|Browse by Catagory:
Civil Rights & Liberties
War & Peace
Cajun & Creole Cooking
Caribbean & West Indian Cooking
Diabetic & Sugar-Free Cooking
Low Fat Cooking
Middle Eastern Cooking
Pacific Rim Cooking
Home & Garden
Literature & Fiction
Sheet Music & Scores
Environmental & Natural Resources Law
Ethics & Professional Responsibility
Procedures & Litigation
Water Supply & Land Use
Lawyer and Crimal Humor
Outdoors & Nature
Hiking & Camping
Hunting & Fishing
Beer & Beer Making
Health & Fitness
Diets & Weight Loss
Children's Science & Nature
Vitamins & Supplements
Psychology and Counseling
Philosophy of Psychology
Physiological Aspects of Psychology
Psychology of Sexuality
Psychology Testing & Measurement
Chaos & Systems
Geometry & Topology
Logic & Brain Teasers
Chaos & Systems
Geometry & Topology
Probability & Statistics
Experiments, Instruments & Measurement
Chaos & Systems
Fusion & Fission
Nuclear Magnetic Resonance
Waves & Wave Mechanics
Administration & Policy
Allied Health Professions
Medical Education & Training
Endocrinology & Metabolism
Physician & Patient
Insects & Spiders
Fish & Aquariums
Mobile & Wireless Computing: Programming
Linux Kernel & Peripherals
Linux Networking & Administration
State & Local History
Sci Fi Calendars
Bujold, Lois McMaster
Card, Orson Scott
Chalker, Jack L.
Heinlein, Robert A.
McKillip, Patricia A.
Nye, Jody Lynn
|Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly
Lowest new price: $49.95
Lowest used price: $93.74
List price: $49.95
Author: Dennis Andriesse
Stop manually analyzing binary! Practical Binary Analysis is the first book of its kind to present advanced binary analysis topics, such as binary instrumentation, dynamic taint analysis, and symbolic execution, in an accessible way.
As malware increasingly obfuscates itself and applies anti-analysis techniques to thwart our analysis, we need more sophisticated methods that allow us to raise that dark curtain designed to keep us out--binary analysis can help. The goal of all binary analysis is to determine (and possibly modify) the true properties of binary programs to understand what they really do, rather than what we think they should do. While reverse engineering and disassembly are critical first steps in many forms of binary analysis, there is much more to be learned.
This hands-on guide teaches you how to tackle the fascinating but challenging topics of binary analysis and instrumentation and helps you become proficient in an area typically only mastered by a small group of expert hackers. It will take you from basic concepts to state-of-the-art methods as you dig into topics like code injection, disassembly, dynamic taint analysis, and binary instrumentation. Written for security engineers, hackers, and those with a basic working knowledge of C/C++ and x86-64, Practical Binary Analysis will teach you in-depth how binary programs work and help you acquire the tools and techniques needed to gain more control and insight into binary programs.
Once you've completed an introduction to basic binary formats, you'll learn how to analyze binaries using techniques like the GNU/Linux binary analysis toolchain, disassembly, and code injection. You'll then go on to implement profiling tools with Pin and learn how to build your own dynamic taint analysis tools with libdft and symbolic execution tools using Triton. You'll learn how to:
- Parse ELF and PE binaries and build a binary loader with libbfd
- Use data-flow analysis techniques like program tracing, slicing, and reaching definitions analysis to reason about runtime flow of your programs
- Modify ELF binaries with techniques like parasitic code injection and hex editing
- Build custom disassembly tools with Capstone
- Use binary instrumentation to circumvent anti-analysis tricks commonly used by malware
- Apply taint analysis to detect control hijacking and data leak attacks
- Use symbolic execution to build automatic exploitation tools
With exercises at the end of each chapter to help solidify your skills, you'll go from understanding basic assembly to performing some of the most sophisticated binary analysis and instrumentation. Practical Binary Analysis gives you what you need to work effectively with binary programs and transform your knowledge from basic understanding to expert-level proficiency.
|A Practical Guide to Linux Commands, Editors, and Shell Programming (4th Edition)
Lowest new price: $33.94
Lowest used price: $29.01
List price: $59.99
Author: Mark G. Sobell
The Most Useful Tutorial and Reference, with Hundreds of High-Quality Examples for Every Popular Linux Distribution
“First Sobell taught people how to use Linux . . . now he teaches you the power of Linux. A must-have book for anyone who wants to take Linux to the next level.”
–Jon “maddog” Hall, Executive Director, Linux International
Discover the Power of Linux—Covers macOS, too!
