Apparel & AccessoriesBooksClassical MusicDVDElectronics & PhotoGourmet Food and GroceriesHealth & Personal CareHome & GardenIndustrial & ScientificKitchen
Popular MusicMusical InstrumentsOutdoor LivingComputer HardwareComputer SoftwareSporting GoodsToolsToys and GamesVHS VideoVideo Games

Search:

Browse by Catagory:

Books

Linux Networking & Administration


Understanding Linux Network Internals: Guided Tour to Networking on Linux

Understanding Linux Network Internals: Guided Tour to Networking on Linux Lowest new price: $32.22
Lowest used price: $12.00
List price: $59.99
Author: Christian Benvenuti

If you've ever wondered how Linux carries out the complicated tasks assigned to it by the IP protocols -- or if you just want to learn about modern networking through real-life examples -- Understanding Linux Network Internals is for you.

Like the popular O'Reilly book, Understanding the Linux Kernel, this book clearly explains the underlying concepts and teaches you how to follow the actual C code that implements it. Although some background in the TCP/IP protocols is helpful, you can learn a great deal from this text about the protocols themselves and their uses. And if you already have a base knowledge of C, you can use the book's code walkthroughs to figure out exactly what this sophisticated part of the Linux kernel is doing.

Part of the difficulty in understanding networks -- and implementing them -- is that the tasks are broken up and performed at many different times by different pieces of code. One of the strengths of this book is to integrate the pieces and reveal the relationships between far-flung functions and data structures. Understanding Linux Network Internals is both a big-picture discussion and a no-nonsense guide to the details of Linux networking. Topics include:

  • Key problems with networking
  • Network interface card (NIC) device drivers
  • System initialization
  • Layer 2 (link-layer) tasks and implementation
  • Layer 3 (IPv4) tasks and implementation
  • Neighbor infrastructure and protocols (ARP)
  • Bridging
  • Routing
  • ICMP

Author Christian Benvenuti, an operating system designer specializing in networking, explains much more than how Linux code works. He shows the purposes of major networking features and the trade-offs involved in choosing one solution over another. A large number of flowcharts and other diagrams enhance the book's understandability.

Similar Products:


SELinux System Administration - Second Edition

SELinux System Administration - Second Edition Lowest new price: $49.98
Lowest used price: $30.07
List price: $49.99
Author: Sven Vermeulen

Ward off traditional security permissions and effectively secure your Linux systems with SELinux

About This Book

  • Leverage SELinux to improve the secure state of your Linux system
  • A clear approach to adopting SELinux within your organization
  • Essential skills and techniques to help further your system administration career

Who This Book Is For

This book is for Linux administrators who want to control the secure state of their systems. It’s packed with the latest information on SELinux operations and administrative procedures so you’ll be able to further harden your system through mandatory access control (MAC) – a security strategy that has been shaping Linux security for years.

What You Will Learn

  • Analyze SELinux events and selectively enable or disable SELinux enforcement
  • Manage Linux users and associate them with the right role and permission set
  • Secure network communications through SELinux access controls
  • Tune the full service flexibility by dynamically assigning resource labels
  • Handle SELinux access patterns enforced through the system
  • Query the SELinux policy in depth

In Detail

Do you have the crucial job of protecting your private and company systems from malicious attacks and undefined application behavior? Are you looking to secure your Linux systems with improved access controls? Look no further, intrepid administrator! This book will show you how to enhance your system’s secure state across Linux distributions, helping you keep application vulnerabilities at bay.

This book covers the core SELinux concepts and shows you how to leverage SELinux to improve the protection measures of a Linux system. You will learn the SELinux fundamentals and all of SELinux’s configuration handles including conditional policies, constraints, policy types, and audit capabilities. These topics are paired with genuine examples of situations and issues you may come across as an administrator. In addition, you will learn how to further harden the virtualization offering of both libvirt (sVirt) and Docker through SELinux.

By the end of the book you will know how SELinux works and how you can tune it to meet your needs.

Style and approach

This book offers a complete overview of SELinux administration and how it integrates with other components on a Linux system. It covers the majority of SELinux features with a mix of real life scenarios, descriptions, and examples. This book contains everything an administrator needs to customize SELinux.

