|
Books > Computing & IT > Computer communications & networking > Networking standards & protocols
Get to grips with the most common as well as complex Linux
networking configurations, tools, and services to enhance your
professional skills Key Features Learn how to solve critical
networking problems using real-world examples Configure common
networking services step by step in an enterprise environment
Discover how to build infrastructure with an eye toward defense
against common attacks Book DescriptionAs Linux continues to gain
prominence, there has been a rise in network services being
deployed on Linux for cost and flexibility reasons. If you are a
networking professional or an infrastructure engineer involved with
networks, extensive knowledge of Linux networking is a must. This
book will guide you in building a strong foundation of Linux
networking concepts. The book begins by covering various major
distributions, how to pick the right distro, and basic Linux
network configurations. You'll then move on to Linux network
diagnostics, setting up a Linux firewall, and using Linux as a host
for network services. You'll discover a wide range of network
services, why they're important, and how to configure them in an
enterprise environment. Finally, as you work with the example
builds in this Linux book, you'll learn to configure various
services to defend against common attacks. As you advance to the
final chapters, you'll be well on your way towards building the
underpinnings for an all-Linux datacenter. By the end of this book,
you'll be able to not only configure common Linux network services
confidently, but also use tried-and-tested methodologies for future
Linux installations. What you will learn Use Linux as a
troubleshooting and diagnostics platform Explore Linux-based
network services Configure a Linux firewall and set it up for
network services Deploy and configure Domain Name System (DNS) and
Dynamic Host Configuration Protocol (DHCP) services securely
Configure Linux for load balancing, authentication, and
authorization services Use Linux as a logging platform for network
monitoring Deploy and configure Intrusion Prevention Services (IPS)
Set up Honeypot solutions to detect and foil attacks Who this book
is forThis book is for IT and Windows professionals and admins
looking for guidance in managing Linux-based networks. Basic
knowledge of networking is necessary to get started with this book.
Discover how to write high-quality character driver code, interface
with userspace, work with chip memory, and gain an in-depth
understanding of working with hardware interrupts and kernel
synchronization Key Features Delve into hardware interrupt
handling, threaded IRQs, tasklets, softirqs, and understand which
to use when Explore powerful techniques to perform user-kernel
interfacing, peripheral I/O and use kernel mechanisms Work with key
kernel synchronization primitives to solve kernel concurrency
issues Book DescriptionLinux Kernel Programming Part 2 - Char
Device Drivers and Kernel Synchronization is an ideal companion
guide to the Linux Kernel Programming book. This book provides a
comprehensive introduction for those new to Linux device driver
development and will have you up and running with writing misc
class character device driver code (on the 5.4 LTS Linux kernel) in
next to no time. You'll begin by learning how to write a simple and
complete misc class character driver before interfacing your driver
with user-mode processes via procfs, sysfs, debugfs, netlink
sockets, and ioctl. You'll then find out how to work with hardware
I/O memory. The book covers working with hardware interrupts in
depth and helps you understand interrupt request (IRQ) allocation,
threaded IRQ handlers, tasklets, and softirqs. You'll also explore
the practical usage of useful kernel mechanisms, setting up delays,
timers, kernel threads, and workqueues. Finally, you'll discover
how to deal with the complexity of kernel synchronization with
locking technologies (mutexes, spinlocks, and atomic/refcount
operators), including more advanced topics such as cache effects, a
primer on lock-free techniques, deadlock avoidance (with lockdep),
and kernel lock debugging techniques. By the end of this Linux
kernel book, you'll have learned the fundamentals of writing Linux
character device driver code for real-world projects and products.
What you will learn Get to grips with the basics of the modern
Linux Device Model (LDM) Write a simple yet complete misc class
character device driver Perform user-kernel interfacing using
popular methods Understand and handle hardware interrupts
confidently Perform I/O on peripheral hardware chip memory Explore
kernel APIs to work with delays, timers, kthreads, and workqueues
Understand kernel concurrency issues Work with key kernel
synchronization primitives and discover how to detect and avoid
deadlock Who this book is forAn understanding of the topics covered
in the Linux Kernel Programming book is highly recommended to make
the most of this book. This book is for Linux programmers beginning
to find their way with device driver development. Linux device
driver developers looking to overcome frequent and common
kernel/driver development issues, as well as perform common driver
tasks such as user-kernel interfaces, performing peripheral I/O,
handling hardware interrupts, and dealing with concurrency will
benefit from this book. A basic understanding of Linux kernel
internals (and common APIs), kernel module development, and C
programming is required.
