How Linux Works 2nd Edition

Titre : How Linux Works 2nd Edition
Auteur : Brian Ward
Éditeur : No Starch Press
ISBN-13 : 9781593275679
Libération : 2014-11-14

Télécharger Lire en ligne



Unlike some operating systems, Linux doesn’t try to hide the important bits from you—it gives you full control of your computer. But to truly master Linux, you need to understand its internals, like how the system boots, how networking works, and what the kernel actually does. In this completely revised second edition of the perennial best seller How Linux Works, author Brian Ward makes the concepts behind Linux internals accessible to anyone curious about the inner workings of the operating system. Inside, you’ll find the kind of knowledge that normally comes from years of experience doing things the hard way. You’ll learn: * How Linux boots, from boot loaders to init implementations (systemd, Upstart, and System V) * How the kernel manages devices, device drivers, and processes * How networking, interfaces, firewalls, and servers work * How development tools work and relate to shared libraries * How to write effective shell scripts You’ll also explore the kernel and examine key system tasks inside user space, including system calls, input and output, and filesystems. With its combination of background, theory, real-world examples, and patient explanations, How Linux Works will teach you what you need to know to solve pesky problems and take control of your operating system.

Books in Print 2004 2005

Titre : Books in Print 2004 2005
Auteur :
Éditeur :
ISBN-13 : 0835246493
Libération :

Télécharger Lire en ligne



A été écrit sous une forme ou une autre pendant la plus grande partie de sa vie. Vous pouvez trouver autant d'inspiration de Books in Print 2004 2005 Aussi informatif et amusant. Cliquez sur le bouton TÉLÉCHARGER ou Lire en ligne pour obtenir gratuitement le livre de titre $ gratuitement.

Linux with Operating System Concepts

Titre : Linux with Operating System Concepts
Auteur : Richard Fox
Éditeur : CRC Press
ISBN-13 : 9781482235890
Libération : 2014-08-26

Télécharger Lire en ligne



A True Textbook for an Introductory Course, System Administration Course, or a Combination Course Linux with Operating System Concepts merges conceptual operating system (OS) and Unix/Linux topics into one cohesive textbook for undergraduate students. The book can be used for a one- or two-semester course on Linux or Unix. It is complete with review sections, problems, definitions, concepts, and relevant introductory material, such as binary and Boolean logic, OS kernels, and the role of the CPU and memory hierarchy. Details for Introductory and Advanced Users The book covers Linux from both the user and system administrator positions. From a user perspective, it emphasizes command line interaction. From a system administrator perspective, the text reinforces shell scripting with examples of administration scripts that support the automation of administrator tasks. Thorough Coverage of Concepts and Linux Commands The author incorporates OS concepts not found in most Linux/Unix textbooks, including kernels, file systems, storage devices, virtual memory, and process management. He also introduces computer science topics, such as computer networks and TCP/IP, binary numbers and Boolean logic, encryption, and the GNUs C compiler. In addition, the text discusses disaster recovery planning, booting, and Internet servers.

Asterisk

Titre : Asterisk
Auteur : Jim Van Meggelen
Éditeur : "O'Reilly Media, Inc."
ISBN-13 : 9780596510480
Libération : 2007-08-28

Télécharger Lire en ligne



Provides information on Asterisk, an open source telephony application.

The Basics of Hacking and Penetration Testing

Titre : The Basics of Hacking and Penetration Testing
Auteur : Patrick Engebretson
Éditeur : Elsevier
ISBN-13 : 9781597496568
Libération : 2011-07-21

Télécharger Lire en ligne



The Basics of Hacking and Penetration Testing serves as an introduction to the steps required to complete a penetration test or perform an ethical hack. You learn how to properly utilize and interpret the results of modern day hacking tools; which are required to complete a penetration test. Tool coverage will include, Backtrack Linux, Google, Whois, Nmap, Nessus, Metasploit, Netcat, Netbus, and more. A simple and clean explanation of how to utilize these tools will allow you to gain a solid understanding of each of the four phases and prepare them to take on more in-depth texts and topics. This book includes the use of a single example (pen test target) all the way through the book which allows you to clearly see how the tools and phases relate. Named a 2011 Best Hacking and Pen Testing Book by InfoSec Reviews Each chapter contains hands-on examples and exercises that are designed to teach you how to interpret the results and utilize those results in later phases. Writen by an author who works in the field as a Penetration Tester and who teaches Offensive Security, Penetration Testing, and Ethical Hacking, and Exploitation classes at Dakota State University. Utilizes the Backtrack Linus distribution and focuses on the seminal tools required to complete a penetration test.

