|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > Unix, Unix Linux & Unix TCL/TK
Achieve enterprise automation in your Linux environment with this
comprehensive guide Key Features Automate your Linux infrastructure
with the help of practical use cases and real-world scenarios Learn
to plan, build, manage, and customize OS releases in your
environment Enhance the scalability and efficiency of your
infrastructure with advanced Linux system administration concepts
Book DescriptionAutomation is paramount if you want to run Linux in
your enterprise effectively. It helps you minimize costs by
reducing manual operations, ensuring compliance across data
centers, and accelerating deployments for your cloud
infrastructures. Complete with detailed explanations, practical
examples, and self-assessment questions, this book will teach you
how to manage your Linux estate and leverage Ansible to achieve
effective levels of automation. You'll learn important concepts on
standard operating environments that lend themselves to automation,
and then build on this knowledge by applying Ansible to achieve
standardization throughout your Linux environments. By the end of
this Linux automation book, you'll be able to build, deploy, and
manage an entire estate of Linux servers with higher reliability
and lower overheads than ever before. What you will learn Perform
large-scale automation of Linux environments in an enterprise
Overcome the common challenges and pitfalls of extensive automation
Define the business processes needed to support a large-scale Linux
environment Get well-versed with the most effective and reliable
patch management strategies Automate a range of tasks from simple
user account changes to complex security policy enforcement Learn
best practices and procedures to make your Linux environment
automatable Who this book is forThis book is for anyone who has a
Linux environment to design, implement, and maintain. Open source
professionals including infrastructure architects and system
administrators will find this book useful. You're expected to have
experience in implementing and maintaining Linux servers along with
knowledge of building, patching, and maintaining server
infrastructure. Although not necessary, knowledge of Ansible or
other automation technologies will be beneficial.
Over 150 recipes to leverage Microsoft's open source automation
framework and command line shell Key Features Work effectively on
Windows, Linux, and macOS with PowerShell's object-oriented
approach and capabilities Handle structured data seamlessly without
the need for manual parsing Enhance your native Linux capabilities
with PowerShell Core 6.1 Book DescriptionPowerShell Core, the open
source, cross-platform that is based on the open source,
cross-platform .NET Core, is not a shell that came out by accident;
it was intentionally created to be versatile and easy to learn at
the same time. PowerShell Core enables automation on systems
ranging from the Raspberry Pi to the cloud. PowerShell Core for
Linux Administrators Cookbook uses simple, real-world examples that
teach you how to use PowerShell to effectively administer your
environment. As you make your way through the book, you will cover
interesting recipes on how PowerShell Core can be used to quickly
automate complex, repetitive, and time-consuming tasks. In the
concluding chapters, you will learn how to develop scripts to
automate tasks that involve systems and enterprise management. By
the end of this book, you will have learned about the automation
capabilities of PowerShell Core, including remote management using
OpenSSH, cross-platform enterprise management, working with Docker
containers, and managing SQL databases. What you will learn
Leverage the object model of the shell, which is based on .NET Core
Administer computers locally as well as remotely using PowerShell
over OpenSSH Get to grips with advanced concepts of PowerShell
functions Use PowerShell for administration on the cloud Know the
best practices pertaining to PowerShell scripts and functions
Exploit the cross-platform capabilities of PowerShell to manage
scheduled jobs, Docker containers and SQL Databases Who this book
is forPowerShell Core for Linux Administrators Cookbook is for you
if you are a system administrator who wants to learn to control and
automate a Linux environment with PowerShell Core 6.1. Basic
knowledge of PowerShell scripting is necessary. It is assumed that
you already understand how an operating system is structured and
how to use the command-line interface to work with the operating
system.
