0
Your cart

Your cart is empty

Browse All Departments
Price
  • R100 - R250 (22)
  • R250 - R500 (109)
  • R500+ (428)
  • -
Status
Format
Author / Contributor
Publisher

Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > Unix, Unix Linux & Unix TCL/TK

Shell Scripting - Learn Linux Shell Programming Step-By-Step (Bash Scripting, Unix) (Paperback): Harry Harvey Shell Scripting - Learn Linux Shell Programming Step-By-Step (Bash Scripting, Unix) (Paperback)
Harry Harvey
R400 Discovery Miles 4 000 Ships in 10 - 15 working days
Kali Linux Cookbook - (Paperback, 2nd Revised edition): Corey P. Schultz, Bob Perciaccante Kali Linux Cookbook - (Paperback, 2nd Revised edition)
Corey P. Schultz, Bob Perciaccante
R1,308 Discovery Miles 13 080 Ships in 10 - 15 working days

Over 80 recipes to effectively test your network and boost your career in security About This Book * Learn how to scan networks to find vulnerable computers and servers * Hack into devices to control them, steal their data, and make them yours * Target wireless networks, databases, and web servers, and password cracking to make the most of Kali Linux Who This Book Is For If you are looking to expand your career into penetration testing, you will need a good understanding of Kali Linux and the variety of tools it includes. This book will work as a perfect guide for anyone who wants to have a practical approach in leveraging penetration testing mechanisms using Kali Linux What You Will Learn * Acquire the key skills of ethical hacking to perform penetration testing * Learn how to perform network reconnaissance * Discover vulnerabilities in hosts * Attack vulnerabilities to take control of workstations and servers * Understand password cracking to bypass security * Learn how to hack into wireless networks * Attack web and database servers to exfiltrate data * Obfuscate your command and control connections to avoid firewall and IPS detection In Detail Kali Linux is a Linux distribution designed for penetration testing and security auditing. It is the successor to BackTrack, the world's most popular penetration testing distribution. Kali Linux is the most widely used platform and toolkit for penetration testing. Security is currently the hottest field in technology with a projected need for millions of security professionals. This book focuses on enhancing your knowledge in Kali Linux for security by expanding your skills with toolkits and frameworks that can increase your value as a security professional. Kali Linux Cookbook, Second Edition starts by helping you install Kali Linux on different options available. You will also be able to understand the lab architecture and install a Windows host for use in the lab. Next, you will understand the concept of vulnerability analysis and look at the different types of exploits. The book will introduce you to the concept and psychology of Social Engineering and password cracking. You will then be able to use these skills to expand the scope of any breaches you create. Finally, the book will guide you in exploiting specific technologies and gaining access to other systems in the environment. By the end of this book, you will have gained the core knowledge and concepts of the penetration testing process. Style and approach This book teaches you everything you need to know about Kali Linux from the perspective of a penetration tester. It is filled with powerful recipes and practical examples that will help you gain in-depth knowledge of Kali Linux.

SUSE Linux Enterprise Desktop 12 - Subscription Management Tool (Paperback): Guide Contributors SUSE Linux Enterprise Desktop 12 - Subscription Management Tool (Paperback)
Guide Contributors
R646 Discovery Miles 6 460 Ships in 10 - 15 working days
SUSE Linux Enterprise Desktop 12 - Tuning Guide (Paperback): Tuning Guide Contributors SUSE Linux Enterprise Desktop 12 - Tuning Guide (Paperback)
Tuning Guide Contributors
R803 Discovery Miles 8 030 Ships in 10 - 15 working days
SUSE Linux Enterprise Desktop 12 - Administration Guide (Paperback): Admin Guide Contributors SUSE Linux Enterprise Desktop 12 - Administration Guide (Paperback)
Admin Guide Contributors
R1,104 Discovery Miles 11 040 Ships in 10 - 15 working days
An Introduction to Docker (Paperback): Kevin Watts An Introduction to Docker (Paperback)
Kevin Watts
R309 Discovery Miles 3 090 Ships in 10 - 15 working days
Ubuntu (Paperback): Dennis Hutten Ubuntu (Paperback)
Dennis Hutten
R504 Discovery Miles 5 040 Ships in 10 - 15 working days
Learning Docker - (Paperback, 2nd Revised edition): Jeeva S. Chelladhurai, Vinod Singh, Pethuru Raj Learning Docker - (Paperback, 2nd Revised edition)
Jeeva S. Chelladhurai, Vinod Singh, Pethuru Raj
R1,393 Discovery Miles 13 930 Ships in 10 - 15 working days

