Apparel & AccessoriesBooksClassical MusicDVDElectronics & PhotoGourmet Food and GroceriesHealth & Personal CareHome & GardenIndustrial & ScientificKitchen
Popular MusicMusical InstrumentsOutdoor LivingComputer HardwareComputer SoftwareSporting GoodsToolsToys and GamesVHS VideoVideo Games

Search:

Browse by Catagory:

Books

Linux Programming


Red Hat RHCSA/RHCE 7 Cert Guide: Red Hat Enterprise Linux 7 (EX200 and EX300) (Certification Guide)

Red Hat RHCSA/RHCE 7 Cert Guide: Red Hat Enterprise Linux 7 (EX200 and EX300) (Certification Guide) Lowest new price: $32.54
Lowest used price: $39.99
List price: $59.99
Author: Sander van Vugt

Master every objective on the RHCSA and RHCE exams

  • 4 Practice Exams (2 RHCSA and 2 RHCE)
  • More than 40 interactive hands-on exercises and performance-based CLI simulations
  • 3 Virtual Machines to help you test your skills in a real-world environment
  • More than 30 minutes of unique video examining pre-assessment theoretical exams so you know if you are prepared to take the tests
  • More than 2 hours of video instruction from our best-selling RHCSA and RHCE Complete Video Courses
  • 40 interactive chapter and glossary quizzes

 

This study guide helps you master topics on both the Red Hat RHCSA (EX200) and RHCE (EX300) exams for Red Hat Enterprise Linux Version 7, including:

 

Part 1: RHCSA

 

  • Basic System Management: Installation, tools, text files, server connections; user, group, and permissions management; network configuration
  • Operating Running Systems: Process management, VMs, package installation, task scheduling, logging, managing partitions, and LVM logical volumes
  • Advanced System Administration: Basic kernel management, basic Apache server configuration, boot procedures/troubleshooting
  • Managing Network Services: Using Kickstart; managing SELinux; configuring firewalls, remote mounts, FTP, and time services

 

Part 2: RHCE

 

  • System Configuration/Management: External authentication/authorization, iSCSI SANs, performance reporting, optimization, logging, routing/advanced networking, and Bash scripting
  • System Security: Configuring firewalls, advanced Apache services, DNS, MariaDB, NFS, Samba, SMTP, SSH, and time synchronization

 

Red Hat RHCSA/RHCE 7 Cert Guide contains proven study features that allow you to succeed on the exam the first time. Best-selling author and top Linux consultant Sander van Vugt shares preparation hints and test-taking tips, helping you identify areas of weakness to improve both your conceptual knowledge and hands-on skills. This complete study package includes the following:

 

  • A test-preparation routine proven to help you pass Red Hat’s tough certification exams
  • Clearly defined chapter learning objectives covering all RHCSA (EX200) and RHCE (EX300) exam topics
  • Chapter-ending review questions to help you drill on key concepts you must know thoroughly
  • Chapter-ending labs showing what real exam tasks and assignments look like
  • 4 Practice Exams that appear in the book and also on the on the companion website and DVD (2 RHCSA and 2 RHCE), so you can thoroughly test your skills before taking your actual exams
  • More than 40 Interactive Hands-on Exercises and 40 Interactive Quizzes to help you immediately test and reinforce your knowledge
  • 4 advanced Command-Line Interface simulations (2 RHCSA and 2 RHCE) walking you through realistic, complex, multi-step Red Hat scenarios
  • Interactive Glossary Quiz on the companion website and DVD allowing you to test yourself on every glossary term covered in the book
  • 2½+ hours of video training: 30 minutes of unique test-prep videos plus more than 2 hours of instruction from the best-selling RHCSA and RHCE Complete Video Course series
  • 3 Virtual Machines on the companion website and DVD giving you easy access to a reliable environment for working through this book’s labs and exercises
  • A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies
  • Two Theoretical Pre-Assessment Exams (one RHCSA and one RHCE) so you can assess your skills and determine the best study path
  • An Exam Essentials appendix that quickly recaps all major chapter topics for easy reference, found on both the companion website and DVD
  • Study plan suggestions and templates to help you organize and optimize your study time

 

Companion Website and DVD

 

The companion website and DVD contain 4 practice exams, exercises, quizzes, virtual labs, video, and more. For details, open the DVD or access the companion website at
www.pearsonitcertification.com/

 

Includes Exclusive Offer for 70% Off Premium Edition eBook and Practice Tests

 

Similar Products:


Mastering Kali Linux for Advanced Penetration Testing - Second Edition: Secure your network with Kali Linux - the ultimate white hat hackers' toolkit

Mastering Kali Linux for Advanced Penetration Testing - Second Edition: Secure your network with Kali Linux - the ultimate white hat hackers' toolkit Lowest new price: $44.49
Lowest used price: $43.59
List price: $49.99
Author: Vijay Kumar Velu

A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers.

