0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (23)
  • R250 - R500 (109)
  • R500+ (428)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > Unix, Unix Linux & Unix TCL/TK

Hands-On Linux Administration on Azure - Explore the essential Linux administration skills you need to deploy and manage... Hands-On Linux Administration on Azure - Explore the essential Linux administration skills you need to deploy and manage Azure-based workloads (Paperback)
Frederik Vos
R1,190 Discovery Miles 11 900 Ships in 10 - 15 working days

Learn to efficiently run Linux-based workloads in Azure Key Features Manage and deploy virtual machines in your Azure environment Explore various open source tools to integrate automation and orchestration Leverage Linux features to create, run, and manage containers Book DescriptionAzure's market share has increased massively and enterprises are adopting it rapidly. Linux is a widely-used operating system and has proven to be one of the most popular workloads on Azure. It has become crucial for Linux administrators and Microsoft professionals to be well versed with the concepts of managing Linux workloads in an Azure environment. Hands-On Linux Administration on Azure starts by introducing you to the fundamentals of Linux and Azure, after which you will explore advanced Linux features and see how they are managed in an Azure environment. Next, with the help of real-world scenarios, you will learn how to deploy virtual machines(VMs) in Azure, along with extending Azure VMs capabilities and managing them efficiently. You will then understand continuous configuration automation and use Ansible, SaltStack and Powershell DSC for orchestration. As you make your way through the chapters, you will understand containers and how they work, along with managing containers and the various tasks you can perform with them. In the concluding chapters, you will cover some Linux troubleshooting techniques on Azure, and you will also be able to monitor Linux in Azure using different open source tools. By the end of this book, you will be able to administer Linux on Azure and make the most of the important tools required for deployment. What you will learn Understand why Azure is the ideal solution for your open source workloads Master essential Linux skills and learn to find your way around the Linux environment Deploy Linux in an Azure environment Use configuration management to manage Linux in Azure Manage containers in an Azure environment Enhance Linux security and use Azure's identity management systems Automate deployment with Azure Resource Manager (ARM) and Powershell Employ Ansible to manage Linux instances in an Azure cloud environment Who this book is forHands-On Linux Administration on Azure is for Linux administrators and Microsoft professionals that need to deploy and manage their workloads in Azure. Prior knowledge of Linux and Azure isn't necessary.

Linux Mint 18.2 - Desktops and Administration (Paperback): Richard Petersen Linux Mint 18.2 - Desktops and Administration (Paperback)
Richard Petersen
R1,181 Discovery Miles 11 810 Ships in 10 - 15 working days
Linux Device Driver Development Cookbook - Develop custom drivers for your embedded Linux applications (Paperback): Rodolfo... Linux Device Driver Development Cookbook - Develop custom drivers for your embedded Linux applications (Paperback)
Rodolfo Giometti
R1,212 Discovery Miles 12 120 Ships in 10 - 15 working days

Over 30 recipes to develop custom drivers for your embedded Linux applications. Key Features Use Kernel facilities to develop powerful drivers Via a practical approach, learn core concepts of developing device drivers Program a custom character device to get access to kernel internals Book DescriptionLinux is a unified kernel that is widely used to develop embedded systems. As Linux has turned out to be one of the most popular operating systems used, the interest in developing proprietary device drivers has also increased. Device drivers play a critical role in how the system performs and ensures that the device works in the manner intended. By offering several examples on the development of character devices and how to use other kernel internals, such as interrupts, kernel timers, and wait queue, as well as how to manage a device tree, you will be able to add proper management for custom peripherals to your embedded system. You will begin by installing the Linux kernel and then configuring it. Once you have installed the system, you will learn to use the different kernel features and the character drivers. You will also cover interrupts in-depth and how you can manage them. Later, you will get into the kernel internals required for developing applications. Next, you will implement advanced character drivers and also become an expert in writing important Linux device drivers. By the end of the book, you will be able to easily write a custom character driver and kernel code as per your requirements. What you will learn Become familiar with the latest kernel releases (4.19+/5.x) running on the ESPRESSObin devkit, an ARM 64-bit machine Download, configure, modify, and build kernel sources Add and remove a device driver or a module from the kernel Master kernel programming Understand how to implement character drivers to manage different kinds of computer peripherals Become well versed with kernel helper functions and objects that can be used to build kernel applications Acquire a knowledge of in-depth concepts to manage custom hardware with Linux from both the kernel and user space Who this book is forThis book will help anyone who wants to develop their own Linux device drivers for embedded systems. Having basic hand-on with Linux operating system and embedded concepts is necessary.