Docker lets you create, deploy, and manage your applications anywhere at anytime - flexibility is key so you can deploy stable, secure, and scalable app containers across a wide variety of platforms and delve into microservices architecture About This Book * This up-to-date edition shows how to leverage Docker's features to deploy your existing applications * Learn how to package your applications with Docker and build, ship, and scale your containers * Explore real-world examples of securing and managing Docker containers Who This Book Is For This book is ideal for developers, operations managers, and IT professionals who would like to learn about Docker and use it to build and deploy container-based apps. No prior knowledge of Docker is expected. What You Will Learn * Develop containerized applications using the Docker version 17.03 * Build Docker images from containers and launch them * Develop Docker images and containers leveraging Dockerfiles * Use Docker volumes to share data * Get to know how data is shared between containers * Understand Docker Jenkins integration * Gain the power of container orchestration * Familiarize yourself with the frequently used commands such as docker exec, docker ps, docker top, and docker stats In Detail Docker is an open source containerization engine that offers a simple and faster way for developing and running software. Docker containers wrap software in a complete filesystem that contains everything it needs to run, enabling any application to be run anywhere - this flexibily and portabily means that you can run apps in the cloud, on virtual machines, or on dedicated servers. This book will give you a tour of the new features of Docker and help you get started with Docker by building and deploying a simple application. It will walk you through the commands required to manage Docker images and containers. You'll be shown how to download new images, run containers, list the containers running on the Docker host, and kill them. You'll learn how to leverage Docker's volumes feature to share data between the Docker host and its containers - this data management feature is also useful for persistent data. This book also covers how to orchestrate containers using Docker compose, debug containers, and secure containers using the AppArmor and SELinux security modules. Style and approach This step-by-step guide will walk you through the features and use of Docker, from Docker software installation to the impenetrable security of containers.

Oracle Linux 5 and 6 System Administration (Paperback): L. Landry Oracle Linux 5 and 6 System Administration (Paperback)
L. Landry
R916 Discovery Miles 9 160 Ships in 10 - 15 working days
Mastering Linux Security and Hardening - Secure your Linux server and protect it from intruders, malware attacks, and other... Mastering Linux Security and Hardening - Secure your Linux server and protect it from intruders, malware attacks, and other external threats (Paperback)
Donald A. Tevault
R1,749 Discovery Miles 17 490 Ships in 10 - 15 working days

A comprehensive guide to mastering the art of preventing your Linux system from getting compromised. Key Features Leverage this guide to confidently deliver a system that reduces the risk of being hacked Perform a number of advanced Linux security techniques such as network service detection, user authentication, controlling special permissions, encrypting file systems, and much more Master the art of securing a Linux environment with this end-to-end practical guide Book DescriptionThis book has extensive coverage of techniques that will help prevent attackers from breaching your system, by building a much more secure Linux environment. You will learn various security techniques such as SSH hardening, network service detection, setting up firewalls, encrypting file systems, protecting user accounts, authentication processes, and so on. Moving forward, you will also develop hands-on skills with advanced Linux permissions, access control, special modes, and more. Lastly, this book will also cover best practices and troubleshooting techniques to get your work done efficiently. By the end of this book, you will be confident in delivering a system that will be much harder to compromise. What you will learn Use various techniques to prevent intruders from accessing sensitive data Prevent intruders from planting malware, and detect whether malware has been planted Prevent insiders from accessing data that they aren't authorized to access Do quick checks to see whether a computer is running network services that it doesn't need to run Learn security techniques that are common to all Linux distros, and some that are distro-specific Who this book is forIf you are a systems administrator or a network engineer interested in making your Linux environment more secure, then this book is for you. Security consultants wanting to enhance their Linux security skills will also benefit from this book. Prior knowledge of Linux is mandatory.

