|
Books > Computing & IT > Computer hardware & operating systems > Operating systems & graphical user interfaces (GUIs) > Unix, Unix Linux & Unix TCL/TK
Build your defense against web attacks with Kali Linux 2.0 About
This Book * Gain a deep understanding of the flaws in web
applications and exploit them in a practical manner * Get hands-on
web application hacking experience with a range of tools in Kali
Linux 2.0 * Develop the practical skills required to master
multiple tools in the Kali Linux 2.0 toolkit Who This Book Is For
If you are already working as a network penetration tester and want
to expand your knowledge of web application hacking, then this book
tailored for you. Those who are interested in learning more about
the Kali Sana tools that are used to test web applications will
find this book a thoroughly useful and interesting guide. What You
Will Learn * Set up your lab with Kali Linux 2.0 * Identify the
difference between hacking a web application and network hacking *
Understand the different techniques used to identify the flavor of
web applications * Expose vulnerabilities present in web servers
and their applications using server-side attacks * Use SQL and
cross-site scripting (XSS) attacks * Check for XSS flaws using the
burp suite proxy * Find out about the mitigation techniques used to
negate the effects of the Injection and Blind SQL attacks In Detail
Kali Linux 2.0 is the new generation of the industry-leading
BackTrack Linux penetration testing and security auditing Linux
distribution. It contains several hundred tools aimed at various
information security tasks such as penetration testing, forensics,
and reverse engineering. At the beginning of the book, you will be
introduced to the concepts of hacking and penetration testing and
will get to know about the tools used in Kali Linux 2.0 that relate
to web application hacking. Then, you will gain a deep
understanding of SQL and command injection flaws and ways to
exploit the flaws. Moving on, you will get to know more about
scripting and input validation flaws, AJAX, and the security issues
related to AJAX. At the end of the book, you will use an automated
technique called fuzzing to be able to identify flaws in a web
application. Finally, you will understand the web application
vulnerabilities and the ways in which they can be exploited using
the tools in Kali Linux 2.0. Style and approach This step-by-step
guide covers each topic with detailed practical examples. Every
concept is explained with the help of illustrations using the tools
available in Kali Linux 2.0.
If you are a developer and you want to completely master Git
without heavy theory, this is the book for you. A reasonable
knowledge level and basic understanding of Git concepts will get
you started with this book.
Harness the power of Linux to create versatile and robust embedded
solutions About This Book * Create efficient and secure embedded
devices using Linux * Minimize project costs by using open source
tools and programs * Explore each component technology in depth,
using sample implementations as a guide Who This Book Is For This
book is ideal for Linux developers and system programmers who are
already familiar with embedded systems and who want to know how to
create best-in-class devices. A basic understanding of C
programming and experience with systems programming is needed. What
You Will Learn * Understand the role of the Linux kernel and select
an appropriate role for your application * Use Buildroot and Yocto
to create embedded Linux systems quickly and efficiently * Create
customized bootloaders using U-Boot * Employ perf and ftrace to
identify performance bottlenecks * Understand device trees and make
changes to accommodate new hardware on your device * Write
applications that interact with Linux device drivers * Design and
write multi-threaded applications using POSIX threads * Measure
real-time latencies and tune the Linux kernel to minimize them In
Detail Mastering Embedded Linux Programming takes you through the
product cycle and gives you an in-depth description of the
components and options that are available at each stage. You will
begin by learning about toolchains, bootloaders, the Linux kernel,
and how to configure a root filesystem to create a basic working
device. You will then learn how to use the two most commonly used
build systems, Buildroot and Yocto, to speed up and simplify the
development process. Building on this solid base, the next section
considers how to make best use of raw NAND/NOR flash memory and
managed flash eMMC chips, including mechanisms for increasing the
lifetime of the devices and to perform reliable in-field updates.
