|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > Unix, Unix Linux & Unix TCL/TK
An annotated guide to program and develop GNU/Linux Embedded
systems quickly About This Book * Rapidly design and build powerful
prototypes for GNU/Linux Embedded systems * Become familiar with
the workings of GNU/Linux Embedded systems and how to manage its
peripherals * Write, monitor, and configure applications quickly
and effectively, manage an external micro-controller, and use it as
co-processor for real-time tasks Who This Book Is For This book
targets Embedded System developers and GNU/Linux programmers who
would like to program Embedded Systems and perform Embedded
development. The book focuses on quick and efficient prototype
building. Some experience with hardware and Embedded Systems is
assumed, as is having done some previous work on GNU/Linux systems.
Knowledge of scripting on GNU/Linux is expected as well. What You
Will Learn * Use embedded systems to implement your projects *
Access and manage peripherals for embedded systems * Program
embedded systems using languages such as C, Python, Bash, and PHP *
Use a complete distribution, such as Debian or Ubuntu, or an
embedded one, such as OpenWrt or Yocto * Harness device driver
capabilities to optimize device communications * Access data
through several kinds of devices such as GPIO's, serial ports, PWM,
ADC, Ethernet, WiFi, audio, video, I2C, SPI, One Wire, USB and CAN
* Practical example usage of several devices such as RFID readers,
Smart card readers, barcode readers, z-Wave devices, GSM/GPRS
modems * Usage of several sensors such as light, pressure,
moisture, temperature, infrared, power, motion In Detail Embedded
computers have become very complex in the last few years and
developers need to easily manage them by focusing on how to solve a
problem without wasting time in finding supported peripherals or
learning how to manage them. The main challenge with experienced
embedded programmers and engineers is really how long it takes to
turn an idea into reality, and we show you exactly how to do it.
This book shows how to interact with external environments through
specific peripherals used in the industry. We will use the latest
Linux kernel release 4.4.x and Debian/Ubuntu distributions (with
embedded distributions like OpenWrt and Yocto). The book will
present popular boards in the industry that are user-friendly to
base the rest of the projects on - BeagleBone Black, SAMA5D3
Xplained, Wandboard and system-on-chip manufacturers. Readers will
be able to take their first steps in programming the embedded
platforms, using C, Bash, and Python/PHP languages in order to get
access to the external peripherals. More about using and
programming device driver and accessing the peripherals will be
covered to lay a strong foundation. The readers will learn how to
read/write data from/to the external environment by using both C
programs or a scripting language (Bash/PHP/Python) and how to
configure a device driver for a specific hardware. After finishing
this book, the readers will be able to gain a good knowledge level
and understanding of writing, configuring, and managing drivers,
controlling and monitoring applications with the help of
efficient/quick programming and will be able to apply these skills
into real-world projects. Style and approach This practical
tutorial will get you quickly prototyping embedded systems on
GNU/Linux. This book uses a variety of hardware to program the
peripherals and build simple prototypes.
Kali Linux: a complete pentesting toolkit facilitating smooth
backtracking for working hackers About This Book * Conduct network
testing, surveillance, pen testing and forensics on MS Windows
using Kali Linux * Footprint, monitor, and audit your network and
investigate any ongoing infestations * Customize Kali Linux with
this professional guide so it becomes your pen testing toolkit Who
This Book Is For If you are a working ethical hacker who is looking
to expand the offensive skillset with a thorough understanding of
Kali Linux, then this is the book for you. Prior knowledge about
Linux operating systems and the BASH terminal emulator along with
Windows desktop and command line would be highly beneficial. What
You Will Learn * Set up Kali Linux for pen testing * Map and
enumerate your Windows network * Exploit several common Windows
network vulnerabilities * Attack and defeat password schemes on
Windows * Debug and reverse-engineer Windows programs * Recover
lost files, investigate successful hacks and discover hidden data
in innocent-looking files * Catch and hold admin rights on the
network, and maintain backdoors on the network after your initial
testing is done In Detail Microsoft Windows is one of the two most
common OS and managing its security has spawned the discipline of
IT security. Kali Linux is the premier platform for testing and
maintaining Windows security. Kali is built on the Debian
distribution of Linux and shares the legendary stability of that
OS. This lets you focus on using the network penetration, password
cracking, forensics tools and not the OS. This book has the most
advanced tools and techniques to reproduce the methods used by
sophisticated hackers to make you an expert in Kali Linux
penetration testing. First, you are introduced to Kali's top ten
tools and other useful reporting tools. Then, you will find your
way around your target network and determine known vulnerabilities
to be able to exploit a system remotely. Next, you will prove that
the vulnerabilities you have found are real and exploitable. You
will learn to use tools in seven categories of exploitation tools.
