Apparel & AccessoriesBooksClassical MusicDVDElectronics & PhotoGourmet Food and GroceriesHealth & Personal CareHome & GardenIndustrial & ScientificKitchen
Popular MusicMusical InstrumentsOutdoor LivingComputer HardwareComputer SoftwareSporting GoodsToolsToys and GamesVHS VideoVideo Games

Search:

Browse by Catagory:

Books

Linux Programming


Linux Kernel Development (3rd Edition)

Linux Kernel Development (3rd Edition) Lowest new price: $24.15
Lowest used price: $15.64
List price: $49.99
Author: Robert Love

Linux Kernel Development details the design and implementation of the Linux kernel, presenting the content in a manner that is beneficial to those writing and developing kernel code, as well as to programmers seeking to better understand the operating system and become more efficient and productive in their coding.

 

The book details the major subsystems and features of the Linux kernel, including its design, implementation, and interfaces. It covers the Linux kernel with both a practical and theoretical eye, which should appeal to readers with a variety of interests and needs.

 

The author, a core kernel developer, shares valuable knowledge and experience on the 2.6 Linux kernel. Specific topics covered include process management, scheduling, time management and timers, the system call interface, memory addressing, memory management, the page cache, the VFS, kernel synchronization, portability concerns, and debugging techniques. This book covers the most interesting features of the Linux 2.6 kernel, including the CFS scheduler, preemptive kernel, block I/O layer, and I/O schedulers.

 

The third edition of Linux Kernel Development includes new and updated material throughout the book:

  • An all-new chapter on kernel data structures
  • Details on interrupt handlers and bottom halves
  • Extended coverage of virtual memory and memory allocation
  • Tips on debugging the Linux kernel
  • In-depth coverage of kernel synchronization and locking
  • Useful insight into submitting kernel patches and working with the Linux kernel community

Similar Products:


How Linux Works, 2nd Edition: What Every Superuser Should Know

How Linux Works, 2nd Edition: What Every Superuser Should Know Lowest new price: $37.95
Lowest used price: $32.72
List price: $39.95
Author: Brian Ward
Brand: imusti

Unlike some operating systems, Linux doesn’t try to hide the important bits from you—it gives you full control of your computer. But to truly master Linux, you need to understand its internals, like how the system boots, how networking works, and what the kernel actually does.

In this completely revised second edition of the perennial best seller How Linux Works, author Brian Ward makes the concepts behind Linux internals accessible to anyone curious about the inner workings of the operating system. Inside, you’ll find the kind of knowledge that normally comes from years of experience doing things the hard way. You’ll learn:
–How Linux boots, from boot loaders to init implementations (systemd, Upstart, and System V)
–How the kernel manages devices, device drivers, and processes
–How networking, interfaces, firewalls, and servers work
–How development tools work and relate to shared libraries
–How to write effective shell scripts

You’ll also explore the kernel and examine key system tasks inside user space, including system calls, input and output, and filesystems. With its combination of background, theory, real-world examples, and patient explanations, How Linux Works will teach you what you need to know to solve pesky problems and take control of your operating system.

Features:

  • No Starch Press

Similar Products:


A Practical Guide to Linux Commands, Editors, and Shell Programming (3rd Edition)

A Practical Guide to Linux Commands, Editors, and Shell Programming (3rd Edition) Lowest new price: $34.85
Lowest used price: $13.88
List price: $49.99
Author: Mark G. Sobell

“First Sobell taught people how to use Linux . . . now he teaches you the power of Linux. A must-have book for anyone who wants to take Linux to the next level.”

Jon “maddog” Hall, Executive Director, Linux International 

New Chapters on Python and MySQLCovers Perl, too!

  • Learn from hundreds of realistic, high-quality examples, and become a true Linux command-line guru!
  • NEW! Covers busybox, Midnight Commander, screen, and sshfs/curlftpf
  • Covers the Mac OS X command line and its unique tools
  • 295-page reference covers 98 utilities, including Mac OS X commands! 

For use with all popular versions of Linux, including Ubuntu™, Fedora™, openSUSE™, Red Hat®, Debian, Mageia, Mint, Arch, CentOS, and Mac OS X, too!

