|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > Unix, Unix Linux & Unix TCL/TK
Docker lets you create, deploy, and manage your applications
anywhere at anytime - flexibility is key so you can deploy stable,
secure, and scalable app containers across a wide variety of
platforms and delve into microservices architecture About This Book
* This up-to-date edition shows how to leverage Docker's features
to deploy your existing applications * Learn how to package your
applications with Docker and build, ship, and scale your containers
* Explore real-world examples of securing and managing Docker
containers Who This Book Is For This book is ideal for developers,
operations managers, and IT professionals who would like to learn
about Docker and use it to build and deploy container-based apps.
No prior knowledge of Docker is expected. What You Will Learn *
Develop containerized applications using the Docker version 17.03 *
Build Docker images from containers and launch them * Develop
Docker images and containers leveraging Dockerfiles * Use Docker
volumes to share data * Get to know how data is shared between
containers * Understand Docker Jenkins integration * Gain the power
of container orchestration * Familiarize yourself with the
frequently used commands such as docker exec, docker ps, docker
top, and docker stats In Detail Docker is an open source
containerization engine that offers a simple and faster way for
developing and running software. Docker containers wrap software in
a complete filesystem that contains everything it needs to run,
enabling any application to be run anywhere - this flexibily and
portabily means that you can run apps in the cloud, on virtual
machines, or on dedicated servers. This book will give you a tour
of the new features of Docker and help you get started with Docker
by building and deploying a simple application. It will walk you
through the commands required to manage Docker images and
containers. You'll be shown how to download new images, run
containers, list the containers running on the Docker host, and
kill them. You'll learn how to leverage Docker's volumes feature to
share data between the Docker host and its containers - this data
management feature is also useful for persistent data. This book
also covers how to orchestrate containers using Docker compose,
debug containers, and secure containers using the AppArmor and
SELinux security modules. Style and approach This step-by-step
guide will walk you through the features and use of Docker, from
Docker software installation to the impenetrable security of
containers.
A comprehensive guide to mastering the art of preventing your Linux
system from getting compromised. Key Features Leverage this guide
to confidently deliver a system that reduces the risk of being
hacked Perform a number of advanced Linux security techniques such
as network service detection, user authentication, controlling
special permissions, encrypting file systems, and much more Master
the art of securing a Linux environment with this end-to-end
practical guide Book DescriptionThis book has extensive coverage of
techniques that will help prevent attackers from breaching your
system, by building a much more secure Linux environment. You will
learn various security techniques such as SSH hardening, network
service detection, setting up firewalls, encrypting file systems,
protecting user accounts, authentication processes, and so on.
Moving forward, you will also develop hands-on skills with advanced
Linux permissions, access control, special modes, and more. Lastly,
this book will also cover best practices and troubleshooting
techniques to get your work done efficiently. By the end of this
book, you will be confident in delivering a system that will be
much harder to compromise. What you will learn Use various
techniques to prevent intruders from accessing sensitive data
Prevent intruders from planting malware, and detect whether malware
has been planted Prevent insiders from accessing data that they
aren't authorized to access Do quick checks to see whether a
computer is running network services that it doesn't need to run
Learn security techniques that are common to all Linux distros, and
some that are distro-specific Who this book is forIf you are a
systems administrator or a network engineer interested in making
your Linux environment more secure, then this book is for you.
Security consultants wanting to enhance their Linux security skills
will also benefit from this book. Prior knowledge of Linux is
mandatory.
Optimize and boost your Linux-based system with Yocto Project and
increase its reliability and robustness efficiently and
cost-effectively. About This Book * Optimize your Yocto Project
tools to develop efficient Linux-based projects * Practical
approach to learning Linux development using Yocto Project *
Demonstrates concepts in a practical and easy-to-understand way Who
This Book Is For If you are an embedded Linux developer with a
basic knowledge of Yocto Project and want to broaden your knowledge
with examples of embedded development, then this book is for you.
