|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > Unix, Unix Linux & Unix TCL/TK
An immersive learning experience enhanced with technical, hands-on
labs to understand the concepts, methods, tools, platforms, and
systems required to master the art of cybersecurity Key Features
Get hold of the best defensive security strategies and tools
Develop a defensive security strategy at an enterprise level Get
hands-on with advanced cybersecurity threat detection, including
XSS, SQL injections, brute forcing web applications, and more Book
DescriptionEvery organization has its own data and digital assets
that need to be protected against an ever-growing threat landscape
that compromises the availability, integrity, and confidentiality
of crucial data. Therefore, it is important to train professionals
in the latest defensive security skills and tools to secure them.
Mastering Defensive Security provides you with in-depth knowledge
of the latest cybersecurity threats along with the best tools and
techniques needed to keep your infrastructure secure. The book
begins by establishing a strong foundation of cybersecurity
concepts and advances to explore the latest security technologies
such as Wireshark, Damn Vulnerable Web App (DVWA), Burp Suite,
OpenVAS, and Nmap, hardware threats such as a weaponized Raspberry
Pi, and hardening techniques for Unix, Windows, web applications,
and cloud infrastructures. As you make progress through the
chapters, you'll get to grips with several advanced techniques such
as malware analysis, security automation, computer forensics, and
vulnerability assessment, which will help you to leverage
pentesting for security. By the end of this book, you'll have
become familiar with creating your own defensive security tools
using IoT devices and developed advanced defensive security skills.
What you will learn Become well versed with concepts related to
defensive security Discover strategies and tools to secure the most
vulnerable factor - the user Get hands-on experience using and
configuring the best security tools Understand how to apply
hardening techniques in Windows and Unix environments Leverage
malware analysis and forensics to enhance your security strategy
Secure Internet of Things (IoT) implementations Enhance the
security of web applications and cloud deployments Who this book is
forThis book is for all IT professionals who want to take their
first steps into the world of defensive security; from system
admins and programmers to data analysts and data scientists with an
interest in security. Experienced cybersecurity professionals
working on broadening their knowledge and keeping up to date with
the latest defensive developments will also find plenty of useful
information in this book. You'll need a basic understanding of
networking, IT, servers, virtualization, and cloud platforms before
you get started with this book.
Practical and actionable recipes for using shell and command-line
scripting on your Linux OS with confidence Key Features Learn how
to use the command line and write and debug Linux Shell scripts
Automate complex repetitive tasks and backups, and learn networking
and security A practical approach to system administration, and
virtual machine and software management Book DescriptionLinux
Command Line and Shell Scripting Techniques begins by taking you
through the basics of the shell and command-line utilities. You'll
start by exploring shell commands for file, directory, service,
package, and process management. Next, you'll learn about
networking - network, firewall and DNS client configuration, ssh,
scp, rsync, and vsftpd, as well as some network troubleshooting
tools. You'll also focus on using the command line to find and
manipulate text content, via commands such as cut, egrep, and sed.
As you progress, you'll learn how to use shell scripting. You'll
understand the basics - input and output, along with various
programming concepts such as loops, variables, arguments,
functions, and arrays. Later, you'll learn about shell script
interaction and troubleshooting, before covering a wide range of
examples of complete shell scripts, varying from network and
firewall configuration, through to backup and concepts for creating
live environments. This includes examples of performing scripted
virtual machine installation and administration, LAMP (Linux,
Apache, MySQL, PHP) stack provisioning and bulk user creation for
testing environments. By the end of this Linux book, you'll have
gained the knowledge and confidence you need to use shell and
command-line scripts. What you will learn Get an introduction to
the command line, text editors, and shell scripting Focus on
regular expressions, file handling, and automating complex tasks
Automate common administrative tasks Become well-versed with
networking and system security scripting Get to grips with
repository management and network-based file synchronization Use
loops, arguments, functions, and arrays for task automation Who
this book is forThis book is for anyone looking to learn about
Linux administration via CLI and scripting. Those with no Linux
command-line interface (CLI) experience will benefit from it by
learning from scratch. More experienced Linux administrators or
engineers will also find this book useful, as it will help them
organize their knowledge, fill in any gaps, and work efficiently
with shell scripts to increase productivity.