Further, you perform web access exploits using tools like websploit
and more. Security is only as strong as the weakest link in the
chain. Passwords are often that weak link. Thus, you learn about
password attacks that can be used in concert with other approaches
to break into and own a network. Moreover, you come to terms with
network sniffing, which helps you understand which users are using
services you can exploit, and IP spoofing, which can be used to
poison a system's DNS cache. Once you gain access to a machine or
network, maintaining access is important. Thus, you not only learn
penetrating in the machine you also learn Windows privilege's
escalations. With easy to follow step-by-step instructions and
support images, you will be able to quickly pen test your system
and network. Style and approach This book is a hands-on guide for
Kali Linux pen testing. This book will provide all the practical
knowledge needed to test your network's security using a proven
hacker's methodology. The book uses easy-to-understand yet
professional language for explaining concepts.
Do amazing things with the shell About This Book * Become an expert
in creating powerful shell scripts and explore the full
possibilities of the shell * Automate any administrative task you
could imagine, with shell scripts * Packed with easy-to-follow
recipes on new features on Linux, particularly, Debian-based, to
help you accomplish even the most complex tasks with ease Who This
Book Is For If you are a beginner or an intermediate Linux user who
wants to master the skill of quickly writing scripts and automate
tasks without reading the entire man pages, then this book is for
you. You can start writing scripts and one-liners by simply looking
at the relevant recipe and its descriptions without any working
knowledge of shell scripting or Linux. Intermediate / advanced
users, system administrators / developers, and programmers can use
this book as a reference when they face problems while coding. What
You Will Learn * Interact with websites via scripts * Write shell
scripts to mine and process data from the Web * Automate system
backups and other repetitive tasks with crontab * Create, compress,
and encrypt archives of your critical data. * Configure and monitor
Ethernet and wireless networks * Monitor and log network and system
activity * Tune your system for optimal performance * Improve your
system's security * Identify resource hogs and network bottlenecks
* Extract audio from video files * Create web photo albums * Use
git or fossil to manage revision control and interact with FOSS
projects * Create and maintain Linux containers and Virtual
Machines * Run a private Cloud server In Detail The shell is the
most powerful tool your computer provides. Despite having it at
their fingertips, many users are unaware of how much the shell can
accomplish. Using the shell, you can generate databases and web
pages from sets of files, automate monotonous admin tasks such as
system backups, monitor your system's health and activity, identify
network bottlenecks and system resource hogs, and more. This book
will show you how to do all this and much more. This book, now in
its third edition, describes the exciting new features in the
newest Linux distributions to help you accomplish more than you
imagine. It shows how to use simple commands to automate complex
tasks, automate web interactions, download videos, set up
containers and cloud servers, and even get free SSL certificates.
Starting with the basics of the shell, you will learn simple
commands and how to apply them to real-world issues. From there,
you'll learn text processing, web interactions, network and system
monitoring, and system tuning. Software engineers will learn how to
examine system applications, how to use modern software management
tools such as git and fossil for their own work, and how to submit
patches to open-source projects. Finally, you'll learn how to set
up Linux Containers and Virtual machines and even run your own
Cloud server with a free SSL Certificate from letsencrypt.org.
Style and approach This book will take you through useful
real-world recipes designed to make your daily life easier when
working with the shell.
Ward off traditional security permissions and effectively secure
your Linux systems with SELinux About This Book * Leverage SELinux
to improve the secure state of your Linux system * A clear approach
to adopting SELinux within your organization * Essential skills and
techniques to help further your system administration career Who
This Book Is For This book is for Linux administrators who want to
control the secure state of their systems. It's packed with the
latest information on SELinux operations and administrative
procedures so you'll be able to further harden your system through
mandatory access control (MAC) - a security strategy that has been
shaping Linux security for years. What You Will Learn * Analyze
SELinux events and selectively enable or disable SELinux
enforcement * Manage Linux users and associate them with the right
role and permission set * Secure network communications through
SELinux access controls * Tune the full service flexibility by
dynamically assigning resource labels * Handle SELinux access
patterns enforced through the system * Query the SELinux policy in
depth In Detail Do you have the crucial job of protecting your
private and company systems from malicious attacks and undefined
application behavior? Are you looking to secure your Linux systems
with improved access controls? Look no further, intrepid
administrator! This book will show you how to enhance your system's
secure state across Linux distributions, helping you keep
application vulnerabilities at bay. This book covers the core
SELinux concepts and shows you how to leverage SELinux to improve
the protection measures of a Linux system. You will learn the
SELinux fundamentals and all of SELinux's configuration handles
including conditional policies, constraints, policy types, and
audit capabilities. These topics are paired with genuine examples
of situations and issues you may come across as an administrator.