This book is also for professionals who want to find new insights
into working methodologies for Linux development. What You Will
Learn * Understand the basic concepts involved in Poky workflows
along with configuring and preparing the Poky build environment. *
Configure a build server and customize images using Toaster. *
Generate images and fit packages into created images using BitBake.
* Support the development process by setting up and using Package
feeds. * Debug Yocto Project by configuring Poky. * Build an image
for the BeagleBone Black, RaspberryPi 3, and Wandboard, and boot it
from an SD card. In Detail Yocto Project is turning out to be the
best integration framework for creating reliable embedded Linux
projects. It has the edge over other frameworks because of its
features such as less development time and improved reliability and
robustness. Embedded Linux Development using Yocto Project starts
with an in-depth explanation of all Yocto Project tools, to help
you perform different Linux-based tasks. The book then moves on to
in-depth explanations of Poky and BitBake. It also includes some
practical use cases for building a Linux subsystem project using
Yocto Project tools available for embedded Linux. The book also
covers topics such as SDK, recipetool, and others. By the end of
the book, you will have learned how to generate and run an image
for real hardware boards and will have gained hands-on experience
at building efficient Linux systems using Yocto Project. Style and
approach A clear, concise, and straightforward book that will
enable you to use and implement the latest features of Yocto
Project.
Get up-to-date with the finer points of Ubuntu Server using this
comprehensive guide Key Features A practical easy-to-understand
book that will teach you how to deploy, maintain and troubleshoot
Ubuntu Server Get well-versed with newly-added features in Ubuntu
18.04. Learn to manage cutting-edge technologies such as
virtualization, containers, Nextcloud and more Book
DescriptionUbuntu Server has taken the data centers by storm.
Whether you're deploying Ubuntu for a large-scale project or for a
small office, it is a stable, customizable, and powerful Linux
distribution that leads the way with innovative and cutting-edge
features. For both simple and complex server deployments, Ubuntu's
flexible nature can be easily adapted to meet to the needs of your
organization. With this book as your guide, you will learn all
about Ubuntu Server, from initial deployment to creating
production-ready resources for your network. The book begins with
the concept of user management, group management, and filesystem
permissions. Continuing into managing storage volumes, you will
learn how to format storage devices, utilize logical volume
management, and monitor disk usage. Later, you will learn how to
virtualize hosts and applications, which will cover setting up
KVM/QEMU, as well as containerization with both Docker and LXD. As
the book continues, you will learn how to automate configuration
with Ansible, as well as take a look at writing scripts. Lastly,
you will explore best practices and troubleshooting techniques when
working with Ubuntu Server that are applicable to real-world
scenarios. By the end of the book, you will be an expert Ubuntu
Server administrator who is well-versed in its advanced concepts.
What you will learn Manage users, groups, and permissions Encrypt
and decrypt disks with Linux Unified Key Setup (LUKS) Set up SSH
for remote access, and connect it to other nodes Add, remove, and
search for packages Use NFS and Samba to share directories with
other users Get to know techniques for managing Apache and MariaDB
Explore best practices and troubleshooting techniques Get familiar
with scripting Automate server deployments with Ansible Who this
book is forThis book is intended for readers with intermediate or
advanced-beginner skills with Linux, who would like to learn all
about setting up servers with Ubuntu Server. This book assumes that
the reader knows the basics of Linux, such as editing configuration
files and running basic commands.