Embedded Linux Development using Yocto Projects - (Paperback, 2nd Revised edition): Otavio Salvador, Daiane Angolini Embedded Linux Development using Yocto Projects - (Paperback, 2nd Revised edition)
Otavio Salvador, Daiane Angolini
R1,344 Discovery Miles 13 440 Ships in 10 - 15 working days

Optimize and boost your Linux-based system with Yocto Project and increase its reliability and robustness efficiently and cost-effectively. About This Book * Optimize your Yocto Project tools to develop efficient Linux-based projects * Practical approach to learning Linux development using Yocto Project * Demonstrates concepts in a practical and easy-to-understand way Who This Book Is For If you are an embedded Linux developer with a basic knowledge of Yocto Project and want to broaden your knowledge with examples of embedded development, then this book is for you. This book is also for professionals who want to find new insights into working methodologies for Linux development. What You Will Learn * Understand the basic concepts involved in Poky workflows along with configuring and preparing the Poky build environment. * Configure a build server and customize images using Toaster. * Generate images and fit packages into created images using BitBake. * Support the development process by setting up and using Package feeds. * Debug Yocto Project by configuring Poky. * Build an image for the BeagleBone Black, RaspberryPi 3, and Wandboard, and boot it from an SD card. In Detail Yocto Project is turning out to be the best integration framework for creating reliable embedded Linux projects. It has the edge over other frameworks because of its features such as less development time and improved reliability and robustness. Embedded Linux Development using Yocto Project starts with an in-depth explanation of all Yocto Project tools, to help you perform different Linux-based tasks. The book then moves on to in-depth explanations of Poky and BitBake. It also includes some practical use cases for building a Linux subsystem project using Yocto Project tools available for embedded Linux. The book also covers topics such as SDK, recipetool, and others. By the end of the book, you will have learned how to generate and run an image for real hardware boards and will have gained hands-on experience at building efficient Linux systems using Yocto Project. Style and approach A clear, concise, and straightforward book that will enable you to use and implement the latest features of Yocto Project.

Ubuntu 18.04 LTS Server - Administration and Reference (Paperback): Richard Petersen Ubuntu 18.04 LTS Server - Administration and Reference (Paperback)
Richard Petersen
R1,188 Discovery Miles 11 880 Ships in 10 - 15 working days
RaspBerry Pi 3 - How to Start: Beginners Guide Book (Paperback): William Rowley RaspBerry Pi 3 - How to Start: Beginners Guide Book (Paperback)
William Rowley
R302 Discovery Miles 3 020 Ships in 10 - 15 working days
Hands-On Serverless Computing - Build, run and orchestrate serverless applications using AWS Lambda, Microsoft Azure Functions,... Hands-On Serverless Computing - Build, run and orchestrate serverless applications using AWS Lambda, Microsoft Azure Functions, and Google Cloud Functions (Paperback)
Kuldeep Chowhan
R1,190 Discovery Miles 11 900 Ships in 10 - 15 working days

Deploy functions efficiently using different cloud-based serverless offerings Key Features Understand the concept of Function-as-a-Service Implement Serverless solutions using AWS Lambda, Azure Functions and Google Cloud Functions Practical approach towards choosing the best tool for your serverless environment Book DescriptionServerless applications and architectures are gaining momentum and are increasingly being used by companies of all sizes. Serverless software takes care of many problems that developers face when running systems and servers, such as fault tolerance, centralized logging, horizontal scalability, and deployments. You will learn how to harness serverless technology to rapidly reduce production time and minimize your costs, while still having the freedom to customize your code, without hindering functionality. Upon finishing the book, you will have the knowledge and resources to build your own serverless application hosted in AWS, Microsoft Azure, or Google Cloud Platform, and will have experienced the benefits of event-driven technology for yourself. This hands-on guide dives into the basis of serverless architectures and how to build them using Node.js as a programming language, Visual Studio Code for code editing, and Postman for quickly and securely developing applications without the hassle of configuring and maintaining infrastructure on three public cloud platforms. What you will learn Understand the benefts of serverless computing and know when to use it Develop serverless applications on AWS, Azure, and Google Cloud Get to grips with Function as a Service (FaaS) Apply triggers to serverless functions Build event-driven apps using serverless frameworks Use the Node.js programming language to build serverless apps Use code editors, such as Visual Studio Code, as development environments Master the best development practices for creating scalable and practical solutions Who this book is forThis book is targeted towards developers, system administrators or any stakeholder working in the Serverless environment and want to understand how functions work. Basic idea of serverless architecture can be an added advantage

