
  • create Certificate Authorities for massive scale deployment
Master Secure Shell with SSH Mastery!

Similar Products:


Guide to UNIX Using Linux (Networking (Course Technology))

Guide to UNIX Using Linux (Networking (Course Technology)) Lowest new price: $49.00
Lowest used price: $44.72
List price: $217.95
Author: Michael Palmer
Brand: Cengage Learning

Written with a clear, straightforward writing style and packed with step-by-step projects for direct, hands-on learning, Guide to UNIX Using Linux, 4E is the perfect resource for learning UNIX and Linux from the ground up. Through the use of practical examples, end-of-chapter reviews, and interactive exercises, novice users are transformed into confident UNIX/Linux users who can employ utilities, master files, manage and query data, create scripts, access a network or the Internet, and navigate popular user interfaces and software. The updated 4th edition incorporates coverage of the latest versions of UNIX and Linux, including new versions of Red Hat, Fedora, SUSE, and Ubuntu Linux. A new chapter has also been added to cover basic networking utilities, and several other chapters have been expanded to include additional information on the KDE and GNOME desktops, as well as coverage of the popular OpenOffice.org office suite. With a strong focus on universal UNIX and Linux commands that are transferable to all versions of Linux, this book is a "must-have" for anyone seeking to develop their knowledge of these systems.

Features:

  • Used Book in Good Condition

Similar Products:


Database Reliability Engineering: Designing and Operating Resilient Database Systems

Database Reliability Engineering: Designing and Operating Resilient Database Systems Lowest new price: $26.22
Lowest used price: $23.68
List price: $49.99
Author: Laine Campbell

The infrastructure-as-code revolution in IT is also affecting database administration. With this practical book, developers, system administrators, and junior to mid-level DBAs will learn how the modern practice of site reliability engineering applies to the craft of database architecture and operations. Authors Laine Campbell and Charity Majors provide a framework for professionals looking to join the ranks of today’s database reliability engineers (DBRE).

You’ll begin by exploring core operational concepts that DBREs need to master. Then you’ll examine a wide range of database persistence options, including how to implement key technologies to provide resilient, scalable, and performant data storage and retrieval. With a firm foundation in database reliability engineering, you’ll be ready to dive into the architecture and operations of any modern database.

This book covers:

  • Service-level requirements and risk management
  • Building and evolving an architecture for operational visibility
  • Infrastructure engineering and infrastructure management
  • How to facilitate the release management process
  • Data storage, indexing, and replication
  • Identifying datastore characteristics and best use cases
  • Datastore architectural components and data-driven architectures

Similar Products:


Linux Device Drivers Development: Develop customized drivers for embedded Linux

Linux Device Drivers Development: Develop customized drivers for embedded Linux Lowest new price: $44.99
Lowest used price: $46.31
List price: $44.99
Author: John Madieu

Key Features

  • Learn to develop customized Linux device drivers
  • Learn the core concepts of device drivers such as memory management, kernel caching, advanced IRQ management, and so on.
  • Practical experience on the embedded side of Linux

Book Description

Linux kernel is a complex, portable, modular and widely used piece of software, running on around 80% of servers and embedded systems in more than half of devices throughout the World. Device drivers play a critical role in how well a Linux system performs. As Linux has turned out to be one of the most popular operating systems used, the interest in developing proprietary device drivers is also increasing steadily.

This book will initially help you understand the basics of drivers as well as prepare for the long journey through the Linux Kernel. This book then covers drivers development based on various Linux subsystems such as memory management, PWM, RTC, IIO, IRQ management, and so on. The book also offers a practical approach on direct memory access and network device drivers.

By the end of this book, you will be comfortable with the concept of device driver development and will be in a position to write any device driver from scratch using the latest kernel version (v4.13 at the time of writing this book).

What you will learn

  • Use kernel facilities to develop powerful drivers
  • Develop drivers for widely used I2C and SPI devices and use the regmap API
  • Write and support devicetree from within your drivers
  • Program advanced drivers for network and frame buffer devices
  • Delve into the Linux irqdomain API and write interrupt controller drivers
  • Enhance your skills with regulator and PWM frameworks
  • Develop measurement system drivers with IIO framework
  • Get the best from memory management and the DMA subsystem
  • Access and manage GPIO subsystems and develop GPIO controller drivers

About the Author

John Madieu is an embedded Linux and kernel engineer living in France, in Paris. His main activities consist of developing drivers and Board Support Packages (BSP) for companies in domains such as automation, transport, healthcare, energy, and the military. John works at EXPEMB, a French company that is a pioneer in electronical board design based on computer-on-module, and in embedded Linux solutions. He is an open source and embedded systems enthusiast, convinced that it is only by sharing knowledge that one learns more.

