Apparel & AccessoriesBooksClassical MusicDVDElectronics & PhotoGourmet Food and GroceriesHealth & Personal CareHome & GardenIndustrial & ScientificKitchen
Popular MusicMusical InstrumentsOutdoor LivingComputer HardwareComputer SoftwareSporting GoodsToolsToys and GamesVHS VideoVideo Games

Search:

Browse by Catagory:

Books

Linux Programming


Kali Linux 2 Assuring Security by Penetration Testing - Third Edition

Kali Linux 2 Assuring Security by Penetration Testing - Third Edition Lowest new price: $44.99
Lowest used price: $54.38
List price: $44.99
Author: Gerard Johansen

Achieve the gold standard in penetration testing with Kali using this masterpiece, now in its third edition!

About This Book

  • Get a rock-solid insight into penetration testing techniques and test your corporate network against threats like never before
  • Formulate your pentesting strategies by relying on the most up-to-date and feature-rich Kali version in town―Kali Linux 2 (aka Sana).
  • Experience this journey with new cutting-edge wireless penetration tools and a variety of new features to make your pentesting experience smoother

Who This Book Is For

If you are an IT security professional or a student with basic knowledge of Unix/Linux operating systems, including an awareness of information security factors, and you want to use Kali Linux for penetration testing, this book is for you.

What You Will Learn

  • Find out to download and install your own copy of Kali Linux
  • Properly scope and conduct the initial stages of a penetration test
  • Conduct reconnaissance and enumeration of target networks
  • Exploit and gain a foothold on a target system or network
  • Obtain and crack passwords
  • Use the Kali Linux NetHunter install to conduct wireless penetration testing
  • Create proper penetration testing reports

In Detail

Kali Linux is a comprehensive penetration testing platform with advanced tools to identify, detect, and exploit the vulnerabilities uncovered in the target network environment. With Kali Linux, you can apply appropriate testing methodology with defined business objectives and a scheduled test plan, resulting in a successful penetration testing project engagement.

Kali Linux – Assuring Security by Penetration Testing is a fully focused, structured book providing guidance on developing practical penetration testing skills by demonstrating cutting-edge hacker tools and techniques with a coherent, step-by-step approach. This book offers you all of the essential lab preparation and testing procedures that reflect real-world attack scenarios from a business perspective, in today's digital age.

Style and approach

This practical guide will showcase penetration testing through cutting-edge tools and techniques using a coherent, step-by-step approach.

Similar Products:


Mastering Kali Linux for Advanced Penetration Testing - Second Edition: Secure your network with Kali Linux - the ultimate white hat hackers' toolkit

Mastering Kali Linux for Advanced Penetration Testing - Second Edition: Secure your network with Kali Linux - the ultimate white hat hackers' toolkit Lowest new price: $49.99
Lowest used price: $59.44
List price: $49.99
Author: Vijay Kumar Velu

A practical guide to testing your network's security with Kali Linux, the preferred choice of penetration testers and hackers.

About This Book

  • Employ advanced pentesting techniques with Kali Linux to build highly-secured systems
  • Get to grips with various stealth techniques to remain undetected and defeat the latest defenses and follow proven approaches
  • Select and configure the most effective tools from Kali Linux to test network security and prepare your business against malicious threats and save costs

Who This Book Is For

Penetration Testers, IT professional or a security consultant who wants to maximize the success of your network testing using some of the advanced features of Kali Linux, then this book is for you.Some prior exposure to basics of penetration testing/ethical hacking would be helpful in making the most out of this title.

What You Will Learn

  • Select and configure the most effective tools from Kali Linux to test network security
  • Employ stealth to avoid detection in the network being tested
  • Recognize when stealth attacks are being used against your network
  • Exploit networks and data systems using wired and wireless networks as well as web services
  • Identify and download valuable data from target systems
  • Maintain access to compromised systems
  • Use social engineering to compromise the weakest part of the network-the end users

In Detail

This book will take you, as a tester or security practitioner through the journey of reconnaissance, vulnerability assessment, exploitation, and post-exploitation activities used by penetration testers and hackers.