Explore the latest ethical hacking tools and techniques in Kali
Linux 2019 to perform penetration testing from scratch Key Features
Get up and running with Kali Linux 2019.2 Gain comprehensive
insights into security concepts such as social engineering,
wireless network exploitation, and web application attacks Learn to
use Linux commands in the way ethical hackers do to gain control of
your environment Book DescriptionThe current rise in hacking and
security breaches makes it more important than ever to effectively
pentest your environment, ensuring endpoint protection. This book
will take you through the latest version of Kali Linux and help you
use various tools and techniques to efficiently deal with crucial
security aspects. Through real-world examples, you'll understand
how to set up a lab and later explore core penetration testing
concepts. Throughout the course of this book, you'll get up to
speed with gathering sensitive information and even discover
different vulnerability assessment tools bundled in Kali Linux
2019. In later chapters, you'll gain insights into concepts such as
social engineering, attacking wireless networks, exploitation of
web applications and remote access connections to further build on
your pentesting skills. You'll also focus on techniques such as
bypassing controls, attacking the end user and maintaining
persistence access through social media. Finally, this pentesting
book covers best practices for performing complex penetration
testing techniques in a highly secured environment. By the end of
this book, you'll be able to use Kali Linux to detect
vulnerabilities and secure your system by applying penetration
testing techniques of varying complexity. What you will learn
Explore the fundamentals of ethical hacking Learn how to install
and configure Kali Linux Get up to speed with performing wireless
network pentesting Gain insights into passive and active
information gathering Understand web application pentesting Decode
WEP, WPA, and WPA2 encryptions using a variety of methods, such as
the fake authentication attack, the ARP request replay attack, and
the dictionary attack Who this book is forIf you are an IT security
professional or a security consultant who wants to get started with
penetration testing using Kali Linux 2019.2, then this book is for
you. The book will also help if you're simply looking to learn more
about ethical hacking and various security breaches. Although prior
knowledge of Kali Linux is not necessary, some understanding of
cybersecurity will be useful.
Master Docker and leverage its power in your day-to-day workflow
Key Features Explore tools such as Docker Engine, Machine, Compose,
and Swarm Discover how Docker can be integrated into your daily
workflows Learn to leverage Docker Swarm and Kubernetes Book
DescriptionDocker has been a game-changer when it comes to how
modern applications are deployed and created. It has now grown into
a key driver of innovation beyond system administration, with an
impact on the world of web development. But how can you make sure
you're keeping up with the innovations it's driving, or be sure
you're using it to its full potential? Mastering Docker shows you
how; this book not only demonstrates how to use Docker more
effectively, but also helps you rethink and reimagine what's
possible with it. You will cover concepts such as building,
managing, and storing images, along with best practices to make you
confident, before delving more into Docker security. You'll find
everything related to extending and integrating Docker in new and
innovative ways. Docker Compose, Docker Swarm, and Kubernetes will
help you take control of your containers in an efficient manner. By
the end of the book, you will have a broad, yet detailed, sense of
what's possible with Docker, and how seamlessly it fits in with a
range of other platforms and tools. What you will learn Become
fluent with the basic components and concepts of Docker Learn the
best ways to build, store, and distribute containers Understand how
Docker can fit into your development workflow Secure your
containers and files with Docker's security features Solve
architectural problems using the first and third clustering tool
Leverage Linux containers and create highly scalable applications
Who this book is forIf you are an I.T professional and recognize
Docker's importance for innovation in everything from system
administration to web development, but aren't sure how to use it to
its full potential, Mastering Docker is for you.
Create and maintain powerful Bash scripts for automation and
administration. Key Features Get up and running with Linux shell
scripting using real-world examples Leverage command-line
techniques and methodologies to automate common yet complex
administration tasks A practical guide with exposure to scripting
constructs and common scripting patterns Book DescriptionShell
scripts allow us to program commands in chains and have the system
execute them as a scripted event, just like batch files. This book
will start with an overview of Linux and Bash shell scripting, and
then quickly deep dive into helping you set up your local
environment, before introducing you to tools that are used to write
shell scripts. The next set of chapters will focus on helping you
understand Linux under the hood and what Bash provides the user.
Soon, you will have embarked on your journey along the command
line. You will now begin writing actual scripts instead of
commands, and will be introduced to practical applications for
scripts. The final set of chapters will deep dive into the more
advanced topics in shell scripting. These advanced topics will take
you from simple scripts to reusable, valuable programs that exist
in the real world. The final chapter will leave you with some handy
tips and tricks and, as regards the most frequently used commands,
a cheat sheet containing the most interesting flags and options
will also be provided. After completing this book, you should feel
confident about starting your own shell scripting projects, no
matter how simple or complex the task previously seemed. We aim to
teach you how to script and what to consider, to complement the
clear-cut patterns that you can use in your daily scripting
challenges. What you will learn Understand Linux and Bash basics as
well as shell scripting fundamentals Learn to write simple shell
scripts that interact with Linux operating system Build, maintain,
and deploy scripts in a Linux environment Learn best practices for
writing shell scripts Avoid common pitfalls associated with Bash
scripting Gain experience and the right toolset to write your own
complex shell scripts Who this book is forThis book targets new and
existing Linux system administrators, Windows system administrators
or developers who are interested in automating administrative
tasks. No prior shell scripting experience is needed but in case
you do this book will make a pro quickly. Readers should have a
basic understanding of the command line.