In addition, you will learn how to further harden the
virtualization offering of both libvirt (sVirt) and Docker through
SELinux. By the end of the book you will know how SELinux works and
how you can tune it to meet your needs. Style and approach This
book offers a complete overview of SELinux administration and how
it integrates with other components on a Linux system. It covers
the majority of SELinux features with a mix of real life scenarios,
descriptions, and examples. This book contains everything an
administrator needs to customize SELinux.
Get acquainted with the world of LXC About This Book * Get the most
practical and up-to-date resource on LXC and take full advantage of
what Linux containers can offer in the day-to-day operations of
large-scale applications * Learn how to deploy and administer
various workloads such as web applications inside LXC * Save your
organization time and money by building robust and secure
containers and by speeding the deployment process of your software
Who This Book Is For This book is for Linux engineers and software
developers who are looking to deploy applications in a fast,
secure, and scalable way for use in testing and production. What
You Will Learn * Deep dive into the foundations of Linux containers
with kernel namespaces and cgroups * Install, configure, and
administer Linux containers with LXC and libvirt * Begin writing
applications using Python libvirt bindings * Take an in-depth look
at container networking * Set up monitoring and security with LXC *
Build and deploy a highly available application with LXC in the
cloud In Detail In recent years, containers have gained wide
adoption by businesses running a variety of application loads. This
became possible largely due to the advent of kernel namespaces and
better resource management with control groups (cgroups). Linux
containers (LXC) are a direct implementation of those kernel
features that provide operating system level virtualization without
the overhead of a hypervisor layer. This book starts by introducing
the foundational concepts behind the implementation of LXC, then
moves into the practical aspects of installing and configuring LXC
containers. Moving on, you will explore container networking,
security, and backups. You will also learn how to deploy LXC with
technologies like Open Stack and Vagrant. By the end of the book,
you will have a solid grasp of how LXC is implemented and how to
run production applications in a highly available and scalable way.
Style and approach A practical guide that introduces the core
technologies behind Linux containers and provides a deep dive into
installation, configuration, and operations of LXC.
Over 80 recipes to get up and running with CentOS 7 Linux server
About This Book * A practical guide to install, configure,
administer and maintain CentOS 7 servers * An in-depth guide to the
CentOS 7 operating system, exploring its various new features and
changes in server administration * Presents tricks and solutions to
tackle common server issues with the help of practical examples and
real-life scenarios Who This Book Is For This book is targeted at
beginner and more experienced system administrators alike who want
to use CentOS as their server solution. Readers do not need much
pre-knowledge or experience at all to work with this book. What You
Will Learn * Install and configure CentOS 7 Linux server system
from scratch using normal and advanced methods * Maintain a
performance-based and secure server solution by deploying expert
configuration advice and managing software packages * Monitor,
manage and develop your server's file system to maintain a stable
performance * Gain best practice methods on sharing files and
resources through a network * Install and configure common standard
services such as web, mail, FTP, database and domain name server
technologies * Introduce you to the world of operating-system-level
virtualization using the Docker platform. * Understand the
fundamentals of the Security-Enhanced Linux access control
architecture * Monitor your IT infrastructure using Nagios In
Detail This book will provide you with a comprehensive series of
starting points that will give you direct access to the inner
workings of the latest CentOS version 7 and help you trim the
learning curve to master your server. You will begin with the
installation and basic configuration of CentOS 7, followed by
learning how to manage your system, services and software packages.
You will then gain an understanding of how to administer the file
system, secure access to your server and configure various resource
sharing services such as file, printer and DHCP servers across your
network. Further on, we cover advanced topics such as FTP services,
building your own DNS server, running database servers, and
providing mail and web services. Finally, you will get a deep
understanding of SELinux and you will learn how to work with Docker
operating-system virtualization and how to monitor your IT
infrastructure with Nagios. By the end of this book, you will have
a fair understanding of all the aspects of configuring,
implementing and administering CentOS 7 Linux server and how to put
it in control. Style and approach This book is a practical
reference guide with hands-on examples and solutions to real-world
administration problems. It covers in-depth and comprehensive
information on CentOS 7 and its new features.
