|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > Unix, Unix Linux & Unix TCL/TK
Break through the practice of writing tedious code with shell
scripts Key Features Learn to impeccably build shell scripts and
develop advanced applications Create smart solutions by writing and
debugging scripts A step-by-step tutorial to automate routine tasks
by developing scripts Book DescriptionLinux is the most powerful
and universally adopted OS. Shell is a program that gives the user
direct interaction with the operating system. Scripts are
collections of commands that are stored in a file. The shell reads
this file and acts on commands as if they were typed on the
keyboard. Learning Linux Shell Scripting covers Bash, GNU Bourne
Again Shell, preparing you to work in the exciting world of Linux
shell scripting. CentOS is a popular rpm-based stable and secured
Linux distribution. Therefore, we have used CentOS distribution
instead of Ubuntu distribution. Linux Shell Scripting is
independent of Linux distributions, but we have covered both types
of distros. We start with an introduction to the Shell environment
and basic commands used. Next, we explore process management in
Linux OS, real-world essentials such as debugging and perform Shell
arithmetic fluently. You'll then take a step ahead and learn new
and advanced topics in Shell scripting, such as decision making,
starting up a system, and customizing a Linux environment. You will
also learn about grep, stream editor, and AWK, which are very
powerful text filters and editors. Finally, you'll get to grips
with taking backup, using other language scripts in Shell Scripts
as well as automating database administration tasks for MySQL and
Oracle. By the end of this book, you will be able to confidently
use your own shell scripts in the real world. What you will learn
Familiarize yourself with the various text filtering tools
available in Linux Understand expressions and variables and how to
use them practically Automate decision-making and save a lot of
time and effort of revisiting code Get to grips with advanced
functionality such as using traps, dialogs to develop screens &
Database administration such as MySQL or Oracle Start up a system
and customize a Linux system Taking backup of local or remote data
or important files. Use existing other language scripts such as
Python, Perl & Ruby in Shell Scripts Who this book is
forLearning Linux Shell Scripting is ideal for those who are
proficient at working with Linux and want to learn about shell
scripting to improve their efficiency and practical skills.
Enhance your software deployment workflow using containers Key
Features Get up-and-running with basic to advanced concepts of
Docker Get acquainted with concepts such as Docker containers,
Docker images, orchestrators and so on. Practical test-based
approach to learning a prominent containerization tool Book
DescriptionDocker containers have revolutionized the software
supply chain in small and big enterprises. Never before has a new
technology so rapidly penetrated the top 500 enterprises worldwide.
Companies that embrace containers and containerize their
traditional mission-critical applications have reported savings of
at least 50% in total maintenance cost and a reduction of 90% (or
more) of the time required to deploy new versions of those
applications. Furthermore they are benefitting from increased
security just by using containers as opposed to running
applications outside containers. This book starts from scratch,
introducing you to Docker fundamentals and setting up an
environment to work with it. Then we delve into concepts such as
Docker containers, Docker images, Docker Compose, and so on. We
will also cover the concepts of deployment, orchestration,
networking, and security. Furthermore, we explain Docker
functionalities on public clouds such as AWS. By the end of this
book, you will have hands-on experience working with Docker
containers and orchestrators such as SwarmKit and Kubernetes. What
you will learn Containerize your traditional or microservice-based
application Share or ship your application as an immutable
container image Build a Docker swarm and a Kubernetes cluster in
the cloud Run a highly distributed application using Docker Swarm
or Kubernetes Update or rollback a distributed application with
zero downtime Secure your applications via encapsulation, networks,
and secrets Know your options when deploying your containerized app
into the cloud Who this book is forThis book is targeted at system
administrators, operations engineers, DevOps engineers, and
developers or stakeholders who are interested in getting started
with Docker from scratch. No prior experience with Docker
Containers is required.
Master the concepts and techniques that will help you gain the
LX0-103 and LX0-104 certifications on your first attempt Key
Features Get a clear understanding of how to achieve the Linux+
certification Explore system architecture, shell scripts, data
management, and Linux security Work through practice and mock tests
to pass both LX0-103 and LX0-104 exams Book DescriptionLinux+
certification demonstrates technical competency and provides a
broad awareness of Linux operating systems. Professionals who have
achieved the Linux+ certification exhibit all-important knowledge
of installation, operation, administration, and troubleshooting
services. The CompTIA Linux+ Certification Guide is an overview of
the certification that gives you insights into the system
architecture. You'll understand how to install and uninstall Linux
distributions, followed by working with various package managers.