- Learn from hundreds of realistic, high-quality examples, and become a true command-line guru
- Covers MariaDB, DNF, and Python 3
- 300+ page reference section covers 102 utilities, including macOS commands
For use with all popular versions of Linux, including Ubuntu,™ Fedora,™ openSUSE,™ Red Hat,® Debian, Mageia, Mint, Arch, CentOS, and macOS
Linux is today’s dominant Internet server platform. System administrators and Web developers need deep Linux fluency, including expert knowledge of shells and the command line. This is the only guide with everything you need to achieve that level of Linux mastery. Renowned Linux expert Mark Sobell has brought together comprehensive, insightful guidance on the tools sysadmins, developers, and power users need most, and has created an outstanding day-to-day reference, updated with assistance from new coauthor Matthew Helmke.
This title is 100 percent distribution and release agnostic. Packed with hundreds of high-quality, realistic examples, it presents Linux from the ground up: the clearest explanations and most useful information about everything from filesystems to shells, editors to utilities, and programming tools to regular expressions.
Use a Mac? You’ll find coverage of the macOS command line, including macOS-only tools and utilities that other Linux/UNIX titles ignore.
A Practical Guide to Linux® Commands, Editors, and Shell Programming, Fourth Edition, is the only guide to deliver
- A MariaDB chapter to get you started with this ubiquitous relational database management system (RDBMS)
- A masterful introduction to Python for system administrators and power users
- In-depth coverage of the bash and tcsh shells, including a complete discussion of environment, inheritance, and process locality, plus coverage of basic and advanced shell programming
- Practical explanations of core utilities, from aspell to xargs, including printf and sshfs/curlftpfs, PLUS macOS–specific utilities from ditto to SetFile
- Expert guidance on automating remote backups using rsync
- Dozens of system security tips, including step-by-step walkthroughs of implementing secure communications using ssh and scp
- Tips and tricks for customizing the shell, including step values, sequence expressions, the eval builtin, and implicit command-line continuation
- High-productivity editing techniques using vim and emacs
- A comprehensive, 300-plus-page command reference section covering 102 utilities, including find, grep, sort, and tar
- Instructions for updating systems using apt-get and dnf
- And much more, including coverage of BitTorrent, gawk, sed, find, sort, bzip2, and regular expressions
|Linux in a Nutshell: A Desktop Quick Reference
Lowest new price: $30.37
Lowest used price: $7.56
List price: $49.99
Author: Ellen Siever
Brand: O'Reilly Media
Everything you need to know about Linux is in this book. Written by Stephen Figgins, Ellen Siever, Robert Love, and Arnold Robbins -- people with years of active participation in the Linux community -- Linux in a Nutshell, Sixth Edition, thoroughly covers programming tools, system and network administration tools, the shell, editors, and LILO and GRUB boot loaders.
This updated edition offers a tighter focus on Linux system essentials, as well as more coverage of new capabilities such as virtualization, wireless network management, and revision control with git. It also highlights the most important options for using the vast number of Linux commands. You'll find many helpful new tips and techniques in this reference, whether you're new to this operating system or have been using it for years.
- Get the Linux commands for system administration and network management
- Use hundreds of the most important shell commands available on Linux
- Understand the Bash shell command-line interpreter
- Search and process text with regular expressions
- Manage your servers via virtualization with Xen and VMware
- Use the Emacs text editor and development environment, as well as the vi, ex, and vim text-manipulation tools
- Process text files with the sed editor and the gawk programming language
- Manage source code with Subversion and git
- Used Book in Good Condition
|Linux Driver Development for Embedded Processors - Second Edition: Learn to develop Linux embedded drivers with kernel 4.9 LTS
Lowest new price: $44.99
List price: $44.99
Author: Alberto Liberal de los Ríos
LINUX DRIVER DEVELOPMENT FOR EMBEDDED PROCESSORS - SECOND EDITION - The flexibility of Linux embedded, the availability of powerful, energy efficient processors designed for embedded computing and the low cost of new processors are encouraging many industrial companies to come up with new developments based on embedded processors. Current engineers have in their hands powerful tools for developing applications previously unimagined, but they need to understand the countless features that Linux offers today. This book will teach you how to develop device drivers for Device Tree Linux embedded systems. You will learn how to write different types of Linux drivers, as well as the appropriate APIs (Application Program Interfaces) and methods to interface with kernel and user spaces. This is a book is meant to be practical, but also provides an important theoretical base. More than twenty drivers are written and ported to three different processors. You can choose between NXP i.MX7D, Microchip SAMA5D2 and Broadcom BCM2837 processors to develop and test the drivers, whose implementation is described in detail in the practical lab sections of the book. Before you start reading, I encourage you to acquire any of these processor boards whenever you have access to some GPIOs, and at least one SPI and I2C controllers. One of the boards used to implement the drivers is the famous Raspberry PI 3 Model B board. You will learn how to develop drivers, from the simplest ones that do not interact with any external hardware, to drivers that manage different kind of devices: accelerometers, DACs, ADCs, RGB LEDs, Multi-Display LED controllers, I/O expanders, and Buttons. You will also develop DMA drivers, drivers that manage interrupts, and drivers that write/read on the internal registers of the processor to control external devices. To easy the development of some of these drivers, you will use different types of Frameworks: Miscellaneous framework, LED framework, UIO framework, Input framework and the IIO industrial one. This second edition has been updated to the v4.9 LTS kernel.
|Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking
Lowest new price: $35.18
Lowest used price: $30.99
List price: $49.99
Author: Ric Messier
With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kali’s expansive security capabilities and helps you identify the tools you need to conduct a wide range of security tests and penetration tests. You’ll also explore the vulnerabilities that make those tests necessary.
Author Ric Messier takes you through the foundations of Kali Linux and explains methods for conducting tests on networks, web applications, wireless security, password vulnerability, and more. You’ll discover different techniques for extending Kali tools and creating your own toolset.
- Learn tools for stress testing network stacks and applications
- Perform network reconnaissance to determine what’s available to attackers
- Execute penetration tests using automated exploit tools such as Metasploit
- Use cracking tools to see if passwords meet complexity requirements
- Test wireless capabilities by injecting frames and cracking passwords
- Assess web application vulnerabilities with automated or proxy-based tools
- Create advanced attack techniques by extending Kali tools or developing your own
- Use Kali Linux to generate reports once testing is complete
|Learning Linux Binary Analysis
Lowest new price: $29.64
Lowest used price: $23.79
List price: $44.99
Author: Ryan "elfmaster" O'Neill
- Grasp the intricacies of the ELF binary format of UNIX and Linux
- Design tools for reverse engineering and binary forensic analysis
- Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes
Learning Linux Binary Analysis is packed with knowledge and code that will teach you the inner workings of the ELF format, and the methods used by hackers and security analysts for virus analysis, binary patching, software protection and more.
This book will start by taking you through UNIX/Linux object utilities, and will move on to teaching you all about the ELF specimen. You will learn about process tracing, and will explore the different types of Linux and UNIX viruses, and how you can make use of ELF Virus Technology to deal with them.
The latter half of the book discusses the usage of Kprobe instrumentation for kernel hacking, code patching, and debugging. You will discover how to detect and disinfect kernel-mode rootkits, and move on to analyze static code. Finally, you will be walked through complex userspace memory infection analysis.
This book will lead you into territory that is uncharted even by some experts; right into the world of the computer hacker.
What you will learn
- Explore the internal workings of the ELF binary format
- Discover techniques for UNIX Virus infection and analysis
- Work with binary hardening and software anti-tamper methods
- Patch executables and process memory
- Bypass anti-debugging measures used in malware
- Perform advanced forensic analysis of binaries
- Design ELF-related tools in the C language
- Learn to operate on memory with ptrace
About the Author
Ryan "elfmaster" O'Neill is a computer security researcher and software engineer with a background in reverse engineering, software exploitation, security defense, and forensics technologies. He grew up in the computer hacker subculture, the world of EFnet, BBS systems, and remote buffer overflows on systems with an executable stack. He was introduced to system security, exploitation, and virus writing at a young age. His great passion for computer hacking has evolved into a love for software development and professional security research. Ryan has spoken at various computer security conferences, including DEFCON and RuxCon, and also conducts a 2-day ELF binary hacking workshop.
He has an extremely fulfilling career and has worked at great companies such as Pikewerks, Leviathan Security Group, and more recently Backtrace as a software engineer.
Ryan has not published any other books, but he is well known for some of his papers published in online journals such as Phrack and VXHeaven. Many of his other publications can be found on his website at http://www.bitlackeys.org.