Wicked Cool Shell Scripts

Titre : Wicked Cool Shell Scripts
Auteur : Dave Taylor
Éditeur : No Starch Press
ISBN-13 : 9781593270124
Libération : 2004

Télécharger Lire en ligne



This useful book offers 101 fun shell scripts for solving common problems and personalizing the computing environment. Readers will find shell scripts to create an interactive calculator, a spell checker, a disk backup utility, a weather tracker, a web logfile analysis tool, a stock portfolio tracker, and much more. The cookbook style examples are all written in Bourne Shell (sh) syntax; the scripts will run on Linux, Mac OS X, and Unix.

Write Great Code Vol 2

Titre : Write Great Code Vol 2
Auteur : Randall Hyde
Éditeur : No Starch Press
ISBN-13 : 9781593270650
Libération : 2006

Télécharger Lire en ligne



Provides information on how computer systems operate, how compilers work, and writing source code.

Security Warrior

Titre : Security Warrior
Auteur : Cyrus Peikari
Éditeur : "O'Reilly Media, Inc."
ISBN-13 : 059651722X
Libération : 2004-01-12

Télécharger Lire en ligne



When it comes to network security, many users and administrators are running scared, and justifiably so. The sophistication of attacks against computer systems increases with each new Internet worm.What's the worst an attacker can do to you? You'd better find out, right? That's what Security Warrior teaches you. Based on the principle that the only way to defend yourself is to understand your attacker in depth, Security Warrior reveals how your systems can be attacked. Covering everything from reverse engineering to SQL attacks, and including topics like social engineering, antiforensics, and common attacks against UNIX and Windows systems, this book teaches you to know your enemy and how to be prepared to do battle.Security Warrior places particular emphasis on reverse engineering. RE is a fundamental skill for the administrator, who must be aware of all kinds of malware that can be installed on his machines -- trojaned binaries, "spyware" that looks innocuous but that sends private data back to its creator, and more. This is the only book to discuss reverse engineering for Linux or Windows CE. It's also the only book that shows you how SQL injection works, enabling you to inspect your database and web applications for vulnerability.Security Warrior is the most comprehensive and up-to-date book covering the art of computer war: attacks against computer systems and their defenses. It's often scary, and never comforting. If you're on the front lines, defending your site against attackers, you need this book. On your shelf--and in your hands.

Android Forensics

Titre : Android Forensics
Auteur : Andrew Hoog
Éditeur : Elsevier
ISBN-13 : 9781597496513
Libération : 2011

Télécharger Lire en ligne



The open source nature of the platform has not only established a new direction for the industry, but enables a developer or forensic analyst to understand the device at the most fundamental level. Android Forensics covers an open source mobile device platform based on the Linux 2.6 kernel and managed by the Open Handset Alliance. The Android platform is a major source of digital forensic investigation and analysis. This book provides a thorough review of the Android platform including supported hardware devices, the structure of the Android development project and implementation of core services (wireless communication, data storage and other low-level functions). Finally, it will focus on teaching readers how to apply actual forensic techniques to recover data. Ability to forensically acquire Android devices using the techniques outlined in the book Detailed information about Android applications needed for forensics investigations Important information about SQLite, a file based structured data storage relevant for both Android and many other platforms.

Practical Forensic Imaging

Titre : Practical Forensic Imaging
Auteur : Bruce Nikkel
Éditeur : No Starch Press
ISBN-13 : 9781593277932
Libération : 2016-12-16

Télécharger Lire en ligne



Bruce Nikkel A été écrit sous une forme ou une autre pendant la plus grande partie de sa vie. Vous pouvez trouver autant d'inspiration de Practical Forensic Imaging Aussi informatif et amusant. Cliquez sur le bouton TÉLÉCHARGER ou Lire en ligne pour obtenir gratuitement le livre de titre $ gratuitement.