|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > Unix, Unix Linux & Unix TCL/TK
Achieve enterprise automation in your Linux environment with this
comprehensive guide Key Features Automate your Linux infrastructure
with the help of practical use cases and real-world scenarios Learn
to plan, build, manage, and customize OS releases in your
environment Enhance the scalability and efficiency of your
infrastructure with advanced Linux system administration concepts
Book DescriptionAutomation is paramount if you want to run Linux in
your enterprise effectively. It helps you minimize costs by
reducing manual operations, ensuring compliance across data
centers, and accelerating deployments for your cloud
infrastructures. Complete with detailed explanations, practical
examples, and self-assessment questions, this book will teach you
how to manage your Linux estate and leverage Ansible to achieve
effective levels of automation. You'll learn important concepts on
standard operating environments that lend themselves to automation,
and then build on this knowledge by applying Ansible to achieve
standardization throughout your Linux environments. By the end of
this Linux automation book, you'll be able to build, deploy, and
manage an entire estate of Linux servers with higher reliability
and lower overheads than ever before. What you will learn Perform
large-scale automation of Linux environments in an enterprise
Overcome the common challenges and pitfalls of extensive automation
Define the business processes needed to support a large-scale Linux
environment Get well-versed with the most effective and reliable
patch management strategies Automate a range of tasks from simple
user account changes to complex security policy enforcement Learn
best practices and procedures to make your Linux environment
automatable Who this book is forThis book is for anyone who has a
Linux environment to design, implement, and maintain. Open source
professionals including infrastructure architects and system
administrators will find this book useful. You're expected to have
experience in implementing and maintaining Linux servers along with
knowledge of building, patching, and maintaining server
infrastructure. Although not necessary, knowledge of Ansible or
other automation technologies will be beneficial.
Android Things is the new Android based Operating System for the
Internet of Things. With this book you will learn the core concepts
by running code examples on different peripherals. Key Features No
previous knowledge of IoT or microcontrollers required. Hands-On
with simple code and plenty of examples. Use Kotlin to write
simpler and more readable code Book DescriptionAndroid Things is
the IoT platform made by Google, based on Android. It allows us to
build smart devices in a simple and convenient way, leveraging on
the Android ecosystem tools and libraries, while letting Google
take care of security updates. This book takes you through the
basics of IoT and smart devices. It will help you to interact with
common IoT device components and learn the underlying protocols.
For a simple setup, we will be using Rainbow HAT so that we don't
need to do any wiring. In the first chapter, you will learn about
the Android Things platform, the design concepts behind it, and how
it relates to other IoT frameworks. We will look at the Developer
Kits and learn how to install Android Things on them by creating a
simple project. Later, we will explore the real power of Android
Things, learning how to make a UI, designing and communicating with
companion apps in different ways, showcasing a few libraries. We
will demonstrate libraries and you will see how powerful the
Android Things operating system is. What you will learn Understand
key design concepts of Android Things and its advantages Set up an
Android Things Developer Kit Interact with all the components of
Rainbow HAT Understand how peripheral protocols work (GPIO, PWM,
I2C, and SPI) Implement best practices of how to handle IoT
peripherals with in terms Android Things Develop techniques for
building companion apps for your devices Who this book is forThis
book is for developers who have a basic knowledge of Android and
want to start using the Android Things developer kit.
Enhance file system security and learn about network attack,
security tools and different versions of Linux build. Key Features
Hands-on recipes to create and administer a secure Linux system
Enhance file system security and local and remote user
authentication Use various security tools and different versions of
Linux for different tasks Book DescriptionOver the last few years,
system security has gained a lot of momentum and software
professionals are focusing heavily on it. Linux is often treated as
a highly secure operating system. However, the reality is that
Linux has its share of security flaws, and these security flaws
allow attackers to get into your system and modify or even destroy
your important data. But there's no need to panic, since there are
various mechanisms by which these flaws can be removed, and this
book will help you learn about different types of Linux security to
create a more secure Linux system. With a step-by-step recipe
approach, the book starts by introducing you to various threats to
Linux systems. Then, this book will walk you through customizing
the Linux kernel and securing local files. Next, you will move on
to managing user authentication both locally and remotely and
mitigating network attacks. Later, you will learn about application
security and kernel vulnerabilities. You will also learn about
patching Bash vulnerability, packet filtering, handling incidents,
and monitoring system logs. Finally, you will learn about auditing
using system services and performing vulnerability scanning on
Linux. By the end of this book, you will be able to secure your
Linux systems and create a robust environment. What you will learn
Learn about vulnerabilities and exploits in relation to Linux
systems Configure and build a secure kernel and test it Learn about
file permissions and how to securely modify files Authenticate
users remotely and securely copy files on remote systems Review
different network security methods and tools Perform vulnerability
scanning on Linux machines using tools Learn about malware scanning
and read through logs Who this book is forThis book is intended for
all those Linux users who already have knowledge of Linux file
systems and administration. You should be familiar with basic Linux
commands. Understanding information security and its risks to a
Linux system is also helpful in understanding the recipes more
easily.
