?>
IT eBooks
Download, Read, Use

Linux eBooks

Learn Linux in a Month of Lunches
Learn Linux in a Month of Lunches

Learn Linux in a Month of Lunches shows you how to install and use Linux for all the things you do with your OS, like connecting to a network, installing software, and securing your system. Whether you're just curious about Linux or have to get up and running for your job, you'll appreciate how this book concentrates on the tasks you need to know how to do in 23 easy lessons. If you've only used Windows or Mac OS X, you may be daunted by the Linux operating system. And yet learning Linux doesn't have to be hard, and the payoff is great. Linux is secure, flexible, and free. It's less susceptible to malicious attacks, and when it is attacked, patches are available quickly. If you don't like the way it looks or behaves, you can change it. And best of all, Linux allows users access to different desktop interfaces and loads of software, almost all of it completely free. Learn Linux in a Month of Lunches shows you how to install a ...
Mastering Kali Linux Wireless Pentesting
Mastering Kali Linux Wireless Pentesting

Kali Linux is a Debian-based Linux distribution designed for digital forensics and penetration testing. It gives access to a large collection of security-related tools for professional security testing - some of the major ones being Nmap, Aircrack-ng, Wireshark, and Metasploit. This book will take you on a journey where you will learn to master advanced tools and techniques to conduct wireless penetration testing with Kali Linux. You will begin by gaining an understanding of setting up and optimizing your penetration testing environment for wireless assessments. Then, the book will take you through a typical assessment from reconnaissance, information gathering, and scanning the network through exploitation and data extraction from your target. You will get to know various ways to compromise the wireless network using browser exploits, vulnerabilities in firmware, web-based attacks, client-side exploits, and many other hacking methods. You will also discover how to ...
Introducing Linux Distros
Introducing Linux Distros

The first barrier that a new Linux user has to face is the overwhelming number of "flavors" that this operating system has. These "flavors" are commonly known as distros (from distribution), and to date there are more than three hundred active distros to choose from. So, how to choose one? You can choose the most popular at the moment, or take heed of what your friend says, but are you sure that this is the one that you need? Making the wrong decision on this matter is behind a good number of disappointments with this operating system. You need to choose the distro that is right for you and your needs. Introducing Linux Distros teaches you the pros and the cons of the most frequently used distros in order to find the one that is right for you. You will explore each distro step by step, so that you don't have to endure hours of web surfing, countless downloads, becoming confused by new concepts and, in the worst cases, reading complex and marathon in ...
Linux Pocket Guide, 3rd Edition
Linux Pocket Guide, 3rd Edition

If you use Linux in your day-to-day work, this popular pocket guide is the perfect on-the-job reference. The third edition features new commands for processing image files and audio files, running and killing programs, reading and modifying the system clipboard, and manipulating PDF files, as well as other commands requested by readers. You'll also find powerful command-line idioms you might not be familiar with, such as process substitution and piping into bash. Linux Pocket Guide provides an organized learning path to help you gain mastery of the most useful and important commands. Whether you're a novice who needs to get up to speed on Linux or an experienced user who wants a concise and functional reference, this guide provides quick answers. ...
Mastering KVM Virtualization
Mastering KVM Virtualization

A robust datacenter is essential for any organization – but you don't want to waste resources. With KVM you can virtualize your datacenter, transforming a Linux operating system into a powerful hypervisor that allows you to manage multiple OS with minimal fuss. This book doesn't just show you how to virtualize with KVM – it shows you how to do it well. Written to make you an expert on KVM, you'll learn to manage the three essential pillars of scalability, performance and security – as well as some useful integrations with cloud services such as OpenStack. From the fundamentals of setting up a standalone KVM virtualization platform, and the best tools to harness it effectively, including virt-manager, and kimchi-project, everything you do is built around making KVM work for you in the real-world, helping you to interact and customize it as you need it. With further guidance on performance optimization for Microsoft Windows and RHEL virtual machines, as well as proven str ...
Introducing Linux Distros
Introducing Linux Distros

