|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > Unix, Unix Linux & Unix TCL/TK
Learn to efficiently run Linux-based workloads in Azure Key
Features Manage and deploy virtual machines in your Azure
environment Explore various open source tools to integrate
automation and orchestration Leverage Linux features to create,
run, and manage containers Book DescriptionAzure's market share has
increased massively and enterprises are adopting it rapidly. Linux
is a widely-used operating system and has proven to be one of the
most popular workloads on Azure. It has become crucial for Linux
administrators and Microsoft professionals to be well versed with
the concepts of managing Linux workloads in an Azure environment.
Hands-On Linux Administration on Azure starts by introducing you to
the fundamentals of Linux and Azure, after which you will explore
advanced Linux features and see how they are managed in an Azure
environment. Next, with the help of real-world scenarios, you will
learn how to deploy virtual machines(VMs) in Azure, along with
extending Azure VMs capabilities and managing them efficiently. You
will then understand continuous configuration automation and use
Ansible, SaltStack and Powershell DSC for orchestration. As you
make your way through the chapters, you will understand containers
and how they work, along with managing containers and the various
tasks you can perform with them. In the concluding chapters, you
will cover some Linux troubleshooting techniques on Azure, and you
will also be able to monitor Linux in Azure using different open
source tools. By the end of this book, you will be able to
administer Linux on Azure and make the most of the important tools
required for deployment. What you will learn Understand why Azure
is the ideal solution for your open source workloads Master
essential Linux skills and learn to find your way around the Linux
environment Deploy Linux in an Azure environment Use configuration
management to manage Linux in Azure Manage containers in an Azure
environment Enhance Linux security and use Azure's identity
management systems Automate deployment with Azure Resource Manager
(ARM) and Powershell Employ Ansible to manage Linux instances in an
Azure cloud environment Who this book is forHands-On Linux
Administration on Azure is for Linux administrators and Microsoft
professionals that need to deploy and manage their workloads in
Azure. Prior knowledge of Linux and Azure isn't necessary.
Over 30 recipes to develop custom drivers for your embedded Linux
applications. Key Features Use Kernel facilities to develop
powerful drivers Via a practical approach, learn core concepts of
developing device drivers Program a custom character device to get
access to kernel internals Book DescriptionLinux is a unified
kernel that is widely used to develop embedded systems. As Linux
has turned out to be one of the most popular operating systems
used, the interest in developing proprietary device drivers has
also increased. Device drivers play a critical role in how the
system performs and ensures that the device works in the manner
intended. By offering several examples on the development of
character devices and how to use other kernel internals, such as
interrupts, kernel timers, and wait queue, as well as how to manage
a device tree, you will be able to add proper management for custom
peripherals to your embedded system. You will begin by installing
the Linux kernel and then configuring it. Once you have installed
the system, you will learn to use the different kernel features and
the character drivers. You will also cover interrupts in-depth and
how you can manage them. Later, you will get into the kernel
internals required for developing applications. Next, you will
implement advanced character drivers and also become an expert in
writing important Linux device drivers. By the end of the book, you
will be able to easily write a custom character driver and kernel
code as per your requirements. What you will learn Become familiar
with the latest kernel releases (4.19+/5.x) running on the
ESPRESSObin devkit, an ARM 64-bit machine Download, configure,
modify, and build kernel sources Add and remove a device driver or
a module from the kernel Master kernel programming Understand how
to implement character drivers to manage different kinds of
computer peripherals Become well versed with kernel helper
functions and objects that can be used to build kernel applications
Acquire a knowledge of in-depth concepts to manage custom hardware
with Linux from both the kernel and user space Who this book is
forThis book will help anyone who wants to develop their own Linux
device drivers for embedded systems. Having basic hand-on with
Linux operating system and embedded concepts is necessary.
