Linux Books
Manning Publications Learn PowerShell in a Month of Lunches: Covers
Book Synopsis"Not only for MacOS and Linux users, but also a great resource for Windows PS users." - Bruce Bergman Learn PowerShell in a Month of Lunches: Covers Windows, Linux, and macOS is a task-focused tutorial for administering Linux and macOS systems using Microsoft PowerShell. Adapted by PowerShell team members Travis Plunk and Tyler Leonhardt from the bestselling Learn Windows PowerShell in a Month of Lunches by community legends Don Jones and Jeffrey Hicks, it features Linux-based examples covering core language features and admin tasks. Designed for busy IT professionals, this innovative guide will take you from the basics to PowerShell proficiency through 25 tutorials you can do in your lunch break. about the technologyThe PowerShell scripting language and administrative shell was initially created for Windows, providing a high-quality command-line interface and awesome automation features. As part of Microsoft's ongoing strategy to support non-Windows platforms with its Azure cloud service and .NET Core framework, PowerShell now runs on Linux and macOS. Like Bash, PowerShell can execute and script nearly any aspect of Linux, so you can easily manage repetitive daily tasks, servers, Cloud resources, Continuous Integration pipelines, and more. Because PowerShell is a full-featured programming language, however, it provides capability well beyond traditional shell scripting languages, such as the ability to treat OS components as objects. about the bookLearn PowerShell in a Month of Lunches: Covers Windows, Linux, and macOS is a user-friendly tutorial to managing Linux and macOS systems with PowerShell. It's based on the bestselling Learn Windows PowerShell in a Month of Lunches, which has introduced PowerShell to nearly 100,000 readers. You'll learn how PowerShell shapes up to Bash or Python scripting as you write and run simple scripts that automate boring daily tasks. As you progress through the book, you'll use PowerShell to write Continuous Integration Pipelines and manage cloud-based servers. Just set aside one hour a day for a month, and you'll be automating tasks faster than you ever thought possible! what's inside- Why you should use PowerShell on Linux and macOS- Background jobs and automation techniques- Simple scripting to automate repetitive daily tasks- Common syntax and commands cheat sheet- Each lesson takes you an hour or less about the readerFor IT professionals comfortable administering Windows or Linux. No previous experience with PowerShell or Bash required. about the authorTravis Plunk has been a Software Engineer on various PowerShell teams since 2013, and at Microsoft since 1999. He was involved in open sourcing PowerShell and has worked on the project full time since shortly after the project was announced. James Petty is a Microsoft MVP, and the CEO and Executive Director for the DevOps Collective and PowerShell.org. Tyler Leonhardt has been a Software Engineer on the PowerShell team since 2017, and at Microsoft since 2016. He is a core maintainer of the PowerShell extension for Visual Studio Code. Learn Windows PowerShell in a Month of Lunches was written by PowerShell community legends Don Jones and Jeffrey Hicks, who have years of experience as successful PowerShell trainers.Trade Review“Notonly for MacOS and Linux users, but also a great resource for Windows PS users.” Bruce Bergman “Gives developers a lot of insight on how PowerShell works and how to accomplish everyday tasks.” Marcel van den Brink “This book enabled me to quickly get using PowerShell for real-lifetasks.” Rick Michaels “The book is great, especially if you have no previous experience with PowerShell, tasks automation, or DevOps.” Max Almonte “Approaches PowerShell from a building block like perspective.” FosterHaines “Unlike other PowerShell type books, this book expands beyond just Windows environments to accommodate those on Mac or Linux platforms who may want to explore this area as well.” James Matlock