Learn OpenShift - Deploy, build, manage, and migrate applications with OpenShift Origin 3.9 (Paperback): Denis Zuev, Artemii... Learn OpenShift - Deploy, build, manage, and migrate applications with OpenShift Origin 3.9 (Paperback)
Denis Zuev, Artemii Kropachev, Aleksey Usov
R1,222 Discovery Miles 12 220 Ships in 10 - 15 working days

Gain hands-on experience of installing OpenShift Origin 3.9 in a production configuration and managing applications using the platform you built Key Features Gain hands-on experience of working with Kubernetes and Docker Learn how to deploy and manage applications in OpenShift Get a practical approach to managing applications on a cloud-based platform Explore multi-site and HA architectures of OpenShift for production Book DescriptionDocker containers transform application delivery technologies to make them faster and more reproducible, and to reduce the amount of time wasted on configuration. Managing Docker containers in the multi-node or multi-datacenter environment is a big challenge, which is why container management platforms are required. OpenShift is a new generation of container management platforms built on top of both Docker and Kubernetes. It brings additional functionality to the table, something that is lacking in Kubernetes. This new functionality significantly helps software development teams to bring software development processes to a whole new level. In this book, we'll start by explaining the container architecture, Docker, and CRI-O overviews. Then, we'll look at container orchestration and Kubernetes. We'll cover OpenShift installation, and its basic and advanced components. Moving on, we'll deep dive into concepts such as deploying application OpenShift. You'll learn how to set up an end-to-end delivery pipeline while working with applications in OpenShift as a developer or DevOps. Finally, you'll discover how to properly design OpenShift in production environments. This book gives you hands-on experience of designing, building, and operating OpenShift Origin 3.9, as well as building new applications or migrating existing applications to OpenShift. What you will learn Understand the core concepts behind containers and container orchestration tools Understand Docker, Kubernetes, and OpenShift, and their relation to CRI-O Install and work with Kubernetes and OpenShift Understand how to work with persistent storage in OpenShift Understand basic and advanced components of OpenShift, including security and networking Manage deployment strategies and application's migration in OpenShift Understand and design OpenShift high availability Who this book is forThe book is for system administrators, DevOps engineers, solutions architects, or any stakeholder who wants to understand the concept and business value of OpenShift.

Web Penetration Testing with Kali Linux - Explore the methods and tools of ethical hacking with Kali Linux, 3rd Edition... Web Penetration Testing with Kali Linux - Explore the methods and tools of ethical hacking with Kali Linux, 3rd Edition (Paperback, 3rd Revised edition)
Gilberto Najera-Gutierrez, Juned Ahmed Ansari
R1,443 Discovery Miles 14 430 Ships in 10 - 15 working days