Next, you need to consider what techniques are best suited to
writing applications for your device. We will then see how
functions are split between processes and the usage of POSIX
threads, which have a big impact on the responsiveness and
performance of the final device The closing sections look at the
techniques available to developers for profiling and tracing
applications and kernel code using perf and ftrace. Style and
approach This book is an easy-to-follow and pragmatic guide
consisting of an in-depth analysis of the implementation of
embedded devices. Each topic has a logical approach to it; this
coupled with hints and best practices helps you understand embedded
Linux better.
Master the complexities of Bash shell scripting and unlock the
power of shell for your enterprise About This Book * Identify the
high level steps such as verifying user input, using command lines
and conditional statements in creating and executing simple shell
scripts * Create and edit dynamic shell scripts to manage complex
and repetitive tasks * Learn about scripting in Perl and
programming in Python as a BASH scripting alternative with this
practical, step-by-step guide Who This Book Is For Mastering Linux
Shell Scripting has been written for Linux administrators who want
to automate tasks in their daily lives, saving time and effort.
You'll need to have command-line experience and be familiar with
the tasks that you need to automate. What You Will Learn * Use the
type command to identify the order of command evaluation * Create
interactive scripts that prompt for user input * Foster menu
structures for operators with little command-line experience *
Develop scripts that dynamically edit web configuration files to
produce a new virtual host * Write scripts that use AWK to search
and reports on log files * Draft effective scripts using functions
as building blocks, reducing maintenance and build time * Make
informed choices by comparing different script languages such as
Perl and Python with BASH In Detail Shell scripting is a quick
method to prototype a complex application or a problem by
automating tasks when working on Linux-based systems. Using both
simple one-line commands and command sequences complex problems can
be solved with ease, from text processing to backing up sysadmin
tools. In this book, you'll discover everything you need to know to
master shell scripting and make informed choices about the elements
you employ. Get to grips with the fundamentals of creating and
running a script in normal mode, and in debug mode. Learn about
various conditional statements' code snippets, and realize the
power of repetition and loops in your shell script. Implement
functions and edit files using the Stream Editor, script in Perl,
program in Python - as well as complete coverage of other scripting
languages to ensure you can choose the best tool for your project.
Style and approach The book will capture your attention and keep
you engaged with the simplicity and clarity of each explanation.
Every step is accompanied with screen captures so you can
cross-check the results before moving on.
Over 60 recipes and solutions for inventors, makers, and budding
engineers to create projects using the BeagleBone Black About This
Book * Learn how to develop applications with the BeagleBone Black
and open source Linux software * Sharpen your expertise in making
sophisticated electronic devices * Explore the BeagleBone Black
with this easy-to-succeed recipe format Who This Book Is For If you
are a hardware, Linux, and/or microcomputing novice, or someone who
wants more power and possibilities with product prototypes,
electronic art projects, or embedded computing experiments, then
this book is for you. It is for Internet of Things enthusiasts who
want to use more sophisticated hardware than the Raspberry Pi or
the Arduino can provide. Whether you are an engineering student, a
DIYer, an inventor, or a budding electronics enthusiast, this book
delivers accessible, easy-to-succeed instructions for using an
advanced microcomputing platform. What You Will Learn * Set up and
run the BeagleBone Black for the first time * Learn the basics of
microcomputing and Linux using the command line and easy kernel
mods * Make introductory projects with Python, JavaScript,
BoneScript, and Node.js * Explore physical computing and simple
circuits using buttons, LEDs, sensors, and motors * Discover the
unique features of the BeagleBone Black and its real-time computing
functions * Build intermediate level audio and video applications *
Assemble and add ingredients for creating Internet of Things
prototypes In Detail There are many single-board controllers and
computers such as Arduino, Udoo, or Raspberry Pi, which can be used
to create electronic prototypes on circuit boards. However, when it
comes to creating more advanced projects, BeagleBone Black provides
a sophisticated alternative. Mastering the BeagleBone Black enables
you to combine it with sensors and LEDs, add buttons, and marry it
to a variety of add-on boards. You can transform this tiny device
into the brain for an embedded application or an endless variety of
electronic inventions and prototypes. With dozens of how-tos, this
book kicks off with the basic steps for setting up and running the
BeagleBone Black for the first time, from connecting the necessary
hardware and using the command line with Linux commands to
installing new software and controlling your system remotely.