Digital Forensics with Kali Linux (Paperback): Shiva V.N Parasram Digital Forensics with Kali Linux (Paperback)
Shiva V.N Parasram
R1,145 Discovery Miles 11 450 Ships in 10 - 15 working days

Learn the skills you need to take advantage of Kali Linux for digital forensics investigations using this comprehensive guide About This Book * Master powerful Kali Linux tools for digital investigation and analysis * Perform evidence acquisition, preservation, and analysis using various tools within Kali Linux * Implement the concept of cryptographic hashing and imaging using Kali Linux * Perform memory forensics with Volatility and internet forensics with Xplico. * Discover the capabilities of professional forensic tools such as Autopsy and DFF (Digital Forensic Framework) used by law enforcement and military personnel alike Who This Book Is For This book is targeted at forensics and digital investigators, security analysts, or any stakeholder interested in learning digital forensics using Kali Linux. Basic knowledge of Kali Linux will be an advantage. What You Will Learn * Get to grips with the fundamentals of digital forensics and explore best practices * Understand the workings of file systems, storage, and data fundamentals * Discover incident response procedures and best practices * Use DC3DD and Guymager for acquisition and preservation techniques * Recover deleted data with Foremost and Scalpel * Find evidence of accessed programs and malicious programs using Volatility. * Perform network and internet capture analysis with Xplico * Carry out professional digital forensics investigations using the DFF and Autopsy automated forensic suites In Detail Kali Linux is a Linux-based distribution used mainly for penetration testing and digital forensics. It has a wide range of tools to help in forensics investigations and incident response mechanisms. You will start by understanding the fundamentals of digital forensics and setting up your Kali Linux environment to perform different investigation practices. The book will delve into the realm of operating systems and the various formats for file storage, including secret hiding places unseen by the end user or even the operating system. The book will also teach you to create forensic images of data and maintain integrity using hashing tools. Next, you will also master some advanced topics such as autopsies and acquiring investigation data from the network, operating system memory, and so on. The book introduces you to powerful tools that will take your forensic abilities and investigations to a professional level, catering for all aspects of full digital forensic investigations from hashing to reporting. By the end of this book, you will have had hands-on experience in implementing all the pillars of digital forensics-acquisition, extraction, analysis, and presentation using Kali Linux tools. Style and approach While covering the best practices of digital forensics investigations, evidence acquisition, preservation, and analysis, this book delivers easy-to-follow practical examples and detailed labs for an easy approach to learning forensics. Following the guidelines within each lab, you can easily practice all readily available forensic tools in Kali Linux, within either a dedicated physical or virtual machine.

Fundamentals of Linux - Explore the essentials of the Linux command line (Paperback): Oliver Pelz Fundamentals of Linux - Explore the essentials of the Linux command line (Paperback)
Oliver Pelz
R888 Discovery Miles 8 880 Ships in 10 - 15 working days

Develop a solid understanding of the important command-line tools and utilities in Linux Key Features Delve into the fundamentals of Linux Explore and work with virtualization, command lines, and Bash shell scripts Use special file permission flags such as setuid and setgid Book DescriptionLinux is a Unix-like operating system assembled under the model of free and open source software development and distribution. Fundamentals of Linux will help you learn all the essentials of the Linux command line required to get you started. The book will start by teaching you how to work with virtualization software and install CentOS 7 Linux as a VM. Then, you will get to grips with the workings of various command line operations, such as cursor movement, commands, options, and arguments. As you make your way through the chapters, the book will not only focus on the most essential Linux commands but also give an introduction to Bash shell scripting. Finally, you will explore advanced topics, such as networking and troubleshooting your system, and you will get familiar with the advanced file permissions: ACL, setuid, and setgid. Fundamentals of Linux includes real-world tasks, use cases, and problems that, as a system administrator, you might encounter in your day-to-day activities. What you will learn Explore basic and advanced command-line concepts Install Linux, work with VirtualBox, and install CentOS 7 in VirtualBox Work with the command line efficiently and learn how to navigate through the Linux filesystem Create file and user group permissions and edit files Use Sticky bit to secure your Linux filesystem Define and remove ACL from Linux files Who this book is forFundamentals of Linux is for individuals looking to work as a Linux system administrator.