Learn the skills you need to take advantage of Kali Linux for
digital forensics investigations using this comprehensive guide
About This Book * Master powerful Kali Linux tools for digital
investigation and analysis * Perform evidence acquisition,
preservation, and analysis using various tools within Kali Linux *
Implement the concept of cryptographic hashing and imaging using
Kali Linux * Perform memory forensics with Volatility and internet
forensics with Xplico. * Discover the capabilities of professional
forensic tools such as Autopsy and DFF (Digital Forensic Framework)
used by law enforcement and military personnel alike Who This Book
Is For This book is targeted at forensics and digital
investigators, security analysts, or any stakeholder interested in
learning digital forensics using Kali Linux. Basic knowledge of
Kali Linux will be an advantage. What You Will Learn * Get to grips
with the fundamentals of digital forensics and explore best
practices * Understand the workings of file systems, storage, and
data fundamentals * Discover incident response procedures and best
practices * Use DC3DD and Guymager for acquisition and preservation
techniques * Recover deleted data with Foremost and Scalpel * Find
evidence of accessed programs and malicious programs using
Volatility. * Perform network and internet capture analysis with
Xplico * Carry out professional digital forensics investigations
using the DFF and Autopsy automated forensic suites In Detail Kali
Linux is a Linux-based distribution used mainly for penetration
testing and digital forensics. It has a wide range of tools to help
in forensics investigations and incident response mechanisms. You
will start by understanding the fundamentals of digital forensics
and setting up your Kali Linux environment to perform different
investigation practices. The book will delve into the realm of
operating systems and the various formats for file storage,
including secret hiding places unseen by the end user or even the
operating system. The book will also teach you to create forensic
images of data and maintain integrity using hashing tools. Next,
you will also master some advanced topics such as autopsies and
acquiring investigation data from the network, operating system
memory, and so on. The book introduces you to powerful tools that
will take your forensic abilities and investigations to a
professional level, catering for all aspects of full digital
forensic investigations from hashing to reporting. By the end of
this book, you will have had hands-on experience in implementing
all the pillars of digital forensics-acquisition, extraction,
analysis, and presentation using Kali Linux tools. Style and
approach While covering the best practices of digital forensics
investigations, evidence acquisition, preservation, and analysis,
this book delivers easy-to-follow practical examples and detailed
labs for an easy approach to learning forensics. Following the
guidelines within each lab, you can easily practice all readily
available forensic tools in Kali Linux, within either a dedicated
physical or virtual machine.
A concise, fast-paced guide to orchestrating and deploying scalable
services with Docker About This Book * Explore the new features
added to the core Docker Engine to make multi-container
orchestration easy * Leverage tools such as Docker Machine, Swarm,
Compose, and third-party tools such as Kubernetes, Mesosphere, and
CoreOS to orchestrate containers * Use Docker Compose with Swarm
and apply rolling updates for zero downtime deployments Who This
Book Is For This book is aimed at Sysadmins and DevOps engineers
who know what Docker does and are now looking to manage multiple
containers on multiple hosts using the orchestration feature. What
You Will Learn * Build scalable, reliable services with Docker *
See how to manage a service in Docker using Docker Swarm,
Kubernetes, and Mesosphere * Discover simpler orchestration tools
such as CoreOS/Fleet and Rancher Cattle * Understand cluster-wide
logging, system monitoring, and troubleshooting * Build, test, and
deploy containers using Continuous Integration * Deploy cluster
hosts on cloud services and automate your infrastructure In Detail
Docker orchestration is what you need when transitioning from
deploying containers individually on a single host to deploying
complex multi-container apps on many machines. This book covers the
new orchestration features of Docker 1.12 and helps you efficiently
build, test, and deploy your application using Docker. You will be
shown how to build multi-container applications using Docker
Compose. You will also be introduced to the building blocks for
multi-host Docker clusters such as registry, overlay networks, and
shared storage using practical examples. This book gives an
overview of core tools such as Docker Machine, Swarm, and Compose
which will enhance your orchestration skills. You'll learn how to
set up a swarm using the decentralized building block. Next, you'll
be shown how to make the most out of the in-built orchestration
feature of Docker engine and you'll use third-party tools such as
Kubernetes, Mesosphere, and CoreOS to orchestrate your existing
process. Finally, you will learn to deploy cluster hosts on cloud
services and automate your infrastructure. Style and approach This
comprehensive guide will take you through the orchestration feature
of Docker. Using practical examples, you will discover various
tools that can be used to manage multiple containers with ease.