Gain an understanding of system administration that will remain
applicable throughout your career and understand why tasks are done
rather than how to do them Key Features Deploy, secure, and
maintain your Linux system in the best possible way Discover best
practices to implement core system administration tasks in Linux
Explore real-world decisions, tasks, and solutions involved in
Linux system administration Book DescriptionLinux is a well-known,
open source Unix-family operating system that is the most widely
used OS today. Linux looks set for a bright future for decades to
come, but system administration is rarely studied beyond learning
rote tasks or following vendor guidelines. To truly excel at Linux
administration, you need to understand how these systems work and
learn to make strategic decisions regarding them. Linux
Administration Best Practices helps you to explore best practices
for efficiently administering Linux systems and servers. This Linux
book covers a wide variety of topics from installation and
deployment through to managing permissions, with each topic
beginning with an overview of the key concepts followed by
practical examples of best practices and solutions. You'll find out
how to approach system administration, Linux, and IT in general,
put technology into proper business context, and rethink your
approach to technical decision making. Finally, the book concludes
by helping you to understand best practices for troubleshooting
Linux systems and servers that'll enable you to grow in your career
as well as in any aspect of IT and business. By the end of this
Linux administration book, you'll have gained the knowledge needed
to take your Linux administration skills to the next level. What
you will learn Find out how to conceptualize the system
administrator role Understand the key values of risk assessment in
administration Apply technical skills to the IT business context
Discover best practices for working with Linux specific system
technologies Understand the reasoning behind system administration
best practices Develop out-of-the-box thinking for everything from
reboots to backups to triage Prioritize, triage, and plan for
disasters and recoveries Discover the psychology behind
administration duties Who this book is forThis book is for anyone
looking to fully understand the role and practices of being a
professional system administrator, as well as for system engineers,
system administrators, and anyone in IT or management who wants to
understand the administration career path. The book assumes a basic
understanding of Linux, including the command line, and an
understanding of how to research individual tasks. Basic working
knowledge of Linux systems and servers is expected.
A comprehensive guide for teaching system administrators,
developers, and security professionals how to create their own
systemd units and maintain system security Key Features Maintain
and troubleshoot systemd services with ease Learn to create,
modify, and reload service files and use systemd utilities Use
cgroups to control resource usage and enhance security Book
DescriptionLinux Service Management Made Easy with systemd will
provide you with an in-depth understanding of systemd, so that you
can set up your servers securely and efficiently. This is a
comprehensive guide for Linux administrators that will help you get
the best of systemd, starting with an explanation of the
fundamentals of systemd management. You'll also learn how to edit
and create your own systemd units, which will be particularly
helpful if you need to create custom services or timers and add
features or security to an existing service. Next, you'll find out
how to analyze and fix boot-up challenges and set system
parameters. An overview of cgroups that'll help you control system
resource usage for both processes and users will also be covered,
alongside a practical demonstration on how cgroups are structured,
spotting the differences between cgroups Version 1 and 2, and how
to set resource limits on both. Finally, you'll learn about the
systemd way of performing time-keeping, networking, logging, and
login management. You'll discover how to configure servers
accurately and gather system information to analyze system security
and performance. By the end of this Linux book, you'll be able to
efficiently manage all aspects of a server running the systemd init
system. What you will learn Use basic systemd utilities to manage a
system Create and edit your own systemd units Create services for
Podman-Docker containers Enhance system security by adding
security-related parameters Find important information with
journald Analyze boot-up problems Configure system settings with
systemd utilities Who this book is forThis book is best suited for
Linux administrators who want to learn more about maintaining and
troubleshooting Linux servers. It will also be useful for aspiring
administrators studying for a Linux certification exam, developers
looking to learn how to create systemd unit files, and security
administrators who want to understand the security settings that
can be used in systemd units and how to control resource usage with
cgroups. Before you dive into this book, you'll need a solid
working knowledge of basic Linux commands.
Get to grips with the most common as well as complex Linux
networking configurations, tools, and services to enhance your
professional skills Key Features Learn how to solve critical
networking problems using real-world examples Configure common
networking services step by step in an enterprise environment
Discover how to build infrastructure with an eye toward defense
against common attacks Book DescriptionAs Linux continues to gain
prominence, there has been a rise in network services being
deployed on Linux for cost and flexibility reasons. If you are a
networking professional or an infrastructure engineer involved with
networks, extensive knowledge of Linux networking is a must. This
book will guide you in building a strong foundation of Linux
networking concepts. The book begins by covering various major
distributions, how to pick the right distro, and basic Linux
network configurations. You'll then move on to Linux network
diagnostics, setting up a Linux firewall, and using Linux as a host
for network services. You'll discover a wide range of network
services, why they're important, and how to configure them in an
enterprise environment. Finally, as you work with the example
builds in this Linux book, you'll learn to configure various
services to defend against common attacks. As you advance to the
final chapters, you'll be well on your way towards building the
underpinnings for an all-Linux datacenter. By the end of this book,
you'll be able to not only configure common Linux network services
confidently, but also use tried-and-tested methodologies for future
Linux installations. What you will learn Use Linux as a
troubleshooting and diagnostics platform Explore Linux-based
network services Configure a Linux firewall and set it up for
network services Deploy and configure Domain Name System (DNS) and
Dynamic Host Configuration Protocol (DHCP) services securely
Configure Linux for load balancing, authentication, and
authorization services Use Linux as a logging platform for network
monitoring Deploy and configure Intrusion Prevention Services (IPS)
Set up Honeypot solutions to detect and foil attacks Who this book
is forThis book is for IT and Windows professionals and admins
looking for guidance in managing Linux-based networks. Basic
knowledge of networking is necessary to get started with this book.
