|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > Unix, Unix Linux & Unix TCL/TK
This comprehensive guide is directed at Linux and UNIX users but is
also the best how-to book on the use of LaTeX in preparing
articles, books and theses. Unlike other LaTeX books, this one is
particularly suitable for anyone coming to LaTeX for the first
time.
For system administrators, programmers, and end users, shell
command or carefully crafted shell script can save you time and
effort, or facilitate consistency and repeatability for a variety
of common tasks. This cookbook provides more than 300 practical
recipes for using bash, the popular Unix shell that enables you to
harness and customize the power of any Unix or Linux system. Ideal
for new and experienced users alike-including proficient Windows
users and sysadmins-this updated second edition helps you solve a
wide range of problems. You'll learn ways to handle input/output,
file manipulation, program execution, administrative tasks, and
many other challenges. Each recipe includes one or more scripting
examples and a discussion of why the solution works. You'll find
recipes for problems including: Standard output and input, and
executing commands Shell variables, shell logic, and arithmetic
Intermediate shell tools and advanced scripting Searching for files
with find, locate, and slocate Working with dates and times
Creating shell scripts for various end-user tasks Working with
tasks that require parsing Writing secure shell scripts Configuring
and customizing bash
This systematic overview for beginners, converts to LINUX, and system administrators gives full details of operating system architecture, LINUX basic commands, and typical development and application packages. Fred Hantelmann focuses on the LST distribution (Power LINUX), the basic distribution for Caldera LINUX products, to provide a quick route to practical deployment.
This book introduces the concepts and features of Linux. It
describes the features and services of the Internet which have been
instrumental in the rapid development and wide distribution of
Linux and focuses on the graphical interface, network capability,
and extended tools of Linux. It also gives an overview of the wide
range of freeware applications available for Linux. Now completely
revised and expanded to help the reader take full advantage of the
high-performance of Linux 2.0, this third edition lists all of the
currently supported hardware; provides the latest information on
Linux as client/server; explains the newest applications including
StarOffice 3.1, new graphics tools (including GIMP), Xemacs, and
LyX; and presents the most up to date information on security and
cryptography. Plus, there is a new UNIX command reference with
entries grouped by purpose, as well as a new section on how to deal
with errors. All in all, the most up-to-date information on Linux
available!
ALL YOU NEED TO KNOW TO SECURE LINUX SYSTEMS, NETWORKS,
APPLICATIONS, AND DATA-IN ONE BOOK From the basics to advanced
techniques: no Linux security experience necessary Realistic
examples & step-by-step activities: practice hands-on without
costly equipment The perfect introduction to Linux-based security
for all students and IT professionals Linux distributions are
widely used to support mission-critical applications and manage
crucial data. But safeguarding modern Linux systems is complex, and
many Linux books have inadequate or outdated security coverage.
Linux Essentials for Cybersecurity is your complete solution.
Leading Linux certification and security experts William "Bo"
Rothwell and Dr. Denise Kinsey introduce Linux with the primary
goal of enforcing and troubleshooting security. Their practical
approach will help you protect systems, even if one or more layers
are penetrated. First, you'll learn how to install Linux to achieve
optimal security upfront, even if you have no Linux experience.
Next, you'll master best practices for securely administering
accounts, devices, services, processes, data, and networks. Then,
you'll master powerful tools and automated scripting techniques for
footprinting, penetration testing, threat detection, logging,
auditing, software management, and more. To help you earn
certification and demonstrate skills, this guide covers many key
topics on CompTIA Linux+ and LPIC-1 exams. Everything is organized
clearly and logically for easy understanding, effective classroom
use, and rapid on-the-job training. LEARN HOW TO: Review Linux
operating system components from the standpoint of security Master
key commands, tools, and skills for securing Linux systems
Troubleshoot common Linux security problems, one step at a time
Protect user and group accounts with Pluggable Authentication
Modules (PAM), SELinux, passwords, and policies Safeguard files and
directories with permissions and attributes Create, manage, and
protect storage devices: both local and networked Automate system
security 24/7 by writing and scheduling scripts Maintain network
services, encrypt network connections, and secure
network-accessible processes Examine which processes are
running-and which may represent a threat Use system logs to
pinpoint potential vulnerabilities Keep Linux up-to-date with Red
Hat or Debian software management tools Modify boot processes to
harden security Master advanced techniques for gathering system
information
"Grep Pocket Reference" is the first guide devoted to grep, the
powerful utility program that helps you locate content in any file
on a Unix or Linux system. Several applications use grep, from mail
filtering and system log management to malware analysis and
application development, and there are many other ways to use the
utility. This pocket reference is ideal for system administrators,
security professionals, developers, and others who want to learn
more about grep and take new approaches with it.With "Grep Pocket
Reference", you will: learn methods for filtering large files for
specific content; acquire information not included in the current
grep documentation; get several tricks for using variants such as
egrep; keep key information about grep right at your fingertips;
and, find the answers you need about grep quickly and easily. If
you're familiar with this utility, "Grep Pocket Reference" will
help you refresh your basic knowledge, understand rare situations,
and find more efficient uses. If you're new to grep, this book is
the best way to get started.
