Apparel & AccessoriesBooksClassical MusicDVDElectronics & PhotoGourmet Food and GroceriesHealth & Personal CareHome & GardenIndustrial & ScientificKitchen
Popular MusicMusical InstrumentsOutdoor LivingComputer HardwareComputer SoftwareSporting GoodsToolsToys and GamesVHS VideoVideo Games

Search:

Browse by Catagory:

Books

Linux Programming


Practical Forensic Imaging: Securing Digital Evidence with Linux Tools

Practical Forensic Imaging: Securing Digital Evidence with Linux Tools Lowest new price: $43.45
Lowest used price: $39.64
List price: $49.95
Author: Bruce Nikkel
Brand: No Starch Press

Forensic image acquisition is an important part of postmortem incident response and evidence collection. Digital forensic investigators acquire, preserve, and manage digital evidence to support civil and criminal cases; examine organizational policy violations; resolve disputes; and analyze cyber attacks.

Practical Forensic Imaging takes a detailed look at how to secure and manage digital evidence using Linux-based command line tools. This essential guide walks you through the entire forensic acquisition process and covers a wide range of practical scenarios and situations related to the imaging of storage media.

You’ll learn how to:
–Perform forensic imaging of magnetic hard disks, SSDs and flash drives, optical discs, magnetic tapes, and legacy technologies
–Protect attached evidence media from accidental modification
–Manage large forensic image files, storage capacity, image format conversion, compression, splitting, duplication, secure transfer and storage, and secure disposal
–Preserve and verify evidence integrity with cryptographic and piecewise hashing, public key signatures, and RFC-3161 timestamping
–Work with newer drive and interface technologies like NVME, SATA Express, 4K-native sector drives, SSHDs, SAS, UASP/USB3x, and Thunderbolt
–Manage drive security such as ATA passwords; encrypted thumb drives; Opal self-encrypting drives; OS-encrypted drives using BitLocker, FileVault, and TrueCrypt; and others
–Acquire usable images from more complex or challenging situations such as RAID systems, virtual machine images, and damaged media

With its unique focus on digital forensic acquisition and evidence preservation, Practical Forensic Imaging is a valuable resource for experienced digital forensic investigators wanting to advance their Linux skills and experienced Linux administrators wanting to learn digital forensics. This is a must-have reference for every digital forensics lab.

Features:

  • No Starch Press

Similar Products:


LPIC-2: Linux Professional Institute Certification Study Guide: Exam 201 and Exam 202

LPIC-2: Linux Professional Institute Certification Study Guide: Exam 201 and Exam 202 Lowest new price: $41.05
Lowest used price: $34.96
List price: $70.00
Author: Christine Bresnahan

Full coverage of the latest LPI-level 2 exams, with bonus online test bank

LPIC-2 is the one-stop preparation resource for the Linux Professional Institute's Advanced Level certification exam. With 100 percent coverage of all exam objectives, this book provides clear and concise coverage of the Linux administration topics you'll need to know for exams 201 and 202. Practical examples highlight the real-world applications of important concepts, and together, the author team provides insights based on almost fifty years in the IT industry. This brand new second edition has been completely revamped to align with the latest versions of the exams, with authoritative coverage of the Linux kernel, system startup, advanced storage, network configuration, system maintenance, web services, security, troubleshooting, and more. You also get access to online learning tools including electronic flashcards, chapter tests, practice exams, and a glossary of critical terms to help you solidify your understanding of upper-level Linux administration topics.

The LPI-level 2 certification confirms your advanced Linux skill set, and the demand for qualified professionals continues to grow. This book gives you the conceptual guidance and hands-on practice you need to pass the exam with flying colors.

  • Understand all of the material for both LPIC-2 exams
  • Gain insight into real-world applications
  • Test your knowledge with chapter tests and practice exams
  • Access online study aids for more thorough preparation

Organizations are flocking to the open-source Linux as an excellent, low-cost, secure alternative to expensive operating systems like Microsoft Windows. As the Linux market share continues to climb, organizations are scrambling to find network and server administrators with expert Linux knowledge and highly practical skills. The LPI-level 2 certification makes you the professional they need, and LPIC-2 is your ideal guide to getting there.