We will start off by using a laboratory environment to validate tools and techniques, and using an application that supports a collaborative approach to penetration testing. Further we will get acquainted with passive reconnaissance with open source intelligence and active reconnaissance of the external and internal networks. We will also focus on how to select, use, customize, and interpret the results from a variety of different vulnerability scanners. Specific routes to the target will also be examined, including bypassing physical security and exfiltration of data using different techniques. You will also get to grips with concepts such as social engineering, attacking wireless networks, exploitation of web applications and remote access connections. Later you will learn the practical aspects of attacking user client systems by backdooring executable files. You will focus on the most vulnerable part of the network-directly and bypassing the controls, attacking the end user and maintaining persistence access through social media.

You will also explore approaches to carrying out advanced penetration testing in tightly secured environments, and the book's hands-on approach will help you understand everything you need to know during a Red teaming exercise or penetration testing

Style and approach

An advanced level tutorial that follows a practical approach and proven methods to maintain top notch security of your networks.

Similar Products:


Mastering Embedded Linux Programming

Mastering Embedded Linux Programming Lowest new price: $49.96
Lowest used price: $43.95
List price: $49.99
Author: Chris Simmonds

Key Features

  • Create efficient and secure embedded devices using Linux
  • Minimize project costs by using open source tools and programs
  • Explore each component technology in depth, using sample implementations as a guide

Book Description

Mastering Embedded Linux Programming takes you through the product cycle and gives you an in-depth description of the components and options that are available at each stage. You will begin by learning about toolchains, bootloaders, the Linux kernel, and how to configure a root filesystem to create a basic working device. You will then learn how to use the two most commonly used build systems, Buildroot and Yocto, to speed up and simplify the development process. Building on this solid base, the next section considers how to make best use of raw NAND/NOR flash memory and managed flash eMMC chips, including mechanisms for increasing the lifetime of the devices and to perform reliable in-field updates. Next, you need to consider what techniques are best suited to writing applications for your device. We will then see how functions are split between processes and the usage of POSIX threads, which have a big impact on the responsiveness and performance of the final device The closing sections look at the techniques available to developers for profiling and tracing applications and kernel code using perf and ftrace.

What you will learn

  • Understand the role of the Linux kernel and select an appropriate role for your application
  • Use Buildroot and Yocto to create embedded Linux systems quickly and efficiently
  • Create customized bootloaders using U-Boot
  • Employ perf and ftrace to identify performance bottlenecks
  • Understand device trees and make changes to accommodate new hardware on your device
  • Write applications that interact with Linux device drivers
  • Design and write multi-threaded applications using POSIX threads
  • Measure real-time latencies and tune the Linux kernel to minimize them

About the Author

Chris Simmonds is a software consultant and trainer who lives in southern England. He has been using Linux in embedded systems since the late 1990s, during which he has worked on many interesting projects, including a stereoscopic camera, intelligent weighing scales, various set-top boxes and home routers, and even a large walking robot.

He is a frequent presenter at open source and embedded conferences, including the Embedded Linux Conference, Embedded World, and the Android Builders' Summit. He has been conducting training courses and workshops in embedded Linux since 2002 and in embedded Android since 2010. He has delivered hundreds of sessions to many well-known companies. You can see some of his work on the "Inner Penguin" blog at www.2net.co.uk.

Table of Contents

  1. Starting Out
  2. Learning About Toolchains
  3. All About Bootloaders
  4. Porting and Configuring the Kernel
  5. Building a Root Filesystem
  6. Selecting a Build System
  7. Creating a Storage Strategy
  8. Introducing Device Drivers
  9. Starting up - the init Program
  10. Learning About Processes and Threads
  11. Managing Memory
  12. Debugging with GDB
  13. Profiling and Tracing
  14. Real-time Programming

Similar Products:


The Cathedral & the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary

The Cathedral & the Bazaar: Musings on Linux and Open Source by an Accidental Revolutionary Lowest new price: $6.29
Lowest used price: $0.49
List price: $16.95
Author: Eric S. Raymond
Brand: Brand: OREILLY ASSOCIATES