Docker Orchestration (Paperback): Randall Smith Docker Orchestration (Paperback)
Randall Smith
R1,255 Discovery Miles 12 550 Ships in 10 - 15 working days

A concise, fast-paced guide to orchestrating and deploying scalable services with Docker About This Book * Explore the new features added to the core Docker Engine to make multi-container orchestration easy * Leverage tools such as Docker Machine, Swarm, Compose, and third-party tools such as Kubernetes, Mesosphere, and CoreOS to orchestrate containers * Use Docker Compose with Swarm and apply rolling updates for zero downtime deployments Who This Book Is For This book is aimed at Sysadmins and DevOps engineers who know what Docker does and are now looking to manage multiple containers on multiple hosts using the orchestration feature. What You Will Learn * Build scalable, reliable services with Docker * See how to manage a service in Docker using Docker Swarm, Kubernetes, and Mesosphere * Discover simpler orchestration tools such as CoreOS/Fleet and Rancher Cattle * Understand cluster-wide logging, system monitoring, and troubleshooting * Build, test, and deploy containers using Continuous Integration * Deploy cluster hosts on cloud services and automate your infrastructure In Detail Docker orchestration is what you need when transitioning from deploying containers individually on a single host to deploying complex multi-container apps on many machines. This book covers the new orchestration features of Docker 1.12 and helps you efficiently build, test, and deploy your application using Docker. You will be shown how to build multi-container applications using Docker Compose. You will also be introduced to the building blocks for multi-host Docker clusters such as registry, overlay networks, and shared storage using practical examples. This book gives an overview of core tools such as Docker Machine, Swarm, and Compose which will enhance your orchestration skills. You'll learn how to set up a swarm using the decentralized building block. Next, you'll be shown how to make the most out of the in-built orchestration feature of Docker engine and you'll use third-party tools such as Kubernetes, Mesosphere, and CoreOS to orchestrate your existing process. Finally, you will learn to deploy cluster hosts on cloud services and automate your infrastructure. Style and approach This comprehensive guide will take you through the orchestration feature of Docker. Using practical examples, you will discover various tools that can be used to manage multiple containers with ease.

Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition (Paperback, 3rd Revised edition): Cameron... Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition (Paperback, 3rd Revised edition)
Cameron Buchanan, Vivek Ramachandran
R1,010 Discovery Miles 10 100 Ships in 10 - 15 working days

Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition presents wireless pentesting from the ground up, and has been updated with the latest methodologies, including full coverage of the KRACK attack. About This Book * Learn wireless penetration testing with Kali Linux * Detect hidden wireless networks and discover their names * Explore advanced Wi-Fi hacking techniques including rogue access point hosting and probe sniffing * Develop your encryption cracking skills and gain an insight into the methods used by attackers and the underlying technologies that facilitate these attacks Who This Book Is For Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition is suitable for anyone who wants to learn more about pentesting and how to understand and defend against the latest wireless network attacks. What You Will Learn * Understand the KRACK attack in full detail * Create a wireless lab for your experiments * Sniff out wireless packets, hidden networks, and SSIDs * Capture and crack WPA-2 keys * Sniff probe requests and track users through their SSID history * Attack radius authentication systems * Sniff wireless traffic and collect interesting data * Decrypt encrypted traffic with stolen keys In Detail As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. This has been highlighted again recently with the discovery of the KRACK attack which enables attackers to potentially break into Wi-Fi networks encrypted with WPA2. The Kali Linux security distribution comes with a myriad of tools used for networking attacks and detecting security loopholes. Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition has been updated to Kali Linux 2017.3 with the latest methodologies, including full coverage of the KRACK attack and how to defend against it. The book presents wireless pentesting from the ground up, introducing all elements of penetration testing with each new technology. You'll learn various wireless testing methodologies by example, from the basics of wireless routing and encryption through to detailed coverage of hacking methods and attacks such as the Hirte and Caffe Latte. Style and approach Kali Linux Wireless Penetration Testing Beginner's Guide, Third Edition is a practical, hands-on guide to modern wi-fi network hacking. It covers both the theory and practice of wireless pentesting, offering detailed, real-world coverage of the latest vulnerabilities and attacks.