Table of Contents
- The Linux Environment and Its Tools
- The ELF Binary Format
- Linux Process Tracing
- ELF Virus Technology – Linux/Unix Viruses
- Linux Binary Protection
- ELF Binary Forensics in Linux
- Process Memory Forensics
- ECFS – Extended Core File Snapshot Technology
- Linux /proc/kcore Analysis
- Linux Kernel Development (3rd Edition)
- Linkers and Loaders (The Morgan Kaufmann Series in Software Engineering and Programming)
- Low-Level Programming: C, Assembly, and Program Execution on Intel® 64 Architecture
- Practical Reverse Engineering: x86, x64, ARM, Windows Kernel, Reversing Tools, and Obfuscation
- The Linux Programming Interface: A Linux and UNIX System Programming Handbook
- The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory
- Attacking Network Protocols: A Hacker's Guide to Capture, Analysis, and Exploitation
- The Hacker Playbook 3: Practical Guide To Penetration Testing
- Practical Malware Analysis: The Hands-On Guide to Dissecting Malicious Software
- Practical Binary Analysis: Build Your Own Linux Tools for Binary Instrumentation, Analysis, and Disassembly
|Linux System Programming: Talking Directly to the Kernel and C Library
Lowest new price: $34.75
Lowest used price: $20.72
List price: $59.99
Author: Robert Love
Brand: Brand: O'Reilly Media
Write software that draws directly on services offered by the Linux kernel and core system libraries. With this comprehensive book, Linux kernel contributor Robert Love provides you with a tutorial on Linux system programming, a reference manual on Linux system calls, and an insider’s guide to writing smarter, faster code.
Love clearly distinguishes between POSIX standard functions and special services offered only by Linux. With a new chapter on multithreading, this updated and expanded edition provides an in-depth look at Linux from both a theoretical and applied perspective over a wide range of programming topics, including:
- A Linux kernel, C library, and C compiler overview
- Basic I/O operations, such as reading from and writing to files
- Advanced I/O interfaces, memory mappings, and optimization techniques
- The family of system calls for basic process management
- Advanced process management, including real-time processes
- Thread concepts, multithreaded programming, and Pthreads
- File and directory management
- Interfaces for allocating memory and optimizing memory access
- Basic and advanced signal interfaces, and their role on the system
- Clock management, including POSIX clocks and high-resolution timers
Q&A with Robert Love, author of "Linux System Programming, 2nd Edition"
Q. Why is your book timely-- what makes it important right now?
A. Developing system software on Unix has always been in vogue, but we've seen a large increase in demand with the rise of the cloud and the web. Where before user apps were primarily client-side, UI-focused programs, now system-level software running in huge data centers at massive scale provides even the simplest of our computing functionality. The code powering the largest of cloud-based providers such as Google or Twitter down to the smallest startup is all system-level software. And nearly all of it runs on Linux.
Q. What information do you hope that readers of your book will walk away with?
A. The system API on Linux: what it is and how to use it as an expert. The book is an API reference manual, of course, but it is also chock-full of anecdotes, insider tips, and Linux-specific techniques that take it beyond your generic Unix API guide.
Q. What's the most exciting thing happening in your space?
A. Definitely the ever-increasing scale of distributed systems that power the cloud and web apps we all use. I work at Google on web search infrastructure; the scale and scope of our systems is absolutely stunning. And, at the end of the day, it is all just Linux system code running on (a very large number of) Linux machines.
Q. What are some of the topics readers will learn in the second edition of Linux System Programming?
- How to design your multithreaded application for maximum performance
- How to efficiently perform I/O
- The pitfalls behind real-time processes
- How to take advantage of modern hardware such as multicore processors or SSDs
- Why your program's I/O model dictates its threading model
- Used Book in Good Condition
|Linux Device Drivers, 3rd Edition
Lowest new price: $22.46
Lowest used price: $5.98
List price: $39.95
Author: Jonathan Corbet
Brand: O Reilly Media
Device drivers literally drive everything you're interested in--disks, monitors, keyboards, modems--everything outside the computer chip and memory. And writing device drivers is one of the few areas of programming for the Linux operating system that calls for unique, Linux-specific knowledge. For years now, programmers have relied on the classic Linux Device Drivers from O'Reilly to master this critical subject. Now in its third edition, this bestselling guide provides all the information you'll need to write drivers for a wide range of devices.Over the years the book has helped countless programmers learn:
- how to support computer peripherals under the Linux operating system
- how to develop and write software for new hardware under Linux
- the basics of Linux operation even if they are not expecting to write a driver
The new edition of Linux Device Drivers
is better than ever. The book covers all the significant changes to Version 2.6 of the Linux kernel, which simplifies many activities, and contains subtle new features that can make a driver both more efficient and more flexible. Readers will find new chapters on important types of drivers not covered previously, such as consoles, USB drivers, and more.Best of all, you don't have to be a kernel hacker to understand and enjoy this book. All you need is an understanding of the C programming language and some background in Unix system calls. And for maximum ease-of-use, the book uses full-featured examples that you can compile and run without special hardware.Today Linux holds fast as the most rapidly growing segment of the computer market and continues to win over enthusiastic adherents in many application areas. With this increasing support, Linux is now absolutely mainstream, and viewed as a solid platform for embedded systems. If you're writing device drivers, you'll want this book. In fact, you'll wonder how drivers are ever written without it.
|Linux Administration: A Beginner’s Guide, Seventh Edition
Lowest new price: $19.39
Lowest used price: $15.39
List price: $40.00
Author: Wale Soyinka
Brand: MCGRAW-HILL Professional
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.