Hailed in previous editions for its user-friendliness, this third
edition of Linux Universe contains the newest Linux Kernel 2.0.25
on two fully configured CD-ROMs for easy installation. The new
edition contains several powerful new features, including Java SDK
(binary), Xemacs, Netatalk (Appletalk connectivity), and IP
firewall administration tools.
"The graphical configuration utility is simple to use and seems to
work well. It works quickly and intelligently. When filling out the
networking configuration, for example, it guesses most of the
information once you type in the IP address." -LINUX JOURNAL
This book describes the design and internals of the MOSIX
distributed operating system. MOSIX, an acronym for Multicomputer
Operating System for UNIX, integrates a cluster of loosely
integrated computers into a virtual single-machine UNIX
environment. The main property of MOSIX is the high degree of
integration among the processors, which may include personal
workstations and shared memory and non-shared memory
multiprocessors, connected by fast communication links. This
integration includes network transparency, cooperation between the
processors to provide services across machine boundaries, support
of dynamic configuration, and system-initiated load balancing by
process migration. Another property of MOSIX is the ability to
scale up the system configuration to encompass a large number of
computers. The development of MOSIX was begun in 1981. The book is
intended primarily for readers who are interested in distributed
and multiprocessor systems. The reader is assumed to have some
knowledge in programming and operating systems, preferably UNIX.
Readers without this background will still benefit from
thetechniques and algorithms discussed.
A System V Guide to UNIX and XENIX takes the novice reader through
the features of the UNIX system step-by-step without jargon and
assumptions about the reader's technical knowledge found in similar
books. With its clear explanations, numerous examles, and
straightforward organization, this book appeals to many
non-technical people just beginning to work with UNIX, as well as
engineers and programmers with prior experience. Anyone who reads
this book will learn how to use the features of UNIX, and how to
modify and customize those features. It is organized in such a way
that it leads the reader from the UNIX basics to the more complex
and powerful concepts such as shell-programming and networking.
Although the book is written as introduction and reference for the
UNIX user, it can very well be used as a textbook in undergraduate
computer science or computer engineering courses.
Well suited to medium-scale general purpose computing, the Unix
time sharing operating system is deservedly popular with academic
institutions, research laboratories, and commercial establishments
alike. Its user com munity, until recently a brotherhood of
experienced computer profes sionals, it now attracting many people
concerned with computer appli cations rather than the computer
systems themselves. This book is intended for that new audience,
people who have never encountered the Unix system before but who do
have some acquaintance with computing. While helping beginning
users get started is the primary aim of this book, it is also
intended to serve as a handy reference subsequently. However, it is
not designed to replace the definitive Unix system docu mentation.
Unix operating systems now installed in computing centers, offices,
and personal computers come in three related but distinct breeds:
Seventh Edition Unix, Berkeley 4.2 BSD, and System V. These differ
from each other in details, even though their family resemblance is
strong. This book emphasizes System V, while paying heed to its two
popular cousins. It also includes a few facilities in wide use, but
not included in the normal system releases. Individual details, of
course, must be found in the manuals supplied with each system."