Similar Products:


Linux Kernel Networking: Implementation and Theory (Expert's Voice in Open Source)

Linux Kernel Networking: Implementation and Theory (Expert's Voice in Open Source) Lowest new price: $45.69
Lowest used price: $45.48
List price: $59.99
Author: Rami Rosen

Linux Kernel Networking takes you on a guided in-depth tour of the current Linux networking implementation and the theory behind it. Linux kernel networking is a complex topic, so the book won't burden you with topics not directly related to networking. This book will also not overload you with cumbersome line-by-line code walkthroughs not directly related to what you're searching for; you'll find just what you need, with in-depth explanations in each chapter and a quick reference at the end of each chapter.

Linux Kernel Networking is the only up-to-date reference guide to understanding how networking is implemented, and it will be indispensable in years to come since so many devices now use Linux or operating systems based on Linux, like Android, and since Linux is so prevalent in the data center arena, including Linux-based virtualization technologies like Xen and KVM.

Similar Products:


Embedded Linux Systems with the Yocto Project (Pearson Open Source Software Development Series)

Embedded Linux Systems with the Yocto Project (Pearson Open Source Software Development Series) Lowest new price: $36.08
Lowest used price: $32.66
List price: $49.99
Author: Rudolf J. Streif

Build Complete Embedded Linux Systems Quickly and Reliably


Developers are increasingly integrating Linux into their embedded systems: It supports virtually all hardware architectures and many peripherals, scales well, offers full source code, and requires no royalties. The Yocto Project makes it much easier to customize Linux for embedded systems. If you’re a developer with working knowledge of Linux, Embedded Linux Systems with the Yocto Project™ will help you make the most of it.


An indispensable companion to the official documentation, this guide starts by offering a solid grounding in the embedded Linux landscape and the challenges of creating custom distributions for embedded systems. You’ll master the Yocto Project’s toolbox hands-on, by working through the entire development lifecycle with a variety of real-life examples that you can incorporate into your own projects.


Author Rudolf Streif offers deep insight into Yocto Project’s build system and engine, and addresses advanced topics ranging from board support to compliance management.


You’ll learn how to


  • Overcome key challenges of creating custom embedded distributions
  • Jumpstart and iterate OS stack builds with the OpenEmbedded Build System
  • Master build workflow, architecture, and the BitBake Build Engine
  • Quickly troubleshoot build problems
  • Customize new distros with built-in blueprints or from scratch
  • Use BitBake recipes to create new software packages
  • Build kernels, set configurations, and apply patches
  • Support diverse CPU architectures and systems
  • Create Board Support Packages (BSP) for hardware-specific adaptations
  • Provide Application Development Toolkits (ADT) for round-trip development
  • Remotely run and debug applications on actual hardware targets
  • Ensure open-source license compliance
  • Scale team-based projects with Toaster, Build History, Source Mirrors, and Autobuilder 

Similar Products:


Linux Phrasebook (2nd Edition) (Developer's Library)

Linux Phrasebook (2nd Edition) (Developer's Library) Lowest new price: $19.23
Lowest used price: $13.97
List price: $29.99
Author: Scott Granneman

 

Get more done faster at the Linux command line! This best-selling Linux Phrasebook has been thoroughly updated in the second edition to reflect the newest distributions, incorporate feedback from hundreds of active Linux users, and cover today's newest tools and techniques -- including an entirely new chapter on text file manipulation. 


Linux Phrasebook, Second Edition offers a concise, handy reference to the Linux commands that, like a language phrasebook, can be used on the spot on moment's notice.