 

The Most Useful Tutorial and Reference, with Hundreds of High-Quality Examples for Every Popular Linux Distribution

 

Linux is today’s dominant Internet server platform. System administrators and Web developers need deep Linux fluency, including expert knowledge of shells and the command line. This is the only guide with everything you need to achieve that level of Linux mastery. Renowned Linux expert Mark Sobell has brought together comprehensive, insightful guidance on the tools sysadmins, developers, and power users need most, and has created an outstanding day-to-day reference.

 

This title is 100 percent distribution and release agnostic. Packed with hundreds of high-quality, realistic examples, it presents Linux from the ground up: the clearest explanations and most useful information about everything from filesystems to shells, editors to utilities, and programming tools to regular expressions.

 

Use a Mac? You’ll find coverage of the Mac OS X command line, including OS X-only tools and utilities other Linux/UNIX titles ignore. Sobell presents a new MySQL chapter. There’s even an expert introduction to Python–today’s most valuable tool for automating complex, time-consuming administration tasks.

 

A Practical Guide to Linux® Commands, Editors, and Shell Programming, Third Edition, is the only guide to deliver 

  • A MySQL chapter to get you started with this ubiquitous relational database management system (RDBMS)
  • A masterful introduction to Python for system administrators and power users
  • New coverage of the busybox single binary collection of utilities, the screen terminal session manager/multiplexer, and the mc (Midnight Commander) textual file manager, plus a new chapter on using ssh for secure communication
  • In-depth coverage of the bash and tcsh shells, including a complete discussion of environment, inheritance, and process locality, plus coverage of basic and advanced shell programming
  • Practical explanations of 98 core utilities, from aspell to xargs, including printf and sshfs/curlftpfs, PLUS Mac OS X-specific utilities from ditto to SetFile
  • Expert guidance on automating remote backups using rsync
  • Dozens of system security tips, including step-by-step walkthroughs of implementing secure communications using ssh and scp
  • Tips and tricks for customizing the shell, including step values, sequence expressions, the eval builtin, and implicit command-line continuation
  • High-productivity editing techniques using vim and emacs
  • A comprehensive, 295-page command reference section covering 98 utilities, including find, grep, sort, and tar
  • Instructions for updating systems using apt-get and yum
  • And much more, including coverage of BitTorrent, gawk, sed, find, sort, bzip2, and regular expressions

 

Similar Products:


Red Hat RHCSA/RHCE 7 Cert Guide: Red Hat Enterprise Linux 7 (EX200 and EX300) (Certification Guide)

Red Hat RHCSA/RHCE 7 Cert Guide: Red Hat Enterprise Linux 7 (EX200 and EX300) (Certification Guide) Lowest new price: $24.49
Lowest used price: $17.21
List price: $59.99
Author: Sander van Vugt

Master every objective on the RHCSA and RHCE exams

  • 4 Practice Exams (2 RHCSA and 2 RHCE)
  • More than 40 interactive hands-on exercises and performance-based CLI simulations
  • 3 Virtual Machines to help you test your skills in a real-world environment
  • More than 30 minutes of unique video examining pre-assessment theoretical exams so you know if you are prepared to take the tests
  • More than 2 hours of video instruction from our best-selling RHCSA and RHCE Complete Video Courses
  • 40 interactive chapter and glossary quizzes

 

This study guide helps you master topics on both the Red Hat RHCSA (EX200) and RHCE (EX300) exams for Red Hat Enterprise Linux Version 7, including:

 

Part 1: RHCSA

 

  • Basic System Management: Installation, tools, text files, server connections; user, group, and permissions management; network configuration
  • Operating Running Systems: Process management, VMs, package installation, task scheduling, logging, managing partitions, and LVM logical volumes
  • Advanced System Administration: Basic kernel management, basic Apache server configuration, boot procedures/troubleshooting
  • Managing Network Services: Using Kickstart; managing SELinux; configuring firewalls, remote mounts, FTP, and time services

 

Part 2: RHCE

 

  • System Configuration/Management: External authentication/authorization, iSCSI SANs, performance reporting, optimization, logging, routing/advanced networking, and Bash scripting
  • System Security: Configuring firewalls, advanced Apache services, DNS, MariaDB, NFS, Samba, SMTP, SSH, and time synchronization

 

