Practical Linux InfrastructurePractical Linux Infrastructure teaches you how to use the best open source tools to build a new Linux infrastructure, or alter an existing infrastructure, to ensure it stands up to enterprise-level needs. Each chapter covers a key area of implementation, with clear examples and step-by-step instructions.
Using this book, you'll understand why scale matters, and what considerations you need to make. You'll see how to switch to using Google Cloud Platform for your hosted solution, how to use KVM for your virtualization, how to use Git, Postfix, and MySQL for your version control, email, and database, and how to use Puppet for your configuration management. For enterprise-level fault tolerance you'll use Apache, and for load balancing and high availability, you'll use HAProxy and Keepalived. For trend analysis you'll learn how to use Cacti, and for notification you'll use Nagios. You'll also learn how to utilize BIND to implement DNS, how to use DHCP (Dynamic Host Configu ...
Linux Mint EssentialsLinux Mint is one of the most popular and proven distributions for beginners and advanced users alike. Out of the box hardware and multimedia support makes Mint your go-to choice for general computing. Its ease of use has transformed it into a celebrated Linux distribution.
This is an all-inclusive guide to Linux Mint, and will teach you everything you need to know in order to use a Linux Mint system. The book starts with the installation process and covers task-oriented topics such as browsing the Internet and installing software as well as shell commands. This guide walks the reader through installing and maintaining Linux Mint on a personal computer. ...
Penetration Testing with the Bash shellThis book teaches you to take your problem solving capabilities to the next level with the Bash shell, to assess network and application level security by leveraging the power of the command-line tools available with Kali Linux.
The book begins by introducing some of the fundamental bash scripting and information processing tools. Building on this, the next few chapters focus on detailing ways to customize your Bash shell using functionalities such as tab completion and rich text formatting. After the fundamental customization techniques and general purpose tools have been discussed, the book breaks into topics such as the command-line-based security tools in the Kali Linux operating system. The general approach in discussing these tools is to involve general purpose tools discussed in previous chapters to integrate security assessment tools. This is a one stop solution to learn Bash and solve information security problems. ...
Linux All-in-One For Dummies, 5th EditionLinux All-in-One For Dummies explains everything you need to get up and running with the popular Linux operating system. Written in the friendly and accessible For Dummies style, the book ideal for new and intermediate Linux users, as well as anyone studying for level-1 Linux certification. The eight minibooks inside cover the basics of Linux interacting with it, networking issues, Internet services, administration, security, scripting, and level-1 certification.
Including everything beginners need to know to get started with Linux Linux All-in-One For Dummies, 5th Edition is the ultimate resource and reference for aspiring professionals. ...
The Art of Memory ForensicsMemory forensics is the art of analyzing computer memory (RAM) to solve digital crimes. As a follow-up to the best seller Malware Analyst's Cookbook, experts in the fields of malware, security, and digital forensics bring you a step-by-step guide to memory forensics - now the most sought after skill in the digital forensics and incident response fields.
Beginning with introductory concepts and moving toward the advanced, The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux and Mac Memory is based on a five day training course that the authors have presented to hundreds of students. It is the only book on the market that focuses exclusively on memory forensics and how to deploy such techniques properly. ...
Pro Linux High Availability ClusteringPro Linux High Availability Clustering teaches you how to implement this fundamental Linux add-on into your business. Linux High Availability Clustering is needed to ensure the availability of mission critical resources. The technique is applied more and more in corporate datacenters around the world. While lots of documentation about the subject is available on the internet, it isn't always easy to build a real solution based on that scattered information, which is often oriented towards specific tasks only. Pro Linux High Availability Clustering explains essential high-availability clustering components on all Linux platforms, giving you the insight to build solutions for any specific case needed. ...
The Definitive Guide to SUSE Linux Enterprise Server 12The Definitive Guide to SUSE Linux Enterprise Server 12 is a task-oriented book designed for self-study as well as classroom environments, which will also serve you as a reference guide. The book covers all skills that system administrators typically need to posses to administer SUSE Linux Enterprise Server in corporate environments. It starts at the beginning, which makes The Definitive Guide to SUSE Linux Enterprise Server 12 suitable for people without any preliminary Linux knowledge, and yet works up to advanced SUSE Linux administration tasks, such as building a cluster, optimizing performance or managing SUSE Linux Enterprise Server with SUSE Manager. ...
Practical Linux InfrastructurePractical Linux Infrastructure teaches you how to use the best open source tools to build a new Linux infrastructure, or alter an existing infrastructure, to ensure it stands up to enterprise-level needs. Each chapter covers a key area of implementation, with clear examples and step-by-step instructions.
Using this book, you'll understand why scale matters, and what considerations you need to make. You'll see how to switch to using Google Cloud Platform for your hosted solution, how to use KVM for your virtualization, how to use Git, Postfix, and MySQL for your version control, email, and database, and how to use Puppet for your configuration management. For enterprise-level fault tolerance you'll use Apache, and for load balancing and high availability, you'll use HAProxy and Keepalived. For trend analysis you'll learn how to use Cacti, and for notification you'll use Nagios. You'll also learn how to utilize BIND to implement DNS, how to use DHCP (Dynamic Host Configu ...
Kali Linux Network Scanning CookbookKali Linux Network Scanning Cookbook will introduce you to critical scanning concepts. You will be shown techniques associated with a wide range of network scanning tasks that include discovery scanning, port scanning, service enumeration, operating system identification, vulnerability mapping, and validation of identified findings. You will learn how to utilize the arsenal of tools available in Kali Linux to conquer any network environment. You will also be shown how to identify remote services, how to assess security risks, and how various attacks are performed. This immersive guide will also encourage the creation of personally scripted tools and the development of skills required to create them. ...
How Linux Works, 2nd EditionUnlike some operating systems, Linux doesn't try to hide the important bits from you—it gives you full control of your computer. But to truly master Linux you need to understand its internals, like how the system boots, how networking works, and what the kernel actually does.
In this completely revised second edition of the perennial best seller How Linux Works, author Brian Ward makes the concepts behind Linux internals accessible to anyone curious about the inner workings of the operating system. Inside, you'll find the kind of knowledge that normally comes from years of experience doing things the hard way. ...
Learn Raspberry Pi with LinuxLearn Raspberry Pi with Linux will tell you everything you need to know about the Raspberry Pi's GUI and command line so you can get started doing amazing things. You'll learn how to set up your new Raspberry Pi with a monitor, keyboard and mouse, and you'll discover that what may look unfamiliar in Linux is really very familiar. You'll find out how to connect to the internet, change your desktop settings, and you'll get a tour of installed applications.
Next, you'll take your first steps toward being a Raspberry Pi expert by learning how to get around at the Linux command line. You'll learn about different shells, including the bash shell, and commands that will make you a true power user. ...