Embedded vision is the integration of "computer vision" into
machines that use algorithms to decode meaning from observed images
or video.It has a wide range of applications to machine learning,
artificial intelligence, industrial, medical, driverless cars,
drones, smart phones,aerospace, defense, agriculture, consumer,
surveillance, robotics and security.This book is an introductory
guide for anyone who is interested in designing machines that have
vision-enabled, embedded products. It covers a large number of
topics encountered in hardware architecture, software algorithms,
applications,advancements in camera, processors, and sensors in the
field of embedded vision. Features: Includes a wide range of
applications to artificialintelligence, machine learning,
industry,science, medicine, transportation, civil infrastructure,
and security Covers a large number of topics encountered in
hardwarearchitecture, software algorithms, applications,
advancements in processors andsensors.
With the internet of things (IoT), it is proven that enormous
networks can be created to interconnect objects and facilitate
daily life in a variety of domains. Research is needed to study how
these improvements can be applied in different ways, using
different technologies, and through the creation of different
applications. IoT Protocols and Applications for Improving
Industry, Environment, and Society contains the latest research on
the most important areas and challenges in the internet of things
and its intersection with technologies and tools such as artificial
intelligence, blockchain, model-driven engineering, and cloud
computing. The book covers subfields that examine smart homes,
smart towns, smart earth, and the industrial internet of things in
order to improve daily life, protect the environment, and create
safer and easier jobs. While covering a range of topics within IoT
including Industry 4.0, security, and privacy, this book is ideal
for computer scientists, engineers, practitioners, stakeholders,
researchers, academicians, and students who are interested in the
latest applications of IoT.
Our coverage includes business trends analysis and industry
statistics. We also include a wireless and cellular business
glossary and a listing of industry contacts, such as industry
associations and government agencies. Next, we profile hundreds of
leading companies. Our 330 company profiles include complete
business descriptions and up to 27 executives by name and title.
You'll find a complete overview, industry analysis and market
research report in one superb, value-priced package.
Get ready to create distributed sensor systems and intelligent
interactive devices using the ZigBee wireless networking protocol
and Series 2 XBee radios. By the time you're halfway through this
fast-paced, hands-on guide, you'll have built a series of useful
projects, including a complete ZigBee wireless network that
delivers remotely sensed data. Radio networking is creating
revolutions in volcano monitoring, performance art, clean energy,
and consumer electronics. As you follow the examples in each
chapter, you'll learn how to tackle inspiring projects of your own.
This practical guide is ideal for inventors, hackers, crafters,
students, hobbyists, and scientists. * Investigate an assortment of
practical and intriguing project ideas * Prep your ZigBee toolbox
with an extensive shopping list of parts and programs * Create a
simple, working ZigBee network with XBee radios in less than two
hours -- for under $100 * Use the Arduino open source electronics
prototyping platform to build a series of increasingly complex
projects * Get familiar with XBee's API mode for creating sensor
networks * Build fully scalable sensing and actuation systems with
inexpensive components * Learn about power management, source
routing, and other XBee technical nuances * Make gateways that
connect with neighboring networks, including the Internet
A comprehensive guide to securing your Linux system against
cyberattacks and intruders Key Features Deliver a system that
reduces the risk of being hacked Explore a variety of advanced
Linux security techniques with the help of hands-on labs Master the
art of securing a Linux environment with this end-to-end practical
guide Book DescriptionFrom creating networks and servers to
automating the entire working environment, Linux has been extremely
popular with system administrators for the last couple of decades.
However, security has always been a major concern. With limited
resources available in the Linux security domain, this book will be
an invaluable guide in helping you get your Linux systems properly
secured. Complete with in-depth explanations of essential concepts,
practical examples, and self-assessment questions, this book begins
by helping you set up a practice lab environment and takes you
through the core functionalities of securing Linux. You'll practice
various Linux hardening techniques and advance to setting up a
locked-down Linux server. As you progress, you will also learn how
to create user accounts with appropriate privilege levels, protect
sensitive data by setting permissions and encryption, and configure
a firewall. The book will help you set up mandatory access control,
system auditing, security profiles, and kernel hardening, and
finally cover best practices and troubleshooting techniques to
secure your Linux environment efficiently. By the end of this Linux
security book, you will be able to confidently set up a Linux
server that will be much harder for malicious actors to compromise.