Gain hands-on experience of installing OpenShift Origin 3.9 in a
production configuration and managing applications using the
platform you built Key Features Gain hands-on experience of working
with Kubernetes and Docker Learn how to deploy and manage
applications in OpenShift Get a practical approach to managing
applications on a cloud-based platform Explore multi-site and HA
architectures of OpenShift for production Book DescriptionDocker
containers transform application delivery technologies to make them
faster and more reproducible, and to reduce the amount of time
wasted on configuration. Managing Docker containers in the
multi-node or multi-datacenter environment is a big challenge,
which is why container management platforms are required. OpenShift
is a new generation of container management platforms built on top
of both Docker and Kubernetes. It brings additional functionality
to the table, something that is lacking in Kubernetes. This new
functionality significantly helps software development teams to
bring software development processes to a whole new level. In this
book, we'll start by explaining the container architecture, Docker,
and CRI-O overviews. Then, we'll look at container orchestration
and Kubernetes. We'll cover OpenShift installation, and its basic
and advanced components. Moving on, we'll deep dive into concepts
such as deploying application OpenShift. You'll learn how to set up
an end-to-end delivery pipeline while working with applications in
OpenShift as a developer or DevOps. Finally, you'll discover how to
properly design OpenShift in production environments. This book
gives you hands-on experience of designing, building, and operating
OpenShift Origin 3.9, as well as building new applications or
migrating existing applications to OpenShift. What you will learn
Understand the core concepts behind containers and container
orchestration tools Understand Docker, Kubernetes, and OpenShift,
and their relation to CRI-O Install and work with Kubernetes and
OpenShift Understand how to work with persistent storage in
OpenShift Understand basic and advanced components of OpenShift,
including security and networking Manage deployment strategies and
application's migration in OpenShift Understand and design
OpenShift high availability Who this book is forThe book is for
system administrators, DevOps engineers, solutions architects, or
any stakeholder who wants to understand the concept and business
value of OpenShift.
Build your defense against web attacks with Kali Linux, including
command injection flaws, crypto implementation layers, and web
application security holes Key Features Know how to set up your lab
with Kali Linux Discover the core concepts of web penetration
testing Get the tools and techniques you need with Kali Linux Book
DescriptionWeb Penetration Testing with Kali Linux - Third Edition
shows you how to set up a lab, helps you understand the nature and
mechanics of attacking websites, and explains classical attacks in
great depth. This edition is heavily updated for the latest Kali
Linux changes and the most recent attacks. Kali Linux shines when
it comes to client-side attacks and fuzzing in particular. From the
start of the book, you'll be given a thorough grounding in the
concepts of hacking and penetration testing, and you'll see the
tools used in Kali Linux that relate to web application hacking.
You'll gain a deep understanding of classicalSQL, command-injection
flaws, and the many ways to exploit these flaws. Web penetration
testing also needs a general overview of client-side attacks, which
is rounded out by a long discussion of scripting and input
validation flaws. There is also an important chapter on
cryptographic implementation flaws, where we discuss the most
recent problems with cryptographic layers in the networking stack.
The importance of these attacks cannot be overstated, and defending
against them is relevant to most internet users and, of course,
penetration testers. At the end of the book, you'll use an
automated technique called fuzzing to identify flaws in a web
application. Finally, you'll gain an understanding of web
application vulnerabilities and the ways they can be exploited
using the tools in Kali Linux. What you will learn Learn how to set
up your lab with Kali Linux Understand the core concepts of web
penetration testing Get to know the tools and techniques you need
to use with Kali Linux Identify the difference between hacking a
web application and network hacking Expose vulnerabilities present
in web servers and their applications using server-side attacks
Understand the different techniques used to identify the flavor of
web applications See standard attacks such as exploiting cross-site
request forgery and cross-site scripting flaws Get an overview of
the art of client-side attacks Explore automated attacks such as
fuzzing web applications Who this book is forSince this book sets
out to cover a large number of tools and security fields, it can
work as an introduction to practical security skills for beginners
in security. In addition, web programmers and also system
administrators would benefit from this rigorous introduction to web
penetration testing. Basic system administration skills are
necessary, and the ability to read code is a must.
A journey toward containerized applications in production with a
cloud-portable, secure, robust and highly available Docker
Enterprise platform. Key Features Get an insider's view into the
container movement and Docker Enterprise Manage the transformation
associated with enterprise container adoption Walk through the
enterprise container adoption journey Book DescriptionWhile known
mostly as the open source engine behind tens of millions of server
nodes, Docker also offers commercially supported enterprise tooling
known as the Docker Enterprise. This platform leverages the deep
roots from Docker Engine - Community (formerly Docker CE) and
Kubernetes, but adds support and tooling to efficiently operate a
secure container platform at scale. With hundreds of enterprises on
board, best practices and adoption patterns are emerging rapidly.