Discover the most common web vulnerabilities and prevent them from
becoming a threat to your site's security Key Features Familiarize
yourself with the most common web vulnerabilities Conduct a
preliminary assessment of attack surfaces and run exploits in your
lab Explore new tools in the Kali Linux ecosystem for web
penetration testing Book DescriptionWeb applications are a huge
point of attack for malicious hackers and a critical area for
security professionals and penetration testers to lock down and
secure. Kali Linux is a Linux-based penetration testing platform
that provides a broad array of testing tools, many of which can be
used to execute web penetration testing. Kali Linux Web Penetration
Testing Cookbook gives you the skills you need to cover every stage
of a penetration test - from gathering information about the system
and application, to identifying vulnerabilities through manual
testing. You will also cover the use of vulnerability scanners and
look at basic and advanced exploitation techniques that may lead to
a full system compromise. You will start by setting up a testing
laboratory, exploring the latest features of tools included in Kali
Linux and performing a wide range of tasks with OWASP ZAP, Burp
Suite and other web proxies and security testing tools. As you make
your way through the book, you will learn how to use automated
scanners to find security flaws in web applications and understand
how to bypass basic security controls. In the concluding chapters,
you will look at what you have learned in the context of the Open
Web Application Security Project (OWASP) and the top 10 web
application vulnerabilities you are most likely to encounter,
equipping you with the ability to combat them effectively. By the
end of this book, you will have acquired the skills you need to
identify, exploit, and prevent web application vulnerabilities.
What you will learn Set up a secure penetration testing laboratory
Use proxies, crawlers, and spiders to investigate an entire website
Identify cross-site scripting and client-side vulnerabilities
Exploit vulnerabilities that allow the insertion of code into web
applications Exploit vulnerabilities that require complex setups
Improve testing efficiency using automated vulnerability scanners
Learn how to circumvent security controls put in place to prevent
attacks Who this book is forKali Linux Web Penetration Testing
Cookbook is for IT professionals, web developers, security
enthusiasts, and security professionals who want an accessible
reference on how to find, exploit, and prevent security
vulnerabilities in web applications. The basics of operating a
Linux environment and prior exposure to security technologies and
tools are necessary.
Explore practical use cases to learn everything from Linux
components, and functionalities, through to hardware and software
support Key Features Gain a clear understanding of how to design a
Linux environment Learn more about the architecture of the modern
Linux operating system(OS) Understand infrastructure needs and
design a high-performing computing environment Book DescriptionIt
is very important to understand the flexibility of an
infrastructure when designing an efficient environment. In this
book, you will cover everything from Linux components and
functionalities through to hardware and software support, which
will help you to implement and tune effective Linux-based
solutions. This book gets started with an overview of Linux design
methodology. Next, you will focus on the core concepts of designing
a solution. As you progress, you will gain insights into the kinds
of decisions you need to make when deploying a high-performance
solution using Gluster File System (GlusterFS). In the next set of
chapters, the book will guide you through the technique of using
Kubernetes as an orchestrator for deploying and managing
containerized applications. In addition to this, you will learn how
to apply and configure Kubernetes for your NGINX application.
You'll then learn how to implement an ELK stack, which is composed
of Elasticsearch, Logstash, and Kibana. In the concluding chapters,
you will focus on installing and configuring a Saltstack solution
to manage different Linux distributions, and explore a variety of
design best practices. By the end of this book, you will be
well-versed with designing a high-performing computing environment
for complex applications to run on. By the end of the book, you
will have delved inside the most detailed technical conditions of
designing a solution, and you will have also dissected every aspect
in detail in order to implement and tune open source Linux-based
solutions What you will learn Study the basics of infrastructure
design and the steps involved Expand your current design portfolio
with Linux-based solutions Discover open source software-based
solutions to optimize your architecture Understand the role of high
availability and fault tolerance in a resilient design Identify the
role of containers and how they improve your continuous integration
and continuous deployment pipelines Gain insights into optimizing
and making resilient and highly available designs by applying
industry best practices Who this book is forThis intermediate-level
book is for Linux system administrators, Linux support engineers,
DevOps engineers, Linux consultants or any open source technology
professional looking to learn or expand their knowledge in
architecting, designing and implementing solutions based on Linux
and open source software. Prior experience in Linux is required.