Over 30 recipes to develop custom drivers for your embedded Linux
applications. Key Features Use Kernel facilities to develop
powerful drivers Via a practical approach, learn core concepts of
developing device drivers Program a custom character device to get
access to kernel internals Book DescriptionLinux is a unified
kernel that is widely used to develop embedded systems. As Linux
has turned out to be one of the most popular operating systems
used, the interest in developing proprietary device drivers has
also increased. Device drivers play a critical role in how the
system performs and ensures that the device works in the manner
intended. By offering several examples on the development of
character devices and how to use other kernel internals, such as
interrupts, kernel timers, and wait queue, as well as how to manage
a device tree, you will be able to add proper management for custom
peripherals to your embedded system. You will begin by installing
the Linux kernel and then configuring it. Once you have installed
the system, you will learn to use the different kernel features and
the character drivers. You will also cover interrupts in-depth and
how you can manage them. Later, you will get into the kernel
internals required for developing applications. Next, you will
implement advanced character drivers and also become an expert in
writing important Linux device drivers. By the end of the book, you
will be able to easily write a custom character driver and kernel
code as per your requirements. What you will learn Become familiar
with the latest kernel releases (4.19+/5.x) running on the
ESPRESSObin devkit, an ARM 64-bit machine Download, configure,
modify, and build kernel sources Add and remove a device driver or
a module from the kernel Master kernel programming Understand how
to implement character drivers to manage different kinds of
computer peripherals Become well versed with kernel helper
functions and objects that can be used to build kernel applications
Acquire a knowledge of in-depth concepts to manage custom hardware
with Linux from both the kernel and user space Who this book is
forThis book will help anyone who wants to develop their own Linux
device drivers for embedded systems. Having basic hand-on with
Linux operating system and embedded concepts is necessary.
Android Things is the new Android based Operating System for the
Internet of Things. With this book you will learn the core concepts
by running code examples on different peripherals. Key Features No
previous knowledge of IoT or microcontrollers required. Hands-On
with simple code and plenty of examples. Use Kotlin to write
simpler and more readable code Book DescriptionAndroid Things is
the IoT platform made by Google, based on Android. It allows us to
build smart devices in a simple and convenient way, leveraging on
the Android ecosystem tools and libraries, while letting Google
take care of security updates. This book takes you through the
basics of IoT and smart devices. It will help you to interact with
common IoT device components and learn the underlying protocols.
For a simple setup, we will be using Rainbow HAT so that we don't
need to do any wiring. In the first chapter, you will learn about
the Android Things platform, the design concepts behind it, and how
it relates to other IoT frameworks. We will look at the Developer
Kits and learn how to install Android Things on them by creating a
simple project. Later, we will explore the real power of Android
Things, learning how to make a UI, designing and communicating with
companion apps in different ways, showcasing a few libraries. We
will demonstrate libraries and you will see how powerful the
Android Things operating system is. What you will learn Understand
key design concepts of Android Things and its advantages Set up an
Android Things Developer Kit Interact with all the components of
Rainbow HAT Understand how peripheral protocols work (GPIO, PWM,
I2C, and SPI) Implement best practices of how to handle IoT
peripherals with in terms Android Things Develop techniques for
building companion apps for your devices Who this book is forThis
book is for developers who have a basic knowledge of Android and
want to start using the Android Things developer kit.
Enhance file system security and learn about network attack,
security tools and different versions of Linux build. Key Features
Hands-on recipes to create and administer a secure Linux system
Enhance file system security and local and remote user
authentication Use various security tools and different versions of
Linux for different tasks Book DescriptionOver the last few years,
system security has gained a lot of momentum and software
professionals are focusing heavily on it. Linux is often treated as
a highly secure operating system. However, the reality is that
Linux has its share of security flaws, and these security flaws
allow attackers to get into your system and modify or even destroy
your important data. But there's no need to panic, since there are
various mechanisms by which these flaws can be removed, and this
book will help you learn about different types of Linux security to
create a more secure Linux system. With a step-by-step recipe
approach, the book starts by introducing you to various threats to
Linux systems. Then, this book will walk you through customizing
the Linux kernel and securing local files. Next, you will move on
to managing user authentication both locally and remotely and
mitigating network attacks. Later, you will learn about application
security and kernel vulnerabilities. You will also learn about
patching Bash vulnerability, packet filtering, handling incidents,
and monitoring system logs. Finally, you will learn about auditing
using system services and performing vulnerability scanning on
Linux. By the end of this book, you will be able to secure your
Linux systems and create a robust environment. What you will learn
Learn about vulnerabilities and exploits in relation to Linux
systems Configure and build a secure kernel and test it Learn about
file permissions and how to securely modify files Authenticate
users remotely and securely copy files on remote systems Review
different network security methods and tools Perform vulnerability
scanning on Linux machines using tools Learn about malware scanning
and read through logs Who this book is forThis book is intended for
all those Linux users who already have knowledge of Linux file
systems and administration. You should be familiar with basic Linux
commands. Understanding information security and its risks to a
Linux system is also helpful in understanding the recipes more
easily.