These learning points can be used to inform adopters and help
manage the enterprise transformation associated with enterprise
container adoption. This book starts by explaining the case for
Docker Enterprise, as well as its structure and reference
architecture. From there, we progress through the PoC,pilot and
production stages as a working model for adoption, evolving the
platform's design and configuration for each stage and using
detailed application examples along the way to clarify and
demonstrate important concepts.The book concludes with Docker's
impact on other emerging software technologies, such as Blockchain
and Serverless computing. By the end of this book, you'll have a
better understanding of what it takes to get your enterprise up and
running with Docker Enterprise and beyond. What you will learn
Understand why containers are important to an enterprise Understand
the features and components of Docker Enterprise 2 Find out about
the PoC, pilot, and production adoption phases Get to know the best
practices for installing and operating Docker Enterprise Understand
what is important for a Docker Enterprise in production Run
Kubernetes on Docker Enterprise Who this book is forThis book is
for Software Architects, DevOps Engineers, Tech Ops, Docker
professionals, or any IT professional working with Docker and
containers who wants to move containerized workloads to production.
This book discusses the enterprise adoption of Docker and
Kubernetes,therefore a basic understanding of Docker concepts will
be helpful.
Over 120 recipes to perform advanced penetration testing with Kali
Linux About This Book * Practical recipes to conduct effective
penetration testing using the powerful Kali Linux * Leverage tools
like Metasploit, Wireshark, Nmap, and many more to detect
vulnerabilities with ease * Confidently perform networking and
application attacks using task-oriented recipes Who This Book Is
For This book is aimed at IT security professionals, pentesters,
and security analysts who have basic knowledge of Kali Linux and
want to conduct advanced penetration testing techniques. What You
Will Learn * Installing, setting up and customizing Kali for
pentesting on multiple platforms * Pentesting routers and embedded
devices * Bug hunting 2017 * Pwning and escalating through
corporate network * Buffer over?ows 101 * Auditing wireless
networks * Fiddling around with software-defned radio * Hacking on
the run with NetHunter * Writing good quality reports In Detail
With the current rate of hacking, it is very important to pentest
your environment in order to ensure advanced-level security. This
book is packed with practical recipes that will quickly get you
started with Kali Linux (version 2016.2) according to your needs,
and move on to core functionalities. This book will start with the
installation and configuration of Kali Linux so that you can
perform your tests. You will learn how to plan attack strategies
and perform web application exploitation using tools such as Burp,
and Jexboss. You will also learn how to perform network
exploitation using Metasploit, Sparta, and Wireshark. Next, you
will perform wireless and password attacks using tools such as
Patator, John the Ripper, and airoscript-ng. Lastly, you will learn
how to create an optimum quality pentest report! By the end of this
book, you will know how to conduct advanced penetration testing
thanks to the book's crisp and task-oriented recipes. Style and
approach This is a recipe-based book that allows you to venture
into some of the most cutting-edge practices and techniques to
perform penetration testing with Kali Linux.
Over 80 recipes to effectively test your network and boost your
career in security About This Book * Learn how to scan networks to
find vulnerable computers and servers * Hack into devices to
control them, steal their data, and make them yours * Target
wireless networks, databases, and web servers, and password
cracking to make the most of Kali Linux Who This Book Is For If you
are looking to expand your career into penetration testing, you
will need a good understanding of Kali Linux and the variety of
tools it includes. This book will work as a perfect guide for
anyone who wants to have a practical approach in leveraging
penetration testing mechanisms using Kali Linux What You Will Learn
* Acquire the key skills of ethical hacking to perform penetration
testing * Learn how to perform network reconnaissance * Discover
vulnerabilities in hosts * Attack vulnerabilities to take control
of workstations and servers * Understand password cracking to
bypass security * Learn how to hack into wireless networks * Attack
web and database servers to exfiltrate data * Obfuscate your
command and control connections to avoid firewall and IPS detection
In Detail Kali Linux is a Linux distribution designed for
penetration testing and security auditing. It is the successor to
BackTrack, the world's most popular penetration testing
distribution. Kali Linux is the most widely used platform and
toolkit for penetration testing. Security is currently the hottest
field in technology with a projected need for millions of security
professionals. This book focuses on enhancing your knowledge in
Kali Linux for security by expanding your skills with toolkits and
frameworks that can increase your value as a security professional.