£28.79
Pearson Education (US) Red Hat RHCSA 9 Cert Guide
Book SynopsisTable of ContentsIntroduction xxx Part I Performing Basic System Management Tasks Chapter 1 Installing Red Hat Enterprise Linux 3 “Do I Know This Already?” Quiz 3 Foundation Topics 6 Preparing to Install Red Hat Enterprise Linux 6 What Is Red Hat Enterprise Linux 9 Server? 6 Getting the Software 7 Using Red Hat Enterprise Linux 7 Using CentOS Stream 7 Other Distributions 8 Understanding Access to Repositories 8 Setup Requirements 9 Cert Guide Environment Description 9 Performing an Installation 10 Summary 22 Exam Preparation Tasks 23 End-of-Chapter Lab 24 Chapter 2 Using Essential Tools 27 “Do I Know This Already?” Quiz 27 Foundation Topics 30 Basic Shell Skills 30 Understanding Commands 30 Executing Commands 30 I/O Redirection 32 Using Pipes 34 History 35 Bash Completion 37 Editing Files with vim 37 Understanding the Shell Environment 40 Understanding Variables 40 Recognizing Environment Configuration Files 41 Using /etc/motd and /etc/issue 42 Finding Help 43 Using --help 43 Using man 43 Finding the Right man Page 44 Updating mandb 46 Using info 47 Using /usr/share/doc Documentation Files 48 Summary 49 Exam Preparation Tasks 49 End-of-Chapter Lab 51 Chapter 3 Essential File Management Tools 53 “Do I Know This Already?” Quiz 53 Foundation Topics 56 Working with the File System Hierarchy 56 Defining the File System Hierarchy 56 Understanding Mounts 57 Managing Files 61 Working with Wildcards 61 Managing and Working with Directories 61 Working with Absolute and Relative Pathnames 62 Listing Files and Directories 64 Copying Files and Directories 64 Moving Files and Directories 65 Deleting Files and Directories 66 Using Links 68 Understanding Hard Links 68 Understanding Symbolic Links 69 Creating Links 69 Removing Links 70 Working with Archives and Compressed Files 71 Managing Archives with tar 72 Creating Archives with tar 72 Monitoring and Extracting tar Files 73 Using Compression 74 Summary 75 Exam Preparation Tasks 76 End-of-Chapter Lab 77 Chapter 4 Working with Text Files 81 “Do I Know This Already?” Quiz 81 Foundation Topics 84 Using Common Text File–Related Tools 84 Doing More with less 84 Showing File Contents with cat 85 Displaying the First or Last Lines of a File with head and tail 86 Filtering Specific Columns with cut 87 Sorting File Contents and Output with sort 87 Counting Lines, Words, and Characters with wc 88 A Primer to Using Regular Expressions 89 Using Line Anchors 90 Using Escaping in Regular Expressions 91 Using Wildcards and Multipliers 91 Using Extended Regular Expressions 91 Using grep to Analyze Text 93 Working with Other Useful Text Processing Utilities 94 Summary 96 Exam Preparation Tasks 96 End-of-Chapter Lab 98 Chapter 5 Connecting to Red Hat Enterprise Linux 9 101 “Do I Know This Already?” Quiz 101 Foundation Topics 104 Working on Local Consoles 104 Logging In to a Local Console 104 Switching Between Terminals in a Graphical Environment 105 Working with Multiple Terminals in a Nongraphical Environment 107 Understanding Pseudo Terminal Devices 108 Booting, Rebooting, and Shutting Down Systems 109 Using SSH and Related Utilities 110 Accessing Remote Systems Using SSH 110 Using Graphical Applications in an SSH Environment 113 Securely Transferring Files Between Systems 114 Using scp to Securely Copy Files 114 Using sftp to Securely Transfer Files 115 Using rsync to Synchronize Files 115 Configuring Key-Based Authentication for SSH 116 Using Passphrases or Not? 116 Summary 117 Exam Preparation Tasks 118 End-of-Chapter Labs 119 Chapter 6 User and Group Management 121 “Do I Know This Already?” Quiz 121 Foundation Topics 124 Understanding Different User Types 124 Users on Linux 124 Working as Root 124 Using su 125 sudo 126 PolicyKit 127 Creating and Managing User Accounts 129 System Accounts and Normal Accounts 129 Creating Users 132 Modifying the Configuration Files 132 Using useradd 133 Home Directories 133 Default Shell 133 Managing User Properties 134 Configuration Files for User Management Defaults 