Build your defense against web attacks with Kali Linux, including command injection flaws, crypto implementation layers, and web application security holes Key Features Know how to set up your lab with Kali Linux Discover the core concepts of web penetration testing Get the tools and techniques you need with Kali Linux Book DescriptionWeb Penetration Testing with Kali Linux - Third Edition shows you how to set up a lab, helps you understand the nature and mechanics of attacking websites, and explains classical attacks in great depth. This edition is heavily updated for the latest Kali Linux changes and the most recent attacks. Kali Linux shines when it comes to client-side attacks and fuzzing in particular. From the start of the book, you'll be given a thorough grounding in the concepts of hacking and penetration testing, and you'll see the tools used in Kali Linux that relate to web application hacking. You'll gain a deep understanding of classicalSQL, command-injection flaws, and the many ways to exploit these flaws. Web penetration testing also needs a general overview of client-side attacks, which is rounded out by a long discussion of scripting and input validation flaws. There is also an important chapter on cryptographic implementation flaws, where we discuss the most recent problems with cryptographic layers in the networking stack. The importance of these attacks cannot be overstated, and defending against them is relevant to most internet users and, of course, penetration testers. At the end of the book, you'll use an automated technique called fuzzing to identify flaws in a web application. Finally, you'll gain an understanding of web application vulnerabilities and the ways they can be exploited using the tools in Kali Linux. What you will learn Learn how to set up your lab with Kali Linux Understand the core concepts of web penetration testing Get to know the tools and techniques you need to use with Kali Linux Identify the difference between hacking a web application and network hacking Expose vulnerabilities present in web servers and their applications using server-side attacks Understand the different techniques used to identify the flavor of web applications See standard attacks such as exploiting cross-site request forgery and cross-site scripting flaws Get an overview of the art of client-side attacks Explore automated attacks such as fuzzing web applications Who this book is forSince this book sets out to cover a large number of tools and security fields, it can work as an introduction to practical security skills for beginners in security. In addition, web programmers and also system administrators would benefit from this rigorous introduction to web penetration testing. Basic system administration skills are necessary, and the ability to read code is a must.

Ed Mastery (Manly McManface Edition) - The Standard Unix Text Editor (Paperback, Manly McManface ed.): Michael W Lucas Ed Mastery (Manly McManface Edition) - The Standard Unix Text Editor (Paperback, Manly McManface ed.)
Michael W Lucas
R686 R635 Discovery Miles 6 350 Save R51 (7%) Ships in 10 - 15 working days
Mastering Docker Enterprise - A companion guide for agile container adoption (Paperback): Mark Panthofer Mastering Docker Enterprise - A companion guide for agile container adoption (Paperback)
Mark Panthofer
R1,321 Discovery Miles 13 210 Ships in 10 - 15 working days

A journey toward containerized applications in production with a cloud-portable, secure, robust and highly available Docker Enterprise platform. Key Features Get an insider's view into the container movement and Docker Enterprise Manage the transformation associated with enterprise container adoption Walk through the enterprise container adoption journey Book DescriptionWhile known mostly as the open source engine behind tens of millions of server nodes, Docker also offers commercially supported enterprise tooling known as the Docker Enterprise. This platform leverages the deep roots from Docker Engine - Community (formerly Docker CE) and Kubernetes, but adds support and tooling to efficiently operate a secure container platform at scale. With hundreds of enterprises on board, best practices and adoption patterns are emerging rapidly. These learning points can be used to inform adopters and help manage the enterprise transformation associated with enterprise container adoption. This book starts by explaining the case for Docker Enterprise, as well as its structure and reference architecture. From there, we progress through the PoC,pilot and production stages as a working model for adoption, evolving the platform's design and configuration for each stage and using detailed application examples along the way to clarify and demonstrate important concepts.The book concludes with Docker's impact on other emerging software technologies, such as Blockchain and Serverless computing. By the end of this book, you'll have a better understanding of what it takes to get your enterprise up and running with Docker Enterprise and beyond. What you will learn Understand why containers are important to an enterprise Understand the features and components of Docker Enterprise 2 Find out about the PoC, pilot, and production adoption phases Get to know the best practices for installing and operating Docker Enterprise Understand what is important for a Docker Enterprise in production Run Kubernetes on Docker Enterprise Who this book is forThis book is for Software Architects, DevOps Engineers, Tech Ops, Docker professionals, or any IT professional working with Docker and containers who wants to move containerized workloads to production. This book discusses the enterprise adoption of Docker and Kubernetes,therefore a basic understanding of Docker concepts will be helpful.

