|Browse by Catagory:
Civil Rights & Liberties
War & Peace
Cajun & Creole Cooking
Caribbean & West Indian Cooking
Diabetic & Sugar-Free Cooking
Low Fat Cooking
Middle Eastern Cooking
Pacific Rim Cooking
Home & Garden
Literature & Fiction
Sheet Music & Scores
Environmental & Natural Resources Law
Ethics & Professional Responsibility
Procedures & Litigation
Water Supply & Land Use
Lawyer and Crimal Humor
Outdoors & Nature
Hiking & Camping
Hunting & Fishing
Beer & Beer Making
Health & Fitness
Diets & Weight Loss
Children's Science & Nature
Vitamins & Supplements
Psychology and Counseling
Philosophy of Psychology
Physiological Aspects of Psychology
Psychology of Sexuality
Psychology Testing & Measurement
Chaos & Systems
Geometry & Topology
Logic & Brain Teasers
Chaos & Systems
Geometry & Topology
Probability & Statistics
Experiments, Instruments & Measurement
Chaos & Systems
Fusion & Fission
Nuclear Magnetic Resonance
Waves & Wave Mechanics
Administration & Policy
Allied Health Professions
Medical Education & Training
Endocrinology & Metabolism
Physician & Patient
Insects & Spiders
Fish & Aquariums
Mobile & Wireless Computing: Programming
Linux Kernel & Peripherals
Linux Networking & Administration
State & Local History
Sci Fi Calendars
Bujold, Lois McMaster
Card, Orson Scott
Chalker, Jack L.
Heinlein, Robert A.
McKillip, Patricia A.
Nye, Jody Lynn
Linux Networking & Administration
|Shell Scripting: How to Automate Command Line Tasks Using Bash Scripting and Shell Programming
Lowest new price: $14.53
Lowest used price: $14.48
List price: $14.99
Author: Jaosn Cannon
Shell Scripting Made Easy
If you want to learn how to write shell scripts like a pro, solve real-world problems, or automate repetitive and complex tasks, read on.
Hello. My name is Jason Cannon and I'm the author of Linux for Beginners, Python Programming for Beginners, and an instructor to thousands of satisfied students. I started my IT career in the late 1990's as a Unix and Linux System Engineer and I'll be sharing my real-world shell scripting and bash programming experience with you throughout this book.
By the end of this book you will be able to create shell scripts with ease. You'll learn how to take tedious and repetitive tasks and turn them into programs that will save you time and simplify your life on Linux, Unix, or MAC systems.
Here is what you will get and learn by reading this Shell Scripting book:
- A step-by-step process of writing shell scripts that solve real-world problems.
- The #1 thing you must do every time you create a shell script.
- How to quickly find and fix the most shell scripting errors.
- How to accept input from a user and then make decisions on that input.
- How to accept and process command line arguments.
- What special variables are available, how to use them in your shell scripts, and when to do so.
- A shell script creation check list -- You'll never have to guess what to include in each of your shell scripts again. Just use this simple check list.
- A shell script template (boilerplate). Use this format for each of your shell scripts. It shows exactly what to include and where everything goes. Eliminate guesswork!
- Practice exercises with solutions so you can start using what you learn right away.
- Real-world examples of shell scripts from my personal collection.
- A download that contains the scripts used in the book and lessons. You'll be able to look at and experiment with everything you're learning.
Learn to Program Using Any Shell Scirpting Language
What you learn in this book can be applied to any shell, however the focus is on the bash shell and you'll learn some really advanced bash features. Again, whether you're using bash, bourne (sh), KornShell (ksh), C shell (csh), Z shell (zsh), or even the tcsh shell, you'll be able to put what you learn in this book to good use.
Perfect for Linux, Unix, Mac and More!
Also, you'll be able to use these scripts on any Linux environment including Ubuntu, Debian, Linux Mint, RedHat, Fedora, OpenSUSE, Slackware, Kali Linux and more. You're scripts will even run on other operating systems such as Apple's Mac OS X, Oracle's Solaris, IBM's AIX, HP's HP-UX, FreeBSD, NetBSD, and OpenBSD.
