|
Books > Computing & IT > Computer communications & networking > Networking standards & protocols
A comprehensive guide to securing your Linux system against
cyberattacks and intruders Key Features Deliver a system that
reduces the risk of being hacked Explore a variety of advanced
Linux security techniques with the help of hands-on labs Master the
art of securing a Linux environment with this end-to-end practical
guide Book DescriptionFrom creating networks and servers to
automating the entire working environment, Linux has been extremely
popular with system administrators for the last couple of decades.
However, security has always been a major concern. With limited
resources available in the Linux security domain, this book will be
an invaluable guide in helping you get your Linux systems properly
secured. Complete with in-depth explanations of essential concepts,
practical examples, and self-assessment questions, this book begins
by helping you set up a practice lab environment and takes you
through the core functionalities of securing Linux. You'll practice
various Linux hardening techniques and advance to setting up a
locked-down Linux server. As you progress, you will also learn how
to create user accounts with appropriate privilege levels, protect
sensitive data by setting permissions and encryption, and configure
a firewall. The book will help you set up mandatory access control,
system auditing, security profiles, and kernel hardening, and
finally cover best practices and troubleshooting techniques to
secure your Linux environment efficiently. By the end of this Linux
security book, you will be able to confidently set up a Linux
server that will be much harder for malicious actors to compromise.
What you will learn Create locked-down user accounts with strong
passwords Configure firewalls with iptables, UFW, nftables, and
firewalld Protect your data with different encryption technologies
Harden the secure shell service to prevent security break-ins Use
mandatory access control to protect against system exploits Harden
kernel parameters and set up a kernel-level auditing system Apply
OpenSCAP security profiles and set up intrusion detection Configure
securely the GRUB 2 bootloader and BIOS/UEFI Who this book is
forThis book is for Linux administrators, system administrators,
and network engineers interested in securing moderate to complex
Linux environments. Security consultants looking to enhance their
Linux security skills will also find this book useful. Working
experience with the Linux command line and package management is
necessary to understand the concepts covered in this book.
Understand the constructs of the Python programming language and
use them to build data science projects Key Features Learn the
basics of developing applications with Python and deploy your first
data application Take your first steps in Python programming by
understanding and using data structures, variables, and loops Delve
into Jupyter, NumPy, Pandas, SciPy, and sklearn to explore the data
science ecosystem in Python Book DescriptionPython is the most
widely used programming language for building data science
applications. Complete with step-by-step instructions, this book
contains easy-to-follow tutorials to help you learn Python and
develop real-world data science projects. The "secret sauce" of the
book is its curated list of topics and solutions, put together
using a range of real-world projects, covering initial data
collection, data analysis, and production. This Python book starts
by taking you through the basics of programming, right from
variables and data types to classes and functions. You'll learn how
to write idiomatic code and test and debug it, and discover how you
can create packages or use the range of built-in ones. You'll also
be introduced to the extensive ecosystem of Python data science
packages, including NumPy, Pandas, scikit-learn, Altair, and
Datashader. Furthermore, you'll be able to perform data analysis,
train models, and interpret and communicate the results. Finally,
you'll get to grips with structuring and scheduling scripts using
Luigi and sharing your machine learning models with the world as a
microservice. By the end of the book, you'll have learned not only
how to implement Python in data science projects, but also how to
maintain and design them to meet high programming standards. What
you will learn Code in Python using Jupyter and VS Code Explore the
basics of coding - loops, variables, functions, and classes Deploy
continuous integration with Git, Bash, and DVC Get to grips with
Pandas, NumPy, and scikit-learn Perform data visualization with
Matplotlib, Altair, and Datashader Create a package out of your
code using poetry and test it with PyTest Make your machine
learning model accessible to anyone with the web API Who this book
is forIf you want to learn Python or data science in a fun and
engaging way, this book is for you. You'll also find this book
useful if you're a high school student, researcher, analyst, or
anyone with little or no coding experience with an interest in the
subject and courage to learn, fail, and learn from failing. A basic
understanding of how computers work will be useful.
Become well-versed with basic networking concepts such as routing,
switching, and subnetting, and prepare for the Microsoft 98-366
exam Key Features Build a strong foundation in networking concepts
Explore both the hardware and software aspects of networking
Prepare by taking mock tests with up-to-date exam questions Book
DescriptionA network is a collection of computers, servers, mobile
devices, or other computing devices connected for sharing data.
