Apparel & AccessoriesBooksClassical MusicDVDElectronics & PhotoGourmet Food and GroceriesHealth & Personal CareHome & GardenIndustrial & ScientificKitchen
Popular MusicMusical InstrumentsOutdoor LivingComputer HardwareComputer SoftwareSporting GoodsToolsToys and GamesVHS VideoVideo Games

Search:

Browse by Catagory:

Books

Linux Programming


Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

Practical Forensic Imaging: Securing Digital Evidence with Linux Tools Lowest new price: $33.04
Lowest used price: $30.87
List price: $49.95
Author: Bruce Nikkel
Brand: No Starch Press

Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.

Practical Forensic Imaging takes a detailed look at how to secure and manage digital evidence using Linux-based command line tools. This essential guide walks you through the entire forensic acquisition process and covers a wide range of practical scenarios and situations related to the imaging of storage media.

You’ll learn how to:
–Perform forensic imaging of magnetic hard disks, SSDs and flash drives, optical discs, magnetic tapes, and legacy technologies
–Protect attached evidence media from accidental modification
–Manage large forensic image files, storage capacity, image format conversion, compression, splitting, duplication, secure transfer and storage, and secure disposal
–Preserve and verify evidence integrity with cryptographic and piecewise hashing, public key signatures, and RFC-3161 timestamping
–Work with newer drive and interface technologies like NVME, SATA Express, 4K-native sector drives, SSHDs, SAS, UASP/USB3x, and Thunderbolt
–Manage drive security such as ATA passwords; encrypted thumb drives; Opal self-encrypting drives; OS-encrypted drives using BitLocker, FileVault, and TrueCrypt; and others
–Acquire usable images from more complex or challenging situations such as RAID systems, virtual machine images, and damaged media

With its unique focus on digital forensic acquisition and evidence preservation, Practical Forensic Imaging is a valuable resource for experienced digital forensic investigators wanting to advance their Linux skills and experienced Linux administrators wanting to learn digital forensics. This is a must-have reference for every digital forensics lab.

Features:

  • No Starch Press

Similar Products:


Learning Linux Binary Analysis

Learning Linux Binary Analysis Lowest new price: $37.23
Lowest used price: $37.23
List price: $44.99
Author: Ryan "elfmaster" O'Neill
Brand: O Neil Ryan Elfmaster

Key Features

  • Grasp the intricacies of the ELF binary format of UNIX and Linux
  • Design tools for reverse engineering and binary forensic analysis
  • Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes

Book Description

Learning Linux Binary Analysis is packed with knowledge and code that will teach you the inner workings of the ELF format, and the methods used by hackers and security analysts for virus analysis, binary patching, software protection and more.

This book will start by taking you through UNIX/Linux object utilities, and will move on to teaching you all about the ELF specimen. You will learn about process tracing, and will explore the different types of Linux and UNIX viruses, and how you can make use of ELF Virus Technology to deal with them.

The latter half of the book discusses the usage of Kprobe instrumentation for kernel hacking, code patching, and debugging. You will discover how to detect and disinfect kernel-mode rootkits, and move on to analyze static code. Finally, you will be walked through complex userspace memory infection analysis.

This book will lead you into territory that is uncharted even by some experts; right into the world of the computer hacker.

What you will learn

  • Explore the internal workings of the ELF binary format
  • Discover techniques for UNIX Virus infection and analysis
  • Work with binary hardening and software anti-tamper methods
  • Patch executables and process memory
  • Bypass anti-debugging measures used in malware
  • Perform advanced forensic analysis of binaries
  • Design ELF-related tools in the C language
  • Learn to operate on memory with ptrace

About the Author

Ryan "elfmaster" O'Neill is a computer security researcher and software engineer with a background in reverse engineering, software exploitation, security defense, and forensics technologies. He grew up in the computer hacker subculture, the world of EFnet, BBS systems, and remote buffer overflows on systems with an executable stack. He was introduced to system security, exploitation, and virus writing at a young age. His great passion for computer hacking has evolved into a love for software development and professional security research. Ryan has spoken at various computer security conferences, including DEFCON and RuxCon, and also conducts a 2-day ELF binary hacking workshop.

He has an extremely fulfilling career and has worked at great companies such as Pikewerks, Leviathan Security Group, and more recently Backtrace as a software engineer.

Ryan has not published any other books, but he is well known for some of his papers published in online journals such as Phrack and VXHeaven. Many of his other publications can be found on his website at http://www.bitlackeys.org.