Similar Products:


Linux Hardening in Hostile Networks: Server Security from TLS to Tor (Pearson Open Source Software Development Series)

Linux Hardening in Hostile Networks: Server Security from TLS to Tor (Pearson Open Source Software Development Series) Lowest new price: $23.36
Lowest used price: $24.19
List price: $39.99
Author: Kyle Rankin
Brand: Rankin Kyle

Implement Industrial-Strength Security on Any Linux Server

 

In an age of mass surveillance, when advanced cyberwarfare weapons rapidly migrate into every hacker’s toolkit, you can’t rely on outdated security methods–especially if you’re responsible for Internet-facing services. In Linux® Hardening in Hostile Networks, Kyle Rankin helps you to implement modern safeguards that provide maximum impact with minimum effort and to strip away old techniques that are no longer worth your time.

 

Rankin provides clear, concise guidance on modern workstation, server, and network hardening, and explains how to harden specific services, such as web servers, email, DNS, and databases. Along the way, he demystifies technologies once viewed as too complex or mysterious but now essential to mainstream Linux security. He also includes a full chapter on effective incident response that both DevOps and SecOps can use to write their own incident response plan.

 

Each chapter begins with techniques any sysadmin can use quickly to protect against entry-level hackers and presents intermediate and advanced techniques to safeguard against sophisticated and knowledgeable attackers, perhaps even state actors. Throughout, you learn what each technique does, how it works, what it does and doesn’t protect against, and whether it would be useful in your environment.

  • Apply core security techniques including 2FA and strong passwords
  • Protect admin workstations via lock screens, disk encryption, BIOS passwords, and other methods
  • Use the security-focused Tails distribution as a quick path to a hardened workstation
  • Compartmentalize workstation tasks into VMs with varying levels of trust
  • Harden servers with SSH, use apparmor and sudo to limit the damage attackers can do, and set up remote syslog servers to track their actions
  • Establish secure VPNs with OpenVPN, and leverage SSH to tunnel traffic when VPNs can’t be used
  • Configure a software load balancer to terminate SSL/TLS connections and initiate new ones downstream
  • Set up standalone Tor services and hidden Tor services and relays
  • Secure Apache and Nginx web servers, and take full advantage of HTTPS
  • Perform advanced web server hardening with HTTPS forward secrecy and ModSecurity web application firewalls
  • Strengthen email security with SMTP relay authentication, SMTPS, SPF records, DKIM, and DMARC
  • Harden DNS servers, deter their use in DDoS attacks, and fully implement DNSSEC
  • Systematically protect databases via network access control, TLS traffic encryption, and encrypted data storage
  • Respond to a compromised server, collect evidence, and prevent future attacks

Register your product at informit.com/register for convenient access to downloads, updates, and corrections as they become available.

Features:

  • Linux Hardening in Hostile Networks Server Security from Tls to Tor

Similar Products:


Puppet 4.10 Beginner's Guide - Second Edition

Puppet 4.10 Beginner's Guide - Second Edition Lowest new price: $39.98
Lowest used price: $48.47
List price: $39.99
Author: John Arundel

Puppet is great for developers, system administrators, IT professionals, and anyone laying the foundation for DevOps practices - this comprehensive guide will get you up to speed, all the way from installation to automation to the latest features of Puppet 4.10.

About This Book

  • Develop skills to run Puppet 4.10 on single or multiple servers without hiccups
  • Use Puppet to spin up and manage cloud resources such as Amazon EC2 instances
  • Take full advantage of the powerful new features of Puppet 4.10, including loops, data types, structured facts, R10K module management, control repos, and EPP templates

Who This Book Is For

Puppet Beginner's Guide, Second Edition is designed for those who are new to Puppet, including system administrators and developers who are looking to manage computer server systems for configuration management. No prior programming or system administration experience is assumed.