This book will help you become well versed in basic networking
concepts and prepare to pass Microsoft's MTA Networking
Fundamentals Exam 98-366. Following Microsoft's official syllabus,
the book starts by covering network infrastructures to help you
differentiate intranets, internets, and extranets, and learn about
network topologies. You'll then get up to date with common network
hardware devices such as routers and switches and the media types
used to connect them together. As you advance, the book will take
you through different protocols and services and the requirements
to follow a standardized approach to networking. You'll get to
grips with the OSI and TCP/IP models as well as IPv4 and IPv6. The
book also shows you how to recall IP addresses through name
resolution. Finally, you'll be able to practice everything you've
learned and take the exam confidently with the help of mock tests.
By the end of this networking book, you'll have developed a strong
foundation in the essential networking concepts needed to pass Exam
98-366. What you will learnThings you will learn: Become well
versed in networking topologies and concepts Understand network
infrastructures such as intranets, extranets, and more Explore
network switches, routers, and other network hardware devices Get
to grips with different network protocols and models such as OSI
and TCP/IP Work with a variety of network services such as DHCP,
NAT, firewalls, and remote access Apply networking concepts in
different real-world scenarios Who this book is forIf you're new to
the IT industry or simply want to gain a thorough understanding of
networking, this book is for you. A basic understanding of the
Windows operating system and your network environment will be
helpful.
Over the past decade the tremendous development of Wireless
Communications has changed human life incredibly. Considerable
advancement has been made in the design and architecture of
communications related RF and Microwave circuits. This book is
focused on special circuits dedicated to the RF level of wireless
Communications. From Oscillators to Modulation and Demodulation and
from Mixers to RF and Power Amplifier Circuits, the topics are
presented in a sequential manner. A wealth of analysis is provided
in the text alongside various worked out examples. Related problem
sets are given at the end of each chapter. Basic concepts of RF
Analog Circuit Design are developed in the book. Technical topics
discussed in the book include: Wireless Communication System; RF
Oscillators and Phase Locked Loops; Modulator and Demodulator
Circuits; RF Mixers; Automatic Gain Control and Limiters; Microwave
Circuits, Transmission Lines and S-Parameters; Matching networks
Linear Amplifier Design and Power Amplifiers Linearization
Techniques
New edition of the bestselling guide to mastering Python
Networking, updated to Python 3 and including the latest on network
data analysis, Cloud Networking, Ansible 2.8, and new libraries Key
Features Explore the power of Python libraries to tackle difficult
network problems efficiently and effectively, including pyATS,
Nornir, and Ansible 2.8 Use Python and Ansible for DevOps, network
device automation, DevOps, and software-defined networking Become
an expert in implementing advanced network-related tasks with
Python 3 Book DescriptionNetworks in your infrastructure set the
foundation for how your application can be deployed, maintained,
and serviced. Python is the ideal language for network engineers to
explore tools that were previously available to systems engineers
and application developers. In Mastering Python Networking, Third
edition, you'll embark on a Python-based journey to transition from
traditional network engineers to network developers ready for the
next-generation of networks. This new edition is completely revised
and updated to work with Python 3. In addition to new chapters on
network data analysis with ELK stack (Elasticsearch, Logstash,
Kibana, and Beats) and Azure Cloud Networking, it includes updates
on using newer libraries such as pyATS and Nornir, as well as
Ansible 2.8. Each chapter is updated with the latest libraries with
working examples to ensure compatibility and understanding of the
concepts. Starting with a basic overview of Python, the book
teaches you how it can interact with both legacy and API-enabled
network devices. You will learn to leverage high-level Python
packages and frameworks to perform network automation tasks,
monitoring, management, and enhanced network security followed by
Azure and AWS Cloud networking. Finally, you will use Jenkins for
continuous integration as well as testing tools to verify your
network. What you will learn Use Python libraries to interact with
your network Integrate Ansible 2.8 using Python to control Cisco,
Juniper, and Arista network devices Leverage existing Flask web
frameworks to construct high-level APIs Learn how to build virtual
networks in the AWS & Azure Cloud Learn how to use Elastic
Stack for network data analysis Understand how Jenkins can be used
to automatically deploy changes in your network Use PyTest and
Unittest for Test-Driven Network Development in networking
engineering with Python Who this book is forMastering Python
Networking, Third edition is for network engineers, developers, and
SREs who want to use Python for network automation,
programmability, and data analysis. Basic familiarity with Python
programming and networking-related concepts such as Transmission
Control Protocol/Internet Protocol (TCP/IP) will be useful.