Scroll up, click the Buy Now With 1 Click button and get started learning Linux today!
|Embedded Linux Development Using Yocto Project Cookbook - Second Edition: Practical recipes to help you leverage the power of Yocto to build exciting Linux-based systems
Lowest new price: $42.00
Lowest used price: $40.01
List price: $44.99
Author: Alex Gonzalez
Over 79 hands-on recipes for professional embedded Linux developers to optimize and boost their Yocto Project know-how
- Optimize your Yocto setup to speed up development and debug build issues
- Use what is quickly becoming the standard embedded Linux product builder framework-the Yocto Project
- Recipe-based implementation of best practices to optimize your Linux system
The Yocto Project has become the de facto distribution build framework for reliable and robust embedded systems with a reduced time to market.
You'll get started by working on a build system where you set up Yocto, create a build directory, and learn how to debug it. Then, you'll explore everything about the BSP layer, from creating a custom layer to debugging device tree issues. In addition to this, you'll learn how to add a new software layer, packages, data, scripts, and configuration files to your system. You will then cover topics based on application development, such as using the Software Development Kit and how to use the Yocto project in various development environments. Toward the end, you will learn how to debug, trace, and profile a running system. This second edition has been updated to include new content based on the latest Yocto release.
What you will learn
- Optimize your Yocto Project setup to speed up development and debug build issues
- Use Docker containers to build Yocto Project-based systems
- Take advantage of the user-friendly Toaster web interface to the Yocto Project build system
- Build and debug the Linux kernel and its device trees
- Customize your root filesystem with already-supported and new Yocto packages
- Optimize your production systems by reducing the size of both the Linux kernel and root filesystems
- Explore the mechanisms to increase the root filesystem security
- Understand the open source licensing requirements and how to comply with them when cohabiting with proprietary programs
- Create recipes, and build and run applications in C, C++, Python, Node.js, and Java
Who This Book Is For
If you are an embedded Linux developer with the basic knowledge of Yocto Project, this book is an ideal way to broaden your knowledge with recipes for embedded development.
Table of Contents
- The build system
- The BSP layer
- The software layer
- Application development
- Debugging, tracing and profiling
|Red Hat Enterprise Linux Troubleshooting Guide
Lowest new price: $33.99
Lowest used price: $36.86
List price: $33.99
Author: Benjamin Cane
Identify, capture and resolve common issues faced by Red Hat Enterprise Linux administrators using best practices and advanced troubleshooting techniques
About This Book
- Develop a strong understanding of the base tools available within Red Hat Enterprise Linux (RHEL) and how to utilize these tools to troubleshoot and resolve real-world issues
- Gain hidden tips and techniques to help you quickly detect the reason for poor network/storage performance
- Troubleshoot your RHEL to isolate problems using this example-oriented guide full of real-world solutions
Who This Book Is For
If you have a basic knowledge of Linux from administration or consultant experience and wish to add to your Red Hat Enterprise Linux troubleshooting skills, then this book is ideal for you. The ability to navigate and use basic Linux commands is expected.
What You Will Learn
- Identify issues that need rapid resolution against long term root cause analysis
- Discover commands for testing network connectivity such as telnet, netstat, ping, ip and curl
- Spot performance issues with commands such as top, ps, free, iostat, and vmstat
- Use tcpdump for traffic analysis
- Repair a degraded file system and rebuild a software raid
- Identify and troubleshoot hardware issues using dmesg
- Troubleshoot custom applications with strace and knowledge of Linux resource limitations
Red Hat Enterprise Linux is an operating system that allows you to modernize your infrastructure, boost efficiency through virtualization, and finally prepare your data center for an open, hybrid cloud IT architecture. It provides the stability to take on today's challenges and the flexibility to adapt to tomorrow's demands.
In this book, you begin with simple troubleshooting best practices and get an overview of the Linux commands used for troubleshooting. The book will cover the troubleshooting methods for web applications and services such as Apache and MySQL. Then, you will learn to identify system performance bottlenecks and troubleshoot network issues; all while learning about vital troubleshooting steps such as understanding the problem statement, establishing a hypothesis, and understanding trial, error, and documentation. Next, the book will show you how to capture and analyze network traffic, use advanced system troubleshooting tools such as strace, tcpdump & dmesg, and discover common issues with system defaults.
Finally, the book will take you through a detailed root cause analysis of an unexpected reboot where you will learn to recover a downed system.