Discover the most common web vulnerabilities and prevent them from
becoming a threat to your site's security Key Features Familiarize
yourself with the most common web vulnerabilities Conduct a
preliminary assessment of attack surfaces and run exploits in your
lab Explore new tools in the Kali Linux ecosystem for web
penetration testing Book DescriptionWeb applications are a huge
point of attack for malicious hackers and a critical area for
security professionals and penetration testers to lock down and
secure. Kali Linux is a Linux-based penetration testing platform
that provides a broad array of testing tools, many of which can be
used to execute web penetration testing. Kali Linux Web Penetration
Testing Cookbook gives you the skills you need to cover every stage
of a penetration test - from gathering information about the system
and application, to identifying vulnerabilities through manual
testing. You will also cover the use of vulnerability scanners and
look at basic and advanced exploitation techniques that may lead to
a full system compromise. You will start by setting up a testing
laboratory, exploring the latest features of tools included in Kali
Linux and performing a wide range of tasks with OWASP ZAP, Burp
Suite and other web proxies and security testing tools. As you make
your way through the book, you will learn how to use automated
scanners to find security flaws in web applications and understand
how to bypass basic security controls. In the concluding chapters,
you will look at what you have learned in the context of the Open
Web Application Security Project (OWASP) and the top 10 web
application vulnerabilities you are most likely to encounter,
equipping you with the ability to combat them effectively. By the
end of this book, you will have acquired the skills you need to
identify, exploit, and prevent web application vulnerabilities.
What you will learn Set up a secure penetration testing laboratory
Use proxies, crawlers, and spiders to investigate an entire website
Identify cross-site scripting and client-side vulnerabilities
Exploit vulnerabilities that allow the insertion of code into web
applications Exploit vulnerabilities that require complex setups
Improve testing efficiency using automated vulnerability scanners
Learn how to circumvent security controls put in place to prevent
attacks Who this book is forKali Linux Web Penetration Testing
Cookbook is for IT professionals, web developers, security
enthusiasts, and security professionals who want an accessible
reference on how to find, exploit, and prevent security
vulnerabilities in web applications. The basics of operating a
Linux environment and prior exposure to security technologies and
tools are necessary.
The most complete, authoritative technical guide to the FreeBSD
kernel's internal structure has now been extensively updated to
cover all major improvements between Versions 5 and 11.
Approximately one-third of this edition's content is completely
new, and another one-third has been extensively rewritten. Three
long-time FreeBSD project leaders begin with a concise overview of
the FreeBSD kernel's current design and implementation. Next, they
cover the FreeBSD kernel from the system-call level down-from the
interface to the kernel to the hardware. Explaining key design
decisions, they detail the concepts, data structures, and
algorithms used in implementing each significant system facility,
including process management, security, virtual memory, the I/O
system, filesystems, socket IPC, and networking. This Second
Edition * Explains highly scalable and lightweight virtualization
using FreeBSD jails, and virtual-machine acceleration with Xen and
Virtio device paravirtualization * Describes new security features
such as Capsicum sandboxing and GELI cryptographic disk protection
* Fully covers NFSv4 and Open Solaris ZFS support * Introduces
FreeBSD's enhanced volume management and new journaled soft updates
* Explains DTrace's fine-grained process debugging/profiling *
Reflects major improvements to networking, wireless, and USB
support Readers can use this guide as both a working reference and
an in-depth study of a leading contemporary, portable, open source
operating system. Technical and sales support professionals will
discover both FreeBSD's capabilities and its limitations.
Applications developers will learn how to effectively and
efficiently interface with it; system administrators will learn how
to maintain, tune, and configure it; and systems programmers will
learn how to extend, enhance, and interface with it. Marshall Kirk
McKusick writes, consults, and teaches classes on UNIX- and
BSD-related subjects. While at the University of California,
Berkeley, he implemented the 4.2BSD fast filesystem. He was
research computer scientist at the Berkeley Computer Systems
Research Group (CSRG), overseeing development and release of 4.3BSD
and 4.4BSD. He is a FreeBSD Foundation board member and a long-time
FreeBSD committer. Twice president of the Usenix Association, he is
also a member of ACM, IEEE, and AAAS. George V. Neville-Neil hacks,
writes, teaches, and consults on security, networking, and
operating systems. A FreeBSD Foundation board member, he served on
the FreeBSD Core Team for four years. Since 2004, he has written
the "Kode Vicious" column for Queue and Communications of the ACM.