Table of Contents

  1. The Linux Environment and Its Tools
  2. The ELF Binary Format
  3. Linux Process Tracing
  4. ELF Virus Technology – Linux/Unix Viruses
  5. Linux Binary Protection
  6. ELF Binary Forensics in Linux
  7. Process Memory Forensics
  8. ECFS – Extended Core File Snapshot Technology
  9. Linux /proc/kcore Analysis

Features:

  • Learning Linux Binary Analysis

Similar Products:


The Cathedral & the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary

The Cathedral & the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary Lowest new price: $6.05
Lowest used price: $2.22
List price: $16.95
Author: Eric S. Raymond
Brand: Brand: OREILLY ASSOCIATES

Open source provides the competitive advantage in the Internet Age. According to the August Forrester Report, 56 percent of IT managers interviewed at Global 2,500 companies are already using some type of open source software in their infrastructure and another 6 percent will install it in the next two years. This revolutionary model for collaborative software development is being embraced and studied by many of the biggest players in the high-tech industry, from Sun Microsystems to IBM to Intel.

The Cathedral & the Bazaar is a must for anyone who cares about the future of the computer industry or the dynamics of the information economy. Already, billions of dollars have been made and lost based on the ideas in this book. Its conclusions will be studied, debated, and implemented for years to come. According to Bob Young, "This is Eric Raymond's great contribution to the success of the open source revolution, to the adoption of Linux-based operating systems, and to the success of open source users and the companies that supply them."

The interest in open source software development has grown enormously in the past year. This revised and expanded paperback edition includes new material on open source developments in 1999 and 2000. Raymond's clear and effective writing style accurately describing the benefits of open source software has been key to its success. With major vendors creating acceptance for open source within companies, independent vendors will become the open source story in 2001.

Features:

  • Used Book in Good Condition

Similar Products:


Embedded Linux Primer: A Practical Real-World Approach (2nd Edition)

Embedded Linux Primer: A Practical Real-World Approach (2nd Edition) Lowest new price: $44.00
Lowest used price: $23.96
List price: $54.99
Author: Christopher Hallinan

Up-to-the-Minute, Complete Guidance for Developing Embedded Solutions with Linux

 

Linux has emerged as today’s #1 operating system for embedded products. Christopher Hallinan’s Embedded Linux Primer has proven itself as the definitive real-world guide to building efficient, high-value, embedded systems with Linux. Now, Hallinan has thoroughly updated this highly praised book for the newest Linux kernels, capabilities, tools, and hardware support, including advanced multicore processors.

 

Drawing on more than a decade of embedded Linux experience, Hallinan helps you rapidly climb the learning curve, whether you’re moving from legacy environments or you’re new to embedded programming. Hallinan addresses today’s most important development challenges and demonstrates how to solve the problems you’re most likely to encounter.

You’ll learn how to build a modern, efficient embedded Linux development environment, and then utilize it as productively as possible. Hallinan offers up-to-date guidance on everything from kernel configuration and initialization to bootloaders, device drivers to file systems, and BusyBox utilities to real-time configuration and system analysis. This edition adds entirely new chapters on UDEV, USB, and open source build systems.

 

  • Tour the typical embedded system and development environment and understand its concepts and components.
  • Understand the Linux kernel and userspace initialization processes.
  • Preview bootloaders, with specific emphasis on U-Boot.
  • Configure the Memory Technology Devices (MTD) subsystem to interface with flash (and other) memory devices.
  • Make the most of BusyBox and latest open source development tools.
  • Learn from expanded and updated coverage of kernel debugging.
  • Build and analyze real-time systems with Linux.
  • Learn to configure device files and driver loading with UDEV.
  • Walk through detailed coverage of the USB subsystem.
  • Introduces the latest open source embedded Linux build systems.
  • Reference appendices include U-Boot and BusyBox commands.

Features:

  • ISBN13: 9780137017836
  • Condition: New
  • Notes: BRAND NEW FROM PUBLISHER! 100% Satisfaction Guarantee. Tracking provided on most orders. Buy with Confidence! Millions of books sold!

Similar Products:


Command Line Kung Fu: Bash Scripting Tricks, Linux Shell Programming Tips, and Bash One-liners

Command Line Kung Fu: Bash Scripting Tricks, Linux Shell Programming Tips, and Bash One-liners Lowest new price: $14.53
Lowest used price: $14.29
List price: $14.99
Author: Jason Cannon
Brand: Jason Cannon

Become a Linux Ninja with Command Line Kung Fu!