Following these recipes, more advanced examples take you through
scripting, debugging, and working with software source files,
eventually working with the Linux kernel. Subsequently, you will
learn how to exploit the board's real-time functions. We will then
discover exciting methods for using sound and video with the system
before marching forward into an exploration of recipes for building
Internet of Things projects. Finally, the book finishes with a
dramatic arc upward into outer space, when you explore ways to
build projects for tracking and monitoring satellites. Style and
approach This comprehensive recipe book deconstructs a complex,
often confusing piece of technology, and transforms it to become
accessible and fun with snappy, unintimidating prose, and extensive
easy-to-succeed instructions.
Master the skills and techniques that are required to design,
deploy, and administer real Linux-based networks About This Book *
Master the art of using Linux and administering network services
for enterprise environments * Perform hands-on activities to
reinforce expert-level knowledge * Get full coverage of both the
CentOS and Debian systems, including how networking concepts differ
for each Who This Book Is For Mastering Linux Network
Administration is recommended for those who already understand the
basics of using Linux and networking, and would like to push those
skills to a higher level through real-world Linux networking
scenarios. Whether you intend to run a home office consisting of
Linux nodes or a rollout of a Linux network within your
organization, this book is a great fit for those that desire to
learn how to manage networked systems with the power of Linux. What
You Will Learn * Install and configure the Debian and CentOS
systems * Set up and configure file servers * Administer networked
nodes remotely * Discover how to monitor system performance for
peak health * Configure network services such as DNS and DHCP *
Host HTTP content via Apache * Troubleshoot Linux networking issues
In Detail Linux is everywhere. Whether you run a home office, a
small business, or manage enterprise systems, Linux can empower
your network to perform at its very best. Armed with the advanced
tools and best practice guidance of this practical guide, you'll be
able to mold Linux networks to your will, empowering your systems
and their users to take advantage of all that Linux-based networks
have to offer. Understand how Linux networks function and get to
grips with essential tips and tricks to manage them - whether
you're already managing a networks, or even just starting out. With
Debian and CentOS as its source, this book will divulge all the
details you need to manage a real Linux-based network. With
detailed activities and instructions based on real-world scenarios,
this book will be your guide to the exciting world of Linux
networking. Style and approach This practical guide will walk you
through all the core concepts required to manage real Linux-based
networks.
 |
Mastering QGIS
(Paperback, Ed)
Kurt Menke Gisp, Dr. Richard Smith Jr., GISP, Dr Luigi Pirelli, Dr. John Van Hoesen, GISP
|
R1,442
Discovery Miles 14 420
|
Ships in 10 - 15 working days
|
|
Identify, capture and resolve common issues faced by Red Hat
Enterprise Linux administrators using best practices and advanced
troubleshooting techniques About This Book * Develop a strong
understanding of the base tools available within Red Hat Enterprise
Linux (RHEL) and how to utilize these tools to troubleshoot and
resolve real-world issues * Gain hidden tips and techniques to help
you quickly detect the reason for poor network/storage performance
* Troubleshoot your RHEL to isolate problems using this
example-oriented guide full of real-world solutions Who This Book
Is For If you have a basic knowledge of Linux from administration
or consultant experience and wish to add to your Red Hat Enterprise
Linux troubleshooting skills, then this book is ideal for you. The
ability to navigate and use basic Linux commands is expected. What
You Will Learn * Identify issues that need rapid resolution against
long term root cause analysis * Discover commands for testing
network connectivity such as telnet, netstat, ping, ip and curl *
Spot performance issues with commands such as top, ps, free,
iostat, and vmstat * Use tcpdump for traffic analysis * Repair a
degraded file system and rebuild a software raid * Identify and
troubleshoot hardware issues using dmesg * Troubleshoot custom
applications with strace and knowledge of Linux resource