What you will learn Create locked-down user accounts with strong
passwords Configure firewalls with iptables, UFW, nftables, and
firewalld Protect your data with different encryption technologies
Harden the secure shell service to prevent security break-ins Use
mandatory access control to protect against system exploits Harden
kernel parameters and set up a kernel-level auditing system Apply
OpenSCAP security profiles and set up intrusion detection Configure
securely the GRUB 2 bootloader and BIOS/UEFI Who this book is
forThis book is for Linux administrators, system administrators,
and network engineers interested in securing moderate to complex
Linux environments. Security consultants looking to enhance their
Linux security skills will also find this book useful. Working
experience with the Linux command line and package management is
necessary to understand the concepts covered in this book.
Understand the constructs of the Python programming language and
use them to build data science projects Key Features Learn the
basics of developing applications with Python and deploy your first
data application Take your first steps in Python programming by
understanding and using data structures, variables, and loops Delve
into Jupyter, NumPy, Pandas, SciPy, and sklearn to explore the data
science ecosystem in Python Book DescriptionPython is the most
widely used programming language for building data science
applications. Complete with step-by-step instructions, this book
contains easy-to-follow tutorials to help you learn Python and
develop real-world data science projects. The "secret sauce" of the
book is its curated list of topics and solutions, put together
using a range of real-world projects, covering initial data
collection, data analysis, and production. This Python book starts
by taking you through the basics of programming, right from
variables and data types to classes and functions. You'll learn how
to write idiomatic code and test and debug it, and discover how you
can create packages or use the range of built-in ones. You'll also
be introduced to the extensive ecosystem of Python data science
packages, including NumPy, Pandas, scikit-learn, Altair, and
Datashader. Furthermore, you'll be able to perform data analysis,
train models, and interpret and communicate the results. Finally,
you'll get to grips with structuring and scheduling scripts using
Luigi and sharing your machine learning models with the world as a
microservice. By the end of the book, you'll have learned not only
how to implement Python in data science projects, but also how to
maintain and design them to meet high programming standards. What
you will learn Code in Python using Jupyter and VS Code Explore the
basics of coding - loops, variables, functions, and classes Deploy
continuous integration with Git, Bash, and DVC Get to grips with
Pandas, NumPy, and scikit-learn Perform data visualization with
Matplotlib, Altair, and Datashader Create a package out of your
code using poetry and test it with PyTest Make your machine
learning model accessible to anyone with the web API Who this book
is forIf you want to learn Python or data science in a fun and
engaging way, this book is for you. You'll also find this book
useful if you're a high school student, researcher, analyst, or
anyone with little or no coding experience with an interest in the
subject and courage to learn, fail, and learn from failing. A basic
understanding of how computers work will be useful.
New edition of the bestselling guide to mastering Python
Networking, updated to Python 3 and including the latest on network
data analysis, Cloud Networking, Ansible 2.8, and new libraries Key
Features Explore the power of Python libraries to tackle difficult
network problems efficiently and effectively, including pyATS,
Nornir, and Ansible 2.8 Use Python and Ansible for DevOps, network
device automation, DevOps, and software-defined networking Become
an expert in implementing advanced network-related tasks with
Python 3 Book DescriptionNetworks in your infrastructure set the
foundation for how your application can be deployed, maintained,
and serviced. Python is the ideal language for network engineers to
explore tools that were previously available to systems engineers
and application developers. In Mastering Python Networking, Third
edition, you'll embark on a Python-based journey to transition from
traditional network engineers to network developers ready for the
next-generation of networks. This new edition is completely revised
and updated to work with Python 3. In addition to new chapters on
network data analysis with ELK stack (Elasticsearch, Logstash,
Kibana, and Beats) and Azure Cloud Networking, it includes updates
on using newer libraries such as pyATS and Nornir, as well as
Ansible 2.8. Each chapter is updated with the latest libraries with
working examples to ensure compatibility and understanding of the
concepts. Starting with a basic overview of Python, the book
teaches you how it can interact with both legacy and API-enabled
network devices. You will learn to leverage high-level Python
packages and frameworks to perform network automation tasks,
monitoring, management, and enhanced network security followed by
Azure and AWS Cloud networking. Finally, you will use Jenkins for
continuous integration as well as testing tools to verify your
network. What you will learn Use Python libraries to interact with
your network Integrate Ansible 2.8 using Python to control Cisco,
Juniper, and Arista network devices Leverage existing Flask web
frameworks to construct high-level APIs Learn how to build virtual
networks in the AWS & Azure Cloud Learn how to use Elastic
Stack for network data analysis Understand how Jenkins can be used
to automatically deploy changes in your network Use PyTest and
Unittest for Test-Driven Network Development in networking
engineering with Python Who this book is forMastering Python
Networking, Third edition is for network engineers, developers, and
SREs who want to use Python for network automation,
programmability, and data analysis. Basic familiarity with Python
programming and networking-related concepts such as Transmission
Control Protocol/Internet Protocol (TCP/IP) will be useful.
