|
|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > Unix, Unix Linux & Unix TCL/TK
Learn to efficiently run Linux-based workloads in Azure Key
Features Manage and deploy virtual machines in your Azure
environment Explore various open source tools to integrate
automation and orchestration Leverage Linux features to create,
run, and manage containers Book DescriptionAzure's market share has
increased massively and enterprises are adopting it rapidly. Linux
is a widely-used operating system and has proven to be one of the
most popular workloads on Azure. It has become crucial for Linux
administrators and Microsoft professionals to be well versed with
the concepts of managing Linux workloads in an Azure environment.
Hands-On Linux Administration on Azure starts by introducing you to
the fundamentals of Linux and Azure, after which you will explore
advanced Linux features and see how they are managed in an Azure
environment. Next, with the help of real-world scenarios, you will
learn how to deploy virtual machines(VMs) in Azure, along with
extending Azure VMs capabilities and managing them efficiently. You
will then understand continuous configuration automation and use
Ansible, SaltStack and Powershell DSC for orchestration. As you
make your way through the chapters, you will understand containers
and how they work, along with managing containers and the various
tasks you can perform with them. In the concluding chapters, you
will cover some Linux troubleshooting techniques on Azure, and you
will also be able to monitor Linux in Azure using different open
source tools. By the end of this book, you will be able to
administer Linux on Azure and make the most of the important tools
required for deployment. What you will learn Understand why Azure
is the ideal solution for your open source workloads Master
essential Linux skills and learn to find your way around the Linux
environment Deploy Linux in an Azure environment Use configuration
management to manage Linux in Azure Manage containers in an Azure
environment Enhance Linux security and use Azure's identity
management systems Automate deployment with Azure Resource Manager
(ARM) and Powershell Employ Ansible to manage Linux instances in an
Azure cloud environment Who this book is forHands-On Linux
Administration on Azure is for Linux administrators and Microsoft
professionals that need to deploy and manage their workloads in
Azure. Prior knowledge of Linux and Azure isn't necessary.
Gain hands-on experience of installing OpenShift Origin 3.9 in a
production configuration and managing applications using the
platform you built Key Features Gain hands-on experience of working
with Kubernetes and Docker Learn how to deploy and manage
applications in OpenShift Get a practical approach to managing
applications on a cloud-based platform Explore multi-site and HA
architectures of OpenShift for production Book DescriptionDocker
containers transform application delivery technologies to make them
faster and more reproducible, and to reduce the amount of time
wasted on configuration. Managing Docker containers in the
multi-node or multi-datacenter environment is a big challenge,
which is why container management platforms are required. OpenShift
is a new generation of container management platforms built on top
of both Docker and Kubernetes. It brings additional functionality
to the table, something that is lacking in Kubernetes. This new
functionality significantly helps software development teams to
bring software development processes to a whole new level. In this
book, we'll start by explaining the container architecture, Docker,
and CRI-O overviews. Then, we'll look at container orchestration
and Kubernetes. We'll cover OpenShift installation, and its basic
and advanced components. Moving on, we'll deep dive into concepts
such as deploying application OpenShift. You'll learn how to set up
an end-to-end delivery pipeline while working with applications in
OpenShift as a developer or DevOps. Finally, you'll discover how to
properly design OpenShift in production environments. This book
gives you hands-on experience of designing, building, and operating
OpenShift Origin 3.9, as well as building new applications or
migrating existing applications to OpenShift. What you will learn
Understand the core concepts behind containers and container
orchestration tools Understand Docker, Kubernetes, and OpenShift,
and their relation to CRI-O Install and work with Kubernetes and
OpenShift Understand how to work with persistent storage in
OpenShift Understand basic and advanced components of OpenShift,
including security and networking Manage deployment strategies and
application's migration in OpenShift Understand and design
OpenShift high availability Who this book is forThe book is for
system administrators, DevOps engineers, solutions architects, or
any stakeholder who wants to understand the concept and business
value of OpenShift.