 

Don't waste a minute on non-essentials: this straight-to-the-point reference delivers specific information and tested commands designed to work with any modern Linux distribution. Portable enough to take anywhere, it starts with a quick introduction to essential command line concepts, and then delivers all the modern Linux command examples, variations, and parameters you need to: 

  • View, manipulate, archive, and compress files
  • Control file ownership and permissions
  • Find anything on your systems
  • Efficiently use the Linux shell
  • Monitor system resources
  • Install software
  • Test, fix, and work with networks

Linux Phrasebook, Second Edition is the perfect quick command line reference for millions of Linux users and administrators at all levels of experience: people who want to get reliable information they can use right now -- with no distractions and no diversions!


Contents at a Glance

 

Part I: Getting Started


Chapter 1 Things to Know About Your Command Line

Everything Is a File

Maximum Filename Lengths

Names Are Case-Sensitive

Special Characters to Avoid in Names

Wildcards and What They Mean

Special Files That Affect Your Command Line

If There’s Too Much Stuff on Screen, Reset

Chapter 2 Navigating Your File System

List Files and Folders

List the Contents of Other Folders

List Folder Contents Using Wildcards

View a List of Files in Subfolders

View a List of Contents in a Single Column

View Contents As a Comma-Separated List

View Hidden Files and Folders

Visually Display a File’s Type

Display Contents in Color

List Permissions, Ownership, and More

Reverse the Order Contents Are Listed

Sort Contents by Date and Time

Sort Contents by Size

Express File Sizes in Terms of K, M, and G

Display the Path of Your Current Directory

Change to a Different Directory

Change to Your Home Directory

Change to Your Previous Directory

Chapter 3 Creation and Destruction

Change a File to the Current Time

Change a File to Any Desired Time

Create a New, Empty File

Create a New Directory

Create a New Directory and Any Necessary Subdirectories

Copy Files

Copy Files Using Wildcards

Copy Files Verbosely

Stop Yourself from Copying over Important Files

Copy Directories

Copy Files As Perfect Backups in Another Directory

Move Files and Folders

Rename Files and Folders

Understand How Linux Stores Files

Create a Link Pointing to Another File or Directory

Delete Files

Remove Several Files at Once with Wildcards

Prevent Yourself from Deleting Key Files

Delete an Empty Directory

Remove Files and Directories That Aren’t Empty

Deleting Troublesome Files

Chapter 4 Learning About Commands

Find Out About Commands with man

Quickly Find Out What a Command Does Based on Its Name

Search for a Command Based on What It Does

Read a Command’s Specific Man Page

Learn About Commands with info

Navigate Within info

Locate the Paths for a Command’s Executable, Source Files, and Man Pages

Find Out Which Version of a Command Will Run

Discover How a Command Will Be Interpreted

Chapter 5 Building Blocks

Run Several Commands Sequentially

Run Commands Only If the Previous Ones Succeed

Run a Command Only If the Previous One Fails

Plug the Output of a Command into Another Command

Understand Input/Output Streams

Use the Output of One Command As Input for Another

Redirect a Command’s Output to a File

Prevent Overwriting Files When Using Redirection

Append a Command’s Output to a File

Use a File As Input for a Command

Combine Input and Output Redirection

Send Output to a File and to stdout at the Same Time

Part II: Working with Files


Chapter 6 Viewing (Mostly Text) Files

Figure Out a File’s Type

View Files on stdout

Concatenate Files to stdout

Concatenate Files to Another File

Concatenate Files and Number the Lines

View Text Files a Screen at a Time

Search Within Your Pager

Edit Files Viewed with a Pager

View the First 10 Lines of a File

View the First 10 Lines of Several Files

View the First Several Lines of a File or Files

View the First Several Bytes, Kilobytes, or Megabytes of a File

View the Last 10 Lines of a File

View the Last 10 Lines of Several Files

View the Last Several Lines of a File or Files

View the Constantly Updated Last Lines of a File or Files

Chapter 7 Manipulating Text Files with Filters

Count the Number of Words, Lines, and Characters in a File

Number Lines in a File

Select an Entire Column of Data in a Delimited File