Develop technical skills and expertise to automate AWS networking
tasks Key Features A fast paced guide that will help you pass the
exam with confidence Learn advanced skill sets to build effective
AWS networking solutions Enhance your AWS skills with practice
exercises and mock tests Book DescriptionAmazon has recently come
up a with specialty certifications which validates a particular
user's expertise that he/she would want to build a career in. Since
the Cloud market now demands of AWS networking skills this becomes
the most wanted certification to upheld ones industry portfolio.
This book would be your ideal companion to getting skilled with
complex and creative networking solutions. Cloud practitioners or
associate-level certified individuals interested in validating
advanced skills in networking can opt for this practical guide.
This book will include topics that will help you design and
implement AWS and hybrid IT network architectures along with some
network automation tasks. You will also delve deep into topics that
will help you design and maintain network architecture for all AWS
services. Like most of our certification guides this book will also
follow a unique approach of testing your learning with
chapter-level practice exercises and certification-based mock
tests. The exam mock tests will help you gauge whether you are
ready to take the certification exam or not. This book will also be
an advanced guide for networking professionals to enhance their
networking skills and get certified. By the end of this book, you
will be all equipped with AWS networking concepts and techniques
and will have mastered core architectural best practices. What you
will learn Formulate solution plans and provide guidance on AWS
architecture best practices Design and deploy scalable, highly
available, and fault-tolerant systems on AWS Identify the tools
required to replicate an on-premises network in AWS Analyze the
access and egress of data to and from AWS Select the appropriate
AWS service based on data, compute, database, or security
requirements Estimate AWS costs and identify cost control
mechanisms Who this book is forIf you are a system administrator,
or a network engineer interested in getting certified with an
advanced Cloud networking certification then this book is for you.
Prior experience in Cloud administration and networking would be
necessary.
Learn how to hack systems like black hat hackers and secure them
like security experts Key Features Understand how computer systems
work and their vulnerabilities Exploit weaknesses and hack into
machines to test their security Learn how to secure systems from
hackers Book DescriptionThis book starts with the basics of ethical
hacking, how to practice hacking safely and legally, and how to
install and interact with Kali Linux and the Linux terminal. You
will explore network hacking, where you will see how to test the
security of wired and wireless networks. You'll also learn how to
crack the password for any Wi-Fi network (whether it uses WEP, WPA,
or WPA2) and spy on the connected devices. Moving on, you will
discover how to gain access to remote computer systems using
client-side and server-side attacks. You will also get the hang of
post-exploitation techniques, including remotely controlling and
interacting with the systems that you compromised. Towards the end
of the book, you will be able to pick up web application hacking
techniques. You'll see how to discover, exploit, and prevent a
number of website vulnerabilities, such as XSS and SQL injections.
The attacks covered are practical techniques that work against real
systems and are purely for educational purposes. At the end of each
section, you will learn how to detect, prevent, and secure systems
from these attacks. What you will learn Understand ethical hacking
and the different fields and types of hackers Set up a penetration
testing lab to practice safe and legal hacking Explore Linux
basics, commands, and how to interact with the terminal Access
password-protected networks and spy on connected clients Use server
and client-side attacks to hack and control remote computers
Control a hacked system remotely and use it to hack other systems
Discover, exploit, and prevent a number of web application
vulnerabilities such as XSS and SQL injections Who this book is
forLearning Ethical Hacking from Scratch is for anyone interested
in learning how to hack and test the security of systems like
professional hackers and security experts.
