IT eBooks
Download, Read, Use

Linux eBooks

Introducing Linux Distros
Introducing Linux Distros

The first barrier that a new Linux user has to face is the overwhelming number of "flavors" that this operating system has. These "flavors" are commonly known as distros (from distribution), and to date there are more than three hundred active distros to choose from. So, how to choose one? You can choose the most popular at the moment, or take heed of what your friend says, but are you sure that this is the one that you need? Making the wrong decision on this matter is behind a good number of disappointments with this operating system. You need to choose the distro that is right for you and your needs. Introducing Linux Distros teaches you the pros and the cons of the most frequently used distros in order to find the one that is right for you. You will explore each distro step by step, so that you don't have to endure hours of web surfing, countless downloads, becoming confused by new concepts and, in the worst cases, reading complex and marathon in ...
Penetration Testing with Raspberry Pi
Penetration Testing with Raspberry Pi

The Raspberry Pi is a low-cost credit-card sized computing system that can be customized for just about anything including penetration testing. Raspberry Pi is the best known platform not because it is cheap but because it is very powerful. Kali is a pentesting/security auditing Linux distribution. Kali Linux has many penetration-testing programs, including nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), Aircrack-ng (a software suite for the penetration-testing of wireless LANs), and Burp suite and OWASP ZAP (both web application security scanners). This book covers how to turn a Raspberry Pi into a hacking arsenal to leverage the most popular open source toolkit, Kali Linux. You will learn how to use various tools to breach networks and steal data. ...
Linux Command Line and Shell Scripting Bible, 3rd Edition
Linux Command Line and Shell Scripting Bible, 3rd Edition

Linux Command Line and Shell Scripting Bible is your essential Linux guide. With detailed instruction and abundant examples, this book teaches you how to bypass the graphical interface and communicate directly with your computer, saving time and expanding capability. This third edition incorporates thirty pages of new functional examples that are fully updated to align with the latest Linux features. Beginning with command line fundamentals, the book moves into shell scripting and shows you the practical application of commands in automating frequently performed functions. This guide includes useful tutorials, and a desk reference value of numerous examples. The Linux command line allows you to type specific shell commands directly into the system to manipulate files and query system resources. Command line statements can be combined into short programs called shell scripts, a practice increasing in popularity due to its usefulness in automation. This boo ...
Intel Galileo and Intel Galileo Gen 2
Intel Galileo and Intel Galileo Gen 2

Intel Galileo and Intel Galileo Gen 2: API Features and Arduino Projects for Linux Programmers provides detailed information about Intel Galileo and Intel Galileo Gen 2 boards for all software developers interested in Arduino and the Linux platform. The book covers the new Arduino APIs and is an introduction for developers on natively using Linux. Author Manoel Carlos Ramon is a member of the Intel Galileo development team; in this book he draws on his practical experience in working on the Galileo project as he shares the team's findings, problems, fixes, workarounds, and techniques with the open source community. His areas of expertise are wide-ranging, including Linux-embedded kernel and device drivers, C/C++, Java, OpenGL, Assembler, Android NDK/SDK/ADK, and 2G/3G/4G modem integration. He has more than 17 years of experience in research and development of mobile devices and embedded circuits. ...
CentOS High Availability
CentOS High Availability

The high performance and stability of CentOS Linux are the key factors that make CentOS Linux the right Linux distribution to build high availability solutions on. This book introduces you to high availability before briefly walking you through the cluster stack and its layers. The book is then divided into two parts, part A and part B, based on CentOS versions 6 and 7 respectively. Each part begins with the installation and configuration of the Corosync cluster messaging software with CMAN or with the Pacemaker cluster resource management software. You will also be introduced to cluster service configuration and cluster service management before you configure fencing or STONITH on CentOS 6 and CentOS 7. By the end of this book, you will have the skills required to independently design, implement, and maintain a CentOS high availability multinode cluster environment. ...
Embedded Linux Projects Using Yocto Project Cookbook
Embedded Linux Projects Using Yocto Project Cookbook