FreeBSD Handbook - Versions 11.1 and 10.4 (Paperback): FreeBSD Documentation Project FreeBSD Handbook - Versions 11.1 and 10.4 (Paperback)
FreeBSD Documentation Project
R1,123 Discovery Miles 11 230 Ships in 10 - 15 working days
Learn Docker - Fundamentals of Docker 18.x - Everything you need to know about containerizing your applications and running... Learn Docker - Fundamentals of Docker 18.x - Everything you need to know about containerizing your applications and running them in production (Paperback)
Gabriel N. Schenker
R1,189 Discovery Miles 11 890 Ships in 10 - 15 working days

Enhance your software deployment workflow using containers Key Features Get up-and-running with basic to advanced concepts of Docker Get acquainted with concepts such as Docker containers, Docker images, orchestrators and so on. Practical test-based approach to learning a prominent containerization tool Book DescriptionDocker containers have revolutionized the software supply chain in small and big enterprises. Never before has a new technology so rapidly penetrated the top 500 enterprises worldwide. Companies that embrace containers and containerize their traditional mission-critical applications have reported savings of at least 50% in total maintenance cost and a reduction of 90% (or more) of the time required to deploy new versions of those applications. Furthermore they are benefitting from increased security just by using containers as opposed to running applications outside containers. This book starts from scratch, introducing you to Docker fundamentals and setting up an environment to work with it. Then we delve into concepts such as Docker containers, Docker images, Docker Compose, and so on. We will also cover the concepts of deployment, orchestration, networking, and security. Furthermore, we explain Docker functionalities on public clouds such as AWS. By the end of this book, you will have hands-on experience working with Docker containers and orchestrators such as SwarmKit and Kubernetes. What you will learn Containerize your traditional or microservice-based application Share or ship your application as an immutable container image Build a Docker swarm and a Kubernetes cluster in the cloud Run a highly distributed application using Docker Swarm or Kubernetes Update or rollback a distributed application with zero downtime Secure your applications via encapsulation, networks, and secrets Know your options when deploying your containerized app into the cloud Who this book is forThis book is targeted at system administrators, operations engineers, DevOps engineers, and developers or stakeholders who are interested in getting started with Docker from scratch. No prior experience with Docker Containers is required.

Linux Shell Scripting Bootcamp (Paperback): Kent Lewis James Linux Shell Scripting Bootcamp (Paperback)
Kent Lewis James
R1,128 Discovery Miles 11 280 Ships in 10 - 15 working days

A quick and straightforward approach to writing shell scripts to accomplish different types of tasks on a Linux system. About This Book * Understand expressions and variables and how to use them practically * Familiarize yourself with the various text filtering tools available in Linux * A fast-paced and concise guide that gets you well versed with linux shell scripting. Who This Book Is For This book is for both GNU/Linux users who want to do amazing things with the shell and for advanced users looking for ways to make their lives with the shell more productive. What You Will Learn * Get acquainted with the basics of a shell script to serve as a refresher for more advanced topics * Learn different ways to create and run a script * Discuss the passing and verification of parameters, along with the verification of other items. * Understand the different forms of conditions and loops, and go over the sleep command in detail * Learn about different ways to handle the reporting of return codes * Create an interactive script by reading the keyboard and use subroutines and interrupts * Create scripts to perform backups and go over the use of encryption tools and checksums * Use wget and curl in scripts to get data directly from the Internet In Detail Linux Shell Scripting Bootcamp is all about learning the essentials of script creation, validating parameters, and checking for the existence of files and other items needed by the script. We will use scripts to explore iterative operations using loops and learn different types of loop statements, with their differences. Along with this, we will also create a numbered backup script for backup files. Further, you will get well-versed with how variables work on a Linux system and how they relate to scripts. You'll also learn how to create and call subroutines in a script and create interactive scripts. The most important archive commands, zip and tar, are also discussed for performing backups. Later, you will dive deeper by understanding the use of wget and curl scripts and the use of checksum and file encryption in further chapters. Finally, you will learn how to debug scripts and scripting best practices that will enable you to write a great code every time! By the end of the book, you will be able to write shell scripts that can dig data from the web and process it efficiently. Style and approach This book is all about fast and intensive learning. This means we don't waste time in helping readers get started. The new content is basically about filling in with highly-effective examples to build new things, solving problems in newer and unseen ways, and solving real-world examples.