Do you think you have to lock yourself in a basement reading cryptic man pages for months on end in order to have ninja like command line skills? In reality, if you had someone share their most powerful command line tips, tricks, and patterns you'd save yourself a lot of time and frustration. What if you could look over the shoulder of a good friend that just happened to be a command line guru? What if they not only showed you the commands they were using, but why they were using them and exactly how they worked? And what if that friend took the time to write all of it down so you can refer to it whenever you liked? Well, a friend did just that. Command Line Kung Fu is packed with dozens of tips and over 100 practical real-world examples. You won't find theoretical examples in this book. The examples demonstrate how to solve actual problems and accomplish worthwhile goals. The tactics are easy to find, too. Each chapter covers a specific topic and groups related tips and examples together. For example, if you need help extracting text from a file look in the "Text Processing and Manipulation" chapter. Also, a comprehensive index is included. If you want to find every example where a given command is used -- even if it's not the main subject of the tip -- look in the index. It will list every single place in the book where that command appears. Here is just some of what you will learn by reading Command Line Kung Fu:
  • How to quickly and easily repeat commands in your shell history
  • Shortcuts for grabbing specific words from your shell history to use in your current command
  • How to save a copy of your command line session for later reference
  • How to strip out blank lines and comments from files
  • How to control colorized text when uses pipes and pagers
  • Ways to transform text: from changing case to substituting characters and more
  • How to extract specific blocks of text from files or streams of input
  • A quick tip to fix common typos
  • How to edit files over the network
  • How to compare the differences between files on your local computer and a remote one
  • How to create and use SSH tunnels
  • Ways to verify what programs are listening on what ports
  • How to kill all the processes for a given user with a single command
  • Strategies for dealing with multi-hop SSH connections
  • How to disconnect from a server in a way that will allow you to pick up where you left off
  • How to automate software installs that require user input
  • Shell scripting tips
  • How to automatically keep repeating a command until it succeeds
  • The right way to delete a file that is being written to
  • How to surf the web from the command line... and more importantly how to download anything from the web and interact with HTTP APIs
  • Ways to determine who and what is using the most disk space
  • How to secure your web browser session when using an open wifi hotspot
  • How to generate random passwords from the command line
  • Two tips for easily creating backups
  • Tips for handling tar archives
  • How to replace a string in multiple files at once with just one command
  • and much more...
What you learn in Command Line Kung Fu applies to any Linux distribution including Ubuntu, Debian, Linux Mint, RedHat, Fedora, OpenSUSE, Slackware, and more.

Scroll up, click the "Buy Now With 1-Click" button to get your black belt in Linux Command Line Kung Fu.

Features:

  • Command Line Kung Fu Bash Scripting Tricks Linux Shell Programming Tips and Bash One Liners

Similar Products:


Linux Hardening in Hostile Networks: Server Security from TLS to Tor (Pearson Open Source Software Development Series)

Linux Hardening in Hostile Networks: Server Security from TLS to Tor (Pearson Open Source Software Development Series) Lowest new price: $23.99
Lowest used price: $31.07
List price: $39.99
Author: Kyle Rankin
Brand: Rankin Kyle

Implement Industrial-Strength Security on Any Linux Server

 

In an age of mass surveillance, when advanced cyberwarfare weapons rapidly migrate into every hacker’s toolkit, you can’t rely on outdated security methods–especially if you’re responsible for Internet-facing services. In Linux® Hardening in Hostile Networks, Kyle Rankin helps you to implement modern safeguards that provide maximum impact with minimum effort and to strip away old techniques that are no longer worth your time.

 

Rankin provides clear, concise guidance on modern workstation, server, and network hardening, and explains how to harden specific services, such as web servers, email, DNS, and databases. Along the way, he demystifies technologies once viewed as too complex or mysterious but now essential to mainstream Linux security. He also includes a full chapter on effective incident response that both DevOps and SecOps can use to write their own incident response plan.

 

Each chapter begins with techniques any sysadmin can use quickly to protect against entry-level hackers and presents intermediate and advanced techniques to safeguard against sophisticated and knowledgeable attackers, perhaps even state actors. Throughout, you learn what each technique does, how it works, what it does and doesn’t protect against, and whether it would be useful in your environment.