Learn how to attack and defend the world s most popular web server
platform Linux Server Security: Hack and Defend presents a detailed
guide for experienced admins, aspiring hackers and other IT
professionals seeking a more advanced understanding of Linux
security. Written by a 20-year veteran of Linux server deployment
this book provides the insight of experience along with highly
practical instruction. The topics range from the theory of past,
current, and future attacks, to the mitigation of a variety of
online attacks, all the way to empowering you to perform numerous
malicious attacks yourself (in the hope that you will learn how to
defend against them). By increasing your understanding of a hacker
s tools and mindset you're less likely to be confronted by the
all-too-common reality faced by many admins these days: someone
else has control of your systems. * Master hacking tools and launch
sophisticated attacks: perform SQL injections, deploy multiple
server exploits and crack complex passwords. * Defend systems and
networks: make your servers invisible, be confident of your
security with penetration testing and repel unwelcome attackers. *
Increase your background knowledge of attacks on systems and
networks and improve all-important practical skills required to
secure any Linux server. The techniques presented apply to almost
all Linux distributions including the many Debian and Red Hat
derivatives and some other Unix-type systems. Further your career
with this intriguing, deeply insightful, must-have technical book.
Diverse, broadly-applicable and hands-on practical, Linux Server
Security: Hack and Defend is an essential resource which will sit
proudly on any techie's bookshelf.
Build your expertise in the BPF virtual machine in the Linux kernel
with this practical guide for systems engineers. You'll not only
dive into the BPF program lifecycle but also learn to write
applications that observe and modify the kernel's behavior; inject
code to monitor, trace, and securely observe events in the kernel;
and more. Authors David Calavera and Lorenzo Fontana help you
harness the power of BPF to make any computing system more
observable. Familiarize yourself with the essential concepts you'll
use on a day-to-day basis and augment your knowledge about
performance optimization, networking, and security. Then see how it
all comes together with code examples in C, Go, and Python. Write
applications that use BPF to observe and modify the Linux kernel's
behavior on demand Inject code to monitor, trace, and observe
events in the kernel in a secure way-no need to recompile the
kernel or reboot the system Explore code examples in C, Go, and
Python Gain a more thorough understanding of the BPF program
lifecycle
Eckert's LINUX+ and LPIC-1 GUIDE TO LINUX CERTIFICATION, 5th
Edition, empowers you with the knowledge and skills you need to
succeed on CompTIA's Linux (R)+ (XKO-004) certification exam and
the Linux Professional Institute LPIC-1 (101-500 and 102-500)
certification exams, as well as in your network administration
career. The book covers the latest Linux (R) distributions,
virtualization, containerization and storage technologies.
Comprehensive coverage also addresses key job-related networking
and security services, including FTP, NFS, Samba, Apache, DNS,
DHCP, NTP, Squid, Postfix, SSH, VNC, Spice, RDP, GPG, PostgreSQL
and iptables/firewalld. Hands-on projects give you practice using
both modern Linux (R) distributions (Fedora (TM) 28 and Ubuntu (R)
Server 18.04) and industry's legacy Linux distributions. And with
MindTap's live virtual machine labs, you can explore various
solutions in a safe, sandbox environment using real Cisco hardware
and virtualized Linux operating systems.
Written by a leading developer and maintainer of the Linux kernel,
"Linux Kernel in a Nutshell" is a comprehensive overview of kernel
configuration and building, a critical task for Linux users and
administrators. No distribution can provide a Linux kernel that
meets all users' needs. Computers big and small have special
requirements that require reconfiguring and rebuilding the kernel.
Whether you are trying to get sound, wireless support, and power
management working on a laptop or incorporating enterprise features
such as logical volume management on a large server, you can
benefit from the insights in this book. "Linux Kernel in a
Nutshell" covers the entire range of kernel tasks, starting with
downloading the source and making sure that the kernel is in sync
with the versions of the tools you need. In addition to
configuration and installation steps, the book offers reference
material and discussions of related topics such as control of
kernel options at runtime. A key benefit of the book is a chapter
on determining exactly what drivers are needed for your hardware.
Also included are recipes that list what you need to do to
accomplish a wide range of popular tasks.