The first barrier that a new Linux user has to face is the overwhelming number of "flavors" that this operating system has. These "flavors" are commonly known as distros (from distribution), and to date there are more than three hundred active distros to choose from. So, how to choose one? You can choose the most popular at the moment, or take heed of what your friend says, but are you sure that this is the one that you need? Making the wrong decision on this matter is behind a good number of disappointments with this operating system. You need to choose the distro that is right for you and your needs. Introducing Linux Distros teaches you the pros and the cons of the most frequently used distros in order to find the one that is right for you. You will explore each distro step by step, so that you don't have to endure hours of web surfing, countless downloads, becoming confused by new concepts and, in the worst cases, reading complex and marathon in ...
Penetration Testing with Raspberry Pi
Penetration Testing with Raspberry Pi

The Raspberry Pi is a low-cost credit-card sized computing system that can be customized for just about anything including penetration testing. Raspberry Pi is the best known platform not because it is cheap but because it is very powerful. Kali is a pentesting/security auditing Linux distribution. Kali Linux has many penetration-testing programs, including nmap (a port scanner), Wireshark (a packet analyzer), John the Ripper (a password cracker), Aircrack-ng (a software suite for the penetration-testing of wireless LANs), and Burp suite and OWASP ZAP (both web application security scanners). This book covers how to turn a Raspberry Pi into a hacking arsenal to leverage the most popular open source toolkit, Kali Linux. You will learn how to use various tools to breach networks and steal data. ...
Linux Command Line and Shell Scripting Bible, 3rd Edition
Linux Command Line and Shell Scripting Bible, 3rd Edition

Linux Command Line and Shell Scripting Bible is your essential Linux guide. With detailed instruction and abundant examples, this book teaches you how to bypass the graphical interface and communicate directly with your computer, saving time and expanding capability. This third edition incorporates thirty pages of new functional examples that are fully updated to align with the latest Linux features. Beginning with command line fundamentals, the book moves into shell scripting and shows you the practical application of commands in automating frequently performed functions. This guide includes useful tutorials, and a desk reference value of numerous examples. The Linux command line allows you to type specific shell commands directly into the system to manipulate files and query system resources. Command line statements can be combined into short programs called shell scripts, a practice increasing in popularity due to its usefulness in automation. This boo ...
Intel Galileo and Intel Galileo Gen 2
Intel Galileo and Intel Galileo Gen 2

Intel Galileo and Intel Galileo Gen 2: API Features and Arduino Projects for Linux Programmers provides detailed information about Intel Galileo and Intel Galileo Gen 2 boards for all software developers interested in Arduino and the Linux platform. The book covers the new Arduino APIs and is an introduction for developers on natively using Linux. Author Manoel Carlos Ramon is a member of the Intel Galileo development team; in this book he draws on his practical experience in working on the Galileo project as he shares the team's findings, problems, fixes, workarounds, and techniques with the open source community. His areas of expertise are wide-ranging, including Linux-embedded kernel and device drivers, C/C++, Java, OpenGL, Assembler, Android NDK/SDK/ADK, and 2G/3G/4G modem integration. He has more than 17 years of experience in research and development of mobile devices and embedded circuits. ...
CentOS High Availability
CentOS High Availability

The high performance and stability of CentOS Linux are the key factors that make CentOS Linux the right Linux distribution to build high availability solutions on. This book introduces you to high availability before briefly walking you through the cluster stack and its layers. The book is then divided into two parts, part A and part B, based on CentOS versions 6 and 7 respectively. Each part begins with the installation and configuration of the Corosync cluster messaging software with CMAN or with the Pacemaker cluster resource management software. You will also be introduced to cluster service configuration and cluster service management before you configure fencing or STONITH on CentOS 6 and CentOS 7. By the end of this book, you will have the skills required to independently design, implement, and maintain a CentOS high availability multinode cluster environment. ...
Embedded Linux Projects Using Yocto Project Cookbook
Embedded Linux Projects Using Yocto Project Cookbook

The embedded Linux world is standardizing around Yocto Project as the best integration framework to create reliable embedded Linux products. Yocto Project effectively shortens the time it takes to develop and maintain an embedded Linux product, and it increases its reliability and robustness by using proven and tested components. This book begins with the installation of a professional embedded Yocto setup, then advises you on best practices, and finally explains how to quickly get hands on with the Freescale ARM ecosystem and community layer, using the affordable and open source Wandboard embedded board. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2024