  • Apply core security techniques including 2FA and strong passwords
  • Protect admin workstations via lock screens, disk encryption, BIOS passwords, and other methods
  • Use the security-focused Tails distribution as a quick path to a hardened workstation
  • Compartmentalize workstation tasks into VMs with varying levels of trust
  • Harden servers with SSH, use apparmor and sudo to limit the damage attackers can do, and set up remote syslog servers to track their actions
  • Establish secure VPNs with OpenVPN, and leverage SSH to tunnel traffic when VPNs can’t be used
  • Configure a software load balancer to terminate SSL/TLS connections and initiate new ones downstream
  • Set up standalone Tor services and hidden Tor services and relays
  • Secure Apache and Nginx web servers, and take full advantage of HTTPS
  • Perform advanced web server hardening with HTTPS forward secrecy and ModSecurity web application firewalls
  • Strengthen email security with SMTP relay authentication, SMTPS, SPF records, DKIM, and DMARC
  • Harden DNS servers, deter their use in DDoS attacks, and fully implement DNSSEC
  • Systematically protect databases via network access control, TLS traffic encryption, and encrypted data storage
  • Respond to a compromised server, collect evidence, and prevent future attacks

Register your product at informit.com/register for convenient access to downloads, updates, and corrections as they become available.

Features:

  • Linux Hardening in Hostile Networks Server Security from Tls to Tor

Similar Products:


Kali Linux Cookbook - Second Edition: Effective penetration testing solutions

Kali Linux Cookbook - Second Edition: Effective penetration testing solutions Lowest new price: $28.00
Lowest used price: $39.35
List price: $44.99
Author: Corey P. Schultz

Over 80 recipes to effectively test your network and boost your career in security

About This Book

  • Learn how to scan networks to find vulnerable computers and servers
  • Hack into devices to control them, steal their data, and make them yours
  • Target wireless networks, databases, and web servers, and password cracking to make the most of Kali Linux

Who This Book Is For

If you are looking to expand your career into penetration testing, you will need a good understanding of Kali Linux and the variety of tools it includes. This book will work as a perfect guide for anyone who wants to have a practical approach in leveraging penetration testing mechanisms using Kali Linux

What You Will Learn

  • Acquire the key skills of ethical hacking to perform penetration testing
  • Learn how to perform network reconnaissance
  • Discover vulnerabilities in hosts
  • Attack vulnerabilities to take control of workstations and servers
  • Understand password cracking to bypass security
  • Learn how to hack into wireless networks
  • Attack web and database servers to exfiltrate data
  • Obfuscate your command and control connections to avoid firewall and IPS detection

In Detail

Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world's most popular penetration testing distribution. Kali Linux is the most widely used platform and toolkit for penetration testing. Security is currently the hottest field in technology with a projected need for millions of security professionals.

Similar Products:


Mastering Linux Kernel Development: A kernel developer's reference manual

Mastering Linux Kernel Development: A kernel developer's reference manual Lowest new price: $38.74
Lowest used price: $34.35
List price: $49.99
Author: Raghu Bharadwaj

Key Features

  • Master the design, components, and structures of core kernel subsystems
  • Explore kernel programming interfaces and related algorithms under the hood
  • Completely updated material for the 4.12.10 kernel

Book Description

Mastering Linux Kernel Development looks at the Linux kernel, its internal arrangement and design, and various core subsystems, helping you to gain significant understanding of this open source marvel. You will look at how the Linux kernel, which possesses a kind of collective intelligence thanks to its scores of contributors, remains so elegant owing to its great design.

This book also looks at all the key kernel code, core data structures, functions, and macros, giving you a comprehensive foundation of the implementation details of the kernel's core services and mechanisms. You will also look at the Linux kernel as well-designed software, which gives us insights into software design in general that are easily scalable yet fundamentally strong and safe.

By the end of this book, you will have considerable understanding of and appreciation for the Linux kernel.

What you will learn

  • Comprehend processes and fles-the core abstraction mechanisms of the Linux kernel that promote effective simplification and dynamism
  • Decipher process scheduling and understand effective capacity utilization under general and real-time dispositions
  • Simplify and learn more about process communication techniques through signals and IPC mechanisms
  • Capture the rudiments of memory by grasping the key concepts and principles of physical and virtual memory management
  • Take a sharp and precise look at all the key aspects of interrupt management and the clock subsystem
  • Understand concurrent execution on SMP platforms through kernel synchronization and locking techniques

About the Author

Raghu Bharadwaj is a leading consultant, contributor, and corporate trainer on the Linux kernel with experience spanning close to two decades. He is an ardent kernel enthusiast and expert, and has been closely following the Linux kernel since the late 90s. He is the founder of TECH VEDA, which specializes in engineering and skilling services on the Linux kernel, through technical support, kernel contributions, and advanced training. His precise understanding and articulation of the kernel has been a hallmark, and his penchant for software designs and OS architectures has garnered him special mention from his clients. Raghu is also an expert in delivering solution-oriented, customized training programs for engineering teams working on the Linux kernel, Linux drivers, and Embedded Linux. Some of his clients include major technology companies such as Xilinx, GE, Canon, Fujitsu, UTC, TCS, Broadcom, Sasken, Qualcomm, Cognizant, STMicroelectronics, Stryker, and Lattice Semiconductors.