Protect your network as you move from the basics of the Wireshark
scenarios to detecting and resolving network anomalies. Key
Features Learn protocol analysis, optimization and troubleshooting
using Wireshark, an open source tool Learn the usage of filtering
and statistical tools to ease your troubleshooting job Quickly
perform root-cause analysis over your network in an event of
network failure or a security breach Book DescriptionWireshark is
an open source protocol analyser, commonly used among the network
and security professionals. Currently being developed and
maintained by volunteer contributions of networking experts from
all over the globe. Wireshark is mainly used to analyze network
traffic, analyse network issues, analyse protocol behaviour, etc. -
it lets you see what's going on in your network at a granular
level. This book takes you from the basics of the Wireshark
environment to detecting and resolving network anomalies. This book
will start from the basics of setting up your Wireshark environment
and will walk you through the fundamentals of networking and packet
analysis. As you make your way through the chapters, you will
discover different ways to analyse network traffic through creation
and usage of filters and statistical features. You will look at
network security packet analysis, command-line utilities, and other
advanced tools that will come in handy when working with day-to-day
network operations. By the end of this book, you have enough skill
with Wireshark 2 to overcome real-world network challenges. What
you will learn Learn how TCP/IP works Install Wireshark and
understand its GUI Creation and Usage of Filters to ease analysis
process Understand the usual and unusual behaviour of Protocols
Troubleshoot network anomalies quickly with help of Wireshark Use
Wireshark as a diagnostic tool for network security analysis to
identify source of malware Decrypting wireless traffic Resolve
latencies and bottleneck issues in the network Who this book is
forIf you are a security professional or a network enthusiast who
is interested in understanding the internal working of networks and
packets, then this book is for you. No prior knowledge of Wireshark
is needed.
In IoT scenarios, ways in which large-scale and cross-domain
service systems can be established are still unclear, and no
systematic or in-depth theories and methods have yet been found. An
effective, formal foundation to IoT application designs could serve
as a knowledge base for a variety of virtual world applications.
Integrating and Streamlining Event-Driven IoT Services discusses
how to observe isolated services running by different observation
sources, how to fuse different observations to deal with
observation conflict and incompleteness, and how to deal with
adversaries and physical system features for real-time property
enforcement over the fused knowledge. Overall, presenting an
exploration of systematic theories and methods for the design of
IoT services based on the principles of streamlining and
integration, this book features research on topics such as CEP
service, virtual machine technologies, and hybrid EPC. It is
ideally designed for engineers, researchers, and university
students seeking coverage on applications for smart cities, smart
grids, and Industry 4.0.
A comprehensive, easy-to-follow guide to creating complete Node
apps and understanding how to build, deploy, and test your own
apps. Key Features Entirely project-based and practical Explains
the "Why" of Node.js features, not just the "how", providing you
with a deep understanding and enabling you to easily apply concepts
in your own applications Covers the full range of technologies
around Node.js - NPM, version control with Git, and much more Book
DescriptionLearning Node.js Development is a practical,
project-based book that provides you with all you need to get
started as a Node.js developer. Node is a ubiquitous technology on
the modern web, and an essential part of any web developers'
toolkit. If you are looking to create real-world Node applications,
or you want to switch careers or launch a side project to generate
some extra income, then you're in the right place. This book has
been written around a single goal-turning you into a professional
Node developer capable of developing, testing, and deploying
real-world production applications. Learning Node.js Development is
built from the ground up around the latest version of Node.js
(version 9.x.x). You'll be learning all the cutting-edge features
available only in the latest software versions. This book cuts
through the mass of information available around Node and delivers
the essential skills that you need to become a Node developer. It
takes you through creating complete apps and understanding how to
build, deploy, and test your own Node apps. It maps out everything
in a comprehensive, easy-to-follow package designed to get you up
and running quickly. What you will learn Learn the fundamentals of
Node Build apps that respond to user input Master working with
servers Learn how to test and debug applications Deploy and update
your apps in the real world Create responsive asynchronous web
applications Who this book is forThis book targets anyone looking
to launch their own Node applications, switch careers, or freelance
as a Node developer. You should have a basic understanding of
JavaScript in order to follow this course.
|
You may like...
AIDS in Africa
Max Essex, Souleymane Mboup, …
Hardcover
R4,914
Discovery Miles 49 140
Diagnosing Syntax
Lisa Lai Shen Cheng, Norbert Corver
Hardcover
R5,087
Discovery Miles 50 870
|