Open source provides the competitive advantage in the Internet Age. According to the August Forrester Report, 56 percent of IT managers interviewed at Global 2,500 companies are already using some type of open source software in their infrastructure and another 6 percent will install it in the next two years. This revolutionary model for collaborative software development is being embraced and studied by many of the biggest players in the high-tech industry, from Sun Microsystems to IBM to Intel.The Cathedral & the Bazaar is a must for anyone who cares about the future of the computer industry or the dynamics of the information economy. Already, billions of dollars have been made and lost based on the ideas in this book. Its conclusions will be studied, debated, and implemented for years to come. According to Bob Young, "This is Eric Raymond's great contribution to the success of the open source revolution, to the adoption of Linux-based operating systems, and to the success of open source users and the companies that supply them."The interest in open source software development has grown enormously in the past year. This revised and expanded paperback edition includes new material on open source developments in 1999 and 2000. Raymond's clear and effective writing style accurately describing the benefits of open source software has been key to its success. With major vendors creating acceptance for open source within companies, independent vendors will become the open source story in 2001.

It may be foolish to consider Eric Raymond's recent collection of essays, The Cathedral and the Bazaar, the most important computer programming thinking to follow the Internet revolution. But it would be more unfortunate to overlook the implications and long-term benefits of his fastidious description of open-source software development considering the growing dependence businesses and economies have on emerging computer technologies.

The Cathedral and the Bazaar takes its title from an essay Raymond read at the 1997 Linux Kongress. The essay documents Raymond's acquisition, re-creation, and numerous revisions of an e-mail utility known as fetchmail. Raymond engagingly narrates the fetchmail development process while elaborating on the ongoing bazaar development method he uses with the help of volunteer programmers. The essay smartly spares the reader from the technical morass that could easily detract from the text's goal of demonstrating the efficacy of the open-source, or bazaar, method in creating robust, usable software.

Once Raymond has established the components and players necessary for an optimally running open-source model, he sets out to counter the conventional wisdom of private, closed-source software development. Like superbly written code, the author's arguments systematically anticipate their rebuttals. For programmers who "worry that the transition to open source will abolish or devalue their jobs," Raymond adeptly and factually counters that "most developer's salaries don't depend on software sale value." Raymond's uncanny ability to convince is as unrestrained as his capacity for extrapolating upon the promise of open-source development.

In addition to outlining the open-source methodology and its benefits, Raymond also sets out to salvage the hacker moniker from the nefarious connotations typically associated with it in his essay, "A Brief History of Hackerdom" (not surprisingly, he is also the compiler of The New Hacker's Dictionary). Recasting hackerdom in a more positive light may be a heroic undertaking in itself, but considering the Herculean efforts and perfectionist motivations of Raymond and his fellow open-source developers, that light will shine brightly. --Ryan Kuykendall

Features:

  • Used Book in Good Condition

Similar Products:


Learning Linux Binary Analysis

Learning Linux Binary Analysis Lowest new price: $44.96
Lowest used price: $30.07
List price: $44.99
Author: Ryan "elfmaster" O'Neill

Key Features

  • Grasp the intricacies of the ELF binary format of UNIX and Linux
  • Design tools for reverse engineering and binary forensic analysis
  • Insights into UNIX and Linux memory infections, ELF viruses, and binary protection schemes

Book Description

Learning Linux Binary Analysis is packed with knowledge and code that will teach you the inner workings of the ELF format, and the methods used by hackers and security analysts for virus analysis, binary patching, software protection and more.

This book will start by taking you through UNIX/Linux object utilities, and will move on to teaching you all about the ELF specimen. You will learn about process tracing, and will explore the different types of Linux and UNIX viruses, and how you can make use of ELF Virus Technology to deal with them.

The latter half of the book discusses the usage of Kprobe instrumentation for kernel hacking, code patching, and debugging. You will discover how to detect and disinfect kernel-mode rootkits, and move on to analyze static code. Finally, you will be walked through complex userspace memory infection analysis.

This book will lead you into territory that is uncharted even by some experts; right into the world of the computer hacker.