Table of Contents

  1. Comprehending Processes, Address Space, and Threads
  2. Deciphering the Process Scheduler
  3. Signal Management
  4. Memory Management and Allocators
  5. File I/O and File Systems
  6. Interprocess Communication
  7. Virtual Memory Management
  8. Kernel Synchronization and Locking
  9. Interrupts and Deferred Work
  10. Clock & Time Management
  11. Module Management

Similar Products:


Shell Programming in Unix, Linux and OS X: The Fourth Edition of Unix Shell Programming (4th Edition) (Developer's Library)

Shell Programming in Unix, Linux and OS X: The Fourth Edition of Unix Shell Programming (4th Edition) (Developer's Library) Lowest new price: $31.68
Lowest used price: $33.46
List price: $44.99
Author: Stephen G. Kochan

excellent condition

Similar Products:


Introduction to 64 Bit Assembly Programming for Linux and OS X: Third Edition - for Linux and OS X

Introduction to 64 Bit Assembly Programming for Linux and OS X: Third Edition - for Linux and OS X Lowest new price: $19.96
Lowest used price: $21.55
List price: $23.95
Author: Ray Seyfarth

This is the third edition of this assembly language programming textbook introducing programmers to 64 bit Intel assembly language. The primary addition to the third edition is the discussion of the new version of the free integrated development environment, ebe, designed by the author specifically to meet the needs of assembly language programmers. The new ebe is a C++ program using the Qt library to implement a GUI environment consisting of a source window, a data window, a register, a floating point register window, a backtrace window, a console window, a terminal window and a project window along with 2 educational tools called the "toy box" and the "bit bucket". The source window includes a full-featured text editor with convenient controls for assembling, linking and debugging a program. The project facility allows a program to be built from C source code files and assembly source files. Assembly is performed automatically using the yasm assembler and linking is performed with ld or gcc. Debugging operates by transparently sending commands into the gdb debugger while automatically displaying registers and variables after each debugging step. Additional information about ebe can be found at http://www.rayseyfarth.com. The second important addition is support for the OS X operating system. Assembly language is similar enough between the two systems to cover in a single book. The book discusses the differences between the systems. The book is intended as a first assembly language book for programmers experienced in high level programming in a language like C or C++. The assembly programming is performed using the yasm assembler automatically from the ebe IDE under the Linux operating system. The book primarily teaches how to write assembly code compatible with C programs. The reader will learn to call C functions from assembly language and to call assembly functions from C in addition to writing complete programs in assembly language. The gcc compiler is used internally to compile C programs. The book starts early emphasizing using ebe to debug programs, along with teaching equivalent commands using gdb. Being able to single-step assembly programs is critical in learning assembly programming. Ebe makes this far easier than using gdb directly. Highlights of the book include doing input/output programming using the Linux system calls and the C library, implementing data structures in assembly language and high performance assembly language programming. Early chapters of the book rely on using the debugger to observe program behavior. After a chapter on functions, the user is prepared to use printf and scanf from the C library to perform I/O. The chapter on data structures covers singly linked lists, doubly linked circular lists, hash tables and binary trees. Test programs are presented for all these data structures. There is a chapter on optimization techniques and 3 chapters on specific optimizations. One chapter covers how to efficiently count the 1 bits in an array with the most efficient version using the recently-introduced popcnt instruction. Another chapter covers using SSE instructions to create an efficient implementation of the Sobel filtering algorithm. The final high performance programming chapter discusses computing correlation between data in 2 arrays. There is an AVX implementation which achieves 20.5 GFLOPs on a single core of a Core i7 CPU. A companion web site, http://www.rayseyfarth.com, has a collection of PDF slides which instructors can use for in-class presentations and source code for sample programs.

Similar Products:


<< Prev   Next >>
Page 4 of 121

[Kindle]    [Kindle DX]
  Privacy Policy

CERTAIN CONTENT THAT APPEARS ON THIS SITE COMES FROM AMAZON SERVICES LLC. THIS CONTENT IS PROVIDED AS IS AND IS SUBJECT TO CHANGE OR REMOVAL AT ANY TIME.