About This Book

  • Employ advanced pentesting techniques with Kali Linux to build highly-secured systems
  • Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches
  • Select and configure the most effective tools from Kali Linux to test network security and prepare your business against malicious threats and save costs

Who This Book Is For

Penetration Testers, IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you.Some prior exposure to basics of penetration testing/ethical hacking would be helpful in making the most out of this title.

What You Will Learn

  • Select and configure the most effective tools from Kali Linux to test network security
  • Employ stealth to avoid detection in the network being tested
  • Recognize when stealth attacks are being used against your network
  • Exploit networks and data systems using wired and wireless networks as well as web services
  • Identify and download valuable data from target systems
  • Maintain access to compromised systems
  • Use social engineering to compromise the weakest part of the network-the end users

In Detail

This book will take you, as a tester or security practitioner through the journey of reconnaissance, vulnerability assessment, exploitation, and post-exploitation activities used by penetration testers and hackers.

We will start off by using a laboratory environment to validate tools and techniques, and using an application that supports a collaborative approach to penetration testing. Further we will get acquainted with passive reconnaissance with open source intelligence and active reconnaissance of the external and internal networks. We will also focus on how to select, use, customize, and interpret the results from a variety of different vulnerability scanners. Specific routes to the target will also be examined, including bypassing physical security and exfiltration of data using different techniques. You will also get to grips with concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections. Later you will learn the practical aspects of attacking user client systems by backdooring executable files. You will focus on the most vulnerable part of the network-directly and bypassing the controls, attacking the end user and maintaining persistence access through social media.

You will also explore approaches to carrying out advanced penetration testing in tightly secured environments, and the book's hands-on approach will help you understand everything you need to know during a Red teaming exercise or penetration testing

Style and approach

An advanced level tutorial that follows a practical approach and proven methods to maintain top notch security of your networks.

Table of Contents

  1. Goal-Based Penetration Testing with Kali Linux
  2. Open Source Intelligence and Passive Reconnaissance
  3. Active Reconnaissance of the External and Internal Networks
  4. Vulnerability Assessment
  5. Physical Security and Social Engineering
  6. Wireless Attacks
  7. Reconnaissance and Exploitation of Web-Based Applications
  8. Attacking Remote Access
  9. Client-Side Exploitation
  10. Bypassing Security Controls
  11. Exploitation
  12. Action on the Objective
  13. Privilege Escalation
  14. Command and Control

Similar Products:


Understanding the Linux Kernel, Third Edition

Understanding the Linux Kernel, Third Edition Lowest new price: $36.20
Lowest used price: $15.98
List price: $59.99
Author: Daniel P. Bovet
Brand: imusti

In order to thoroughly understand what makes Linux tick and why it works so well on a wide variety of systems, you need to delve deep into the heart of the kernel. The kernel handles all interactions between the CPU and the external world, and determines which programs will share processor time, in what order. It manages limited memory so well that hundreds of processes can share the system efficiently, and expertly organizes data transfers so that the CPU isn't kept waiting any longer than necessary for the relatively slow disks.

The third edition of Understanding the Linux Kernel takes you on a guided tour of the most significant data structures, algorithms, and programming tricks used in the kernel. Probing beyond superficial features, the authors offer valuable insights to people who want to know how things really work inside their machine. Important Intel-specific features are discussed. Relevant segments of code are dissected line by line. But the book covers more than just the functioning of the code; it explains the theoretical underpinnings of why Linux does things the way it does.

This edition of the book covers Version 2.6, which has seen significant changes to nearly every kernel subsystem, particularly in the areas of memory management and block devices. The book focuses on the following topics:

  • Memory management, including file buffering, process swapping, and Direct memory Access (DMA)
  • The Virtual Filesystem layer and the Second and Third Extended Filesystems
  • Process creation and scheduling
  • Signals, interrupts, and the essential interfaces to device drivers
  • Timing
  • Synchronization within the kernel
  • Interprocess Communication (IPC)
  • Program execution

Understanding the Linux Kernel will acquaint you with all the inner workings of Linux, but it's more than just an academic exercise. You'll learn what conditions bring out Linux's best performance, and you'll see how it meets the challenge of providing good system response during process scheduling, file access, and memory management in a wide variety of environments. This book will help you make the most of your Linux system.