Shell Programming in Unix, Linux and OS X is a thoroughly updated
revision of Kochan and Wood's classic Unix Shell Programming
tutorial. Following the methodology of the original text, the book
focuses on the POSIX standard shell, and teaches you how to develop
programs in this useful programming environment, taking full
advantage of the underlying power of Unix and Unix-like operating
systems. After a quick review of Unix utilities, the book's authors
take you step-by-step through the process of building shell
scripts, debugging them, and understanding how they work within the
shell's environment. All major features of the shell are covered,
and the large number of practical examples make it easy for you to
build shell scripts for your particular applications. The book also
describes the major features of the Korn and Bash shells. Learn how
to... Take advantage of the many utilities provided in the Unix
system Write powerful shell scripts Use the shell's built-in
decision-making and looping constructs Use the shell's powerful
quoting mechanisms Make the most of the shell's built-in history
and command editing capabilities Use regular expressions with Unix
commands Take advantage of the special features of the Korn and
Bash shells Identify the major differences between versions of the
shell language Customize the way your Unix system responds to you
Set up your shell environment Make use of functions Debug scripts
Contents at a Glance 1 A Quick Review of the Basics 2 What Is the
Shell? 3 Tools of the Trade 4 And Away We Go 5 Can I Quote You on
That? 6 Passing Arguments 7 Decisions, Decisions 8 'Round and
'Round She Goes 9 Reading and Printing Data 10 Your Environment 11
More on Parameters 12 Loose Ends 13 Rolo Revisited 14 Interactive
and Nonstandard Shell Features A Shell Summary B For More
Information
This handy cookbook teaches new-to-intermediate Linux users the
essential skills necessary to manage a Linux system, using both
graphical and command-line tools. Whether you run Linux in
embedded, desktop, server, or cloud or virtual environments, the
fundamental skills are the same. This book aims to get you up and
running quickly, with copy-paste examples. Carla Schroder provides
recipes that cover specific problems, with discussions that explain
how each recipe works, as well as references for additional study.
You'll learn how to: Use systemd, the new comprehensive service
manager Build simple or complex firewalls with firewalld Set up
secure network connections for Linux systems and mobile devices
Rescue nonbooting systems Reset lost passwords on Linux and Windows
Use dnsmasq to simplify managing your LAN name services Manage
users and groups and control access to files Probe your computer
hardware and monitor hardware health Manage the GRUB bootloader and
multiboot Linux and Windows Keep accurate time across your network
with the newest tools Build an internet router/firewall on
Raspberry Pi Manage filesystems and partitioning
"There's an incredible amount of depth and thinking in the
practices described here, and it's impressive to see it all in one
place." -Win Treese, coauthor of Designing Systems for Internet
Commerce The Practice of Cloud System Administration, Volume 2,
focuses on "distributed" or "cloud" computing and brings a
DevOps/SRE sensibility to the practice of system administration.
Unsatisfied with books that cover either design or operations in
isolation, the authors created this authoritative reference
centered on a comprehensive approach. Case studies and examples
from Google, Etsy, Twitter, Facebook, Netflix, Amazon, and other
industry giants are explained in practical ways that are useful to
all enterprises. The new companion to the best-selling first
volume, The Practice of System and Network Administration, Second
Edition, this guide offers expert coverage of the following and
many other crucial topics: Designing and building modern web and
distributed systems Fundamentals of large system design Understand
the new software engineering implications of cloud administration
Make systems that are resilient to failure and grow and scale
dynamically Implement DevOps principles and cultural changes
IaaS/PaaS/SaaS and virtual platform selection Operating and running
systems using the latest DevOps/SRE strategies Upgrade production
systems with zero down-time What and how to automate; how to decide
what not to automate On-call best practices that improve uptime Why
distributed systems require fundamentally different system
administration techniques Identify and resolve resiliency problems
before they surprise you Assessing and evaluating your team's
operational effectiveness Manage the scientific process of
continuous improvement A forty-page, pain-free assessment system
you can start using today
Praise for the First Edition: "This outstanding book ... gives the
reader robust concepts and implementable knowledge of this
environment. Graphical user interface (GUI)-based users and
developers do not get short shrift, despite the command-line
interface's (CLI) full-power treatment. ... Every programmer should
read the introduction's Unix/Linux philosophy section. ... This
authoritative and exceptionally well-constructed book has my
highest recommendation. It will repay careful and recursive study."
--Computing Reviews, August 2011 Mastering Modern Linux, Second
Edition retains much of the good material from the previous
edition, with extensive updates and new topics added. The book
provides a comprehensive and up-to-date guide to Linux concepts,
usage, and programming. The text helps the reader master Linux with
a well-selected set of topics, and encourages hands-on practice.