What you will learn

  • Explore the internal workings of the ELF binary format
  • Discover techniques for UNIX Virus infection and analysis
  • Work with binary hardening and software anti-tamper methods
  • Patch executables and process memory
  • Bypass anti-debugging measures used in malware
  • Perform advanced forensic analysis of binaries
  • Design ELF-related tools in the C language
  • Learn to operate on memory with ptrace

About the Author

Ryan "elfmaster" O'Neill is a computer security researcher and software engineer with a background in reverse engineering, software exploitation, security defense, and forensics technologies. He grew up in the computer hacker subculture, the world of EFnet, BBS systems, and remote buffer overflows on systems with an executable stack. He was introduced to system security, exploitation, and virus writing at a young age. His great passion for computer hacking has evolved into a love for software development and professional security research. Ryan has spoken at various computer security conferences, including DEFCON and RuxCon, and also conducts a 2-day ELF binary hacking workshop.

He has an extremely fulfilling career and has worked at great companies such as Pikewerks, Leviathan Security Group, and more recently Backtrace as a software engineer.

Ryan has not published any other books, but he is well known for some of his papers published in online journals such as Phrack and VXHeaven. Many of his other publications can be found on his website at http://www.bitlackeys.org.

Table of Contents

  1. The Linux Environment and Its Tools
  2. The ELF Binary Format
  3. Linux Process Tracing
  4. ELF Virus Technology – Linux/Unix Viruses
  5. Linux Binary Protection
  6. ELF Binary Forensics in Linux
  7. Process Memory Forensics
  8. ECFS – Extended Core File Snapshot Technology
  9. Linux /proc/kcore Analysis

Similar Products:


Introduction to 64 Bit Assembly Programming for Linux and OS X: Third Edition - for Linux and OS X

Introduction to 64 Bit Assembly Programming for Linux and OS X: Third Edition - for Linux and OS X Lowest new price: $23.95
Lowest used price: $15.96
List price: $23.95
Author: Ray Seyfarth

This is the third edition of this assembly language programming textbook introducing programmers to 64 bit Intel assembly language. The primary addition to the third edition is the discussion of the new version of the free integrated development environment, ebe, designed by the author specifically to meet the needs of assembly language programmers. The new ebe is a C++ program using the Qt library to implement a GUI environment consisting of a source window, a data window, a register, a floating point register window, a backtrace window, a console window, a terminal window and a project window along with 2 educational tools called the "toy box" and the "bit bucket". The source window includes a full-featured text editor with convenient controls for assembling, linking and debugging a program. The project facility allows a program to be built from C source code files and assembly source files. Assembly is performed automatically using the yasm assembler and linking is performed with ld or gcc. Debugging operates by transparently sending commands into the gdb debugger while automatically displaying registers and variables after each debugging step. Additional information about ebe can be found at http://www.rayseyfarth.com. The second important addition is support for the OS X operating system. Assembly language is similar enough between the two systems to cover in a single book. The book discusses the differences between the systems. The book is intended as a first assembly language book for programmers experienced in high level programming in a language like C or C++. The assembly programming is performed using the yasm assembler automatically from the ebe IDE under the Linux operating system. The book primarily teaches how to write assembly code compatible with C programs. The reader will learn to call C functions from assembly language and to call assembly functions from C in addition to writing complete programs in assembly language. The gcc compiler is used internally to compile C programs. The book starts early emphasizing using ebe to debug programs, along with teaching equivalent commands using gdb. Being able to single-step assembly programs is critical in learning assembly programming. Ebe makes this far easier than using gdb directly. Highlights of the book include doing input/output programming using the Linux system calls and the C library, implementing data structures in assembly language and high performance assembly language programming. Early chapters of the book rely on using the debugger to observe program behavior. After a chapter on functions, the user is prepared to use printf and scanf from the C library to perform I/O. The chapter on data structures covers singly linked lists, doubly linked circular lists, hash tables and binary trees. Test programs are presented for all these data structures. There is a chapter on optimization techniques and 3 chapters on specific optimizations. One chapter covers how to efficiently count the 1 bits in an array with the most efficient version using the recently-introduced popcnt instruction. Another chapter covers using SSE instructions to create an efficient implementation of the Sobel filtering algorithm. The final high performance programming chapter discusses computing correlation between data in 2 arrays. There is an AVX implementation which achieves 20.5 GFLOPs on a single core of a Core i7 CPU. A companion web site, http://www.rayseyfarth.com, has a collection of PDF slides which instructors can use for in-class presentations and source code for sample programs.