Features:

  • O Reilly Media

Similar Products:


Linux All-in-One For Dummies

Linux All-in-One For Dummies Lowest new price: $23.65
Lowest used price: $23.94
List price: $39.99
Author: Emmett Dulaney
Brand: For Dummies

Eight minibooks in one volume cover every important aspect of Linux and everything you need to know to pass level-1 certification

Linux All-in-One For Dummies explains everything you need to get up and running with the popular Linux operating system. Written in the friendly and accessible For Dummies style, the book ideal for new and intermediate Linux users, as well as anyone studying for level-1 Linux certification. The eight minibooks inside cover the basics of Linux, interacting with it, networking issues, Internet services, administration, security, scripting, and level-1 certification.

  • Covers every major topic for anyone just getting familiar with Linux
  • Includes a test-prep section for passing the level-1 Linux certification exam
  • Written by the expert author of more than thirty books, including CompTIA Security+ Study Guide, 3rd Edition

Including everything beginners need to know to get started with Linux, Linux All-in-One For Dummies, 5th Edition is the ultimate resource and reference for aspiring professionals.

Features:

  • For Dummies

Similar Products:


Wicked Cool Shell Scripts, 2nd Edition: 101 Scripts for Linux, OS X, and UNIX Systems

Wicked Cool Shell Scripts, 2nd Edition: 101 Scripts for Linux, OS X, and UNIX Systems Lowest new price: $22.81
Lowest used price: $22.59
List price: $34.95
Author: Dave Taylor
Brand: No Starch Press

Shell scripts are an efficient way to interact with your machine and manage your files and system operations. With just a few lines of code, your computer will do exactly what you want it to do. But you can also use shell scripts for many other essential (and not-so-essential) tasks.

This second edition of Wicked Cool Shell Scripts offers a collection of useful, customizable, and fun shell scripts for solving common problems and personalizing your computing environment. Each chapter contains ready-to-use scripts and explanations of how they work, why you’d want to use them, and suggestions for changing and expanding them. You'll find a mix of classic favorites, like a disk backup utility that keeps your files safe when your system crashes, a password manager, a weather tracker, and several games, as well as 23 brand-new scripts, including:

– ZIP code lookup tool that reports the city and state
– Bitcoin address information retriever
– suite of tools for working with cloud services like Dropbox and iCloud
– for renaming and applying commands to files in bulk
– processing and editing tools

Whether you want to save time managing your system or just find new ways to goof off, these scripts are wicked cool!

Features:

  • No Starch Press

Similar Products:


The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory Lowest new price: $38.93
Lowest used price: $36.97
List price: $65.00
Author: Michael Hale Ligh
Brand: Wiley

Memory forensics provides cutting edge technology to help investigate digital attacks

Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics—now the most sought after skill in the digital forensics and incident response fields.

Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. Discover memory forensics techniques:

  • How volatile memory analysis improves digital investigations
  • Proper investigative steps for detecting stealth malware and advanced threats
  • How to use free, open source tools for conducting thorough memory forensics
  • Ways to acquire memory from suspect systems in a forensically sound manner

The next era of malware and security breaches are more sophisticated and targeted, and the volatile memory of a computer is often overlooked or destroyed as part of the incident response process. The Art of Memory Forensics explains the latest technological innovations in digital forensics to help bridge this gap. It covers the most popular and recently released versions of Windows, Linux, and Mac, including both the 32 and 64-bit editions.

Features:

  • Wiley

Similar Products:


Linux Device Drivers, 3rd Edition

Linux Device Drivers, 3rd Edition Lowest new price: $20.57
Lowest used price: $9.89
List price: $39.95
Author: Jonathan Corbet
Brand: O Reilly Media

Device drivers literally drive everything you're interested in--disks, monitors, keyboards, modems--everything outside the computer chip and memory. And writing device drivers is one of the few areas of programming for the Linux operating system that calls for unique, Linux-specific knowledge. For years now, programmers have relied on the classic Linux Device Drivers from O'Reilly to master this critical subject. Now in its third edition, this bestselling guide provides all the information you'll need to write drivers for a wide range of devices.Over the years the book has helped countless programmers learn:

  • how to support computer peripherals under the Linux operating system
  • how to develop and write software for new hardware under Linux
  • the basics of Linux operation even if they are not expecting to write a driver
The new edition of Linux Device Drivers is better than ever. The book covers all the significant changes to Version 2.6 of the Linux kernel, which simplifies many activities, and contains subtle new features that can make a driver both more efficient and more flexible. Readers will find new chapters on important types of drivers not covered previously, such as consoles, USB drivers, and more.Best of all, you don't have to be a kernel hacker to understand and enjoy this book. All you need is an understanding of the C programming language and some background in Unix system calls. And for maximum ease-of-use, the book uses full-featured examples that you can compile and run without special hardware.Today Linux holds fast as the most rapidly growing segment of the computer market and continues to win over enthusiastic adherents in many application areas. With this increasing support, Linux is now absolutely mainstream, and viewed as a solid platform for embedded systems. If you're writing device drivers, you'll want this book. In fact, you'll wonder how drivers are ever written without it.

Features:

  • O Reilly Media

Similar Products:


Mastering Embedded Linux Programming - Second Edition: Unleash the full potential of Embedded Linux with Linux 4.9 and Yocto Project 2.2 (Morty) Updates

Mastering Embedded Linux Programming - Second Edition: Unleash the full potential of Embedded Linux with Linux 4.9 and Yocto Project 2.2 (Morty) Updates Lowest new price: $40.51
Lowest used price: $39.80
List price: $49.99
Author: Chris Simmonds

Key Features

  • Discover how to build and configure reliable embedded Linux devices
  • This book has been updated to include Linux 4.9 and Yocto Project 2.2 (Morty)
  • This comprehensive guide covers the remote update of devices in the field and power management

Book Description

Embedded Linux runs many of the devices we use every day, from smart TVs to WiFi routers, test equipment to industrial controllers - all of them have Linux at their heart. Linux is a core technology in the implementation of the inter-connected world of the Internet of Things.

The comprehensive guide shows you the technologies and techniques required to build Linux into embedded systems. You will begin by learning about the fundamental elements that underpin all embedded Linux projects: the toolchain, the bootloader, the kernel, and the root filesystem. You'll see how to create each of these elements from scratch, and how to automate the process using Buildroot and the Yocto Project.

Moving on, you'll find out how to implement an effective storage strategy for flash memory chips, and how to install updates to the device remotely once it is deployed. You'll also get to know the key aspects of writing code for embedded Linux, such as how to access hardware from applications, the implications of writing multi-threaded code, and techniques to manage memory in an efficient way. The final chapters show you how to debug your code, both in applications and in the Linux kernel, and how to profile the system so that you can look out for performance bottlenecks.

By the end of the book, you will have a complete overview of the steps required to create a successful embedded Linux system.

What you will learn

  • Evaluate the Board Support Packages offered by most manufacturers of a system on chip or embedded module
  • Use Buildroot and the Yocto Project to create embedded Linux systems quickly and efficiently
  • Update IoT devices in the field without compromising security
  • Reduce the power budget of devices to make batteries last longer
  • Interact with the hardware without having to write kernel device drivers
  • Debug devices remotely using GDB, and see how to measure the performance of the systems using powerful tools such as perk, ftrace, and valgrind
  • Find out how to configure Linux as a real-time operating system

Table of Contents

  1. Starting Out
  2. Learning About Toolchains
  3. All About Bootloaders
  4. Configuring and Building the Kernel
  5. Building a Root Filesystem
  6. Selecting a Build System
  7. Creating a Storage Strategy
  8. Updating Software in the Field
  9. Interfacing with Device Drivers
  10. starting Up - The Init Program
  11. Managing Power
  12. Learning About Processes and Threads
  13. Managing Memory
  14. Debugging with GDB
  15. Profiling and Tracing
  16. Real-Time Programming

Similar Products:


Exploring BeagleBone: Tools and Techniques for Building with Embedded Linux

Exploring BeagleBone: Tools and Techniques for Building with Embedded Linux Lowest new price: $17.64
Lowest used price: $13.99
List price: $35.00
Author: Derek Molloy
Brand: Wiley

In-depth instruction and practical techniques for building with the BeagleBone embedded Linux platform

Exploring BeagleBone is a hands-on guide to bringing gadgets, gizmos, and robots to life using the popular BeagleBone embedded Linux platform. Comprehensive content and deep detail provide more than just a BeagleBone instruction manual--you'll also learn the underlying engineering techniques that will allow you to create your own projects. The book begins with a foundational primer on essential skills, and then gradually moves into communication, control, and advanced applications using C/C++, allowing you to learn at your own pace. In addition, the book's companion website features instructional videos, source code, discussion forums, and more, to ensure that you have everything you need.