Now with a virtual machine showcasing the book's test system configuration, Linux Administration: A Beginner's Guide, Seventh Edition teaches system administrators how to set-up and configure Linux quickly and easily.
Effectively set up and manage any version of Linux on individual servers or entire networks using this practical resource. Fully updated to cover the latest tools and techniques, Linux Administration: A Beginner’s Guide, Seventh Edition features clear explanations, step-by-step instructions, and real-world examples. Find out how to configure hardware and software, work from the GUI or command line, maintain Internet and network services, and secure your data. Performance tuning, virtualization, containers, software management, and backup solutions are covered in detail.
- Install and configure Linux, including the latest distributions from Fedora, Ubuntu, CentOS, openSUSE, Debian, and RHEL
- Manage users, permissions, files, folders, and applications
- Set up and administer system services and daemons
- Manage software from source code or binary packages
- Customize, build, or patch the Linux kernel
- Work with physical and virtual file systems, such as proc, SysFS, and cgroup
- Understand networking protocols, including TCP/IP, ARP, IPv4, and IPv6
- Build reliable firewalls and routers with Netfilter (iptables and nftables) and Linux
- Monitor and test network activity and minimize security threats
- Create and maintain DNS, FTP, web, e-mail, print, LDAP, and VoIP servers
- Share resources using GlusterFS, NFS, and Samba
- Implement popular cloud-based technologies using Linux virtualization and containers using KVM and Docker
|Mastering Embedded Linux Programming - Second Edition: Unleash the full potential of Embedded Linux with Linux 4.9 and Yocto Project 2.2 (Morty) Updates
Lowest new price: $31.55
Lowest used price: $36.17
List price: $49.99
Author: Chris Simmonds
- Discover how to build and configure reliable embedded Linux devices
- This book has been updated to include Linux 4.9 and Yocto Project 2.2 (Morty)
- This comprehensive guide covers the remote update of devices in the field and power management
Embedded Linux runs many of the devices we use every day, from smart TVs to WiFi routers, test equipment to industrial controllers - all of them have Linux at their heart. Linux is a core technology in the implementation of the inter-connected world of the Internet of Things.
The comprehensive guide shows you the technologies and techniques required to build Linux into embedded systems. You will begin by learning about the fundamental elements that underpin all embedded Linux projects: the toolchain, the bootloader, the kernel, and the root filesystem. You'll see how to create each of these elements from scratch, and how to automate the process using Buildroot and the Yocto Project.
Moving on, you'll find out how to implement an effective storage strategy for flash memory chips, and how to install updates to the device remotely once it is deployed. You'll also get to know the key aspects of writing code for embedded Linux, such as how to access hardware from applications, the implications of writing multi-threaded code, and techniques to manage memory in an efficient way. The final chapters show you how to debug your code, both in applications and in the Linux kernel, and how to profile the system so that you can look out for performance bottlenecks.
By the end of the book, you will have a complete overview of the steps required to create a successful embedded Linux system.
What you will learn
- Evaluate the Board Support Packages offered by most manufacturers of a system on chip or embedded module
- Use Buildroot and the Yocto Project to create embedded Linux systems quickly and efficiently
- Update IoT devices in the field without compromising security
- Reduce the power budget of devices to make batteries last longer
- Interact with the hardware without having to write kernel device drivers
- Debug devices remotely using GDB, and see how to measure the performance of the systems using powerful tools such as perk, ftrace, and valgrind
- Find out how to configure Linux as a real-time operating system
Table of Contents
- Starting Out
- Learning About Toolchains
- All About Bootloaders
- Configuring and Building the Kernel
- Building a Root Filesystem
- Selecting a Build System
- Creating a Storage Strategy
- Updating Software in the Field
- Interfacing with Device Drivers
- starting Up - The Init Program
- Managing Power
- Learning About Processes and Threads
- Managing Memory
- Debugging with GDB
- Profiling and Tracing
- Real-Time Programming
Page 2 of 105
CERTAIN CONTENT THAT APPEARS ON THIS SITE COMES FROM AMAZON SERVICES LLC. THIS CONTENT IS PROVIDED AS IS AND IS SUBJECT TO CHANGE OR REMOVAL AT ANY TIME.