Similar Products:


Unix in 24 Hours, Sams Teach Yourself: Covers OS X, Linux, and Solaris (5th Edition)

Unix in 24 Hours, Sams Teach Yourself: Covers OS X, Linux, and Solaris (5th Edition) Lowest new price: $23.84
Lowest used price: $21.99
List price: $39.99
Author: Dave Taylor

Learn to use Unix, OS X, or Linux quickly and easily!


In just 24 lessons of one hour or less, Sams Teach Yourself Unix in 24 Hours helps you get up and running with Unix and Unix-based operating systems such as Mac OS X and Linux.

 

Designed for beginners with no previous experience using Unix, this book’s straightforward, step-by-step approach makes it easy to learn.

 

Each lesson clearly explains essential Unix tools and techniques from the ground up, helping you to become productive as quickly and efficiently as possible.

  • Step-by-step instructions carefully walk you through the most common Unix tasks.
  • Practical, hands-on examples show you how to apply what you learn.
  • Quizzes and exercises help you test your knowledge and stretch your skills.
  • Notes and tips point out shortcuts and solutions

Learn how to

  • Pick the command shell that’s best for you
  • Organize the Unix file system (and why)
  • Manage file and directory ownership and permissions
  • Maximize your productivity with power filters and pipes
  • Use the vi and emacs editors
  • Create your own commands and shell scripts
  • Connect to remote systems using SSH and SFTP
  • Troubleshoot common problems
  • List files and manage disk usage
  • Get started with Unix shell programming
  • Set up printing in a Unix environment
  • Archive and back up files
  • Search for information and files
  • Use Perl as an alternative Unix programming language
  • Set up, tweak, and make use of the GNOME graphical environment
Contents at a Glance

HOUR 1: What Is This Unix Stuff?

HOUR 2: Getting onto the System and Using the Command Line

HOUR 3: Moving About the File System

HOUR 4: Listing Files and Managing Disk Usage

HOUR 5: Ownership and Permissions

HOUR 6: Creating, Moving, Renaming, and Deleting Files and Directories

HOUR 7: Looking into Files

HOUR 8: Filters, Pipes, and Wildcards!

HOUR 9: Slicing and Dicing Command-Pipe Data

HOUR 10: An Introduction to the vi Editor

HOUR 11: Advanced vi Tricks, Tools, and Techniquess

HOUR 12: An Overview of the emacs Editor

HOUR 13: Introduction to Command Shells

HOUR 14: Advanced Shell Interaction

HOUR 15: Job Control

HOUR 16: Shell Programming Overview

HOUR 17: Advanced Shell Programming

HOUR 18: Printing in the Unix Environment

HOUR 19: Archives and Backups

HOUR 20: Using Email to Communicate

HOUR 21: Connecting to Remote Systems Using SSH and SFTP

HOUR 22: Searching for Information and Files

HOUR 23: Perl Programming in Unix

HOUR 24: GNOME and the GUI Environment

Appendix A: Common Unix Questions and Answers


Similar Products:


Linux Phrasebook (2nd Edition) (Developer's Library)

Linux Phrasebook (2nd Edition) (Developer's Library) Lowest new price: $17.21
Lowest used price: $19.90
List price: $29.99
Author: Scott Granneman

 

Get more done faster at the Linux command line! This best-selling Linux Phrasebook has been thoroughly updated in the second edition to reflect the newest distributions, incorporate feedback from hundreds of active Linux users, and cover today's newest tools and techniques -- including an entirely new chapter on text file manipulation. 


Linux Phrasebook, Second Edition offers a concise, handy reference to the Linux commands that, like a language phrasebook, can be used on the spot on moment's notice.