Style and approach
This is an easy-to-follow guide packed with examples of real-world core Linux concepts. All the topics are presented in detail while you're performing the actual troubleshooting steps.
|Ansible Playbook Essentials
Lowest new price: $29.99
Lowest used price: $20.56
List price: $29.99
Author: Gourav Shah
Design automation blueprints using Ansible's playbooks to orchestrate and manage your multitier infrastructure
About This Book
- Get to grips with Ansible's features such as orchestration, automatic node discovery, and data encryption
- Create data-driven, modular and reusable automation code with Ansible roles, facts, variables, and templates
- A step-by-step approach to automating and managing system and application configurations effectively using Ansible's playbooks
Who This Book Is For
If you are a systems or automation engineer who intends to automate common infrastructure tasks, deploy applications, and use orchestration to configure systems in a coordinated manner, then this book is for you. Some understanding of the Linux/Unix command-line interface is expected.
What You Will Learn
- Write simple tasks and plays
- Organize code into a reusable, modular structure
- Separate code from data using variables and Jinja2 templates
- Run custom commands and scripts using Ansible's command modules
- Control execution flow based on conditionals
- Integrate nodes and discover topology information about other nodes in the cluster
- Encrypt data with Ansible-vault
- Create environments with isolated configurations to match the application development workflow
- Orchestrate infrastructure and deploy applications in a coordinated manner
This book will show you how to write a blueprint of your infrastructure, encompassing multitier applications using Ansible's playbooks. Beginning with basic concepts such as plays, tasks, handlers, inventory, and the YAML syntax that Ansible uses, you will see how to organize your code into a modular structure. Building on this, you will master techniques to create data-driven playbooks with variables, templates, logical constructs, and encrypted data. This book will also take you through advanced clustering concepts, such as discovering topology information about other nodes in the cluster, managing multiple environments with isolated configurations, and orchestrate infrastructure and deploy applications in a coordinated manner.
By the end of this book, you will be able to design solutions to your automation and orchestration problems using playbooks quickly and efficiently.
|Learning Linux Binary Analysis
Lowest new price: $37.18
Lowest used price: $26.47
List price: $44.99
Author: Ryan "elfmaster" O'Neill
- Grasp the intricacies of the ELF binary format of UNIX and Linux
- Design tools for reverse engineering and binary forensic analysis
- Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes
Learning Linux Binary Analysis is packed with knowledge and code that will teach you the inner workings of the ELF format, and the methods used by hackers and security analysts for virus analysis, binary patching, software protection and more.
This book will start by taking you through UNIX/Linux object utilities, and will move on to teaching you all about the ELF specimen. You will learn about process tracing, and will explore the different types of Linux and UNIX viruses, and how you can make use of ELF Virus Technology to deal with them.
The latter half of the book discusses the usage of Kprobe instrumentation for kernel hacking, code patching, and debugging. You will discover how to detect and disinfect kernel-mode rootkits, and move on to analyze static code. Finally, you will be walked through complex userspace memory infection analysis.
This book will lead you into territory that is uncharted even by some experts; right into the world of the computer hacker.
What you will learn
- Explore the internal workings of the ELF binary format
- Discover techniques for UNIX Virus infection and analysis
- Work with binary hardening and software anti-tamper methods
- Patch executables and process memory
- Bypass anti-debugging measures used in malware
- Perform advanced forensic analysis of binaries
- Design ELF-related tools in the C language
- Learn to operate on memory with ptrace
About the Author
Ryan "elfmaster" O'Neill is a computer security researcher and software engineer with a background in reverse engineering, software exploitation, security defense, and forensics technologies. He grew up in the computer hacker subculture, the world of EFnet, BBS systems, and remote buffer overflows on systems with an executable stack. He was introduced to system security, exploitation, and virus writing at a young age. His great passion for computer hacking has evolved into a love for software development and professional security research. Ryan has spoken at various computer security conferences, including DEFCON and RuxCon, and also conducts a 2-day ELF binary hacking workshop.
He has an extremely fulfilling career and has worked at great companies such as Pikewerks, Leviathan Security Group, and more recently Backtrace as a software engineer.
Ryan has not published any other books, but he is well known for some of his papers published in online journals such as Phrack and VXHeaven. Many of his other publications can be found on his website at http://www.bitlackeys.org.