Red Hat RHCSA/RHCE 7 Cert Guide contains proven study features that allow you to succeed on the exam the first time. Best-selling author and top Linux consultant Sander van Vugt shares preparation hints and test-taking tips, helping you identify areas of weakness to improve both your conceptual knowledge and hands-on skills. This complete study package includes the following:

 

  • A test-preparation routine proven to help you pass Red Hat’s tough certification exams
  • Clearly defined chapter learning objectives covering all RHCSA (EX200) and RHCE (EX300) exam topics
  • Chapter-ending review questions to help you drill on key concepts you must know thoroughly
  • Chapter-ending labs showing what real exam tasks and assignments look like
  • 4 Practice Exams that appear in the book and also on the on the companion website and DVD (2 RHCSA and 2 RHCE), so you can thoroughly test your skills before taking your actual exams
  • More than 40 Interactive Hands-on Exercises and 40 Interactive Quizzes to help you immediately test and reinforce your knowledge
  • 4 advanced Command-Line Interface simulations (2 RHCSA and 2 RHCE) walking you through realistic, complex, multi-step Red Hat scenarios
  • Interactive Glossary Quiz on the companion website and DVD allowing you to test yourself on every glossary term covered in the book
  • 2½+ hours of video training: 30 minutes of unique test-prep videos plus more than 2 hours of instruction from the best-selling RHCSA and RHCE Complete Video Course series
  • 3 Virtual Machines on the companion website and DVD giving you easy access to a reliable environment for working through this book’s labs and exercises
  • A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies
  • Two Theoretical Pre-Assessment Exams (one RHCSA and one RHCE) so you can assess your skills and determine the best study path
  • An Exam Essentials appendix that quickly recaps all major chapter topics for easy reference, found on both the companion website and DVD
  • Study plan suggestions and templates to help you organize and optimize your study time

 

Companion Website and DVD

 

The companion website and DVD contain 4 practice exams, exercises, quizzes, virtual labs, video, and more. For details, open the DVD or access the companion website at
www.pearsonitcertification.com/

 

Includes Exclusive Offer for 70% Off Premium Edition eBook and Practice Tests

 

Similar Products:


Mastering Kali Linux for Advanced Penetration Testing - Second Edition: Secure your network with Kali Linux - the ultimate white hat hackers' toolkit

Mastering Kali Linux for Advanced Penetration Testing - Second Edition: Secure your network with Kali Linux - the ultimate white hat hackers' toolkit Lowest new price: $47.48
Lowest used price: $41.62
List price: $49.99
Author: Vijay Kumar Velu

A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers.

About This Book

  • Employ advanced pentesting techniques with Kali Linux to build highly-secured systems
  • Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches
  • Select and configure the most effective tools from Kali Linux to test network security and prepare your business against malicious threats and save costs

Who This Book Is For

Penetration Testers, IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you.Some prior exposure to basics of penetration testing/ethical hacking would be helpful in making the most out of this title.

What You Will Learn

  • Select and configure the most effective tools from Kali Linux to test network security
  • Employ stealth to avoid detection in the network being tested
  • Recognize when stealth attacks are being used against your network
  • Exploit networks and data systems using wired and wireless networks as well as web services
  • Identify and download valuable data from target systems
  • Maintain access to compromised systems
  • Use social engineering to compromise the weakest part of the network-the end users

In Detail

This book will take you, as a tester or security practitioner through the journey of reconnaissance, vulnerability assessment, exploitation, and post-exploitation activities used by penetration testers and hackers.

We will start off by using a laboratory environment to validate tools and techniques, and using an application that supports a collaborative approach to penetration testing. Further we will get acquainted with passive reconnaissance with open source intelligence and active reconnaissance of the external and internal networks. We will also focus on how to select, use, customize, and interpret the results from a variety of different vulnerability scanners. Specific routes to the target will also be examined, including bypassing physical security and exfiltration of data using different techniques. You will also get to grips with concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections. Later you will learn the practical aspects of attacking user client systems by backdooring executable files. You will focus on the most vulnerable part of the network-directly and bypassing the controls, attacking the end user and maintaining persistence access through social media.

You will also explore approaches to carrying out advanced penetration testing in tightly secured environments, and the book's hands-on approach will help you understand everything you need to know during a Red teaming exercise or penetration testing

Style and approach

An advanced level tutorial that follows a practical approach and proven methods to maintain top notch security of your networks.