Kali Linux - An Ethical Hacker's Cookbook (Paperback): Himanshu Sharma Kali Linux - An Ethical Hacker's Cookbook (Paperback)
Himanshu Sharma
R1,294 Discovery Miles 12 940 Ships in 10 - 15 working days

Over 120 recipes to perform advanced penetration testing with Kali Linux About This Book * Practical recipes to conduct effective penetration testing using the powerful Kali Linux * Leverage tools like Metasploit, Wireshark, Nmap, and many more to detect vulnerabilities with ease * Confidently perform networking and application attacks using task-oriented recipes Who This Book Is For This book is aimed at IT security professionals, pentesters, and security analysts who have basic knowledge of Kali Linux and want to conduct advanced penetration testing techniques. What You Will Learn * Installing, setting up and customizing Kali for pentesting on multiple platforms * Pentesting routers and embedded devices * Bug hunting 2017 * Pwning and escalating through corporate network * Buffer over?ows 101 * Auditing wireless networks * Fiddling around with software-defned radio * Hacking on the run with NetHunter * Writing good quality reports In Detail With the current rate of hacking, it is very important to pentest your environment in order to ensure advanced-level security. This book is packed with practical recipes that will quickly get you started with Kali Linux (version 2016.2) according to your needs, and move on to core functionalities. This book will start with the installation and configuration of Kali Linux so that you can perform your tests. You will learn how to plan attack strategies and perform web application exploitation using tools such as Burp, and Jexboss. You will also learn how to perform network exploitation using Metasploit, Sparta, and Wireshark. Next, you will perform wireless and password attacks using tools such as Patator, John the Ripper, and airoscript-ng. Lastly, you will learn how to create an optimum quality pentest report! By the end of this book, you will know how to conduct advanced penetration testing thanks to the book's crisp and task-oriented recipes. Style and approach This is a recipe-based book that allows you to venture into some of the most cutting-edge practices and techniques to perform penetration testing with Kali Linux.

The Ubuntu Beginner's Guide (Paperback): Jonathan Moeller The Ubuntu Beginner's Guide (Paperback)
Jonathan Moeller
R347 Discovery Miles 3 470 Ships in 10 - 15 working days
Shell Scripting - Learn Linux Shell Programming Step-By-Step (Bash Scripting, Unix) (Paperback): Harry Harvey Shell Scripting - Learn Linux Shell Programming Step-By-Step (Bash Scripting, Unix) (Paperback)
Harry Harvey
R400 Discovery Miles 4 000 Ships in 10 - 15 working days
Kali Linux Cookbook - (Paperback, 2nd Revised edition): Corey P. Schultz, Bob Perciaccante Kali Linux Cookbook - (Paperback, 2nd Revised edition)
Corey P. Schultz, Bob Perciaccante
R1,308 Discovery Miles 13 080 Ships in 10 - 15 working days

Over 80 recipes to effectively test your network and boost your career in security About This Book * Learn how to scan networks to find vulnerable computers and servers * Hack into devices to control them, steal their data, and make them yours * Target wireless networks, databases, and web servers, and password cracking to make the most of Kali Linux Who This Book Is For If you are looking to expand your career into penetration testing, you will need a good understanding of Kali Linux and the variety of tools it includes. This book will work as a perfect guide for anyone who wants to have a practical approach in leveraging penetration testing mechanisms using Kali Linux What You Will Learn * Acquire the key skills of ethical hacking to perform penetration testing * Learn how to perform network reconnaissance * Discover vulnerabilities in hosts * Attack vulnerabilities to take control of workstations and servers * Understand password cracking to bypass security * Learn how to hack into wireless networks * Attack web and database servers to exfiltrate data * Obfuscate your command and control connections to avoid firewall and IPS detection In Detail Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world's most popular penetration testing distribution. Kali Linux is the most widely used platform and toolkit for penetration testing. Security is currently the hottest field in technology with a projected need for millions of security professionals. This book focuses on enhancing your knowledge in Kali Linux for security by expanding your skills with toolkits and frameworks that can increase your value as a security professional. Kali Linux Cookbook, Second Edition starts by helping you install Kali Linux on different options available. You will also be able to understand the lab architecture and install a Windows host for use in the lab. Next, you will understand the concept of vulnerability analysis and look at the different types of exploits. The book will introduce you to the concept and psychology of Social Engineering and password cracking. You will then be able to use these skills to expand the scope of any breaches you create. Finally, the book will guide you in exploiting specific technologies and gaining access to other systems in the environment. By the end of this book, you will have gained the core knowledge and concepts of the penetration testing process. Style and approach This book teaches you everything you need to know about Kali Linux from the perspective of a penetration tester. It is filled with powerful recipes and practical examples that will help you gain in-depth knowledge of Kali Linux.