Sort the Contents of a File

Sort the Contents of a File Numerically

Remove Duplicate Lines in a File

Substitute Selected Characters with Others

Replace Repeated Characters with a Single Instance

Delete Matching Characters

Transform Text in a File

Print Specific Fields in a File

Chapter 8 Ownerships and Permissions

Become Another User

Become Another User, with His Environment Variables

Become root

Become root, with Its Environment Variables

Change the Group Owning Files and Directories

Recursively Change the Group Owning a Directory

Change the Owner of Files and Directories

Change the Owner and Group of Files and Directories

Understand the Basics of Permissions

Change Permissions on Files and Directories Using Alphabetic Notation

Change Permissions on Files and Directories Using Numeric Permissions

Change Permissions Recursively

Set and Then Clear suid

Set and Then Clear sgid

Set and Then Clear the Sticky Bit

Chapter 9 Archiving and Compression

Archive and Compress Files Using zip

Get the Best Compression Possible with zip

Archive and Compress Files of a Specified Type in Directories and Subdirectories

Password-Protect Compressed Zip Archives

Unzip Files

Test Files That Will Be Unzipped

Archive and Compress Files Using gzip

Archive and Compress Files Recursively Using gzip

Uncompress Files Compressed with gzip

Test Files That Will Be Unzipped with gunzip

Archive and Compress Files Using bzip2

Uncompress Files Compressed with bzip2

Test Files That Will Be Unzipped with bunzip2

Archive Files with tar

Archive and Compress Files with tar and gzip

Test Files That Will Be Untarred and Uncompressed

Untar and Uncompress Files

Part III: Finding Files, Words, and More


Chapter 10 Finding Files, Directories, Words, and Phrases

Search a Database of Filenames

Search a Database of Filenames Without Worrying About Case

Update the Database Used by locate

Searching Inside Text Files for Patterns

The Basics of Searching Inside Text Files for Patterns

Search Recursively for Text in Files

Search for Words and Highlight the Results

Search for Text in Files, Ignoring Case

Search for Whole Words in Files

Show Line Numbers Where Words Appear in Files

Search the Output of Other Commands for Specific Words

See Context for Words Appearing in Files

Show Lines Where Words Do Not Appear in Files

List Files Containing Searched-for Words

List the Number of Occurrences of Words in Files

Search for Words Inside Search Results

Chapter 11 The find Command

Find Files by Name

Find Files by Ownership

Find Files by File Size

Find Files by File Type

Find Files by Time

Show Results If the Expressions Are True (AND)

Show Results If Either Expression Is True (OR)

Show Results If the Expression Is Not True (NOT)

Execute a Command on Found Files

Execute a Command on Found Files More Efficiently

Execute a Command on Found Files Containing Spaces

Part IV: Your Environment


Chapter 12 Your Shell

View Your Command-Line History

Run the Last Command Again

Run a Previous Command Using Numbers

Run a Previous Command Using a String

Search for a Previous Command and Run It

Display All Command Aliases

View a Specific Command Alias

Create a New Temporary Alias

Create a New Permanent Alias

Remove an Alias

Create a New Temporary Function

Create a New Permanent Function

Display All Functions

Remove a Function

When to Use an Alias and When to Use a Function

Chapter 13 Monitoring System Resources

Discover How Long Your Computer Has Been Running

View All Currently Running Processes

View a Process Tree

View Processes Owned by a Particular User

End a Running Process

View a Dynamically Updated List of Running Processes

List Open Files

List a User’s Open Files

List Users for a Particular File

List Processes for a Particular Program

Display Information About System RAM

Show File System Disk Usage

Report File Space Used by a Directory

Report Just the Total Space Used for a Directory

Chapter 14 Installing Software

Install Software Packages (RPM)

Remove Software Packages (RPM)

Install Software Packages and Dependencies (RPM)

Remove Software Packages and Dependencies (RPM)

Upgrade Software Packages and Dependencies (RPM)

Find Packages Available for Download (RPM)

Install Software Packages (DEB)

Remove Software Packages (DEB)

Install Software Packages and Dependencies (DEB)

Remove Software Packages and Dependencies (DEB)