Table of Contents

  1. Goal-Based Penetration Testing with Kali Linux
  2. Open Source Intelligence and Passive Reconnaissance
  3. Active Reconnaissance of the External and Internal Networks
  4. Vulnerability Assessment
  5. Physical Security and Social Engineering
  6. Wireless Attacks
  7. Reconnaissance and Exploitation of Web-Based Applications
  8. Attacking Remote Access
  9. Client-Side Exploitation
  10. Bypassing Security Controls
  11. Exploitation
  12. Action on the Objective
  13. Privilege Escalation
  14. Command and Control

Similar Products:


Wicked Cool Shell Scripts, 2nd Edition: 101 Scripts for Linux, OS X, and UNIX Systems

Wicked Cool Shell Scripts, 2nd Edition: 101 Scripts for Linux, OS X, and UNIX Systems Lowest new price: $19.95
Lowest used price: $10.34
List price: $34.95
Author: Dave Taylor
Brand: No Starch Press

Shell scripts are an efficient way to interact with your machine and manage your files and system operations. With just a few lines of code, your computer will do exactly what you want it to do. But you can also use shell scripts for many other essential (and not-so-essential) tasks.

This second edition of Wicked Cool Shell Scripts offers a collection of useful, customizable, and fun shell scripts for solving common problems and personalizing your computing environment. Each chapter contains ready-to-use scripts and explanations of how they work, why you’d want to use them, and suggestions for changing and expanding them. You'll find a mix of classic favorites, like a disk backup utility that keeps your files safe when your system crashes, a password manager, a weather tracker, and several games, as well as 23 brand-new scripts, including:

– ZIP code lookup tool that reports the city and state
– Bitcoin address information retriever
– suite of tools for working with cloud services like Dropbox and iCloud
– for renaming and applying commands to files in bulk
– processing and editing tools

Whether you want to save time managing your system or just find new ways to goof off, these scripts are wicked cool!

Features:

  • No Starch Press

Similar Products:


Exploring BeagleBone: Tools and Techniques for Building with Embedded Linux

Exploring BeagleBone: Tools and Techniques for Building with Embedded Linux Lowest new price: $21.52
Lowest used price: $10.56
List price: $35.00
Author: Derek Molloy
Brand: Wiley

In-depth instruction and practical techniques for building with the BeagleBone embedded Linux platform

Exploring BeagleBone is a hands-on guide to bringing gadgets, gizmos, and robots to life using the popular BeagleBone embedded Linux platform. Comprehensive content and deep detail provide more than just a BeagleBone instruction manual--you'll also learn the underlying engineering techniques that will allow you to create your own projects. The book begins with a foundational primer on essential skills, and then gradually moves into communication, control, and advanced applications using C/C++, allowing you to learn at your own pace. In addition, the book's companion website features instructional videos, source code, discussion forums, and more, to ensure that you have everything you need.

The BeagleBone's small size, high performance, low cost, and extreme adaptability have made it a favorite development platform, and the Linux software base allows for complex yet flexible functionality. The BeagleBone has applications in smart buildings, robot control, environmental sensing, to name a few; and, expansion boards and peripherals dramatically increase the possibilities. Exploring BeagleBone provides a reader-friendly guide to the device, including a crash course in computer engineering. While following step by step, you can: 

  • Get up to speed on embedded Linux, electronics, and programming
  • Master interfacing electronic circuits, buses and modules, with practical examples
  • Explore the Internet-connected BeagleBone and the BeagleBone with a display
  • Apply the BeagleBone to sensing applications, including video and sound
  • Explore the BeagleBone's Programmable Real-Time Controllers
Hands-on learning helps ensure that your new skills stay with you, allowing you to design with electronics, modules, or peripherals even beyond the BeagleBone. Insightful guidance and online peer support help you transition from beginner to expert as you master the techniques presented in Exploring BeagleBone, the practical handbook for the popular computing platform. Visit the companion website for more information at exploringbeaglebone.com.