The first part of the textbook covers interactive use of Linux via
the Graphical User Interface (GUI) and the Command-Line Interface
(CLI), including comprehensive treatment of the Gnome desktop and
the Bash Shell. Using different apps, commands and filters,
building pipelines, and matching patterns with regular expressions
are major focuses. Next comes Bash scripting, file system
structure, organization, and usage. The following chapters present
networking, the Internet and the Web, data encryption, basic system
admin, as well as Web hosting. The Linux Apache MySQL/MariaDB PHP
(LAMP) Web hosting combination is also presented in depth. In the
last part of the book, attention is turned to C-level programming.
Topics covered include the C compiler, preprocessor, debugger, I/O,
file manipulation, process control, inter-process communication,
and networking. The book includes many examples and complete
programs ready to download and run. A summary and exercises of
varying degrees of difficulty can be found at the end of each
chapter. A companion website (http://mml.sofpower.com) provides
appendices, information updates, an example code package, and other
resources for instructors, as well as students.
This is the third edition of the bestselling one-stop resource for
sysadmins and DevOps professionals to learn, configure and use
Ubuntu 20.04 for their day-to-day operations and deployments. Key
Features A hands-on book that will teach you how to deploy,
maintain and troubleshoot Ubuntu Server Learn to leverage the
improved performance and security-related aspects of Ubuntu Server
20.04 LTS New chapters dedicated to exploring Ubuntu for cloud Book
DescriptionUbuntu Server has taken data centers around the world by
storm. Whether you're deploying Ubuntu for a large-scale project or
for a small office, it is a stable, customizable, and powerful
Linux distribution with innovative and cutting-edge features. For
both simple and complex server deployments, Ubuntu's flexible
nature can be easily adapted to meet to the needs of your
organization. This third edition is updated to cover the
advancements of Ubuntu 20.04 LTS and further train you to
understand how to use Ubuntu Server, from initial deployment to
creating production-ready resources for your network. The book
begins with the concepts of user management, group management, and
file system permissions. Continuing into managing storage volumes,
you will learn how to format storage devices, utilize logical
volume management, and monitor disk usage. Later, you will learn
how to virtualize hosts and applications, which will include
setting up QEMU & KVM, as well as containerization with both
Docker and LXD. As the book continues, you will learn how to
automate configuration with Ansible, as well as take a look at
writing scripts. Lastly, you will explore best practices and
troubleshooting techniques when working with Ubuntu Server that are
applicable to real-world scenarios. By the end of this Ubuntu
Server book, you will be well-versed in Ubuntu server's advanced
concepts and attain the required proficiency needed for Ubuntu
Server administration. What you will learn Manage users, groups,
and permissions Optimize the performance of system resources
Perform disk encryption and decryption with Linux Unified Key Setup
(LUKS) Set up Secure Shell (SSH) for remote access, and connect it
to other nodes Share directories using Samba and Network File
System (NFS) Get familiar with scripting to improve command-line
efficiency Configure VMs, containers, and orchestrate with MicroK8s
and Kubernetes Automate server deployments with Ansible and cloud
server deployments with Terraform Who this book is forThe book is
written to cater to sysadmins and DevOps professionals whose teams
are planning to employ an Ubuntu/Linux environment for their
development needs. Prior knowledge of Ubuntu is not required.
However, it is assumed that you possess some IT admin, Linux, and
shell scripting experience.
If you're a developer or system administrator lured to Mac OS X
because of its Unix roots, you'll quickly discover that performing
Unix tasks on a Mac is different than what you're accustomed to.
Mac OS X for Unix Geeks serves as a bridge between Apple's Darwin
OS and the more traditional Unix systems. This clear, concise guide
gives you a tour of Mac OS X's Unix shell in both Leopard and
Tiger, and helps you find the facilities that replace or correspond
to standard Unix utilities. You'll learn how to perform common Unix
tasks in Mac OS X, such as using Directory Services instead of the
standard Unix /etc/passwd and /etc/group, and you'll be able to
compile code, link to libraries, and port Unix software using
either Leopard and Tiger. This book teaches you to: * Navigate the
Terminal and understand how it differs from an xterm * Use Open
Directory (LDAP) and NetInfo as well as Directory Services *
Compile your code with GCC 4 * Port Unix programs to Mac OS X with
Fink * Use MacPorts to install free/open source software * Search
through metadata with Spotlight's command-line utilities * Build
the Darwin kernel And there's much more. Mac OS X for Unix Geeks is
the ideal survival guide to tame the Unix side of Leopard and
Tiger. If you're a Unix geek with an interest in Mac OS X, you'll
soon find that this book is invaluable.
|
|