Upgrade Software Packages and Dependencies (DEB)

Find Packages Available for Download (DEB)

Clean Up Unneeded Installation Packages (DEB)

Troubleshoot Problems with APT (DEB)

Part V: Networking


Chapter 15 Connectivity

View the Status of Your Network Interfaces

Verify That a Computer Is Running and Accepting Requests

Trace the Route Packets Take Between Two Hosts

Query DNS Records

Configure a Network Interface

View the Status of Your Wireless Network Interfaces

Configure a Wireless Network Interface

Grab a New Address Using DHCP

Make a Network Connection Active

Bring a Network Connection Down

Display Your IP Routing Table

Change Your IP Routing Table

Troubleshooting Network Problems

Chapter 16 Working on the Network

Securely Log In to Another Compute

Securely Log In to Another Machine Without a Password

Securely Transfer Files Between Machines

Securely Copy Files Between Hosts

Securely Transfer and Back Up Files

Download Files Non-interactively

Download Websites Non-interactively

Download Sequential Files and Internet Resources


Similar Products:


Linux Hardening in Hostile Networks: Server Security from TLS to Tor (Pearson Open Source Software Development Series)

Linux Hardening in Hostile Networks: Server Security from TLS to Tor (Pearson Open Source Software Development Series) Lowest new price: $30.60
Lowest used price: $31.38
List price: $39.99
Author: Kyle Rankin

Implement Industrial-Strength Security on Any Linux Server

 

In an age of mass surveillance, when advanced cyberwarfare weapons rapidly migrate into every hacker’s toolkit, you can’t rely on outdated security methods–especially if you’re responsible for Internet-facing services. In Linux® Hardening in Hostile Networks, Kyle Rankin helps you to implement modern safeguards that provide maximum impact with minimum effort and to strip away old techniques that are no longer worth your time.

 

Rankin provides clear, concise guidance on modern workstation, server, and network hardening, and explains how to harden specific services, such as web servers, email, DNS, and databases. Along the way, he demystifies technologies once viewed as too complex or mysterious but now essential to mainstream Linux security. He also includes a full chapter on effective incident response that both DevOps and SecOps can use to write their own incident response plan.

 

Each chapter begins with techniques any sysadmin can use quickly to protect against entry-level hackers and presents intermediate and advanced techniques to safeguard against sophisticated and knowledgeable attackers, perhaps even state actors. Throughout, you learn what each technique does, how it works, what it does and doesn’t protect against, and whether it would be useful in your environment.

  • Apply core security techniques including 2FA and strong passwords
  • Protect admin workstations via lock screens, disk encryption, BIOS passwords, and other methods
  • Use the security-focused Tails distribution as a quick path to a hardened workstation
  • Compartmentalize workstation tasks into VMs with varying levels of trust
  • Harden servers with SSH, use apparmor and sudo to limit the damage attackers can do, and set up remote syslog servers to track their actions
  • Establish secure VPNs with OpenVPN, and leverage SSH to tunnel traffic when VPNs can’t be used
  • Configure a software load balancer to terminate SSL/TLS connections and initiate new ones downstream
  • Set up standalone Tor services and hidden Tor services and relays
  • Secure Apache and Nginx web servers, and take full advantage of HTTPS
  • Perform advanced web server hardening with HTTPS forward secrecy and ModSecurity web application firewalls
  • Strengthen email security with SMTP relay authentication, SMTPS, SPF records, DKIM, and DMARC
  • Harden DNS servers, deter their use in DDoS attacks, and fully implement DNSSEC
  • Systematically protect databases via network access control, TLS traffic encryption, and encrypted data storage
  • Respond to a compromised server, collect evidence, and prevent future attacks

Register your product at informit.com/register for convenient access to downloads, updates, and corrections as they become available.