He is passionate about boxing, which he practised for 6 years professionally, and continues to transmit this passion through sessions of training that he provides voluntarily.

Table of Contents

  1. Introduction to Kernel Development
  2. Device Driver Basis
  3. Kernel Facilities and Helper Functions
  4. Character Device Drivers
  5. Platform Device Drivers
  6. The Concept of Device Tree
  7. I2C Client Drivers
  8. SPI Device Drivers
  9. Regmap API - A Register Map Abstraction
  10. IIO Framework
  11. Kernel Memory Management
  12. DMA Direct Memory Access
  13. Linux Device Model
  14. Pin Control and GPIO Subsystem
  15. GPIO Controller Drivers gpio_chip
  16. Advanced IRQ Management
  17. Input Devices Drivers
  18. RTC Drivers
  19. PWM Drivers
  20. Regulator Framework

Similar Products:


Learn System Center Configuration Manager in a Month of Lunches

Learn System Center Configuration Manager in a Month of Lunches Lowest new price: $26.76
Lowest used price: $25.25
List price: $44.99
Author: James Bannan
Brand: Bannan James

Summary

Learn System Center Configuration Manager in a Month of Lunches is a super-practical guide to Microsoft System Center Configuration Manager. In this book, you'll cut to the chase and learn the administrative procedures and techniques that will keep your systems humming smoothly.

Purchase of the print book comes with an offer of a free PDF, ePub, and Kindle eBook from Manning. Also available is all code from the book.

About the Technology

Businesses rely on a complex patchwork of client computers, physical and virtual servers, middleware, mobile devices, and cloud services. Microsoft System Center Configuration Manager (SCCM) sits in the middle of this mix, providing a single administrative control center to deploy and manage Windows servers and applications across your entire infrastructure, including cross-platform management of Mac OS X, Linux, and UNIX. To get up to speed with the day-to-day tasks of managing a system with ConfigMgr, all you need is this book—and a quiet place to eat your lunch.

About the Book

Learn System Center Configuration Manager in a Month of Lunches is a super-practical guide to Microsoft System Center Configuration Manager. In this book, you’ll cut to the chase and learn the administrative procedures and techniques that will keep your systems humming smoothly. Whether you’re a new sysadmin or you already understand the inner workings of Active Directory and Windows Server, you’ll be productive immediately as you work through the 22 self-contained lessons in this handy tutorial.

What's Inside

  • Covers the latest build of Configuration Manager
  • How to simplify updates, operating system deployment, and reporting
  • Cross-platform and mobile management including Linux, OS X, and Windows
  • Smart application delivery

About the Reader

No prior experience with System Center Configuration Manager needed.

About the Author

James Bannan is a Cloud and Datacenter Management MVP based in Australia.

Table of Contents

  1. Before you begin
  2. Setting up your lab environment
  3. Making ConfigMgr aware of your environment
  4. Managing ConfigMgr devices and users
  5. Organizing devices and users
  6. Configuring ConfigMgr clients
  7. Creating and configuring applications with the AppModel
  8. Deploying applications and packages to ConfigMgr clients
  9. Ensuring that ConfigMgr clients can access content
  10. Keeping ConfigMgr clients patched
  11. Preparing to deploy Windows
  12. Deploying Windows
  13. Advanced deployment of Windows with ConfigMgr and MDT
  14. Managing Linux clients
  15. Deploying to Linux and Mac clients
  16. Managing anti-malware with ConfigMgr
  17. Making sure clients are healthy
  18. Reporting in ConfigMgr
  19. Keeping an eye on your clients
  20. What to do when things go wrong
  21. Securing ConfigMgr
  22. All engines full steam ahead

Features:

  • Learn System Center Configuration Manager in a Month of Lunches

Similar Products:


<< Prev   Next >>
Page 2 of 131

[Kindle]    [Kindle DX]
  Privacy Policy

CERTAIN CONTENT THAT APPEARS ON THIS SITE COMES FROM AMAZON SERVICES LLC. THIS CONTENT IS PROVIDED AS IS AND IS SUBJECT TO CHANGE OR REMOVAL AT ANY TIME.