Once you've grasped all this, you'll move on to manipulating files
and processes at command-line interface (CLI) and creating,
monitoring, killing, restarting, and modifying processes. As you
progress, you'll be equipped to work with display managers and
learn how to create, modify, and remove user accounts and groups,
as well as understand how to automate tasks. The last set of
chapters helps you configure dates and set up local and remote
system logging. In addition to this, you'll explore different
internet protocols, along with discovering network configuration,
security administration, Shell scripting, and SQL management. By
the end of this book, you'll not only have got to grips with all
the modules using practice questions and mock exams, but you'll
also be well prepared to pass the LX0-103 and LX0-104 certification
exams. What you will learn Understand the Linux system architecture
Install, upgrade, and manage Linux system packages Configure
devices and maintain the Linux filesystem Manage the Shell
environment, write scripts, and manage data Set user interfaces and
desktops in the Linux operating system Automate system admin tasks
and manage essential system services Manage SQL server on Linux and
log locally and remotely with rsyslogd Administer network and local
security Who this book is forThe CompTIA Linux+ Certification Guide
is for you if you want to gain the CompTIA Linux+ certificate. This
guide is also for system administrators and rookie Linux
professionals interested in enhancing their Linux and Shell
scripting skills. No prior knowledge of Linux is needed, although
some understanding of Shell scripting would be helpful.
Get up and running with system programming concepts in Linux Key
Features Acquire insight on Linux system architecture and its
programming interfaces Get to grips with core concepts such as
process management, signalling and pthreads Packed with industry
best practices and dozens of code examples Book DescriptionThe
Linux OS and its embedded and server applications are critical
components of today's software infrastructure in a decentralized,
networked universe. The industry's demand for proficient Linux
developers is only rising with time. Hands-On System Programming
with Linux gives you a solid theoretical base and practical
industry-relevant descriptions, and covers the Linux system
programming domain. It delves into the art and science of Linux
application programming- system architecture, process memory and
management, signaling, timers, pthreads, and file IO. This book
goes beyond the use API X to do Y approach; it explains the
concepts and theories required to understand programming interfaces
and design decisions, the tradeoffs made by experienced developers
when using them, and the rationale behind them. Troubleshooting
tips and techniques are included in the concluding chapter. By the
end of this book, you will have gained essential conceptual design
knowledge and hands-on experience working with Linux system
programming interfaces. What you will learn Explore the theoretical
underpinnings of Linux system architecture Understand why modern
OSes use virtual memory and dynamic memory APIs Get to grips with
dynamic memory issues and effectively debug them Learn key concepts
and powerful system APIs related to process management Effectively
perform file IO and use signaling and timers Deeply understand
multithreading concepts, pthreads APIs, synchronization and
scheduling Who this book is forHands-On System Programming with
Linux is for Linux system engineers, programmers, or anyone who
wants to go beyond using an API set to understanding the
theoretical underpinnings and concepts behind powerful Linux system
programming APIs. To get the most out of this book, you should be
familiar with Linux at the user-level logging in, using shell via
the command line interface, the ability to use tools such as find,
grep, and sort. Working knowledge of the C programming language is
required. No prior experience with Linux systems programming is
assumed.
Learn to efficiently run Linux-based workloads in Azure Key
Features Manage and deploy virtual machines in your Azure
environment Explore various open source tools to integrate
automation and orchestration Leverage Linux features to create,
run, and manage containers Book DescriptionAzure's market share has
increased massively and enterprises are adopting it rapidly. Linux
is a widely-used operating system and has proven to be one of the
most popular workloads on Azure. It has become crucial for Linux
administrators and Microsoft professionals to be well versed with
the concepts of managing Linux workloads in an Azure environment.