What You Will Learn

  • Covers the latest Puppet 4.10 release
  • Install and set up Puppet and discover the latest and most advanced features
  • Configure, build, and run containers in production using Puppet's industry-leading Docker support
  • Deploy configuration files and templates at super-fast speeds and manage user accounts and access control
  • Automate your IT infrastructure
  • Use the latest features in Puppet 4 onward and its official modules
  • Manage clouds, containers, and orchestration
  • Get to know the best practices to make Puppet more reliable and increase its performance

In Detail

Puppet 4.10 Beginner's Guide, Second Edition, gets you up and running with the very latest features of Puppet 4.10, including Docker containers, Hiera data, and Amazon AWS cloud orchestration. Go from beginner to confident Puppet user with a series of clear, practical examples to help you manage every aspect of your server setup.

Whether you're a developer, a system administrator, or you are simply curious about Puppet, you'll learn Puppet skills that you can put into practice right away. With practical steps giving you the key concepts you need, this book teaches you how to install packages and config files, create users, set up scheduled jobs, provision cloud instances, build containers, and so much more.

Every example in this book deals with something real and practical that you're likely to need in your work, and you'll see the complete Puppet code that makes it happen, along with step-by-step instructions for what to type and what output you'll see. All the examples are available in a GitHub repo for you to download and adapt for your own server setup.

Style and approach

This tutorial is packed with quick step-by-step instructions that are immediately applicable for beginners. This is an easy-to-read guide, to learn Puppet from scratch, that explains simply and clearly all you need to know to use this essential IT power tool, while applying these solutions to real-world scenarios.

Similar Products:


Kali Linux 2 Assuring Security by Penetration Testing - Third Edition

Kali Linux 2 Assuring Security by Penetration Testing - Third Edition Lowest new price: $44.99
Lowest used price: $54.38
List price: $44.99
Author: Gerard Johansen

Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition!

About This Book

  • Get a rock-solid insight into penetration testing techniques and test your corporate network against threats like never before
  • Formulate your pentesting strategies by relying on the most up-to-date and feature-rich Kali version in town―Kali Linux 2 (aka Sana).
  • Experience this journey with new cutting-edge wireless penetration tools and a variety of new features to make your pentesting experience smoother

Who This Book Is For

If you are an IT security professional or a student with basic knowledge of Unix/Linux operating systems, including an awareness of information security factors, and you want to use Kali Linux for penetration testing, this book is for you.

What You Will Learn

  • Find out to download and install your own copy of Kali Linux
  • Properly scope and conduct the initial stages of a penetration test
  • Conduct reconnaissance and enumeration of target networks
  • Exploit and gain a foothold on a target system or network
  • Obtain and crack passwords
  • Use the Kali Linux NetHunter install to conduct wireless penetration testing
  • Create proper penetration testing reports

In Detail

Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in a successful penetration testing project engagement.

Kali Linux – Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating cutting-edge hacker tools and techniques with a coherent, step-by-step approach. This book offers you all of the essential lab preparation and testing procedures that reflect real-world attack scenarios from a business perspective, in today's digital age.

Style and approach

This practical guide will showcase penetration testing through cutting-edge tools and techniques using a coherent, step-by-step approach.

Similar Products:


Mastering Kali Linux for Advanced Penetration Testing - Second Edition: Secure your network with Kali Linux - the ultimate white hat hackers' toolkit

Mastering Kali Linux for Advanced Penetration Testing - Second Edition: Secure your network with Kali Linux - the ultimate white hat hackers' toolkit Lowest new price: $49.99
Lowest used price: $59.44
List price: $49.99
Author: Vijay Kumar Velu

A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers.

About This Book

  • Employ advanced pentesting techniques with Kali Linux to build highly-secured systems
  • Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches
  • Select and configure the most effective tools from Kali Linux to test network security and prepare your business against malicious threats and save costs

Who This Book Is For

Penetration Testers, IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you.Some prior exposure to basics of penetration testing/ethical hacking would be helpful in making the most out of this title.

What You Will Learn

  • Select and configure the most effective tools from Kali Linux to test network security
  • Employ stealth to avoid detection in the network being tested
  • Recognize when stealth attacks are being used against your network
  • Exploit networks and data systems using wired and wireless networks as well as web services
  • Identify and download valuable data from target systems
  • Maintain access to compromised systems
  • Use social engineering to compromise the weakest part of the network-the end users

In Detail

This book will take you, as a tester or security practitioner through the journey of reconnaissance, vulnerability assessment, exploitation, and post-exploitation activities used by penetration testers and hackers.