Achieve enterprise automation in your Linux environment with this
comprehensive guide Key Features Automate your Linux infrastructure
with the help of practical use cases and real-world scenarios Learn
to plan, build, manage, and customize OS releases in your
environment Enhance the scalability and efficiency of your
infrastructure with advanced Linux system administration concepts
Book DescriptionAutomation is paramount if you want to run Linux in
your enterprise effectively. It helps you minimize costs by
reducing manual operations, ensuring compliance across data
centers, and accelerating deployments for your cloud
infrastructures. Complete with detailed explanations, practical
examples, and self-assessment questions, this book will teach you
how to manage your Linux estate and leverage Ansible to achieve
effective levels of automation. You'll learn important concepts on
standard operating environments that lend themselves to automation,
and then build on this knowledge by applying Ansible to achieve
standardization throughout your Linux environments. By the end of
this Linux automation book, you'll be able to build, deploy, and
manage an entire estate of Linux servers with higher reliability
and lower overheads than ever before. What you will learn Perform
large-scale automation of Linux environments in an enterprise
Overcome the common challenges and pitfalls of extensive automation
Define the business processes needed to support a large-scale Linux
environment Get well-versed with the most effective and reliable
patch management strategies Automate a range of tasks from simple
user account changes to complex security policy enforcement Learn
best practices and procedures to make your Linux environment
automatable Who this book is forThis book is for anyone who has a
Linux environment to design, implement, and maintain. Open source
professionals including infrastructure architects and system
administrators will find this book useful. You're expected to have
experience in implementing and maintaining Linux servers along with
knowledge of building, patching, and maintaining server
infrastructure. Although not necessary, knowledge of Ansible or
other automation technologies will be beneficial.
Build your defense against web attacks with Kali Linux, including
command injection flaws, crypto implementation layers, and web
application security holes Key Features Know how to set up your lab
with Kali Linux Discover the core concepts of web penetration
testing Get the tools and techniques you need with Kali Linux Book
DescriptionWeb Penetration Testing with Kali Linux - Third Edition
shows you how to set up a lab, helps you understand the nature and
mechanics of attacking websites, and explains classical attacks in
great depth. This edition is heavily updated for the latest Kali
Linux changes and the most recent attacks. Kali Linux shines when
it comes to client-side attacks and fuzzing in particular. From the
start of the book, you'll be given a thorough grounding in the
concepts of hacking and penetration testing, and you'll see the
tools used in Kali Linux that relate to web application hacking.
You'll gain a deep understanding of classicalSQL, command-injection
flaws, and the many ways to exploit these flaws. Web penetration
testing also needs a general overview of client-side attacks, which
is rounded out by a long discussion of scripting and input
validation flaws. There is also an important chapter on
cryptographic implementation flaws, where we discuss the most
recent problems with cryptographic layers in the networking stack.
The importance of these attacks cannot be overstated, and defending
against them is relevant to most internet users and, of course,
penetration testers. At the end of the book, you'll use an
automated technique called fuzzing to identify flaws in a web
application. Finally, you'll gain an understanding of web
application vulnerabilities and the ways they can be exploited
using the tools in Kali Linux. What you will learn Learn how to set
up your lab with Kali Linux Understand the core concepts of web
penetration testing Get to know the tools and techniques you need
to use with Kali Linux Identify the difference between hacking a
web application and network hacking Expose vulnerabilities present
in web servers and their applications using server-side attacks
Understand the different techniques used to identify the flavor of
web applications See standard attacks such as exploiting cross-site
request forgery and cross-site scripting flaws Get an overview of
the art of client-side attacks Explore automated attacks such as
fuzzing web applications Who this book is forSince this book sets
out to cover a large number of tools and security fields, it can
work as an introduction to practical security skills for beginners
in security. In addition, web programmers and also system
administrators would benefit from this rigorous introduction to web
penetration testing. Basic system administration skills are
necessary, and the ability to read code is a must.
Over 120 recipes to perform advanced penetration testing with Kali
Linux About This Book * Practical recipes to conduct effective
penetration testing using the powerful Kali Linux * Leverage tools
like Metasploit, Wireshark, Nmap, and many more to detect
vulnerabilities with ease * Confidently perform networking and
application attacks using task-oriented recipes Who This Book Is
For This book is aimed at IT security professionals, pentesters,
and security analysts who have basic knowledge of Kali Linux and
want to conduct advanced penetration testing techniques. What You
Will Learn * Installing, setting up and customizing Kali for
pentesting on multiple platforms * Pentesting routers and embedded
devices * Bug hunting 2017 * Pwning and escalating through
corporate network * Buffer over?ows 101 * Auditing wireless
networks * Fiddling around with software-defned radio * Hacking on
the run with NetHunter * Writing good quality reports In Detail
With the current rate of hacking, it is very important to pentest
your environment in order to ensure advanced-level security. This
book is packed with practical recipes that will quickly get you
started with Kali Linux (version 2016.2) according to your needs,
and move on to core functionalities. This book will start with the
installation and configuration of Kali Linux so that you can
perform your tests. You will learn how to plan attack strategies
and perform web application exploitation using tools such as Burp,
and Jexboss. You will also learn how to perform network
exploitation using Metasploit, Sparta, and Wireshark. Next, you
will perform wireless and password attacks using tools such as
Patator, John the Ripper, and airoscript-ng. Lastly, you will learn
how to create an optimum quality pentest report! By the end of this
book, you will know how to conduct advanced penetration testing
thanks to the book's crisp and task-oriented recipes. Style and
approach This is a recipe-based book that allows you to venture
into some of the most cutting-edge practices and techniques to
perform penetration testing with Kali Linux.