SUSE Linux Enterprise Desktop 12 - Subscription Management Tool (Paperback): Guide Contributors SUSE Linux Enterprise Desktop 12 - Subscription Management Tool (Paperback)
Guide Contributors
R646 Discovery Miles 6 460 Ships in 10 - 15 working days
SUSE Linux Enterprise Desktop 12 - Tuning Guide (Paperback): Tuning Guide Contributors SUSE Linux Enterprise Desktop 12 - Tuning Guide (Paperback)
Tuning Guide Contributors
R803 Discovery Miles 8 030 Ships in 10 - 15 working days
SUSE Linux Enterprise Desktop 12 - Administration Guide (Paperback): Admin Guide Contributors SUSE Linux Enterprise Desktop 12 - Administration Guide (Paperback)
Admin Guide Contributors
R1,104 Discovery Miles 11 040 Ships in 10 - 15 working days
An Introduction to Docker (Paperback): Kevin Watts An Introduction to Docker (Paperback)
Kevin Watts
R309 Discovery Miles 3 090 Ships in 10 - 15 working days
Getting Started with Terraform - (Paperback, 2nd Revised edition): Kirill Shirinkin Getting Started with Terraform - (Paperback, 2nd Revised edition)
Kirill Shirinkin
R879 Discovery Miles 8 790 Ships in 10 - 15 working days

Build, Manage and Improve your infrastructure effortlessly. About This Book * An up-to-date and comprehensive resource on Terraform that lets you quickly and efficiently launch your infrastructure * Learn how to implement your infrastructure as code and make secure, effective changes to your infrastructure * Learn to build multi-cloud fault-tolerant systems and simplify the management and orchestration of even the largest scale and most complex cloud infrastructures Who This Book Is For This book is for developers and operators who already have some exposure to working with infrastructure but want to improve their workflow and introduce infrastructure as a code practice. Knowledge of essential Amazon Web Services components (EC2, VPC, IAM) would help contextualize the examples provided. Basic understanding of Jenkins and Shell scripts will be helpful for the chapters on the production usage of Terraform. What You Will Learn * Understand what Infrastructure as Code (IaC) means and why it matters * Install, configure, and deploy Terraform * Take full control of your infrastructure in the form of code * Manage complete infrastructure, starting with a single server and scaling beyond any limits * Discover a great set of production-ready practices to manage infrastructure * Set up CI/CD pipelines to test and deliver Terraform stacks * Construct templates to simplify more complex provisioning tasks In Detail Terraform is a tool used to efficiently build, configure, and improve the production infrastructure. It can manage the existing infrastructure as well as create custom in-house solutions. This book shows you when and how to implement infrastructure as a code practices with Terraform. It covers everything necessary to set up the complete management of infrastructure with Terraform, starting with the basics of using providers and resources. It is a comprehensive guide that begins with very small infrastructure templates and takes you all the way to managing complex systems, all using concrete examples that evolve over the course of the book. The book ends with the complete workflow of managing a production infrastructure as code-this is achieved with the help of version control and continuous integration. The readers will also learn how to combine multiple providers in a single template and manage different code bases with many complex modules. It focuses on how to set up continuous integration for the infrastructure code. The readers will be able to use Terraform to build, change, and combine infrastructure safely and efficiently. Style and approach This book will help and guide you to implement Terraform in your infrastructure. The readers will start by working on very small infrastructure templates and then slowly move on to manage complex systems, all by using concrete examples that will evolve during the course of the book.

