IT eBooks
Download, Read, Use
Ubuntu 7.10 Linux Unleashed
Ubuntu 7.10 Linux Unleashed

Ubuntu 7.10 Linux Unleashed presents comprehensive coverage of the popular Ubuntu Linux distribution. Windows users, Mac users, and Linux enthusiasts have been increasingly turning to Ubuntu for a user-friendly, easy-to-use Linux distribution. This book provides detailed information on installing, using, and administering Ubuntu. You'll learn how to set up a workstation or a server, and you'll find complete details on Ubuntu's easy-to-use desktop and productivity software. ...
Getting Started with BeagleBone
Getting Started with BeagleBone

Many people think of Linux as a computer operating system, running on users' desktops and powering servers. But Linux can also be found inside many consumer electronics devices. Whether they're the brains of a cell phone, cable box, or exercise bike, embedded Linux systems blur the distinction between computer and device. Many makers love microcontroller platforms such as Arduino, but as the complexity increases in their projects, they need more power for applications, such as computer vision. The BeagleBone is an embedded Linux board for makers. It's got built-in networking, many inputs and outputs, and a fast processor to handle demanding tasks. ...
Debian 7: System Administration Best Practices
Debian 7: System Administration Best Practices

Debian is one of the most popular Linux-based operating systems, with over 37 thousand software packages available in several architectures. Debian 7 is the latest version of this universal operating system and provides the foundation for thousands of web servers. It is easy to install, stable, and provides mechanisms for system security. Debian 7: System Administration Best Practices provides valuable background information, tips, and advice on the major areas of installing, maintaining, and administering Debian Linux, from single systems to clusters. Learn what makes Debian the most stable and popular Linux distribution for Internet sites. ...
Penetration Testing with the Bash shell
Penetration Testing with the Bash shell

This book teaches you to take your problem solving capabilities to the next level with the Bash shell, to assess network and application level security by leveraging the power of the command-line tools available with Kali Linux. The book begins by introducing some of the fundamental bash scripting and information processing tools. Building on this, the next few chapters focus on detailing ways to customize your Bash shell using functionalities such as tab completion and rich text formatting. After the fundamental customization techniques and general purpose tools have been discussed, the book breaks into topics such as the command-line-based security tools in the Kali Linux operating system. The general approach in discussing these tools is to involve general purpose tools discussed in previous chapters to integrate security assessment tools. This is a one stop solution to learn Bash and solve information security problems. ...
Linux All-in-One For Dummies, 5th Edition
Linux All-in-One For Dummies, 5th Edition

Linux All-in-One For Dummies explains everything you need to get up and running with the popular Linux operating system. Written in the friendly and accessible For Dummies style, the book ideal for new and intermediate Linux users, as well as anyone studying for level-1 Linux certification. The eight minibooks inside cover the basics of Linux, interacting with it, networking issues, Internet services, administration, security, scripting, and level-1 certification. Including everything beginners need to know to get started with Linux, Linux All-in-One For Dummies, 5th Edition is the ultimate resource and reference for aspiring professionals. ...
The Art of Memory Forensics
The Art of Memory Forensics

Memory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics - now the most sought after skill in the digital forensics and incident response fields. Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux, and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. ...
Arch Linux Environment Setup How-to
Arch Linux Environment Setup How-to

Learn something new in an Instant! A short, fast, focused guide delivering immediate results. Install and configure Arch Linux to set up your optimum environment for building applications Boot and manage services, add and remove packages Discover and get to grips with the features of the Linux Kernel ...
Linux Shell Scripting Cookbook
Linux Shell Scripting Cookbook

GNU/Linux is a remarkable operating system that comes with a complete development environment that is stable, reliable, and extremely powerful. The shell being the native interface to communicate with the operating system is capable of controlling the entire operating system. There are numerous commands on Linux shell which are documented but hard to understand. The man pages are helpful but they are very lengthy and it does not give any clues on key areas where commands can be used. Proper usage of shell commands can easily solve many complex tasks with a few lines of code, but most linux users don't have the right know-how to use the Linux shell to its full potential. ...
Linux Thin Client Networks Design and Deployment
Linux Thin Client Networks Design and Deployment

A thin client network is a client-server architecture where client computers depend primarily on a central server for processing activities. The client machines (thin clients) mainly focus on passing user input to remote services and receiving and displaying the output; thin clients aren't as much about the hardware or software as about the design. This book has all the information you need to easily set up your own Linux thin client network. It will help you evaluate how a thin client network fits into your organization and make informed choices on the hardware and software needed for your deployment, discusses design issues, and guides you with building, configuring, and supporting the network. ...
Linux Shell Scripting Cookbook, 2nd Edition
Linux Shell Scripting Cookbook, 2nd Edition

The shell remains one of the most powerful tools on a computer system - yet a large number of users are unaware of how much one can accomplish with it. Using a combination of simple commands, we will see how to solve complex problems in day to day computer usage. Linux Shell Scripting Cookbook, 2nd Edition will take you through useful real-world recipes designed to make your daily life easy when working with the shell. The book shows the reader how to effectively use the shell to accomplish complex tasks with ease. The book discusses basics of using the shell, general commands and proceeds to show the reader how to use them to perform complex tasks with ease. ...
← Prev       Next →
Reproduction of site books is authorized only for informative purposes and strictly for personal, private use.
Only Direct Download
IT eBooks Group © 2011-2025