Table of Contents
- The Linux Environment and Its Tools
- The ELF Binary Format
- Linux Process Tracing
- ELF Virus Technology – Linux/Unix Viruses
- Linux Binary Protection
- ELF Binary Forensics in Linux
- Process Memory Forensics
- ECFS – Extended Core File Snapshot Technology
- Linux /proc/kcore Analysis
- Linux Kernel Development (3rd Edition)
- Low-Level Programming: C, Assembly, and Program Execution on Intel® 64 Architecture
- Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
- The Linux Programming Interface: A Linux and UNIX System Programming Handbook
- Linkers and Loaders (The Morgan Kaufmann Series in Software Engineering and Programming)
- The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
- Serious Cryptography: A Practical Introduction to Modern Encryption
- Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation
- Linux Device Drivers Development: Develop customized drivers for embedded Linux
- Practical Malware Analysis: A Hands-On Guide to Dissecting Malicious Software
|Linux Administration: A Beginner’s Guide, Seventh Edition
Lowest new price: $21.99
Lowest used price: $15.48
List price: $40.00
Author: Wale Soyinka
Brand: MCGRAW-HILL Professional
Now with a virtual machine showcasing the book's test system configuration, Linux Administration: A Beginner's Guide, Seventh Edition teaches system administrators how to set-up and configure Linux quickly and easily.
Effectively set up and manage any version of Linux on individual servers or entire networks using this practical resource. Fully updated to cover the latest tools and techniques, Linux Administration: A Beginner’s Guide, Seventh Edition features clear explanations, step-by-step instructions, and real-world examples. Find out how to configure hardware and software, work from the GUI or command line, maintain Internet and network services, and secure your data. Performance tuning, virtualization, containers, software management, and backup solutions are covered in detail.
- Install and configure Linux, including the latest distributions from Fedora, Ubuntu, CentOS, openSUSE, Debian, and RHEL
- Manage users, permissions, files, folders, and applications
- Set up and administer system services and daemons
- Manage software from source code or binary packages
- Customize, build, or patch the Linux kernel
- Work with physical and virtual file systems, such as proc, SysFS, and cgroup
- Understand networking protocols, including TCP/IP, ARP, IPv4, and IPv6
- Build reliable firewalls and routers with Netfilter (iptables and nftables) and Linux
- Monitor and test network activity and minimize security threats
- Create and maintain DNS, FTP, web, e-mail, print, LDAP, and VoIP servers
- Share resources using GlusterFS, NFS, and Samba
- Implement popular cloud-based technologies using Linux virtualization and containers using KVM and Docker
|Using Docker: Developing and Deploying Software with Containers
Lowest new price: $21.14
Lowest used price: $14.39
List price: $59.99
Author: Adrian Mouat
Brand: O'Reilly Media
Docker containers offer simpler, faster, and more robust methods for developing, distributing, and running software than previously available. With this hands-on guide, you’ll learn why containers are so important, what you’ll gain by adopting Docker, and how to make it part of your development process.
Ideal for developers, operations engineers, and system administrators—especially those keen to embrace a DevOps approach—Using Docker will take you from Docker and container basics to running dozens of containers on a multi-host system with networking and scheduling. The core of the book walks you through the steps needed to develop, test, and deploy a web application with Docker.
- Get started with Docker by building and deploying a simple web application
- Use Continuous Deployment techniques to push your application to production multiple times a day
- Learn various options and techniques for logging and monitoring multiple containers
- Examine networking and service discovery: how do containers find each other and how do you connect them?
- Orchestrate and cluster containers to address load-balancing, scaling, failover, and scheduling
- Secure your system by following the principles of defense-in-depth and least privilege
|Linux Hardening in Hostile Networks: Server Security from TLS to Tor (Pearson Open Source Software Development Series)
Lowest new price: $30.60
Lowest used price: $24.47
List price: $39.99
Author: Kyle Rankin
Implement Industrial-Strength Security on Any Linux Server
In an age of mass surveillance, when advanced cyberwarfare weapons rapidly migrate into every hacker’s toolkit, you can’t rely on outdated security methods–especially if you’re responsible for Internet-facing services. In Linux® Hardening in Hostile Networks, Kyle Rankin helps you to implement modern safeguards that provide maximum impact with minimum effort and to strip away old techniques that are no longer worth your time.
Rankin provides clear, concise guidance on modern workstation, server, and network hardening, and explains how to harden specific services, such as web servers, email, DNS, and databases. Along the way, he demystifies technologies once viewed as too complex or mysterious but now essential to mainstream Linux security. He also includes a full chapter on effective incident response that both DevOps and SecOps can use to write their own incident response plan.
Each chapter begins with techniques any sysadmin can use quickly to protect against entry-level hackers and presents intermediate and advanced techniques to safeguard against sophisticated and knowledgeable attackers, perhaps even state actors. Throughout, you learn what each technique does, how it works, what it does and doesn’t protect against, and whether it would be useful in your environment.