Become well-versed with basic networking concepts such as routing,
switching, and subnetting, and prepare for the Microsoft 98-366
exam Key Features Build a strong foundation in networking concepts
Explore both the hardware and software aspects of networking
Prepare by taking mock tests with up-to-date exam questions Book
DescriptionA network is a collection of computers, servers, mobile
devices, or other computing devices connected for sharing data.
This book will help you become well versed in basic networking
concepts and prepare to pass Microsoft's MTA Networking
Fundamentals Exam 98-366. Following Microsoft's official syllabus,
the book starts by covering network infrastructures to help you
differentiate intranets, internets, and extranets, and learn about
network topologies. You'll then get up to date with common network
hardware devices such as routers and switches and the media types
used to connect them together. As you advance, the book will take
you through different protocols and services and the requirements
to follow a standardized approach to networking. You'll get to
grips with the OSI and TCP/IP models as well as IPv4 and IPv6. The
book also shows you how to recall IP addresses through name
resolution. Finally, you'll be able to practice everything you've
learned and take the exam confidently with the help of mock tests.
By the end of this networking book, you'll have developed a strong
foundation in the essential networking concepts needed to pass Exam
98-366. What you will learnThings you will learn: Become well
versed in networking topologies and concepts Understand network
infrastructures such as intranets, extranets, and more Explore
network switches, routers, and other network hardware devices Get
to grips with different network protocols and models such as OSI
and TCP/IP Work with a variety of network services such as DHCP,
NAT, firewalls, and remote access Apply networking concepts in
different real-world scenarios Who this book is forIf you're new to
the IT industry or simply want to gain a thorough understanding of
networking, this book is for you. A basic understanding of the
Windows operating system and your network environment will be
helpful.
Over the past decade the tremendous development of Wireless
Communications has changed human life incredibly. Considerable
advancement has been made in the design and architecture of
communications related RF and Microwave circuits. This book is
focused on special circuits dedicated to the RF level of wireless
Communications. From Oscillators to Modulation and Demodulation and
from Mixers to RF and Power Amplifier Circuits, the topics are
presented in a sequential manner. A wealth of analysis is provided
in the text alongside various worked out examples. Related problem
sets are given at the end of each chapter. Basic concepts of RF
Analog Circuit Design are developed in the book. Technical topics
discussed in the book include: Wireless Communication System; RF
Oscillators and Phase Locked Loops; Modulator and Demodulator
Circuits; RF Mixers; Automatic Gain Control and Limiters; Microwave
Circuits, Transmission Lines and S-Parameters; Matching networks
Linear Amplifier Design and Power Amplifiers Linearization
Techniques
In IoT scenarios, ways in which large-scale and cross-domain
service systems can be established are still unclear, and no
systematic or in-depth theories and methods have yet been found. An
effective, formal foundation to IoT application designs could serve
as a knowledge base for a variety of virtual world applications.
Integrating and Streamlining Event-Driven IoT Services discusses
how to observe isolated services running by different observation
sources, how to fuse different observations to deal with
observation conflict and incompleteness, and how to deal with
adversaries and physical system features for real-time property
enforcement over the fused knowledge. Overall, presenting an
exploration of systematic theories and methods for the design of
IoT services based on the principles of streamlining and
integration, this book features research on topics such as CEP
service, virtual machine technologies, and hybrid EPC. It is
ideally designed for engineers, researchers, and university
students seeking coverage on applications for smart cities, smart
grids, and Industry 4.0.
|
|