 

Don't waste a minute on non-essentials: this straight-to-the-point reference delivers specific information and tested commands designed to work with any modern Linux distribution. Portable enough to take anywhere, it starts with a quick introduction to essential command line concepts, and then delivers all the modern Linux command examples, variations, and parameters you need to: 

  • View, manipulate, archive, and compress files
  • Control file ownership and permissions
  • Find anything on your systems
  • Efficiently use the Linux shell
  • Monitor system resources
  • Install software
  • Test, fix, and work with networks

Linux Phrasebook, Second Edition is the perfect quick command line reference for millions of Linux users and administrators at all levels of experience: people who want to get reliable information they can use right now -- with no distractions and no diversions!


Contents at a Glance

 

Part I: Getting Started


Chapter 1 Things to Know About Your Command Line

Everything Is a File

Maximum Filename Lengths

Names Are Case-Sensitive

Special Characters to Avoid in Names

Wildcards and What They Mean

Special Files That Affect Your Command Line

If There’s Too Much Stuff on Screen, Reset

Chapter 2 Navigating Your File System

List Files and Folders

List the Contents of Other Folders

List Folder Contents Using Wildcards

View a List of Files in Subfolders

View a List of Contents in a Single Column

View Contents As a Comma-Separated List

View Hidden Files and Folders

Visually Display a File’s Type

Display Contents in Color

List Permissions, Ownership, and More

Reverse the Order Contents Are Listed

Sort Contents by Date and Time

Sort Contents by Size

Express File Sizes in Terms of K, M, and G

Display the Path of Your Current Directory

Change to a Different Directory

Change to Your Home Directory

Change to Your Previous Directory

Chapter 3 Creation and Destruction

Change a File to the Current Time

Change a File to Any Desired Time

Create a New, Empty File

Create a New Directory

Create a New Directory and Any Necessary Subdirectories

Copy Files

Copy Files Using Wildcards

Copy Files Verbosely

Stop Yourself from Copying over Important Files

Copy Directories

Copy Files As Perfect Backups in Another Directory

Move Files and Folders

Rename Files and Folders

Understand How Linux Stores Files

Create a Link Pointing to Another File or Directory

Delete Files

Remove Several Files at Once with Wildcards

Prevent Yourself from Deleting Key Files

Delete an Empty Directory

Remove Files and Directories That Aren’t Empty

Deleting Troublesome Files

Chapter 4 Learning About Commands

Find Out About Commands with man

Quickly Find Out What a Command Does Based on Its Name

Search for a Command Based on What It Does

Read a Command’s Specific Man Page

Learn About Commands with info

Navigate Within info

Locate the Paths for a Command’s Executable, Source Files, and Man Pages

Find Out Which Version of a Command Will Run

Discover How a Command Will Be Interpreted

Chapter 5 Building Blocks

Run Several Commands Sequentially

Run Commands Only If the Previous Ones Succeed

Run a Command Only If the Previous One Fails

Plug the Output of a Command into Another Command

Understand Input/Output Streams

Use the Output of One Command As Input for Another

Redirect a Command’s Output to a File

Prevent Overwriting Files When Using Redirection

Append a Command’s Output to a File

Use a File As Input for a Command

Combine Input and Output Redirection

Send Output to a File and to stdout at the Same Time

Part II: Working with Files


Chapter 6 Viewing (Mostly Text) Files

Figure Out a File’s Type

View Files on stdout

Concatenate Files to stdout

Concatenate Files to Another File

Concatenate Files and Number the Lines

View Text Files a Screen at a Time

Search Within Your Pager

Edit Files Viewed with a Pager

View the First 10 Lines of a File

View the First 10 Lines of Several Files

View the First Several Lines of a File or Files

View the First Several Bytes, Kilobytes, or Megabytes of a File

View the Last 10 Lines of a File

View the Last 10 Lines of Several Files

View the Last Several Lines of a File or Files

View the Constantly Updated Last Lines of a File or Files

Chapter 7 Manipulating Text Files with Filters

Count the Number of Words, Lines, and Characters in a File

Number Lines in a File