Kali Linux Cookbook, Second Edition starts by helping you install
Kali Linux on different options available. You will also be able to
understand the lab architecture and install a Windows host for use
in the lab. Next, you will understand the concept of vulnerability
analysis and look at the different types of exploits. The book will
introduce you to the concept and psychology of Social Engineering
and password cracking. You will then be able to use these skills to
expand the scope of any breaches you create. Finally, the book will
guide you in exploiting specific technologies and gaining access to
other systems in the environment. By the end of this book, you will
have gained the core knowledge and concepts of the penetration
testing process. Style and approach This book teaches you
everything you need to know about Kali Linux from the perspective
of a penetration tester. It is filled with powerful recipes and
practical examples that will help you gain in-depth knowledge of
Kali Linux.
Build, Manage and Improve your infrastructure effortlessly. About
This Book * An up-to-date and comprehensive resource on Terraform
that lets you quickly and efficiently launch your infrastructure *
Learn how to implement your infrastructure as code and make secure,
effective changes to your infrastructure * Learn to build
multi-cloud fault-tolerant systems and simplify the management and
orchestration of even the largest scale and most complex cloud
infrastructures Who This Book Is For This book is for developers
and operators who already have some exposure to working with
infrastructure but want to improve their workflow and introduce
infrastructure as a code practice. Knowledge of essential Amazon
Web Services components (EC2, VPC, IAM) would help contextualize
the examples provided. Basic understanding of Jenkins and Shell
scripts will be helpful for the chapters on the production usage of
Terraform. What You Will Learn * Understand what Infrastructure as
Code (IaC) means and why it matters * Install, configure, and
deploy Terraform * Take full control of your infrastructure in the
form of code * Manage complete infrastructure, starting with a
single server and scaling beyond any limits * Discover a great set
of production-ready practices to manage infrastructure * Set up
CI/CD pipelines to test and deliver Terraform stacks * Construct
templates to simplify more complex provisioning tasks In Detail
Terraform is a tool used to efficiently build, configure, and
improve the production infrastructure. It can manage the existing
infrastructure as well as create custom in-house solutions. This
book shows you when and how to implement infrastructure as a code
practices with Terraform. It covers everything necessary to set up
the complete management of infrastructure with Terraform, starting
with the basics of using providers and resources. It is a
comprehensive guide that begins with very small infrastructure
templates and takes you all the way to managing complex systems,
all using concrete examples that evolve over the course of the
book. The book ends with the complete workflow of managing a
production infrastructure as code-this is achieved with the help of
version control and continuous integration. The readers will also
learn how to combine multiple providers in a single template and
manage different code bases with many complex modules. It focuses
on how to set up continuous integration for the infrastructure
code. The readers will be able to use Terraform to build, change,
and combine infrastructure safely and efficiently. Style and
approach This book will help and guide you to implement Terraform
in your infrastructure. The readers will start by working on very
small infrastructure templates and then slowly move on to manage
complex systems, all by using concrete examples that will evolve
during the course of the book.
Docker lets you create, deploy, and manage your applications
anywhere at anytime - flexibility is key so you can deploy stable,
secure, and scalable app containers across a wide variety of
platforms and delve into microservices architecture About This Book
* This up-to-date edition shows how to leverage Docker's features
to deploy your existing applications * Learn how to package your
applications with Docker and build, ship, and scale your containers
* Explore real-world examples of securing and managing Docker
containers Who This Book Is For This book is ideal for developers,
operations managers, and IT professionals who would like to learn
about Docker and use it to build and deploy container-based apps.