Kali Linux Wireless Penetration Testing Beginner's Guide, Third
Edition presents wireless pentesting from the ground up, and has
been updated with the latest methodologies, including full coverage
of the KRACK attack. About This Book * Learn wireless penetration
testing with Kali Linux * Detect hidden wireless networks and
discover their names * Explore advanced Wi-Fi hacking techniques
including rogue access point hosting and probe sniffing * Develop
your encryption cracking skills and gain an insight into the
methods used by attackers and the underlying technologies that
facilitate these attacks Who This Book Is For Kali Linux Wireless
Penetration Testing Beginner's Guide, Third Edition is suitable for
anyone who wants to learn more about pentesting and how to
understand and defend against the latest wireless network attacks.
What You Will Learn * Understand the KRACK attack in full detail *
Create a wireless lab for your experiments * Sniff out wireless
packets, hidden networks, and SSIDs * Capture and crack WPA-2 keys
* Sniff probe requests and track users through their SSID history *
Attack radius authentication systems * Sniff wireless traffic and
collect interesting data * Decrypt encrypted traffic with stolen
keys In Detail As wireless networks become ubiquitous in our lives,
wireless penetration testing has become a key skill in the
repertoire of the professional penetration tester. This has been
highlighted again recently with the discovery of the KRACK attack
which enables attackers to potentially break into Wi-Fi networks
encrypted with WPA2. The Kali Linux security distribution comes
with a myriad of tools used for networking attacks and detecting
security loopholes. Kali Linux Wireless Penetration Testing
Beginner's Guide, Third Edition has been updated to Kali Linux
2017.3 with the latest methodologies, including full coverage of
the KRACK attack and how to defend against it. The book presents
wireless pentesting from the ground up, introducing all elements of
penetration testing with each new technology. You'll learn various
wireless testing methodologies by example, from the basics of
wireless routing and encryption through to detailed coverage of
hacking methods and attacks such as the Hirte and Caffe Latte.
Style and approach Kali Linux Wireless Penetration Testing
Beginner's Guide, Third Edition is a practical, hands-on guide to
modern wi-fi network hacking. It covers both the theory and
practice of wireless pentesting, offering detailed, real-world
coverage of the latest vulnerabilities and attacks.
Master the complexities of Bash shell scripting and unlock the
power of shell for your enterprise Key Features Identify high-level
steps such as verifying user input Using the command line and
conditional statements in creating/executing simple shell scripts
Create and edit dynamic shell scripts to manage complex and
repetitive tasks Leverage the command-line to bypass GUI and
automate common tasks Book DescriptionIn this book, you'll discover
everything you need to know to master shell scripting and make
informed choices about the elements you employ. Grab your favorite
editor and start writing your best Bash scripts step by step. Get
to grips with the fundamentals of creating and running a script in
normal mode, and in debug mode. Learn about various conditional
statements' code snippets, and realize the power of repetition and
loops in your shell script. You will also learn to write complex
shell scripts. This book will also deep dive into file system
administration, directories, and system administration like
networking, process management, user authentications, and package
installation and regular expressions. Towards the end of the book,
you will learn how to use Python as a BASH Scripting alternative.
By the end of this book, you will know shell scripts at the snap of
your fingers and will be able to automate and communicate with your
system with keyboard expressions. What you will learn Make,
execute, and debug your first Bash script Create interactive
scripts that prompt for user input Foster menu structures for
operators with little command-line experience Develop scripts that
dynamically edit web configuration files to produce a new virtual
host Write scripts that use AWK to search and reports on log files
Draft effective scripts using functions as building blocks,
reducing maintenance and build time Make informed choices by
comparing different script languages such as Python with BASH Who
this book is forIf you are a Linux administrator or a system
administrator and are interested in automating tasks in your daily
lives, saving time and effort, this book is for you. Basic shell
scripting and command-line experience will be required. Familiarity
with the tasks you need to automate will be helpful.
|
|