134 Managing Password Properties 135 Creating a User Environment 135 Creating and Managing Group Accounts 137 Understanding Linux Groups 137 Creating Groups 137 Creating Groups with vigr 137 Using groupadd to Create Groups 138 Managing Group Properties 138 Summary 139 Exam Preparation Tasks 140 End-of-Chapter Labs 141 Chapter 7 Permissions Management 145 “Do I Know This Already?” Quiz 145 Foundation Topics 148 Managing File Ownership 148 Displaying Ownership 148 Changing User Ownership 149 Changing Group Ownership 150 Understanding Default Ownership 150 Managing Basic Permissions 151 Understanding Read, Write, and Execute Permissions 152 Applying Read, Write, and Execute Permissions 153 Managing Advanced Permissions 155 Understanding Advanced Permissions 155 Applying Advanced Permissions 157 Setting Default Permissions with umask 159 Working with User-Extended Attributes 160 Summary 162 Exam Preparation Tasks 162 End-of-Chapter Lab 164 Chapter 8 Configuring Networking 167 “Do I Know This Already?” Quiz 167 Foundation Topics 170 Networking Fundamentals 170 IP Addresses 170 IPv6 Addresses 171 IPv4 Network Masks 171 Binary Notation 172 MAC Addresses 173 Protocol and Ports 173 Managing Network Addresses and Interfaces 174 Validating Network Configuration 175 Validating Network Address Configuration 175 Validating Routing 178 Validating the Availability of Ports and Services 179 Managing Network Configuration with nmtui and nmcli 180 Required Permissions to Change Network Configuration 181 Configuring the Network with nmcli 182 Configuring the Network with nmtui 184 Working on Network Configuration Files 186 Setting Up Hostname and Name Resolution 187 Hostnames 187 DNS Name Resolution 189 Summary 191 Exam Preparation Tasks 191 End-of-Chapter Lab 193 Part II Operating Running Systems Chapter 9 Managing Software 195 “Do I Know This Already?” Quiz 195 Foundation Topics 198 Managing Software Packages with dnf 198 Understanding the Role of Repositories 198 Registering Red Hat Enterprise Linux for Support 199 Managing Subscriptions 200 Specifying Which Repository to Use 200 Understanding Repository Security 203 Creating Your Own Repository 204 Using dnf 206 Using dnf to Find Software Packages 206 Getting More Information About Packages 208 Installing and Removing Software Packages 209 Showing Lists of Packages 211 Updating Packages 213 Working with dnf Package Groups 214 Using dnf History 216 Managing Package Modules 217 Understanding dnf Modules 218 Managing Modules 218 Managing Software Packages with rpm 221 Understanding RPM Filenames 222 Querying the RPM Database 222 Querying RPM Package Files 223 Using repoquery 224 Summary 226 Exam Preparation Tasks 226 End-of-Chapter Labs 227 Chapter 10 Managing Processes 231 “Do I Know This Already?” Quiz 231 Foundation Topics 234 Introduction to Process Management 234 Managing Shell Jobs 234 Running Jobs in the Foreground and Background 234 Managing Shell Jobs 235 Understanding Parent–Child Relations 237 Using Common Command-Line Tools for Process Management 237 Understanding Processes and Threads 238 Using ps to Get Process Information 239 Understanding Process Priorities 241 Exploring Relations Between Slices 241 Managing Process Priorities 242 Sending Signals to Processes with kill, killall, and pkill 243 Killing Zombies 245 Using top to Manage Processes 246 Using tuned to Optimize Performance 248 Summary 250 Exam Preparation Tasks 250 End-of-Chapter Lab 251 Chapter 11 Working with Systemd 253 “Do I Know This Already?” Quiz 253 Foundation Topics 256 Understanding Systemd 256 Understanding Systemd Unit Locations 256 Understanding Systemd Service Units 257 Understanding Systemd Mount Units 258 Understanding Systemd Socket Units 259 Understanding Systemd Target Units 260 Managing Units Through Systemd 261 Managing Dependencies 263 Managing Unit Options 265 Summary 267 Exam Preparation Tasks 267 End-of-Chapter Lab 268 Chapter 12 Scheduling Tasks 271 “Do I Know This Already?” Quiz 271 Foundation Topics 274 Understanding Task Scheduling Options in RHEL 274 Using