He is vice chair of ACM's Practitioner Board and a member of Usenix
Association, ACM, IEEE, and AAAS. Robert N.M. Watson is a
University Lecturer in systems, security, and architecture in the
Security Research Group at the University of Cambridge Computer
Laboratory. He supervises advanced research in computer
architecture, compilers, program analysis, operating systems,
networking, and security. A FreeBSD Foundation board member, he
served on the Core Team for ten years and has been a committer for
fifteen years. He is a member of Usenix Association and ACM.
Explore practical use cases to learn everything from Linux
components, and functionalities, through to hardware and software
support Key Features Gain a clear understanding of how to design a
Linux environment Learn more about the architecture of the modern
Linux operating system(OS) Understand infrastructure needs and
design a high-performing computing environment Book DescriptionIt
is very important to understand the flexibility of an
infrastructure when designing an efficient environment. In this
book, you will cover everything from Linux components and
functionalities through to hardware and software support, which
will help you to implement and tune effective Linux-based
solutions. This book gets started with an overview of Linux design
methodology. Next, you will focus on the core concepts of designing
a solution. As you progress, you will gain insights into the kinds
of decisions you need to make when deploying a high-performance
solution using Gluster File System (GlusterFS). In the next set of
chapters, the book will guide you through the technique of using
Kubernetes as an orchestrator for deploying and managing
containerized applications. In addition to this, you will learn how
to apply and configure Kubernetes for your NGINX application.
You'll then learn how to implement an ELK stack, which is composed
of Elasticsearch, Logstash, and Kibana. In the concluding chapters,
you will focus on installing and configuring a Saltstack solution
to manage different Linux distributions, and explore a variety of
design best practices. By the end of this book, you will be
well-versed with designing a high-performing computing environment
for complex applications to run on. By the end of the book, you
will have delved inside the most detailed technical conditions of
designing a solution, and you will have also dissected every aspect
in detail in order to implement and tune open source Linux-based
solutions What you will learn Study the basics of infrastructure
design and the steps involved Expand your current design portfolio
with Linux-based solutions Discover open source software-based
solutions to optimize your architecture Understand the role of high
availability and fault tolerance in a resilient design Identify the
role of containers and how they improve your continuous integration
and continuous deployment pipelines Gain insights into optimizing
and making resilient and highly available designs by applying
industry best practices Who this book is forThis intermediate-level
book is for Linux system administrators, Linux support engineers,
DevOps engineers, Linux consultants or any open source technology
professional looking to learn or expand their knowledge in
architecting, designing and implementing solutions based on Linux
and open source software. Prior experience in Linux is required.
Deploy functions efficiently using different cloud-based serverless
offerings Key Features Understand the concept of
Function-as-a-Service Implement Serverless solutions using AWS
Lambda, Azure Functions and Google Cloud Functions Practical
approach towards choosing the best tool for your serverless
environment Book DescriptionServerless applications and
architectures are gaining momentum and are increasingly being used
by companies of all sizes. Serverless software takes care of many
problems that developers face when running systems and servers,
such as fault tolerance, centralized logging, horizontal
scalability, and deployments. You will learn how to harness
serverless technology to rapidly reduce production time and
minimize your costs, while still having the freedom to customize
your code, without hindering functionality. Upon finishing the
book, you will have the knowledge and resources to build your own
serverless application hosted in AWS, Microsoft Azure, or Google
Cloud Platform, and will have experienced the benefits of
event-driven technology for yourself. This hands-on guide dives
into the basis of serverless architectures and how to build them
using Node.js as a programming language, Visual Studio Code for
code editing, and Postman for quickly and securely developing
applications without the hassle of configuring and maintaining
infrastructure on three public cloud platforms. What you will learn
Understand the benefts of serverless computing and know when to use
it Develop serverless applications on AWS, Azure, and Google Cloud
Get to grips with Function as a Service (FaaS) Apply triggers to
serverless functions Build event-driven apps using serverless
frameworks Use the Node.js programming language to build serverless
apps Use code editors, such as Visual Studio Code, as development
environments Master the best development practices for creating
scalable and practical solutions Who this book is forThis book is
targeted towards developers, system administrators or any
stakeholder working in the Serverless environment and want to
understand how functions work. Basic idea of serverless
architecture can be an added advantage
|
You may like...
Die Goue Kring
Koos Meinderts, Harrie Jekkers
Hardcover
R62
Discovery Miles 620
|