We will start off by using a laboratory environment to validate tools and techniques, and using an application that supports a collaborative approach to penetration testing. Further we will get acquainted with passive reconnaissance with open source intelligence and active reconnaissance of the external and internal networks. We will also focus on how to select, use, customize, and interpret the results from a variety of different vulnerability scanners. Specific routes to the target will also be examined, including bypassing physical security and exfiltration of data using different techniques. You will also get to grips with concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections. Later you will learn the practical aspects of attacking user client systems by backdooring executable files. You will focus on the most vulnerable part of the network-directly and bypassing the controls, attacking the end user and maintaining persistence access through social media.

You will also explore approaches to carrying out advanced penetration testing in tightly secured environments, and the book's hands-on approach will help you understand everything you need to know during a Red teaming exercise or penetration testing

Style and approach

An advanced level tutorial that follows a practical approach and proven methods to maintain top notch security of your networks.

Similar Products:


Cloud Foundry: The Cloud-Native Platform

Cloud Foundry: The Cloud-Native Platform Lowest new price: $9.60
Lowest used price: $7.83
List price: $14.99
Author: Duncan C. E. Winn
Brand: imusti

What exactly is a cloud-native platform? It’s certainly a hot topic in IT, as enterprises today assess this option for developing and delivering software quickly and repeatedly. This O’Reilly report explains the capabilities of cloud-native platforms and examines the fundamental changes enterprises need to make in process, organization, and culture if they’re to take real advantage of this approach.

Author Duncan Winn focuses on the open source platform Cloud Foundry, one of the more prominent cloud-native providers. You’ll learn how cloud-native applications are designed to be "infrastructure unaware" so they can thrive and move at will in the highly distributed and constantly evolving cloud environment.

With this report, you’ll explore:

  • Technical driving forces that are rapidly changing the way organizations develop and deliver software today
  • How key concepts underpinning the Cloud Foundry platform leverage each of the technical forces discussed
  • How cloud-native platforms remove the requirement to perform undifferentiated heavy lifting, such as provisioning VMs, middleware, and databases
  • Why cloud-native platforms enable fast feedback loops as you move from agile development to agile deployment
  • Recommended changes and practical considerations for organizations that want to build cloud-native applications

Features:

  • O Reilly Media

Similar Products:


Fedora 16 Desktop: Applications and Administration

Fedora 16 Desktop: Applications and Administration Lowest new price: $37.59
Lowest used price: $16.80
List price: $42.00
Author: Richard Petersen
Brand: Brand: surfing turtle press

This book examines Fedora for the user. Though administrative tools are covered, the emphasis is on what a user would need to know to perform tasks. The focus here is on what users face when using Fedora, covering topics like installation, applications, software management, the GNOME 3 and KDE desktops, shell commands, and both the Fedora administration and network tools. Desktops are examined in detail, including configuration options. Applications examined include Office Suites, editors, ebook readers, music and video applications and codecs, email clients, Web and FTP browsers, microblogging and IM applications. This book is designed for the Fedora 16 desktop, with all the latest features of interest to users.

Features:

  • Used Book in Good Condition


Learning Linux Binary Analysis

Learning Linux Binary Analysis Lowest new price: $44.96
Lowest used price: $30.07
List price: $44.99
Author: Ryan "elfmaster" O'Neill

Key Features

  • Grasp the intricacies of the ELF binary format of UNIX and Linux
  • Design tools for reverse engineering and binary forensic analysis
  • Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes

Book Description

Learning Linux Binary Analysis is packed with knowledge and code that will teach you the inner workings of the ELF format, and the methods used by hackers and security analysts for virus analysis, binary patching, software protection and more.

This book will start by taking you through UNIX/Linux object utilities, and will move on to teaching you all about the ELF specimen. You will learn about process tracing, and will explore the different types of Linux and UNIX viruses, and how you can make use of ELF Virus Technology to deal with them.