Systemd Timers 274 Configuring cron to Automate Recurring Tasks 276 Managing the crond Service 276 Understanding cron Timing 278 Managing cron Configuration Files 278 Understanding the Purpose of anacron 281 Managing cron Security 282 Configuring at to Schedule Future Tasks 282 Summary 283 Exam Preparation Tasks 284 End-of-Chapter Lab 285 Chapter 13 Configuring Logging 287 “Do I Know This Already?” Quiz 287 Foundation Topics 290 Understanding System Logging 290 Understanding the Role of systemd-journald and rsyslogd 290 Reading Log Files 292 Understanding Log File Contents 293 Live Log File Monitoring 294 Using logger 294 Working with systemd-journald 295 Using journalctl to Find Events 295 Preserving the Systemd Journal 298 Configuring rsyslogd 300 Understanding rsyslogd Configuration Files 300 Understanding rsyslog.conf Sections 300 Understanding Facilities, Priorities, and Log Destinations 301 Rotating Log Files 304 Summary 306 Exam Preparation Tasks 306 End-of-Chapter Lab 308 Chapter 14 Managing Storage 311 “Do I Know This Already?” Quiz 311 Foundation Topics 314 Understanding MBR and GPT Partitions 314 Understanding the MBR Partitioning Scheme 314 Understanding the Need for GPT Partitioning 315 Understanding Storage Measurement Units 316 Managing Partitions and File Systems 317 Creating MBR Partitions with fdisk 318 Using Extended and Logical Partitions on MBR 320 Creating GPT Partitions with gdisk 322 Creating GPT Partitions with parted 327 Creating File Systems 328 Changing File System Properties 329 Managing Ext4 File System Properties 329 Managing XFS File System Properties 331 Adding Swap Partitions 332 Adding Swap Files 333 Mounting File Systems 333 Manually Mounting File Systems 334 Using Device Names, UUIDs, or Disk Labels 334 Automating File System Mounts Through /etc/fstab 335 Using Systemd Mounts 338 Summary 339 Exam Preparation Tasks 340 End-of-Chapter Lab 341 Chapter 15 Managing Advanced Storage 343 “Do I Know This Already?” Quiz 343 Foundation Topics 346 Understanding LVM 346 LVM Architecture 346 LVM Features 347 Creating LVM Logical Volumes 348 Creating the Physical Volumes 350 Creating the Volume Groups 353 Creating the Logical Volumes and File Systems 355 Understanding LVM Device Naming 355 Resizing LVM Logical Volumes 358 Resizing Volume Groups 358 Resizing Logical Volumes and File Systems 358 Reducing Volume Groups 360 Configuring Stratis 361 Understanding Stratis Architecture 362 Creating Stratis Storage 362 Managing Stratis 363 Summary 365 Exam Preparation Tasks 365 End-of-Chapter Labs 366 Part III Performing Advanced System Administration Tasks Chapter 16 Basic Kernel Management 369 “Do I Know This Already?” Quiz 369 Foundation Topics 372 Understanding the Role of the Linux Kernel 372 Understanding the Use of Kernel Threads and Drivers 372 Analyzing What the Kernel Is Doing 373 Working with Kernel Modules 375 Understanding Hardware Initialization 376 Managing Kernel Modules 378 Checking Driver Availability for Hardware Devices 381 Managing Kernel Module Parameters 382 Upgrading the Linux Kernel 383 Summary 383 Exam Preparation Tasks 384 End-of-Chapter Lab 385 Chapter 17 Managing and Understanding the Boot Procedure 387 “Do I Know This Already?” Quiz 387 Foundation Topics 390 Managing Systemd Targets 390 Understanding Systemd Targets 390 Working with Targets 390 Understanding Target Units 391 Understanding Wants 392 Managing Systemd Targets 392 Isolating Targets 393 Setting the Default Target 396 Working with GRUB 2 396 Understanding GRUB 2 396 Understanding GRUB 2 Configuration Files 397 Modifying Default GRUB 2 Boot Options 398 Summary 399 Exam Preparation Tasks 399 End-of-Chapter Labs 401 Chapter 18 Essential Troubleshooting Skills 403 “Do I Know This Already?” Quiz 403 Foundation Topics 406 Understanding the RHEL 9 Boot Procedure 406 Passing Kernel Boot Arguments 408 Accessing the Boot Prompt 408 Starting a Troubleshooting Target 409 Using a Rescue Disk 410 Restoring System Access Using a Rescue Disk 411 Reinstalling GRUB Using a Rescue Disk 413 Re-creating the