Enhance Linux security, application platforms, and virtualization
solutions with SELinux 3 to work within your boundaries, your
rules, and your policies Key Features Learn what SELinux is, and
how it acts as a mandatory access control system on Linux Apply and
tune SELinux enforcement to users, applications, platforms, and
virtualization solutions Use real-life examples and custom policies
to strengthen the security posture of your systems Book
DescriptionLinux is a dominant player in many organizations and in
the cloud. Securing the Linux environment is extremely important
for any organization, and Security-Enhanced Linux (SELinux) acts as
an additional layer to Linux system security. SELinux System
Administration covers basic SELinux concepts and shows you how to
enhance Linux system protection measures. You will get to grips
with SELinux and understand how it is integrated. As you progress,
you'll get hands-on experience of tuning and configuring SELinux
and integrating it into day-to-day administration tasks such as
user management, network management, and application maintenance.
Platforms such as Kubernetes, system services like systemd, and
virtualization solutions like libvirt and Xen, all of which offer
SELinux-specific controls, will be explained effectively so that
you understand how to apply and configure SELinux within these
applications. If applications do not exert the expected behavior,
you'll learn how to fine-tune policies to securely host these
applications. In case no policies exist, the book will guide you
through developing custom policies on your own. By the end of this
Linux book, you'll be able to harden any Linux system using SELinux
to suit your needs and fine-tune existing policies and develop
custom ones to protect any app and service running on your Linux
systems. What you will learn Understand what SELinux is and how it
is integrated into Linux Tune Linux security using policies and
their configurable settings Manage Linux users with least-privilege
roles and access controls Use SELinux controls in system services
and virtualization solutions Analyze SELinux behavior through log
events and policy analysis tools Protect systems against unexpected
and malicious behavior Enhance existing policies or develop custom
ones Who this book is forThis Linux sysadmin book is for Linux
administrators who want to control the secure state of their
systems using SELinux, and for security professionals who have
experience in maintaining a Linux system and want to know about
SELinux. Experience in maintaining Linux systems, covering user
management, software installation and maintenance, Linux security
controls, and network configuration is required to get the most out
of this book.
Develop a solid understanding of cloud computing, Linux virtual
machine, container virtualization, and other fundamental concepts
to create and manage your Linux workload in Azure Key Features
Deploy and manage virtual machines in the Azure environment Explore
open source tools to integrate automation and orchestration
Implement Linux features to create and manage containers Book
DescriptionThanks to its flexibility in delivering scalable cloud
solutions, Microsoft Azure is a suitable platform for managing all
your workloads. You can use it to implement Linux virtual machines
and containers, and to create applications in open source languages
with open APIs. This Linux administration book first takes you
through the fundamentals of Linux and Azure to prepare you for the
more advanced Linux features in later chapters. With the help of
real-world examples, you'll learn how to deploy virtual machines
(VMs) in Azure, expand their capabilities, and manage them
efficiently. You will manage containers and use them to run
applications reliably, and in the concluding chapter, you'll
explore troubleshooting techniques using a variety of open source
tools. By the end of this book, you'll be proficient in
administering Linux on Azure and leveraging the tools required for
deployment. What you will learn Grasp the fundamentals of
virtualization and cloud computing Understand file hierarchy and
mount new filesystems Maintain the life cycle of your application
in Azure Kubernetes Service Manage resources with the Azure CLI and
PowerShell Manage users, groups, and filesystem permissions Use
Azure Resource Manager to redeploy virtual machines Implement
configuration management to configure a VM correctly Build a
container using Docker Who this book is forIf you are a Linux
administrator or a Microsoft professional looking to deploy and
manage your workload in Azure, this book is for you. Although not
necessary, knowledge of Linux and Azure will assist with
understanding core concepts.
|
You may like...
Sudo Mastery
Michael W Lucas
Hardcover
R963
R868
Discovery Miles 8 680
Only Footnotes
Michael W Lucas
Hardcover
R595
R565
Discovery Miles 5 650
|