Ubuntu (Paperback): Dennis Hutten Ubuntu (Paperback)
Dennis Hutten
R504 Discovery Miles 5 040 Ships in 10 - 15 working days
SUSE Linux Enterprise Server 12 - Storage Administration Guide (Paperback): Suse Llc SUSE Linux Enterprise Server 12 - Storage Administration Guide (Paperback)
Suse Llc
R567 Discovery Miles 5 670 Ships in 10 - 15 working days
Gcc 8.0 Gnu Compiler Collection Internals (Paperback): The FreeBSD Documentation Project Gcc 8.0 Gnu Compiler Collection Internals (Paperback)
The FreeBSD Documentation Project
R1,141 Discovery Miles 11 410 Ships in 10 - 15 working days
Learning Docker - (Paperback, 2nd Revised edition): Jeeva S. Chelladhurai, Vinod Singh, Pethuru Raj Learning Docker - (Paperback, 2nd Revised edition)
Jeeva S. Chelladhurai, Vinod Singh, Pethuru Raj
R1,393 Discovery Miles 13 930 Ships in 10 - 15 working days

Docker lets you create, deploy, and manage your applications anywhere at anytime - flexibility is key so you can deploy stable, secure, and scalable app containers across a wide variety of platforms and delve into microservices architecture About This Book * This up-to-date edition shows how to leverage Docker's features to deploy your existing applications * Learn how to package your applications with Docker and build, ship, and scale your containers * Explore real-world examples of securing and managing Docker containers Who This Book Is For This book is ideal for developers, operations managers, and IT professionals who would like to learn about Docker and use it to build and deploy container-based apps. No prior knowledge of Docker is expected. What You Will Learn * Develop containerized applications using the Docker version 17.03 * Build Docker images from containers and launch them * Develop Docker images and containers leveraging Dockerfiles * Use Docker volumes to share data * Get to know how data is shared between containers * Understand Docker Jenkins integration * Gain the power of container orchestration * Familiarize yourself with the frequently used commands such as docker exec, docker ps, docker top, and docker stats In Detail Docker is an open source containerization engine that offers a simple and faster way for developing and running software. Docker containers wrap software in a complete filesystem that contains everything it needs to run, enabling any application to be run anywhere - this flexibily and portabily means that you can run apps in the cloud, on virtual machines, or on dedicated servers. This book will give you a tour of the new features of Docker and help you get started with Docker by building and deploying a simple application. It will walk you through the commands required to manage Docker images and containers. You'll be shown how to download new images, run containers, list the containers running on the Docker host, and kill them. You'll learn how to leverage Docker's volumes feature to share data between the Docker host and its containers - this data management feature is also useful for persistent data. This book also covers how to orchestrate containers using Docker compose, debug containers, and secure containers using the AppArmor and SELinux security modules. Style and approach This step-by-step guide will walk you through the features and use of Docker, from Docker software installation to the impenetrable security of containers.

Oracle Linux 5 and 6 System Administration (Paperback): L. Landry Oracle Linux 5 and 6 System Administration (Paperback)
L. Landry
R916 Discovery Miles 9 160 Ships in 10 - 15 working days
Mastering Linux Security and Hardening - Secure your Linux server and protect it from intruders, malware attacks, and other... Mastering Linux Security and Hardening - Secure your Linux server and protect it from intruders, malware attacks, and other external threats (Paperback)
Donald A. Tevault
R1,749 Discovery Miles 17 490 Ships in 10 - 15 working days

A comprehensive guide to mastering the art of preventing your Linux system from getting compromised. Key Features Leverage this guide to confidently deliver a system that reduces the risk of being hacked Perform a number of advanced Linux security techniques such as network service detection, user authentication, controlling special permissions, encrypting file systems, and much more Master the art of securing a Linux environment with this end-to-end practical guide Book DescriptionThis book has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. You will learn various security techniques such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, protecting user accounts, authentication processes, and so on. Moving forward, you will also develop hands-on skills with advanced Linux permissions, access control, special modes, and more. Lastly, this book will also cover best practices and troubleshooting techniques to get your work done efficiently. By the end of this book, you will be confident in delivering a system that will be much harder to compromise. What you will learn Use various techniques to prevent intruders from accessing sensitive data Prevent intruders from planting malware, and detect whether malware has been planted Prevent insiders from accessing data that they aren't authorized to access Do quick checks to see whether a computer is running network services that it doesn't need to run Learn security techniques that are common to all Linux distros, and some that are distro-specific Who this book is forIf you are a systems administrator or a network engineer interested in making your Linux environment more secure, then this book is for you. Security consultants wanting to enhance their Linux security skills will also benefit from this book. Prior knowledge of Linux is mandatory.