Initramfs Using a Rescue Disk 413 Fixing Common Issues 414 Reinstalling GRUB 2 414 Fixing the Initramfs 415 Recovering from File System Issues 415 Resetting the Root Password 416 Summary 417 Exam Preparation Tasks 417 End-of-Chapter Lab 419 Chapter 19 An Introduction to Automation with Bash Shell Scripting 421 “Do I Know This Already?” Quiz 421 Foundation Topics 424 Understanding Shell Scripting Core Elements 424 Using Variables and Input 426 Using Positional Parameters 426 Working with Variables 427 Using Conditional Loops 429 Working with if … then … else 430 Using || and && 431 Applying for 431 Understanding while and until 432 Understanding case 434 Bash Shell Script Debugging 435 Summary 435 Exam Preparation Tasks 436 End-of-Chapter Lab 437 Part IV Managing Network Services Chapter 20 Configuring SSH 439 “Do I Know This Already?” Quiz 439 Foundation Topics 442 Hardening the SSH Server 442 Limiting Root Access 442 Configuring Alternative Ports 443 Modifying SELinux to Allow for Port Changes 443 Limiting User Access 444 Using Other Useful sshd Options 445 Session Options 446 Connection Keepalive Options 446 Configuring Key-Based Authentication with Passphrases 447 Summary 448 Exam Preparation Tasks 448 End-of-Chapter Lab 450 Chapter 21 Managing Apache HTTP Services 453 “Do I Know This Already?” Quiz 453 Foundation Topics 456 Configuring a Basic Apache Server 456 Installing the Required Software 456 Identifying the Main Configuration File 456 Creating Web Server Content 459 Understanding Apache Configuration Files 460 Creating Apache Virtual Hosts 462 Summary 464 Exam Preparation Tasks 464 End-of-Chapter Lab 466 Chapter 22 Managing SELinux 469 “Do I Know This Already?” Quiz 470 Foundation Topics 473 Understanding SELinux Working Modes 473 Understanding Context Settings and the Policy 477 Monitoring Current Context Labels 477 Setting Context Types 479 Finding the Context Type You Need 482 Restoring Default File Contexts 483 Managing Port Access 484 Using Boolean Settings to Modify SELinux Settings 485 Diagnosing and Addressing SELinux Policy Violations 487 Making SELinux Analyzing Easier 489 Summary 490 Exam Preparation Tasks 491 End-of-Chapter Lab 492 Chapter 23 Configuring a Firewall 495 “Do I Know This Already?” Quiz 495 Foundation Topics 498 Understanding Linux Firewalling 498 Understanding Previous Solutions 498 Understanding Firewalld 498 Understanding Firewalld Zones 499 Understanding Firewalld Services 500 Working with Firewalld 501 Summary 504 Exam Preparation Tasks 504 End-of-Chapter Lab 506 Chapter 24 Accessing Network Storage 509 “Do I Know This Already?” Quiz 509 Foundation Topics 512 Using NFS Services 512 Understanding NFS Security 512 RHEL NFS Versions 512 Setting Up NFS 513 Mounting the NFS Share 514 Mounting Remote File Systems Through fstab 515 Mounting NFS Shares Through fstab 515 Using Automount to Mount Remote File Systems 516 Understanding Automount 516 Defining Mounts in Automount 516 Configuring Automount for NFS 517 Using Wildcards in Automount 517 Summary 518 Exam Preparation Tasks 518 End-of-Chapter Lab 520 Chapter 25 Configuring Time Services 523 “Do I Know This Already?” Quiz 523 Foundation Topics 526 Understanding Local Time 526 Using Network Time Protocol 527 Managing Time on Red Hat Enterprise Linux 527 Using date 528 Using hwclock 528 Using timedatectl 529 Managing Time Zone Settings 531 Configuring Time Service Clients 533 Summary 534 Exam Preparation Tasks 535 End-of-Chapter Lab 536 Chapter 26 Managing Containers 539 “Do I Know This Already?” Quiz 539 Foundation Topics 542 Understanding Containers 542 Container Host Requirements 543 Containers on RHEL 9 544 Container Orchestration 545 Running a Container 545 Working with Container Images 550 Using Registries 550 Finding Images 552 Inspecting Images 553 Performing Image Housekeeping 556 Building Images from a Containerfile 556 Managing Containers 558 Managing Container Status 558 Running Commands in a Container 559 Managing Container Ports 561 Managing Container Environment Variables 562 Managing Container