Deploy functions efficiently using different cloud-based serverless
offerings Key Features Understand the concept of
Function-as-a-Service Implement Serverless solutions using AWS
Lambda, Azure Functions and Google Cloud Functions Practical
approach towards choosing the best tool for your serverless
environment Book DescriptionServerless applications and
architectures are gaining momentum and are increasingly being used
by companies of all sizes. Serverless software takes care of many
problems that developers face when running systems and servers,
such as fault tolerance, centralized logging, horizontal
scalability, and deployments. You will learn how to harness
serverless technology to rapidly reduce production time and
minimize your costs, while still having the freedom to customize
your code, without hindering functionality. Upon finishing the
book, you will have the knowledge and resources to build your own
serverless application hosted in AWS, Microsoft Azure, or Google
Cloud Platform, and will have experienced the benefits of
event-driven technology for yourself. This hands-on guide dives
into the basis of serverless architectures and how to build them
using Node.js as a programming language, Visual Studio Code for
code editing, and Postman for quickly and securely developing
applications without the hassle of configuring and maintaining
infrastructure on three public cloud platforms. What you will learn
Understand the benefts of serverless computing and know when to use
it Develop serverless applications on AWS, Azure, and Google Cloud
Get to grips with Function as a Service (FaaS) Apply triggers to
serverless functions Build event-driven apps using serverless
frameworks Use the Node.js programming language to build serverless
apps Use code editors, such as Visual Studio Code, as development
environments Master the best development practices for creating
scalable and practical solutions Who this book is forThis book is
targeted towards developers, system administrators or any
stakeholder working in the Serverless environment and want to
understand how functions work. Basic idea of serverless
architecture can be an added advantage
Explore the latest ethical hacking tools and techniques in Kali
Linux 2019 to perform penetration testing from scratch Key Features
Get up and running with Kali Linux 2019.2 Gain comprehensive
insights into security concepts such as social engineering,
wireless network exploitation, and web application attacks Learn to
use Linux commands in the way ethical hackers do to gain control of
your environment Book DescriptionThe current rise in hacking and
security breaches makes it more important than ever to effectively
pentest your environment, ensuring endpoint protection. This book
will take you through the latest version of Kali Linux and help you
use various tools and techniques to efficiently deal with crucial
security aspects. Through real-world examples, you'll understand
how to set up a lab and later explore core penetration testing
concepts. Throughout the course of this book, you'll get up to
speed with gathering sensitive information and even discover
different vulnerability assessment tools bundled in Kali Linux
2019. In later chapters, you'll gain insights into concepts such as
social engineering, attacking wireless networks, exploitation of
web applications and remote access connections to further build on
your pentesting skills. You'll also focus on techniques such as
bypassing controls, attacking the end user and maintaining
persistence access through social media. Finally, this pentesting
book covers best practices for performing complex penetration
testing techniques in a highly secured environment. By the end of
this book, you'll be able to use Kali Linux to detect
vulnerabilities and secure your system by applying penetration
testing techniques of varying complexity. What you will learn
Explore the fundamentals of ethical hacking Learn how to install
and configure Kali Linux Get up to speed with performing wireless
network pentesting Gain insights into passive and active
information gathering Understand web application pentesting Decode
WEP, WPA, and WPA2 encryptions using a variety of methods, such as
the fake authentication attack, the ARP request replay attack, and
the dictionary attack Who this book is forIf you are an IT security
professional or a security consultant who wants to get started with
penetration testing using Kali Linux 2019.2, then this book is for
you. The book will also help if you're simply looking to learn more
about ethical hacking and various security breaches. Although prior
knowledge of Kali Linux is not necessary, some understanding of
cybersecurity will be useful.
Break through the practice of writing tedious code with shell
scripts Key Features Learn to impeccably build shell scripts and
develop advanced applications Create smart solutions by writing and
debugging scripts A step-by-step tutorial to automate routine tasks
by developing scripts Book DescriptionLinux is the most powerful
and universally adopted OS. Shell is a program that gives the user
direct interaction with the operating system. Scripts are
collections of commands that are stored in a file. The shell reads
this file and acts on commands as if they were typed on the
keyboard. Learning Linux Shell Scripting covers Bash, GNU Bourne
Again Shell, preparing you to work in the exciting world of Linux
shell scripting. CentOS is a popular rpm-based stable and secured
Linux distribution. Therefore, we have used CentOS distribution
instead of Ubuntu distribution. Linux Shell Scripting is
independent of Linux distributions, but we have covered both types
of distros. We start with an introduction to the Shell environment
and basic commands used. Next, we explore process management in
Linux OS, real-world essentials such as debugging and perform Shell
arithmetic fluently. You'll then take a step ahead and learn new
and advanced topics in Shell scripting, such as decision making,
starting up a system, and customizing a Linux environment. You will
also learn about grep, stream editor, and AWK, which are very
powerful text filters and editors. Finally, you'll get to grips
with taking backup, using other language scripts in Shell Scripts
as well as automating database administration tasks for MySQL and
Oracle. By the end of this book, you will be able to confidently
use your own shell scripts in the real world. What you will learn
Familiarize yourself with the various text filtering tools
available in Linux Understand expressions and variables and how to
use them practically Automate decision-making and save a lot of
time and effort of revisiting code Get to grips with advanced
functionality such as using traps, dialogs to develop screens &
Database administration such as MySQL or Oracle Start up a system
and customize a Linux system Taking backup of local or remote data
or important files. Use existing other language scripts such as
Python, Perl & Ruby in Shell Scripts Who this book is
forLearning Linux Shell Scripting is ideal for those who are
proficient at working with Linux and want to learn about shell
scripting to improve their efficiency and practical skills.