Develop fun and exciting games and create amazing animations for
your existing apps with SpriteKit, Apple's 2D game development
framework About This Book * Learn the key concepts of game
development in iOS * Take advantage of SpriteKit to create your own
games and improve your apps * Follow the step-by-step chapters to
create a complete product ready to submit to the App Store Who This
Book Is For Getting Started with SpriteKit is for beginner-level
iOS developers who want to add an extra edge to their apps and
create amazing games using SpriteKit. It doesn't matter whether you
have experience in iOS development or not as this book will show
you the swift tricks you can use to create games. What You Will
Learn * Create and configure a SpriteKit project from scratch *
Load and manage the basic elements of games such as sprites,
labels, and geometrical primitives * Handle touch events, detect
collisions, and play sound audio files * Create complex elements,
animate sprites, and run the parallax effect * Complete your games
with key components such as a main menu, transitions between
scenes, a tutorial, and the ability to load and save data *
Increase the efficiency of your device using the accelerometer or
by adding shaders, lights, and shadows * Gain complementary
techniques such as creating or finding audio resources, applying
SpriteKit to apps, or using third-party tools In Detail SpriteKit
is Apple's game engine to develop native iOS games. Strongly
boosted by the Apple Inc., Cupertino, it has increased in
popularity since its first release. This book shows you the
solutions provided by SpriteKit to help you create any 2D game you
can imagine and apply them to create animations that will highlight
your existing apps. This book will give you the knowledge you need
to apply SpriteKit to your existing apps or create your own games
from scratch. Throughout the book, you will develop a complete
game. The beautiful designs implemented in the game in this book
will easily lead you to learn the basis of 2D game development,
including creating and moving sprites, and adding them to a game
scene. You will also discover how to apply advanced techniques such
as collision detection, action execution, playing music, or running
animations to give a more professional aspect to the game. You will
finish your first game by learning how to add a main menu and a
tutorial, as well as saving and loading data from and to the
player's device. Finally, you will find out how to apply some
mobile games techniques such as accelerometer use or touch
detection. Style and approach Written in an informal way with
plenty of illustrative screenshots, this easy-to-follow and
practical guide will help you get the most from SpriteKit. The main
part of the book provides step-by-step instructions to develop of a
complete product, while the last chapters give you some
complementary techniques than can be used in mobile 2D game
development.
Dive in to the cutting edge techniques of Linux KVM virtualization,
and build the virtualization solutions your datacentre demands
About This Book * Become an expert in Linux virtualization *
Migrate your virtualized datacenter to the cloud * Find out how to
build a large scale virtualization solution that will transform
your organization Who This Book Is For Linux administrators - if
you want to build incredible, yet manageable virtualization
solutions with KVM this is the book to get you there. It will help
you apply what you already know to some tricky virtualization
tasks. What You Will Learn * Explore the ecosystem of tools that
support Linux virtualization * Find out why KVM offers you a
smarter way to unlock the potential of virtualization * Implement
KVM virtualization using oVirt * Explore the KVM architecture - so
you can manage, scale and optimize it with ease * Migrate your
virtualized datacenter to the cloud for truly resource-efficient
computing * Find out how to integrate OpenStack with KVM to take
full control of the cloud In Detail A robust datacenter is
essential for any organization - but you don't want to waste
resources. With KVM you can virtualize your datacenter,
transforming a Linux operating system into a powerful hypervisor
that allows you to manage multiple OS with minimal fuss. This book
doesn't just show you how to virtualize with KVM - it shows you how
to do it well. Written to make you an expert on KVM, you'll learn
to manage the three essential pillars of scalability, performance
and security - as well as some useful integrations with cloud
services such as OpenStack. From the fundamentals of setting up a
standalone KVM virtualization platform, and the best tools to
harness it effectively, including virt-manager, and kimchi-project,
everything you do is built around making KVM work for you in the
real-world, helping you to interact and customize it as you need
it. With further guidance on performance optimization for Microsoft
Windows and RHEL virtual machines, as well as proven strategies for
backup and disaster recovery, you'll can be confident that your
virtualized data center is working for your organization - not
hampering it. Finally, the book will empower you to unlock the full
potential of cloud through KVM. Migrating your physical machines to
the cloud can be challenging, but once you've mastered KVM, it's a
little easie. Style and approach Combining advanced insights with
practical solutions, Mastering KVM Virtualization is a vital
resource for anyone that believes in the power of virtualization to
help a business use resources more effectively.
|
You may like...
Sudo Mastery
Michael W Lucas
Hardcover
R963
R831
Discovery Miles 8 310
|