Similar Products:


Introduction to 64 Bit Assembly Programming for Linux and OS X: Third Edition - for Linux and OS X

Introduction to 64 Bit Assembly Programming for Linux and OS X: Third Edition - for Linux and OS X Lowest new price: $23.95
Lowest used price: $18.65
List price: $23.95
Author: Ray Seyfarth

This is the third edition of this assembly language programming textbook introducing programmers to 64 bit Intel assembly language. The primary addition to the third edition is the discussion of the new version of the free integrated development environment, ebe, designed by the author specifically to meet the needs of assembly language programmers. The new ebe is a C++ program using the Qt library to implement a GUI environment consisting of a source window, a data window, a register, a floating point register window, a backtrace window, a console window, a terminal window and a project window along with 2 educational tools called the "toy box" and the "bit bucket". The source window includes a full-featured text editor with convenient controls for assembling, linking and debugging a program. The project facility allows a program to be built from C source code files and assembly source files. Assembly is performed automatically using the yasm assembler and linking is performed with ld or gcc. Debugging operates by transparently sending commands into the gdb debugger while automatically displaying registers and variables after each debugging step. Additional information about ebe can be found at http://www.rayseyfarth.com. The second important addition is support for the OS X operating system. Assembly language is similar enough between the two systems to cover in a single book. The book discusses the differences between the systems. The book is intended as a first assembly language book for programmers experienced in high level programming in a language like C or C++. The assembly programming is performed using the yasm assembler automatically from the ebe IDE under the Linux operating system. The book primarily teaches how to write assembly code compatible with C programs. The reader will learn to call C functions from assembly language and to call assembly functions from C in addition to writing complete programs in assembly language. The gcc compiler is used internally to compile C programs. The book starts early emphasizing using ebe to debug programs, along with teaching equivalent commands using gdb. Being able to single-step assembly programs is critical in learning assembly programming. Ebe makes this far easier than using gdb directly. Highlights of the book include doing input/output programming using the Linux system calls and the C library, implementing data structures in assembly language and high performance assembly language programming. Early chapters of the book rely on using the debugger to observe program behavior. After a chapter on functions, the user is prepared to use printf and scanf from the C library to perform I/O. The chapter on data structures covers singly linked lists, doubly linked circular lists, hash tables and binary trees. Test programs are presented for all these data structures. There is a chapter on optimization techniques and 3 chapters on specific optimizations. One chapter covers how to efficiently count the 1 bits in an array with the most efficient version using the recently-introduced popcnt instruction. Another chapter covers using SSE instructions to create an efficient implementation of the Sobel filtering algorithm. The final high performance programming chapter discusses computing correlation between data in 2 arrays. There is an AVX implementation which achieves 20.5 GFLOPs on a single core of a Core i7 CPU. A companion web site, http://www.rayseyfarth.com, has a collection of PDF slides which instructors can use for in-class presentations and source code for sample programs.

Similar Products:


Ubuntu Linux Toolbox: 1000+ Commands for Ubuntu and Debian Power Users

Ubuntu Linux Toolbox: 1000+ Commands for Ubuntu and Debian Power Users Lowest new price: $13.99
Lowest used price: $8.36
List price: $29.99
Author: Christopher Negus
Brand: Brand: Wiley

This updated bestseller from Linux guru Chris Negus is packed with an array of new and revised material

As a longstanding bestseller, Ubuntu Linux Toolbox has taught you how to get the most out Ubuntu, the world's most popular Linux distribution. With this anticipated new edition, Christopher Negus returns with a host of new and expanded coverage on tools for managing file systems, ways to connect to networks, techniques for securing Ubuntu systems, and a look at the latest Long Term Support (LTS) release of Ubuntu, all aimed at getting you up and running with Ubuntu Linux quickly.

  • Covers installation, configuration, shell primer, the desktop, administrations, servers, and security
  • Delves into coverage of popular applications for the web, productivity suites, and e-mail
  • Highlights setting up a server (Apache, Samba, CUPS)
  • Boasts a handy trim size so that you can take it with you on the go

Ubuntu Linux Toolbox, Second Edition prepares you with a host of updated tools for today's environment, as well as expanded coverage on everything you know to confidently start using Ubuntu today.