The latter half of the book discusses the usage of Kprobe instrumentation for kernel hacking, code patching, and debugging. You will discover how to detect and disinfect kernel-mode rootkits, and move on to analyze static code. Finally, you will be walked through complex userspace memory infection analysis.

This book will lead you into territory that is uncharted even by some experts; right into the world of the computer hacker.

What you will learn

  • Explore the internal workings of the ELF binary format
  • Discover techniques for UNIX Virus infection and analysis
  • Work with binary hardening and software anti-tamper methods
  • Patch executables and process memory
  • Bypass anti-debugging measures used in malware
  • Perform advanced forensic analysis of binaries
  • Design ELF-related tools in the C language
  • Learn to operate on memory with ptrace

About the Author

Ryan "elfmaster" O'Neill is a computer security researcher and software engineer with a background in reverse engineering, software exploitation, security defense, and forensics technologies. He grew up in the computer hacker subculture, the world of EFnet, BBS systems, and remote buffer overflows on systems with an executable stack. He was introduced to system security, exploitation, and virus writing at a young age. His great passion for computer hacking has evolved into a love for software development and professional security research. Ryan has spoken at various computer security conferences, including DEFCON and RuxCon, and also conducts a 2-day ELF binary hacking workshop.

He has an extremely fulfilling career and has worked at great companies such as Pikewerks, Leviathan Security Group, and more recently Backtrace as a software engineer.

Ryan has not published any other books, but he is well known for some of his papers published in online journals such as Phrack and VXHeaven. Many of his other publications can be found on his website at http://www.bitlackeys.org.

Table of Contents

  1. The Linux Environment and Its Tools
  2. The ELF Binary Format
  3. Linux Process Tracing
  4. ELF Virus Technology – Linux/Unix Viruses
  5. Linux Binary Protection
  6. ELF Binary Forensics in Linux
  7. Process Memory Forensics
  8. ECFS – Extended Core File Snapshot Technology
  9. Linux /proc/kcore Analysis

Similar Products:


Absolute OpenBSD: UNIX for the Practical Paranoid

Absolute OpenBSD: UNIX for the Practical Paranoid Lowest new price: $48.40
Lowest used price: $20.00
List price: $59.95
Author: Michael W. Lucas
Brand: Brand: No Starch Press

The definitive guide to OpenBSD

Foreword by Henning Brauer, OpenBSD PF Developer

OpenBSD, the elegant, highly secure Unix-like operating system, is widely used as the basis for critical DNS servers, routers, firewalls, and more. This long-awaited second edition of Absolute OpenBSD maintains author Michael Lucas's trademark straightforward and practical approach that readers have enjoyed for years. You'll learn the intricacies of the platform, the technical details behind certain design decisions, and best practices, with bits of humor sprinkled throughout. This edition has been completely updated for OpenBSD 5.3, including new coverage of OpenBSD's boot system, security features like W^X and ProPolice, and advanced networking techniques.

You'll learn how to:

  • Manage network traffic with VLANs, trunks, IPv6, and the PF packet filter
  • Make software management quick and effective using the ports and packages system
  • Give users only the access they need with groups, sudo, and chroots
  • Configure OpenBSD's secure implementations of SNMP, DHCP, NTP, hardware sensors, and more
  • Customize the installation and upgrade processes for your network and hardware, or build a custom OpenBSD release

Whether you're a new user looking for a complete introduction to OpenBSD or an experienced sysadmin looking for a refresher, Absolute OpenBSD, 2nd Edition will give you everything you need to master the intricacies of the world's most secure operating system.

"The definitive book on OpenBSD gets a long-overdue refresh."

-Theo de Raadt, OpenBSD Founder

Features:

  • Used Book in Good Condition

Similar Products:


<< Prev   Next >>
Page 4 of 130

[Kindle]    [Kindle DX]
  Privacy Policy

CERTAIN CONTENT THAT APPEARS ON THIS SITE COMES FROM AMAZON SERVICES LLC. THIS CONTENT IS PROVIDED AS IS AND IS SUBJECT TO CHANGE OR REMOVAL AT ANY TIME.