Select an Entire Column of Data in a Delimited File

Sort the Contents of a File

Sort the Contents of a File Numerically

Remove Duplicate Lines in a File

Substitute Selected Characters with Others

Replace Repeated Characters with a Single Instance

Delete Matching Characters

Transform Text in a File

Print Specific Fields in a File

Chapter 8 Ownerships and Permissions

Become Another User

Become Another User, with His Environment Variables

Become root

Become root, with Its Environment Variables

Change the Group Owning Files and Directories

Recursively Change the Group Owning a Directory

Change the Owner of Files and Directories

Change the Owner and Group of Files and Directories

Understand the Basics of Permissions

Change Permissions on Files and Directories Using Alphabetic Notation

Change Permissions on Files and Directories Using Numeric Permissions

Change Permissions Recursively

Set and Then Clear suid

Set and Then Clear sgid

Set and Then Clear the Sticky Bit

Chapter 9 Archiving and Compression

Archive and Compress Files Using zip

Get the Best Compression Possible with zip

Archive and Compress Files of a Specified Type in Directories and Subdirectories

Password-Protect Compressed Zip Archives

Unzip Files

Test Files That Will Be Unzipped

Archive and Compress Files Using gzip

Archive and Compress Files Recursively Using gzip

Uncompress Files Compressed with gzip

Test Files That Will Be Unzipped with gunzip

Archive and Compress Files Using bzip2

Uncompress Files Compressed with bzip2

Test Files That Will Be Unzipped with bunzip2

Archive Files with tar

Archive and Compress Files with tar and gzip

Test Files That Will Be Untarred and Uncompressed

Untar and Uncompress Files

Part III: Finding Files, Words, and More


Chapter 10 Finding Files, Directories, Words, and Phrases

Search a Database of Filenames

Search a Database of Filenames Without Worrying About Case

Update the Database Used by locate

Searching Inside Text Files for Patterns

The Basics of Searching Inside Text Files for Patterns

Search Recursively for Text in Files

Search for Words and Highlight the Results

Search for Text in Files, Ignoring Case

Search for Whole Words in Files

Show Line Numbers Where Words Appear in Files

Search the Output of Other Commands for Specific Words

See Context for Words Appearing in Files

Show Lines Where Words Do Not Appear in Files

List Files Containing Searched-for Words

List the Number of Occurrences of Words in Files

Search for Words Inside Search Results

Chapter 11 The find Command

Find Files by Name

Find Files by Ownership

Find Files by File Size

Find Files by File Type

Find Files by Time

Show Results If the Expressions Are True (AND)

Show Results If Either Expression Is True (OR)

Show Results If the Expression Is Not True (NOT)

Execute a Command on Found Files

Execute a Command on Found Files More Efficiently

Execute a Command on Found Files Containing Spaces

Part IV: Your Environment


Chapter 12 Your Shell

View Your Command-Line History

Run the Last Command Again

Run a Previous Command Using Numbers

Run a Previous Command Using a String

Search for a Previous Command and Run It

Display All Command Aliases

View a Specific Command Alias

Create a New Temporary Alias

Create a New Permanent Alias

Remove an Alias

Create a New Temporary Function

Create a New Permanent Function

Display All Functions

Remove a Function

When to Use an Alias and When to Use a Function

Chapter 13 Monitoring System Resources

Discover How Long Your Computer Has Been Running

View All Currently Running Processes

View a Process Tree

View Processes Owned by a Particular User

End a Running Process

View a Dynamically Updated List of Running Processes

List Open Files

List a User’s Open Files

List Users for a Particular File

List Processes for a Particular Program

Display Information About System RAM

Show File System Disk Usage

Report File Space Used by a Directory

Report Just the Total Space Used for a Directory

Chapter 14 Installing Software

Install Software Packages (RPM)

Remove Software Packages (RPM)

Install Software Packages and Dependencies (RPM)

Remove Software Packages and Dependencies (RPM)

Upgrade Software Packages and Dependencies (RPM)

Find Packages Available for Download (RPM)

Install Software Packages (DEB)

Remove Software Packages (DEB)

Install Software Packages and Dependencies (DEB)