Hands-On Linux Administration on Azure starts by introducing you to
the fundamentals of Linux and Azure, after which you will explore
advanced Linux features and see how they are managed in an Azure
environment. Next, with the help of real-world scenarios, you will
learn how to deploy virtual machines(VMs) in Azure, along with
extending Azure VMs capabilities and managing them efficiently. You
will then understand continuous configuration automation and use
Ansible, SaltStack and Powershell DSC for orchestration. As you
make your way through the chapters, you will understand containers
and how they work, along with managing containers and the various
tasks you can perform with them. In the concluding chapters, you
will cover some Linux troubleshooting techniques on Azure, and you
will also be able to monitor Linux in Azure using different open
source tools. By the end of this book, you will be able to
administer Linux on Azure and make the most of the important tools
required for deployment. What you will learn Understand why Azure
is the ideal solution for your open source workloads Master
essential Linux skills and learn to find your way around the Linux
environment Deploy Linux in an Azure environment Use configuration
management to manage Linux in Azure Manage containers in an Azure
environment Enhance Linux security and use Azure's identity
management systems Automate deployment with Azure Resource Manager
(ARM) and Powershell Employ Ansible to manage Linux instances in an
Azure cloud environment Who this book is forHands-On Linux
Administration on Azure is for Linux administrators and Microsoft
professionals that need to deploy and manage their workloads in
Azure. Prior knowledge of Linux and Azure isn't necessary.
Gain hands-on experience of installing OpenShift Origin 3.9 in a
production configuration and managing applications using the
platform you built Key Features Gain hands-on experience of working
with Kubernetes and Docker Learn how to deploy and manage
applications in OpenShift Get a practical approach to managing
applications on a cloud-based platform Explore multi-site and HA
architectures of OpenShift for production Book DescriptionDocker
containers transform application delivery technologies to make them
faster and more reproducible, and to reduce the amount of time
wasted on configuration. Managing Docker containers in the
multi-node or multi-datacenter environment is a big challenge,
which is why container management platforms are required. OpenShift
is a new generation of container management platforms built on top
of both Docker and Kubernetes. It brings additional functionality
to the table, something that is lacking in Kubernetes. This new
functionality significantly helps software development teams to
bring software development processes to a whole new level. In this
book, we'll start by explaining the container architecture, Docker,
and CRI-O overviews. Then, we'll look at container orchestration
and Kubernetes. We'll cover OpenShift installation, and its basic
and advanced components. Moving on, we'll deep dive into concepts
such as deploying application OpenShift. You'll learn how to set up
an end-to-end delivery pipeline while working with applications in
OpenShift as a developer or DevOps. Finally, you'll discover how to
properly design OpenShift in production environments. This book
gives you hands-on experience of designing, building, and operating
OpenShift Origin 3.9, as well as building new applications or
migrating existing applications to OpenShift. What you will learn
Understand the core concepts behind containers and container
orchestration tools Understand Docker, Kubernetes, and OpenShift,
and their relation to CRI-O Install and work with Kubernetes and
OpenShift Understand how to work with persistent storage in
OpenShift Understand basic and advanced components of OpenShift,
including security and networking Manage deployment strategies and
application's migration in OpenShift Understand and design
OpenShift high availability Who this book is forThe book is for
system administrators, DevOps engineers, solutions architects, or
any stakeholder who wants to understand the concept and business
value of OpenShift.
Build your defense against web attacks with Kali Linux, including
command injection flaws, crypto implementation layers, and web
application security holes Key Features Know how to set up your lab
with Kali Linux Discover the core concepts of web penetration
testing Get the tools and techniques you need with Kali Linux Book
DescriptionWeb Penetration Testing with Kali Linux - Third Edition
shows you how to set up a lab, helps you understand the nature and
mechanics of attacking websites, and explains classical attacks in
great depth. This edition is heavily updated for the latest Kali
Linux changes and the most recent attacks. Kali Linux shines when
it comes to client-side attacks and fuzzing in particular. From the
start of the book, you'll be given a thorough grounding in the
concepts of hacking and penetration testing, and you'll see the
tools used in Kali Linux that relate to web application hacking.
You'll gain a deep understanding of classicalSQL, command-injection
flaws, and the many ways to exploit these flaws. Web penetration
testing also needs a general overview of client-side attacks, which
is rounded out by a long discussion of scripting and input
validation flaws. There is also an important chapter on
cryptographic implementation flaws, where we discuss the most
recent problems with cryptographic layers in the networking stack.