Features:

  • Used Book in Good Condition

Similar Products:


Microsoft SQL Server 2017 on Linux

Microsoft SQL Server 2017 on Linux Lowest new price: $29.16
Lowest used price: $29.65
List price: $50.00
Author: Benjamin Nevarez

Essential Microsoft® SQL Server® 2017 installation, configuration, and management techniques for Linux

Foreword by Kalen Delaney, Microsoft SQL Server MVP

This comprehensive guide shows, step-by-step, how to set up, configure, and administer SQL Server 2017 on Linux for high performance and high availability. Written by a SQL Server expert and respected author, Microsoft SQL Server 2017 on Linux teaches valuable Linux skills to Windows-based SQL Server professionals. You will get clear coverage of both Linux and SQL Server and complete explanations of the latest features, tools, and techniques. The book offers clear instruction on adaptive query processing, automatic tuning, disaster recovery, security, and much more.

Understand how SQL Server 2017 on Linux works
Install and configure SQL Server on Linux
Run SQL Server on Docker containers
Learn Linux Administration
Troubleshoot and tune query performance in SQL Server
Learn what is new in SQL Server 2017
Work with adaptive query processing and automatic tuning techniques
Implement high availability and disaster recovery for SQL Server on Linux
Learn the security features available in SQL Server


Similar Products:


Go Systems Programming: Master Linux and Unix system level programming with Go

Go Systems Programming: Master Linux and Unix system level programming with Go Lowest new price: $46.16
Lowest used price: $38.53
List price: $49.99
Author: Mihalis Tsoukalos

Key Features

  • Learn how to write system's level code in Golang, similar to Unix/Linux systems code
  • Ramp up in Go quickly
  • Deep dive into Goroutines and Go concurrency to be able to take advantage of Go server-level constructs

Book Description

Go is the new systems programming language for Linux and Unix systems. It is also the language in which some of the most prominent cloud-level systems have been written, such as Docker. Where C programmers used to rule, Go programmers are in demand to write highly optimized systems programming code.

Created by some of the original designers of C and Unix, Go expands the systems programmers toolkit and adds a mature, clear programming language. Traditional system applications become easier to write since pointers are not relevant and garbage collection has taken away the most problematic area for low-level systems code: memory management.

This book opens up the world of high-performance Unix system applications to the beginning Go programmer. It does not get stuck on single systems or even system types, but tries to expand the original teachings from Unix system level programming to all types of servers, the cloud, and the web.

What you will learn

  • Explore the Go language from the standpoint of a developer conversant with Unix, Linux, and so on
  • Understand Goroutines, the lightweight threads used for systems and concurrent applications
  • Learn how to translate Unix and Linux systems code in C to Golang code
  • How to write fast and lightweight server code
  • Dive into concurrency with Go
  • Write low-level networking code

About the Author

Mihalis Tsoukalos is a Unix administrator, programmer, DBA, and mathematician, who enjoys writing technical books and articles and learning new things. He has written more than 250 technical articles for many magazines including Sys Admin, MacTech, Linux User and Developer, USENIX ;login:, Linux Format, and Linux Journal. His research interests include databases, operating systems, Statistics, and machine learning.

He is also the technical editor for MongoDB in Action, Second Edition, published by Manning.

Table of Contents

  1. Getting Started with Go and Unix Systems Programming
  2. Writing programs in Go
  3. Advanced Go Features
  4. Go Packages, Algorithms, and Data Structures
  5. Files and Directories
  6. File Input and Output
  7. Working with System Files
  8. Processes and Signals
  9. Goroutines - Basic Features
  10. Goroutines - Advance Features
  11. Writing Web Applications in Go
  12. Network Programming

Similar Products:


<< Prev   Next >>
Page 5 of 123

[Kindle]    [Kindle DX]
  Privacy Policy

CERTAIN CONTENT THAT APPEARS ON THIS SITE COMES FROM AMAZON SERVICES LLC. THIS CONTENT IS PROVIDED AS IS AND IS SUBJECT TO CHANGE OR REMOVAL AT ANY TIME.