No prior knowledge of Docker is expected. What You Will Learn *
Develop containerized applications using the Docker version 17.03 *
Build Docker images from containers and launch them * Develop
Docker images and containers leveraging Dockerfiles * Use Docker
volumes to share data * Get to know how data is shared between
containers * Understand Docker Jenkins integration * Gain the power
of container orchestration * Familiarize yourself with the
frequently used commands such as docker exec, docker ps, docker
top, and docker stats In Detail Docker is an open source
containerization engine that offers a simple and faster way for
developing and running software. Docker containers wrap software in
a complete filesystem that contains everything it needs to run,
enabling any application to be run anywhere - this flexibily and
portabily means that you can run apps in the cloud, on virtual
machines, or on dedicated servers. This book will give you a tour
of the new features of Docker and help you get started with Docker
by building and deploying a simple application. It will walk you
through the commands required to manage Docker images and
containers. You'll be shown how to download new images, run
containers, list the containers running on the Docker host, and
kill them. You'll learn how to leverage Docker's volumes feature to
share data between the Docker host and its containers - this data
management feature is also useful for persistent data. This book
also covers how to orchestrate containers using Docker compose,
debug containers, and secure containers using the AppArmor and
SELinux security modules. Style and approach This step-by-step
guide will walk you through the features and use of Docker, from
Docker software installation to the impenetrable security of
containers.
A comprehensive guide to mastering the art of preventing your Linux
system from getting compromised. Key Features Leverage this guide
to confidently deliver a system that reduces the risk of being
hacked Perform a number of advanced Linux security techniques such
as network service detection, user authentication, controlling
special permissions, encrypting file systems, and much more Master
the art of securing a Linux environment with this end-to-end
practical guide Book DescriptionThis book has extensive coverage of
techniques that will help prevent attackers from breaching your
system, by building a much more secure Linux environment. You will
learn various security techniques such as SSH hardening, network
service detection, setting up firewalls, encrypting file systems,
protecting user accounts, authentication processes, and so on.
Moving forward, you will also develop hands-on skills with advanced
Linux permissions, access control, special modes, and more. Lastly,
this book will also cover best practices and troubleshooting
techniques to get your work done efficiently. By the end of this
book, you will be confident in delivering a system that will be
much harder to compromise. What you will learn Use various
techniques to prevent intruders from accessing sensitive data
Prevent intruders from planting malware, and detect whether malware
has been planted Prevent insiders from accessing data that they
aren't authorized to access Do quick checks to see whether a
computer is running network services that it doesn't need to run
Learn security techniques that are common to all Linux distros, and
some that are distro-specific Who this book is forIf you are a
systems administrator or a network engineer interested in making
your Linux environment more secure, then this book is for you.
Security consultants wanting to enhance their Linux security skills
will also benefit from this book. Prior knowledge of Linux is
mandatory.
Optimize and boost your Linux-based system with Yocto Project and
increase its reliability and robustness efficiently and
cost-effectively. About This Book * Optimize your Yocto Project
tools to develop efficient Linux-based projects * Practical
approach to learning Linux development using Yocto Project *
Demonstrates concepts in a practical and easy-to-understand way Who
This Book Is For If you are an embedded Linux developer with a
basic knowledge of Yocto Project and want to broaden your knowledge
with examples of embedded development, then this book is for you.
This book is also for professionals who want to find new insights
into working methodologies for Linux development. What You Will
Learn * Understand the basic concepts involved in Poky workflows
along with configuring and preparing the Poky build environment. *
Configure a build server and customize images using Toaster. *
Generate images and fit packages into created images using BitBake.
* Support the development process by setting up and using Package
feeds. * Debug Yocto Project by configuring Poky. * Build an image
for the BeagleBone Black, RaspberryPi 3, and Wandboard, and boot it
from an SD card. In Detail Yocto Project is turning out to be the
best integration framework for creating reliable embedded Linux
projects. It has the edge over other frameworks because of its
features such as less development time and improved reliability and
robustness. Embedded Linux Development using Yocto Project starts
with an in-depth explanation of all Yocto Project tools, to help
you perform different Linux-based tasks. The book then moves on to
in-depth explanations of Poky and BitBake. It also includes some
practical use cases for building a Linux subsystem project using
Yocto Project tools available for embedded Linux. The book also
covers topics such as SDK, recipetool, and others. By the end of
the book, you will have learned how to generate and run an image
for real hardware boards and will have gained hands-on experience
at building efficient Linux systems using Yocto Project. Style and
approach A clear, concise, and straightforward book that will
enable you to use and implement the latest features of Yocto
Project.
|
You may like...
Sudo Mastery
Michael W Lucas
Hardcover
R963
R868
Discovery Miles 8 680
|