The BeagleBone's small size, high performance, low cost, and extreme adaptability have made it a favorite development platform, and the Linux software base allows for complex yet flexible functionality. The BeagleBone has applications in smart buildings, robot control, environmental sensing, to name a few; and, expansion boards and peripherals dramatically increase the possibilities. Exploring BeagleBone provides a reader-friendly guide to the device, including a crash course in computer engineering. While following step by step, you can: 

  • Get up to speed on embedded Linux, electronics, and programming
  • Master interfacing electronic circuits, buses and modules, with practical examples
  • Explore the Internet-connected BeagleBone and the BeagleBone with a display
  • Apply the BeagleBone to sensing applications, including video and sound
  • Explore the BeagleBone's Programmable Real-Time Controllers
Hands-on learning helps ensure that your new skills stay with you, allowing you to design with electronics, modules, or peripherals even beyond the BeagleBone. Insightful guidance and online peer support help you transition from beginner to expert as you master the techniques presented in Exploring BeagleBone, the practical handbook for the popular computing platform. Visit the companion website for more information at exploringbeaglebone.com.

Features:

  • Wiley

Similar Products:


Linux System Programming: Talking Directly to the Kernel and C Library

Linux System Programming: Talking Directly to the Kernel and C Library Lowest new price: $35.49
Lowest used price: $25.89
List price: $59.99
Author: Robert Love
Brand: Brand: O'Reilly Media

Write software that draws directly on services offered by the Linux kernel and core system libraries. With this comprehensive book, Linux kernel contributor Robert Love provides you with a tutorial on Linux system programming, a reference manual on Linux system calls, and an insider’s guide to writing smarter, faster code.

Love clearly distinguishes between POSIX standard functions and special services offered only by Linux. With a new chapter on multithreading, this updated and expanded edition provides an in-depth look at Linux from both a theoretical and applied perspective over a wide range of programming topics, including:

  • A Linux kernel, C library, and C compiler overview
  • Basic I/O operations, such as reading from and writing to files
  • Advanced I/O interfaces, memory mappings, and optimization techniques
  • The family of system calls for basic process management
  • Advanced process management, including real-time processes
  • Thread concepts, multithreaded programming, and Pthreads
  • File and directory management
  • Interfaces for allocating memory and optimizing memory access
  • Basic and advanced signal interfaces, and their role on the system
  • Clock management, including POSIX clocks and high-resolution timers

Q&A with Robert Love, author of "Linux System Programming, 2nd Edition"

Q. Why is your book timely-- what makes it important right now?

A. Developing system software on Unix has always been in vogue, but we've seen a large increase in demand with the rise of the cloud and the web. Where before user apps were primarily client-side, UI-focused programs, now system-level software running in huge data centers at massive scale provides even the simplest of our computing functionality. The code powering the largest of cloud-based providers such as Google or Twitter down to the smallest startup is all system-level software. And nearly all of it runs on Linux.

Q. What information do you hope that readers of your book will walk away with?

A. The system API on Linux: what it is and how to use it as an expert. The book is an API reference manual, of course, but it is also chock-full of anecdotes, insider tips, and Linux-specific techniques that take it beyond your generic Unix API guide.

Q. What's the most exciting thing happening in your space?

A. Definitely the ever-increasing scale of distributed systems that power the cloud and web apps we all use. I work at Google on web search infrastructure; the scale and scope of our systems is absolutely stunning. And, at the end of the day, it is all just Linux system code running on (a very large number of) Linux machines.

Q. What are some of the topics readers will learn in the second edition of Linux System Programming?

  • How to design your multithreaded application for maximum performance
  • How to efficiently perform I/O
  • The pitfalls behind real-time processes
  • How to take advantage of modern hardware such as multicore processors or SSDs
  • Why your program's I/O model dictates its threading model

Features:

  • Used Book in Good Condition

Similar Products:


<< Prev   Next >>
Page 2 of 123

[Kindle]    [Kindle DX]
  Privacy Policy

CERTAIN CONTENT THAT APPEARS ON THIS SITE COMES FROM AMAZON SERVICES LLC. THIS CONTENT IS PROVIDED AS IS AND IS SUBJECT TO CHANGE OR REMOVAL AT ANY TIME.