Remove Software Packages and Dependencies (DEB)

Upgrade Software Packages and Dependencies (DEB)

Find Packages Available for Download (DEB)

Clean Up Unneeded Installation Packages (DEB)

Troubleshoot Problems with APT (DEB)

Part V: Networking


Chapter 15 Connectivity

View the Status of Your Network Interfaces

Verify That a Computer Is Running and Accepting Requests

Trace the Route Packets Take Between Two Hosts

Query DNS Records

Configure a Network Interface

View the Status of Your Wireless Network Interfaces

Configure a Wireless Network Interface

Grab a New Address Using DHCP

Make a Network Connection Active

Bring a Network Connection Down

Display Your IP Routing Table

Change Your IP Routing Table

Troubleshooting Network Problems

Chapter 16 Working on the Network

Securely Log In to Another Compute

Securely Log In to Another Machine Without a Password

Securely Transfer Files Between Machines

Securely Copy Files Between Hosts

Securely Transfer and Back Up Files

Download Files Non-interactively

Download Websites Non-interactively

Download Sequential Files and Internet Resources


Similar Products:


Guide to Parallel Operating Systems with Windows 10 and Linux

Guide to Parallel Operating Systems with Windows 10 and Linux Lowest new price: $139.00
Lowest used price: $79.95
List price: $227.95
Author: Ron Carswell

Examine two of the most prominent operating systems -- Windows 10 and Linux CentOS7 -- in parallel with the unique approach found only in GUIDE TO PARALLEL OPERATING SYSTEMS WITH WINDOWS 10 AND LINUX, 3E. Rather than using a compare and contrast model, the book presents each topic conceptually before demonstrating it simultaneously on both operating systems. You are able to switch instantly between Windows 10 and Linux CentOS 7 to complete the myriad of hands-on activities that reinforce the similarities between the two operating systems for each conceptual task. The text's virtualization approach provides flexibility that enables you to use Microsoft Hyper-V Client, Oracle VirtualBox, or VMWare Workstation. This comprehensive guide helps you develop the competencies you need in Windows 10 and Linux to maximize success in today's classroom as well as in tomorrow's business environment.

Similar Products:


Linux for Makers: Understanding the Operating System That Runs Raspberry Pi and Other Maker SBCs

Linux for Makers: Understanding the Operating System That Runs Raspberry Pi and Other Maker SBCs Lowest new price: $13.73
Lowest used price: $10.64
List price: $24.99
Author: Aaron Newcomb
Brand: MAKER MEDIA

Linux is a powerful open-source operating system that has been around for many years and is widely used for running servers and websites. But most students and Makers encounter it for the first time when they are working on projects with their Raspberry Pi or similar single-board computers (SBCs) such as BeagleBone Black or Intel Galileo. Linux for Makers is the first book that explains the Linux operating system specifically for Makers, as opposed to programmers and administrators. By gaining a deeper understanding of Linux, Makers can add another useful tool to their kit that will help them build their projects more easily.

Written with the Maker in mind, this book will focus mostly on Rasbian running on the Raspberry Pi as it is the most prolific in the ecosystem today. However most of the topics covered will apply broadly to other Linux distributions and will be called out when they may differ. Many times users cut and paste from a website tutorial into the Linux command line without understanding what they are actually doing only to be frustrated when they want to modify or tweak something to suit their needs. Also, many Makers shy away from using the Raspberry Pi or similar board because they feel Linux is too foreign and they think using a command line will be more difficult than using a GUI. This book aims to overcome those fears and provide a foundation for further learning and exploration. To that end, this book will focus on the basic principles that a Maker would need to know as opposed to other resources that go into detail that is not particularly relevant to building projects.

Features:

  • MAKER MEDIA

Similar Products:


<< Prev   Next >>
Page 4 of 123

[Kindle]    [Kindle DX]
  Privacy Policy

CERTAIN CONTENT THAT APPEARS ON THIS SITE COMES FROM AMAZON SERVICES LLC. THIS CONTENT IS PROVIDED AS IS AND IS SUBJECT TO CHANGE OR REMOVAL AT ANY TIME.