Master the concepts and techniques that will help you gain the
LX0-103 and LX0-104 certifications on your first attempt Key
Features Get a clear understanding of how to achieve the Linux+
certification Explore system architecture, shell scripts, data
management, and Linux security Work through practice and mock tests
to pass both LX0-103 and LX0-104 exams Book DescriptionLinux+
certification demonstrates technical competency and provides a
broad awareness of Linux operating systems. Professionals who have
achieved the Linux+ certification exhibit all-important knowledge
of installation, operation, administration, and troubleshooting
services. The CompTIA Linux+ Certification Guide is an overview of
the certification that gives you insights into the system
architecture. You'll understand how to install and uninstall Linux
distributions, followed by working with various package managers.
Once you've grasped all this, you'll move on to manipulating files
and processes at command-line interface (CLI) and creating,
monitoring, killing, restarting, and modifying processes. As you
progress, you'll be equipped to work with display managers and
learn how to create, modify, and remove user accounts and groups,
as well as understand how to automate tasks. The last set of
chapters helps you configure dates and set up local and remote
system logging. In addition to this, you'll explore different
internet protocols, along with discovering network configuration,
security administration, Shell scripting, and SQL management. By
the end of this book, you'll not only have got to grips with all
the modules using practice questions and mock exams, but you'll
also be well prepared to pass the LX0-103 and LX0-104 certification
exams. What you will learn Understand the Linux system architecture
Install, upgrade, and manage Linux system packages Configure
devices and maintain the Linux filesystem Manage the Shell
environment, write scripts, and manage data Set user interfaces and
desktops in the Linux operating system Automate system admin tasks
and manage essential system services Manage SQL server on Linux and
log locally and remotely with rsyslogd Administer network and local
security Who this book is forThe CompTIA Linux+ Certification Guide
is for you if you want to gain the CompTIA Linux+ certificate. This
guide is also for system administrators and rookie Linux
professionals interested in enhancing their Linux and Shell
scripting skills. No prior knowledge of Linux is needed, although
some understanding of Shell scripting would be helpful.
Enhance your software deployment workflow using containers Key
Features Get up-and-running with basic to advanced concepts of
Docker Get acquainted with concepts such as Docker containers,
Docker images, orchestrators and so on. Practical test-based
approach to learning a prominent containerization tool Book
DescriptionDocker containers have revolutionized the software
supply chain in small and big enterprises. Never before has a new
technology so rapidly penetrated the top 500 enterprises worldwide.
Companies that embrace containers and containerize their
traditional mission-critical applications have reported savings of
at least 50% in total maintenance cost and a reduction of 90% (or
more) of the time required to deploy new versions of those
applications. Furthermore they are benefitting from increased
security just by using containers as opposed to running
applications outside containers. This book starts from scratch,
introducing you to Docker fundamentals and setting up an
environment to work with it. Then we delve into concepts such as
Docker containers, Docker images, Docker Compose, and so on. We
will also cover the concepts of deployment, orchestration,
networking, and security. Furthermore, we explain Docker
functionalities on public clouds such as AWS. By the end of this
book, you will have hands-on experience working with Docker
containers and orchestrators such as SwarmKit and Kubernetes. What
you will learn Containerize your traditional or microservice-based
application Share or ship your application as an immutable
container image Build a Docker swarm and a Kubernetes cluster in
the cloud Run a highly distributed application using Docker Swarm
or Kubernetes Update or rollback a distributed application with
zero downtime Secure your applications via encapsulation, networks,
and secrets Know your options when deploying your containerized app
into the cloud Who this book is forThis book is targeted at system
administrators, operations engineers, DevOps engineers, and
developers or stakeholders who are interested in getting started
with Docker from scratch. No prior experience with Docker
Containers is required.
|
|