The embedded Linux world is standardizing around Yocto Project as the best integration framework to create reliable embedded Linux products. Yocto Project effectively shortens the time it takes to develop and maintain an embedded Linux product, and it increases its reliability and robustness by using proven and tested components. This book begins with the installation of a professional embedded Yocto setup, then advises you on best practices, and finally explains how to quickly get hands on with the Freescale ARM ecosystem and community layer, using the affordable and open source Wandboard embedded board. ...
Kali Linux Wireless Penetration Testing
Kali Linux Wireless Penetration Testing

As wireless networks become ubiquitous in our lives, wireless penetration testing has become a key skill in the repertoire of the professional penetration tester. The Kali Linux security distribution comes with a myriad of tools used for networking attacks and detecting security loopholes. Kali Linux Wireless Penetration Testing Beginner's Guide presents wireless pentesting from the ground up, introducing all elements of penetration testing with each new technology. Learn various wireless testing methodologies by example, from the basics of wireless routing and encryption through to detailed coverage of hacking methods and attacks such as the Hirte and Caffe Latte. ...
Pro Bash Programming, 2nd Edition
Pro Bash Programming, 2nd Edition

Pro Bash Programming teaches you how to effectively utilize the Bash shell in your programming. The Bash shell is a complete programming language, not merely a glue to combine external Linux commands. By taking full advantage of Shell internals, Shell programs can perform as snappily as utilities written in C or other compiled languages. And you will see how, without assuming Unix lore, you can write professional Bash 4.3 programs through standard programming techniques. This second edition has updated for Bash 4.3, and many scripts have been rewritten to make them more idiomatically Bash, taking better advantage of features specific to Bash. It is easy to read, understand, and will teach you how to get to grips with Bash programming without drowning you in pages and pages of syntax. ...
Learning RHEL Networking
Learning RHEL Networking

Red Hat Enterprise Linux (RHEL) is the most popular Linux distribution currently being used and can be deployed on many platforms. Enterprises that have a large number of systems need to be interconnected, configured, and managed effectively. RHEL networking lets you accomplish these tasks easily. This is a highly-detailed guide to help with your deployments on RHEL 7 or CentOS 7. This book, based on RHEL 7.1, will introduce to you the fundamentals of networking your systems. You will learn the use of new consistent names to identify your network cards. Soon, you will move on to configuring the basic plumbing of your network, setting up time, network address assignment, and name resolution. Last, the focus moves to configuring the new kernel-based iSCSI target services on RHEL 7 and using the service to host storage area networks. ...
NW.js Essentials
NW.js Essentials

Using Node.js, we can create web applications easily. Now, thanks to NW.js, we can also create desktop apps with it using a unique combination of HTML5 and Node. NW.js is a runtime application based on Chromium and Node.js. In this book, you'll discover how to leverage well-known programming languages, such as JavaScript, HTML, and CSS in order to create NW.js desktop applications. You will implement your first simple application right from the first chapter and see how easy it is to use the platform, after which you will learn about Native UI APIs and the different approaches to Node.js programming. You'll get a complete picture of the many possible ways to package and deploy NW.js applications on Microsoft Windows, Mac OS X, and Linux. So, get ready to explore NW.js and build a real, and complex, application. ...
Linux Bible, 9th Edition
Linux Bible, 9th Edition

Linux Bible, 9th Edition is the ultimate hands-on Linux user guide, whether you're a true beginner or a more advanced user navigating recent changes. This updated ninth edition covers the latest versions of Red Hat Enterprise Linux 7 (RHEL 7), Fedora 21, and Ubuntu 14.04 LTS, and includes new information on cloud computing and development with guidance on Openstack and Cloudforms. With a focus on RHEL 7, this practical guide gets you up to speed quickly on the new enhancements for enterprise-quality file systems, the new boot process and services management, firewalld, and the GNOME 3 desktop. Written by a Red Hat expert, this book provides the clear explanations and step-by-step instructions that demystify Linux and bring the new features seamlessly into your workflow. This useful guide assumes a base of little or no Linux knowledge, and takes you step by step through what you need to know to get the job done. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2018