The importance of these attacks cannot be overstated, and defending
against them is relevant to most internet users and, of course,
penetration testers. At the end of the book, you'll use an
automated technique called fuzzing to identify flaws in a web
application. Finally, you'll gain an understanding of web
application vulnerabilities and the ways they can be exploited
using the tools in Kali Linux. What you will learn Learn how to set
up your lab with Kali Linux Understand the core concepts of web
penetration testing Get to know the tools and techniques you need
to use with Kali Linux Identify the difference between hacking a
web application and network hacking Expose vulnerabilities present
in web servers and their applications using server-side attacks
Understand the different techniques used to identify the flavor of
web applications See standard attacks such as exploiting cross-site
request forgery and cross-site scripting flaws Get an overview of
the art of client-side attacks Explore automated attacks such as
fuzzing web applications Who this book is forSince this book sets
out to cover a large number of tools and security fields, it can
work as an introduction to practical security skills for beginners
in security. In addition, web programmers and also system
administrators would benefit from this rigorous introduction to web
penetration testing. Basic system administration skills are
necessary, and the ability to read code is a must.
Develop a solid understanding of the important command-line tools
and utilities in Linux Key Features Delve into the fundamentals of
Linux Explore and work with virtualization, command lines, and Bash
shell scripts Use special file permission flags such as setuid and
setgid Book DescriptionLinux is a Unix-like operating system
assembled under the model of free and open source software
development and distribution. Fundamentals of Linux will help you
learn all the essentials of the Linux command line required to get
you started. The book will start by teaching you how to work with
virtualization software and install CentOS 7 Linux as a VM. Then,
you will get to grips with the workings of various command line
operations, such as cursor movement, commands, options, and
arguments. As you make your way through the chapters, the book will
not only focus on the most essential Linux commands but also give
an introduction to Bash shell scripting. Finally, you will explore
advanced topics, such as networking and troubleshooting your
system, and you will get familiar with the advanced file
permissions: ACL, setuid, and setgid. Fundamentals of Linux
includes real-world tasks, use cases, and problems that, as a
system administrator, you might encounter in your day-to-day
activities. What you will learn Explore basic and advanced
command-line concepts Install Linux, work with VirtualBox, and
install CentOS 7 in VirtualBox Work with the command line
efficiently and learn how to navigate through the Linux filesystem
Create file and user group permissions and edit files Use Sticky
bit to secure your Linux filesystem Define and remove ACL from
Linux files Who this book is forFundamentals of Linux is for
individuals looking to work as a Linux system administrator.
Learn to develop customized device drivers for your embedded Linux
system About This Book * Learn to develop customized Linux device
drivers * Learn the core concepts of device drivers such as memory
management, kernel caching, advanced IRQ management, and so on. *
Practical experience on the embedded side of Linux Who This Book Is
For This book will help anyone who wants to get started with
developing their own Linux device drivers for embedded systems.
Embedded Linux users will benefit highly from this book. This book
covers all about device driver development, from char drivers to
network device drivers to memory management. What You Will Learn *
Use kernel facilities to develop powerful drivers * Develop drivers
for widely used I2C and SPI devices and use the regmap API * Write
and support devicetree from within your drivers * Program advanced
drivers for network and frame buffer devices * Delve into the Linux
irqdomain API and write interrupt controller drivers * Enhance your
skills with regulator and PWM frameworks * Develop measurement
system drivers with IIO framework * Get the best from memory
management and the DMA subsystem * Access and manage GPIO
subsystems and develop GPIO controller drivers In Detail Linux
kernel is a complex, portable, modular and widely used piece of
software, running on around 80% of servers and embedded systems in
more than half of devices throughout the World. Device drivers play
a critical role in how well a Linux system performs. As Linux has
turned out to be one of the most popular operating systems used,
the interest in developing proprietary device drivers is also
increasing steadily. This book will initially help you understand
the basics of drivers as well as prepare for the long journey
through the Linux Kernel. This book then covers drivers development
based on various Linux subsystems such as memory management, PWM,
RTC, IIO, IRQ management, and so on. The book also offers a
practical approach on direct memory access and network device