limitations In Detail Red Hat Enterprise Linux is an operating
system that allows you to modernize your infrastructure, boost
efficiency through virtualization, and finally prepare your data
center for an open, hybrid cloud IT architecture. It provides the
stability to take on today's challenges and the flexibility to
adapt to tomorrow's demands. In this book, you begin with simple
troubleshooting best practices and get an overview of the Linux
commands used for troubleshooting. The book will cover the
troubleshooting methods for web applications and services such as
Apache and MySQL. Then, you will learn to identify system
performance bottlenecks and troubleshoot network issues; all while
learning about vital troubleshooting steps such as understanding
the problem statement, establishing a hypothesis, and understanding
trial, error, and documentation. Next, the book will show you how
to capture and analyze network traffic, use advanced system
troubleshooting tools such as strace, tcpdump & dmesg, and
discover common issues with system defaults. Finally, the book will
take you through a detailed root cause analysis of an unexpected
reboot where you will learn to recover a downed system. Style and
approach This is an easy-to-follow guide packed with examples of
real-world core Linux concepts. All the topics are presented in
detail while you're performing the actual troubleshooting steps.
A practical tutorial guide which introduces you to the basics of
Yocto Project, and also helps you with its real hardware use to
boost your Embedded Linux-based project. If you are an embedded
systems enthusiast and willing to learn about compelling features
offered by the Yocto Project, then this book is for you. With prior
experience in the embedded Linux domain, you can make the most of
this book to efficiently create custom Linux-based systems.
Learn to harness the programming power that comes standard with all
unix and linux systems (including Apple's OSX). This guide
encourages hands-on experimentation by including actual scripts
that feature the korn shell (ksh), awk, and sed.
Learn to harness the programming power that comes standard with all
unix and linux systems (including Apple's OSX). This guide
encourages hands-on experimentation by including actual scripts
that feature the korn shell (ksh), awk, and sed.
Learn to harness the programming power that comes standard with all
unix and linux systems (including Apple's OSX). This guide
encourages hands-on experimentation by including actual scripts
that feature the korn shell (ksh), awk, and sed.
Learn to harness the programming power that comes standard with all
unix and linux systems (including Apple's OSX). This guide
encourages hands-on experimentation by including actual scripts
that feature the korn shell (ksh), awk, and sed.
This practical book outlines the steps needed to perform
penetration testing using BackBox. It explains common penetration
testing scenarios and gives practical explanations applicable to a
realworld setting. This book is written primarily for security
experts and system administrators who have an intermediate Linux
capability. However, because of the simplicity and userfriendly
design, it is also suitable for beginners looking to understand the
principle steps of penetration testing.
More and more computers are being used for writing texts. With the
development of Unicode, which supports more than 110,000
characters, it is currently possible to write in almost any
language. However, most of these keys are not on your keyboard.
GNOME, Unity, KDE and other X11-based desktop environments,
fortunately, offer various mechanisms to enter characters from this
vast range. One way is by using compose key sequences, of which
over 4,000 exist. Even though compose key sequences are relatively
easy to remember, it is still a challenge to find out which are
available for the characters you regularly need when writing or
programming on your computer. Multiple practical overviews of
almost 2,800 compose key sequences are provided by this reference
guide. Most of these sequences result in Unicode characters which
are not available on your keyboard and related mainly, but not
exclusively, to Western languages. This reference guide allows you
in a unique way to quickly find compose key sequences you are
looking for and discover a myriad of new characters to easily use
in your texts.
|
You may like...
Only Footnotes
Michael W Lucas
Hardcover
R610
R548
Discovery Miles 5 480
Sudo Mastery
Michael W Lucas
Hardcover
R988
R868
Discovery Miles 8 680
|