Mastering Ubuntu Server - Master the art of deploying, configuring, managing, and troubleshooting Ubuntu Server 18.04, 2nd... Mastering Ubuntu Server - Master the art of deploying, configuring, managing, and troubleshooting Ubuntu Server 18.04, 2nd Edition (Paperback, 2nd Revised edition)
Jay LaCroix
R1,334 Discovery Miles 13 340 Ships in 10 - 15 working days

Get up-to-date with the finer points of Ubuntu Server using this comprehensive guide Key Features A practical easy-to-understand book that will teach you how to deploy, maintain and troubleshoot Ubuntu Server Get well-versed with newly-added features in Ubuntu 18.04. Learn to manage cutting-edge technologies such as virtualization, containers, Nextcloud and more Book DescriptionUbuntu Server has taken the data centers by storm. Whether you're deploying Ubuntu for a large-scale project or for a small office, it is a stable, customizable, and powerful Linux distribution that leads the way with innovative and cutting-edge features. For both simple and complex server deployments, Ubuntu's flexible nature can be easily adapted to meet to the needs of your organization. With this book as your guide, you will learn all about Ubuntu Server, from initial deployment to creating production-ready resources for your network. The book begins with the concept of user management, group management, and filesystem permissions. Continuing into managing storage volumes, you will learn how to format storage devices, utilize logical volume management, and monitor disk usage. Later, you will learn how to virtualize hosts and applications, which will cover setting up KVM/QEMU, as well as containerization with both Docker and LXD. As the book continues, you will learn how to automate configuration with Ansible, as well as take a look at writing scripts. Lastly, you will explore best practices and troubleshooting techniques when working with Ubuntu Server that are applicable to real-world scenarios. By the end of the book, you will be an expert Ubuntu Server administrator who is well-versed in its advanced concepts. What you will learn Manage users, groups, and permissions Encrypt and decrypt disks with Linux Unified Key Setup (LUKS) Set up SSH for remote access, and connect it to other nodes Add, remove, and search for packages Use NFS and Samba to share directories with other users Get to know techniques for managing Apache and MariaDB Explore best practices and troubleshooting techniques Get familiar with scripting Automate server deployments with Ansible Who this book is forThis book is intended for readers with intermediate or advanced-beginner skills with Linux, who would like to learn all about setting up servers with Ubuntu Server. This book assumes that the reader knows the basics of Linux, such as editing configuration files and running basic commands.

Git Version Control Guide - Step -by-step tutorial for beginners (Paperback): Gregory Blake Git Version Control Guide - Step -by-step tutorial for beginners (Paperback)
Gregory Blake
R334 Discovery Miles 3 340 Ships in 10 - 15 working days
Centos 7.3 Linux Server Guide (Paperback): Gregory Blake Centos 7.3 Linux Server Guide (Paperback)
Gregory Blake
R324 Discovery Miles 3 240 Ships in 10 - 15 working days
Ed Mastery - The Standard Unix Text Editor (Paperback): Michael W Lucas Ed Mastery - The Standard Unix Text Editor (Paperback)
Michael W Lucas
R248 Discovery Miles 2 480 Ships in 10 - 15 working days
Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Linux for Hackers - A Comprehensive…
William Vance Hardcover R625 R568 Discovery Miles 5 680
PowerShell, IT Pro Solutions…
William R. Stanek, William Stanek Hardcover R1,550 Discovery Miles 15 500
Only Footnotes
Michael W Lucas Hardcover R595 R565 Discovery Miles 5 650
Linux - The Ultimate Crash Course to…
Mark Reed Hardcover R605 R549 Discovery Miles 5 490
Linux - A Comprehensive Guide to Linux…
Sam Griffin Hardcover R606 R550 Discovery Miles 5 500
PowerShell - The Ultimate Beginners…
Mark Reed Hardcover R615 R559 Discovery Miles 5 590
DNSSEC Mastery, 2nd Edition
Michael W Lucas Hardcover R947 R853 Discovery Miles 8 530
Linux Programming Tools Unveiled
N B Venkateswarlu Hardcover R3,515 R2,940 Discovery Miles 29 400
PowerShell for Administration, IT Pro…
William R. Stanek, William Stanek Hardcover R1,533 Discovery Miles 15 330
The UNIX Philosophy
Mike Gancarz Paperback R1,489 Discovery Miles 14 890

 

Partners