Explore the latest ethical hacking tools and techniques in Kali
Linux 2019 to perform penetration testing from scratch Key Features
Get up and running with Kali Linux 2019.2 Gain comprehensive
insights into security concepts such as social engineering,
wireless network exploitation, and web application attacks Learn to
use Linux commands in the way ethical hackers do to gain control of
your environment Book DescriptionThe current rise in hacking and
security breaches makes it more important than ever to effectively
pentest your environment, ensuring endpoint protection. This book
will take you through the latest version of Kali Linux and help you
use various tools and techniques to efficiently deal with crucial
security aspects. Through real-world examples, you'll understand
how to set up a lab and later explore core penetration testing
concepts. Throughout the course of this book, you'll get up to
speed with gathering sensitive information and even discover
different vulnerability assessment tools bundled in Kali Linux
2019. In later chapters, you'll gain insights into concepts such as
social engineering, attacking wireless networks, exploitation of
web applications and remote access connections to further build on
your pentesting skills. You'll also focus on techniques such as
bypassing controls, attacking the end user and maintaining
persistence access through social media. Finally, this pentesting
book covers best practices for performing complex penetration
testing techniques in a highly secured environment. By the end of
this book, you'll be able to use Kali Linux to detect
vulnerabilities and secure your system by applying penetration
testing techniques of varying complexity. What you will learn
Explore the fundamentals of ethical hacking Learn how to install
and configure Kali Linux Get up to speed with performing wireless
network pentesting Gain insights into passive and active
information gathering Understand web application pentesting Decode
WEP, WPA, and WPA2 encryptions using a variety of methods, such as
the fake authentication attack, the ARP request replay attack, and
the dictionary attack Who this book is forIf you are an IT security
professional or a security consultant who wants to get started with
penetration testing using Kali Linux 2019.2, then this book is for
you. The book will also help if you're simply looking to learn more
about ethical hacking and various security breaches. Although prior
knowledge of Kali Linux is not necessary, some understanding of
cybersecurity will be useful.
Over 30 recipes to develop custom drivers for your embedded Linux
applications. Key Features Use Kernel facilities to develop
powerful drivers Via a practical approach, learn core concepts of
developing device drivers Program a custom character device to get
access to kernel internals Book DescriptionLinux is a unified
kernel that is widely used to develop embedded systems. As Linux
has turned out to be one of the most popular operating systems
used, the interest in developing proprietary device drivers has
also increased. Device drivers play a critical role in how the
system performs and ensures that the device works in the manner
intended. By offering several examples on the development of
character devices and how to use other kernel internals, such as
interrupts, kernel timers, and wait queue, as well as how to manage
a device tree, you will be able to add proper management for custom
peripherals to your embedded system. You will begin by installing
the Linux kernel and then configuring it. Once you have installed
the system, you will learn to use the different kernel features and
the character drivers. You will also cover interrupts in-depth and
how you can manage them. Later, you will get into the kernel
internals required for developing applications. Next, you will
implement advanced character drivers and also become an expert in
writing important Linux device drivers. By the end of the book, you
will be able to easily write a custom character driver and kernel
code as per your requirements. What you will learn Become familiar
with the latest kernel releases (4.19+/5.x) running on the
ESPRESSObin devkit, an ARM 64-bit machine Download, configure,
modify, and build kernel sources Add and remove a device driver or
a module from the kernel Master kernel programming Understand how
to implement character drivers to manage different kinds of
computer peripherals Become well versed with kernel helper
functions and objects that can be used to build kernel applications
Acquire a knowledge of in-depth concepts to manage custom hardware
with Linux from both the kernel and user space Who this book is
forThis book will help anyone who wants to develop their own Linux
device drivers for embedded systems. Having basic hand-on with
Linux operating system and embedded concepts is necessary.
|
You may like...
Bays
Fat Freddys Drop
CD
R361
Discovery Miles 3 610
Revival Fire
Wesley L. Duewel
Paperback
R409
Discovery Miles 4 090
|