SUSE Linux Enterprise Server 12 - Deployment Guide (Paperback): Suse Llc SUSE Linux Enterprise Server 12 - Deployment Guide (Paperback)
Suse Llc
R614 Discovery Miles 6 140 Ships in 10 - 15 working days
SUSE Linux Enterprise Desktop 12 - GNOME User Guide (Paperback): Suse Llc SUSE Linux Enterprise Desktop 12 - GNOME User Guide (Paperback)
Suse Llc
R497 Discovery Miles 4 970 Ships in 10 - 15 working days
Embedded Linux Development using Yocto Projects - (Paperback, 2nd Revised edition): Otavio Salvador, Daiane Angolini Embedded Linux Development using Yocto Projects - (Paperback, 2nd Revised edition)
Otavio Salvador, Daiane Angolini
R1,344 Discovery Miles 13 440 Ships in 10 - 15 working days

Optimize and boost your Linux-based system with Yocto Project and increase its reliability and robustness efficiently and cost-effectively. About This Book * Optimize your Yocto Project tools to develop efficient Linux-based projects * Practical approach to learning Linux development using Yocto Project * Demonstrates concepts in a practical and easy-to-understand way Who This Book Is For If you are an embedded Linux developer with a basic knowledge of Yocto Project and want to broaden your knowledge with examples of embedded development, then this book is for you. This book is also for professionals who want to find new insights into working methodologies for Linux development. What You Will Learn * Understand the basic concepts involved in Poky workflows along with configuring and preparing the Poky build environment. * Configure a build server and customize images using Toaster. * Generate images and fit packages into created images using BitBake. * Support the development process by setting up and using Package feeds. * Debug Yocto Project by configuring Poky. * Build an image for the BeagleBone Black, RaspberryPi 3, and Wandboard, and boot it from an SD card. In Detail Yocto Project is turning out to be the best integration framework for creating reliable embedded Linux projects. It has the edge over other frameworks because of its features such as less development time and improved reliability and robustness. Embedded Linux Development using Yocto Project starts with an in-depth explanation of all Yocto Project tools, to help you perform different Linux-based tasks. The book then moves on to in-depth explanations of Poky and BitBake. It also includes some practical use cases for building a Linux subsystem project using Yocto Project tools available for embedded Linux. The book also covers topics such as SDK, recipetool, and others. By the end of the book, you will have learned how to generate and run an image for real hardware boards and will have gained hands-on experience at building efficient Linux systems using Yocto Project. Style and approach A clear, concise, and straightforward book that will enable you to use and implement the latest features of Yocto Project.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Sudo Mastery
Michael W Lucas Hardcover R963 R868 Discovery Miles 8 680
DNSSEC Mastery, 2nd Edition
Michael W Lucas Hardcover R947 R853 Discovery Miles 8 530
Kubernetes - The Ultimate Beginners…
Mark Reed Hardcover R599 R543 Discovery Miles 5 430
PowerShell for Administration, IT Pro…
William R. Stanek, William Stanek Hardcover R1,533 Discovery Miles 15 330
Linux - A complete guide to Linux…
James Arthur Hardcover R593 R536 Discovery Miles 5 360
Linux - The ultimate guide to Linux for…
Craig Newport Hardcover R596 R540 Discovery Miles 5 400
PowerShell, IT Pro Solutions…
William R. Stanek, William Stanek Hardcover R1,550 Discovery Miles 15 500
Linux Malware Incident Response: A…
Cameron H. Malin, Eoghan Casey, … Paperback R459 Discovery Miles 4 590
Linux for Hackers - A Comprehensive…
William Vance Hardcover R625 R568 Discovery Miles 5 680
Linux and Solaris Recipes for Oracle…
Darl Kuhn, Bernard Lopuz, … Paperback R3,383 Discovery Miles 33 830

 

Partners