- Apply core security techniques including 2FA and strong passwords
- Protect admin workstations via lock screens, disk encryption, BIOS passwords, and other methods
- Use the security-focused Tails distribution as a quick path to a hardened workstation
- Compartmentalize workstation tasks into VMs with varying levels of trust
- Harden servers with SSH, use apparmor and sudo to limit the damage attackers can do, and set up remote syslog servers to track their actions
- Establish secure VPNs with OpenVPN, and leverage SSH to tunnel traffic when VPNs can’t be used
- Configure a software load balancer to terminate SSL/TLS connections and initiate new ones downstream
- Set up standalone Tor services and hidden Tor services and relays
- Secure Apache and Nginx web servers, and take full advantage of HTTPS
- Perform advanced web server hardening with HTTPS forward secrecy and ModSecurity web application firewalls
- Strengthen email security with SMTP relay authentication, SMTPS, SPF records, DKIM, and DMARC
- Harden DNS servers, deter their use in DDoS attacks, and fully implement DNSSEC
- Systematically protect databases via network access control, TLS traffic encryption, and encrypted data storage
- Respond to a compromised server, collect evidence, and prevent future attacks
Register your product at informit.com/register for convenient access to downloads, updates, and corrections as they become available.
|Database Reliability Engineering: Designing and Operating Resilient Database Systems
Lowest new price: $30.87
Lowest used price: $28.75
List price: $49.99
Author: Laine Campbell
Brand: O'Reilly Media
The infrastructure-as-code revolution in IT is also affecting database administration. With this practical book, developers, system administrators, and junior to mid-level DBAs will learn how the modern practice of site reliability engineering applies to the craft of database architecture and operations. Authors Laine Campbell and Charity Majors provide a framework for professionals looking to join the ranks of today’s database reliability engineers (DBRE).
You’ll begin by exploring core operational concepts that DBREs need to master. Then you’ll examine a wide range of database persistence options, including how to implement key technologies to provide resilient, scalable, and performant data storage and retrieval. With a firm foundation in database reliability engineering, you’ll be ready to dive into the architecture and operations of any modern database.
This book covers:
- Service-level requirements and risk management
- Building and evolving an architecture for operational visibility
- Infrastructure engineering and infrastructure management
- How to facilitate the release management process
- Data storage, indexing, and replication
- Identifying datastore characteristics and best use cases
- Datastore architectural components and data-driven architectures
|Absolute FreeBSD, 3rd Edition
Lowest new price: $59.95
List price: $59.95
Author: Michael W. Lucas
This updated edition of Michael W. Lucas' definitive volume on FreeBSD-based systems adds coverage of modern disks, the ZFS filesystem IPv6, redesigned jail and packaging systems, and virtualization, among dozens of new features added in the last 10 years.
FreeBSD is the muscle behind companies like Netflix and EMC. Any place where someone does heavy lifting on the Internet, you'll find FreeBSD. This newly revised edition of Absolute FreeBSD brings FreeBSD's strengths to bear on your problems and covers FreeBSD's newest features, all in the inimitable style that has made author Michael W. Lucas' system administration books so popular.
Any computer system is only as good as the system administrator's knowledge. Absolute FreeBSD teaches you everything you need to know about managing FreeBSD systems, from installation, configuration, and taking the system from "just working" to "working well." A cohesive focus on service delivery and best practice means that you can apply much of the book to other operating systems.
Absolute FreeBSD dives deep into server management, taking you beyond just making things work and into understanding why they work.
* How to best install FreeBSD to meet your needs
* Which filesystem to use in your environment
* How to back up and restore critical data
* How to tweak the kernel, and when not to
* Network configuration, from activating interfaces to selecting congestion control algorithms
* How to manage UFS, ZFS, and other critical filesystems
* FreeBSD's software packaging system, including how to build your own package repository
* How and when to upgrade
* Techniques to build your own FreeBSD
* Advanced security features like blacklistd and packet filtering
* How to monitor and adjust performance
* Container-style virtualization with jails
* Diskless systems
* Panic management and bug reporting
With Absolute FreeBSD readers will get the solid introduction they need while fans of the earlier editions will expand their skills even further.
Page 5 of 136
CERTAIN CONTENT THAT APPEARS ON THIS SITE COMES FROM AMAZON SERVICES LLC. THIS CONTENT IS PROVIDED AS IS AND IS SUBJECT TO CHANGE OR REMOVAL AT ANY TIME.