drivers. By the end of this book, you will be comfortable with the
concept of device driver development and will be in a position to
write any device driver from scratch using the latest kernel
version (v4.13 at the time of writing this book). Style and
approach A set of engaging examples to develop Linux device drivers
Over 120 recipes to perform advanced penetration testing with Kali
Linux About This Book * Practical recipes to conduct effective
penetration testing using the powerful Kali Linux * Leverage tools
like Metasploit, Wireshark, Nmap, and many more to detect
vulnerabilities with ease * Confidently perform networking and
application attacks using task-oriented recipes Who This Book Is
For This book is aimed at IT security professionals, pentesters,
and security analysts who have basic knowledge of Kali Linux and
want to conduct advanced penetration testing techniques. What You
Will Learn * Installing, setting up and customizing Kali for
pentesting on multiple platforms * Pentesting routers and embedded
devices * Bug hunting 2017 * Pwning and escalating through
corporate network * Buffer over?ows 101 * Auditing wireless
networks * Fiddling around with software-defned radio * Hacking on
the run with NetHunter * Writing good quality reports In Detail
With the current rate of hacking, it is very important to pentest
your environment in order to ensure advanced-level security. This
book is packed with practical recipes that will quickly get you
started with Kali Linux (version 2016.2) according to your needs,
and move on to core functionalities. This book will start with the
installation and configuration of Kali Linux so that you can
perform your tests. You will learn how to plan attack strategies
and perform web application exploitation using tools such as Burp,
and Jexboss. You will also learn how to perform network
exploitation using Metasploit, Sparta, and Wireshark. Next, you
will perform wireless and password attacks using tools such as
Patator, John the Ripper, and airoscript-ng. Lastly, you will learn
how to create an optimum quality pentest report! By the end of this
book, you will know how to conduct advanced penetration testing
thanks to the book's crisp and task-oriented recipes. Style and
approach This is a recipe-based book that allows you to venture
into some of the most cutting-edge practices and techniques to
perform penetration testing with Kali Linux.
Over 80 recipes to effectively test your network and boost your
career in security About This Book * Learn how to scan networks to
find vulnerable computers and servers * Hack into devices to
control them, steal their data, and make them yours * Target
wireless networks, databases, and web servers, and password
cracking to make the most of Kali Linux Who This Book Is For If you
are looking to expand your career into penetration testing, you
will need a good understanding of Kali Linux and the variety of
tools it includes. This book will work as a perfect guide for
anyone who wants to have a practical approach in leveraging
penetration testing mechanisms using Kali Linux What You Will Learn
* Acquire the key skills of ethical hacking to perform penetration
testing * Learn how to perform network reconnaissance * Discover
vulnerabilities in hosts * Attack vulnerabilities to take control
of workstations and servers * Understand password cracking to
bypass security * Learn how to hack into wireless networks * Attack
web and database servers to exfiltrate data * Obfuscate your
command and control connections to avoid firewall and IPS detection
In Detail Kali Linux is a Linux distribution designed for
penetration testing and security auditing. It is the successor to
BackTrack, the world's most popular penetration testing
distribution. Kali Linux is the most widely used platform and
toolkit for penetration testing. Security is currently the hottest
field in technology with a projected need for millions of security
professionals. This book focuses on enhancing your knowledge in
Kali Linux for security by expanding your skills with toolkits and
frameworks that can increase your value as a security professional.
Kali Linux Cookbook, Second Edition starts by helping you install
Kali Linux on different options available. You will also be able to
understand the lab architecture and install a Windows host for use
in the lab. Next, you will understand the concept of vulnerability
analysis and look at the different types of exploits. The book will
introduce you to the concept and psychology of Social Engineering
and password cracking. You will then be able to use these skills to
expand the scope of any breaches you create. Finally, the book will
guide you in exploiting specific technologies and gaining access to
other systems in the environment. By the end of this book, you will
have gained the core knowledge and concepts of the penetration
testing process. Style and approach This book teaches you
everything you need to know about Kali Linux from the perspective
of a penetration tester. It is filled with powerful recipes and
practical examples that will help you gain in-depth knowledge of
Kali Linux.
|
You may like...
Only Footnotes
Michael W Lucas
Hardcover
R595
R522
Discovery Miles 5 220
|