Features:

  • Wiley

Similar Products:


Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking

Learning Kali Linux: Security Testing, Penetration Testing, and Ethical Hacking Lowest new price: $37.52
Lowest used price: $30.42
List price: $49.99
Author: Ric Messier

With more than 600 security tools in its arsenal, the Kali Linux distribution can be overwhelming. Experienced and aspiring security professionals alike may find it challenging to select the most appropriate tool for conducting a given test. This practical book covers Kali’s expansive security capabilities and helps you identify the tools you need to conduct a wide range of security tests and penetration tests. You’ll also explore the vulnerabilities that make those tests necessary.

Author Ric Messier takes you through the foundations of Kali Linux and explains methods for conducting tests on networks, web applications, wireless security, password vulnerability, and more. You’ll discover different techniques for extending Kali tools and creating your own toolset.

  • Learn tools for stress testing network stacks and applications
  • Perform network reconnaissance to determine what’s available to attackers
  • Execute penetration tests using automated exploit tools such as Metasploit
  • Use cracking tools to see if passwords meet complexity requirements
  • Test wireless capabilities by injecting frames and cracking passwords
  • Assess web application vulnerabilities with automated or proxy-based tools
  • Create advanced attack techniques by extending Kali tools or developing your own
  • Use Kali Linux to generate reports once testing is complete


Similar Products:


Linux All-In-One For Dummies (For Dummies (Computer/Tech))

Linux All-In-One For Dummies (For Dummies (Computer/Tech)) Lowest new price: $24.13
Lowest used price: $22.98
List price: $39.99
Author: Emmett Dulaney

8 mini books chock full of Linux!

Inside, over 800 pages of Linux topics are organized into eight task-oriented mini books that help you understand all aspects of the latest OS distributions of the most popular open-source operating system in use today. Topics include getting up and running with basics, desktops, networking, internet services, administration, security, scripting, Linux certification, and more. 

This new edition of Linux All-in-One For Dummies has a unique focus on Ubuntu, while still including coverage of Debian, Red Hat, SuSE, and others. The market is looking for administrators, and part of the qualifications needed for job openings is the authentication of skills by vendor-neutral third parties (CompTIA/Linux Professional Institute)—and that’s something other books out there don’t address.

  • Install and configure peripherals, software packages, and keep everything current
  • Connect to the internet, set up a local area network (including a primer on TCP/IP, and managing a local area network using configuration tools and files)
  • Browse the web securely and anonymously
  • Get everything you need to pass your entry-level Linux certification exams

This book is for anyone getting familiar with the Linux OS, and those looking for test-prep content as they study for the level-1 Linux certification!  

Similar Products:


The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory

The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory Lowest new price: $35.00
Lowest used price: $27.17
List price: $65.00
Author: Michael Hale Ligh
Brand: Wiley

Memory forensics provides cutting edge technology to helpinvestigate digital attacks

Memory forensics is the art of analyzing computer memory (RAM)to solve digital crimes. As a follow-up to the best seller MalwareAnalyst's Cookbook, experts in the fields of malware, security, anddigital forensics bring you a step-by-step guide to memoryforensics—now the most sought after skill in the digitalforensics and incident response fields.

Beginning with introductory concepts and moving toward theadvanced, The Art of Memory Forensics: Detecting Malware andThreats in Windows, Linux, and Mac Memory is based on a five daytraining course that the authors have presented to hundreds ofstudents. It is the only book on the market that focusesexclusively on memory forensics and how to deploy such techniquesproperly. Discover memory forensics techniques:

  • How volatile memory analysis improves digitalinvestigations
  • Proper investigative steps for detecting stealth malware andadvanced threats
  • How to use free, open source tools for conducting thoroughmemory forensics
  • Ways to acquire memory from suspect systems in a forensicallysound manner

The next era of malware and security breaches are moresophisticated and targeted, and the volatile memory of a computeris often overlooked or destroyed as part of the incident responseprocess. The Art of Memory Forensics explains the latesttechnological innovations in digital forensics to help bridge thisgap. It covers the most popular and recently released versions ofWindows, Linux, and Mac, including both the 32 and 64-biteditions.

Features:

  • Wiley

Similar Products:


<< Prev   Next >>
Page 2 of 119

[Kindle]    [Kindle DX]
  Privacy Policy

CERTAIN CONTENT THAT APPEARS ON THIS SITE COMES FROM AMAZON SERVICES LLC. THIS CONTENT IS PROVIDED AS IS AND IS SUBJECT TO CHANGE OR REMOVAL AT ANY TIME.