Storage 563 Running Containers as Systemd Services 566 Summary 568 Exam Preparation Tasks 569 End-of-Chapter Lab 570 Chapter 27 Final Preparation 573 General Tips 573 Verifying Your Readiness 573 Registering for the Exam 573 On Exam Day 574 During the Exam 575 The Nondisclosure Agreement 576 Chapter 28 Theoretical Pre-Assessment Exam 579 Part V RHCSA 9 Practice Exams RHCSA Practice Exam A 581 RHCSA Practice Exam B 583 Appendix A: Answers to the “Do I Know This Already?” Quizzes and Review Questions 585 Appendix B: Red Hat RHCSA 9 Cert Guide: EX200 Exam Updates 617 Glossary 619 Online Elements: RHCSA Practice Exam C RHCSA Practice Exam D Appendix C: Memory Tables Appendix D: Memory Tables Answer Key Appendix E: Study Planner Glossary 9780138096274 TOC 3/24/2023
£34.19
Pearson Education (US) Python Distilled
Book SynopsisDavid Beazley is the author of the Python Essential Reference, Fourth Edition (Addison-Wesley), and Python Cookbook, Third Edition (O'Reilly Media). He currently teaches advanced computer science courses through his company, Dabeaz LLC (www.dabeaz.com). He's been using, writing about, speaking about, and teaching Python since 1996.Table of ContentsPreface xiiiChapter 1: Python Basics 11.1 Running Python 11.2 Python Programs 21.3 Primitives, Variables, and Expressions 31.4 Arithmetic Operators 51.5 Conditionals and Control Flow 71.6 Text Strings 91.7 File Input and Output 121.8 Lists 131.9 Tuples 151.10 Sets 171.11 Dictionaries 181.12 Iteration and Looping 211.13 Functions 221.14 Exceptions 241.15 Program Termination 261.16 Objects and Classes 261.17 Modules 301.18 Script Writing 321.19 Packages 331.20 Structuring an Application 341.21 Managing Third-Party Packages 351.22 Python: It Fits Your Brain 36Chapter 2: Operators, Expressions, and Data Manipulation 372.1 Literals 372.2 Expressions and Locations 382.3 Standard Operators 392.4 In-Place Assignment 412.5 Object Comparison 422.6 Ordered Comparison Operators 422.7 Boolean Expressions and Truth Values 432.8 Conditional Expressions 442.9 Operations Involving Iterables 452.10 Operations on Sequences 472.11 Operations on Mutable Sequences 492.12 Operations on Sets 502.13 Operations on Mappings 512.14 List, Set, and Dictionary Comprehensions 522.15 Generator Expressions 542.16 The Attribute (.) Operator 562.17 The Function Call () Operator 562.18 Order of Evaluation 562.19 Final Words: The Secret Life of Data 58Chapter 3: Program Structure and Control Flow 593.1 Program Structure and Execution 593.2 Conditional Execution 593.3 Loops and Iteration 603.4 Exceptions 643.5 Context Managers and the with Statement 753.6 Assertions and __debug__ 773.7 Final Words 78Chapter 4: Objects, Types, and Protocols 794.1 Essential Concepts 794.2 Object Identity and Type 804.3 Reference Counting and Garbage Collection 814.4 References and Copies 834.5 Object Representation and Printing 844.6 First-Class Objects 854.7 Using None for Optional or Missing Data 874.8 Object Protocols and Data Abstraction 874.9 Object Protocol 894.10 Number Protocol 904.11 Comparison Protocol 924.12 Conversion Protocols 944.13 Container Protocol 954.14 Iteration Protocol 974.15 Attribute Protocol 984.16 Function Protocol 984.17 Context Manager Protocol 994.18 Final Words: On Being Pythonic 99Chapter 5: Functions 1015.1 Function Definitions 1015.2 Default Arguments 1015.3 Variadic Arguments 1025.4 Keyword Arguments 1035.5 Variadic Keyword Arguments 1045.6 Functions Accepting All Inputs 1045.7 Positional-Only Arguments 1055.8 Names, Documentation Strings, and Type Hints 1065.9 Function Application and Parameter Passing 1075.10 Return Values 1095.11 Error Handling 1105.12 Scoping Rules 1115.13 Recursion 1145.14 The lambda Expression 1145.15 Higher-Order Functions 1155.16 Argument Passing in Callback Functions 1185.17 Returning Results from Callbacks 1215.18 Decorators 1245.19 Map, Filter, and Reduce 1275.20 Function Introspection, Attributes, and Signatures 1295.21 Environment Inspection 1315.22 Dynamic Code Execution and Creation 1335.23 Asynchronous Functions and await 1355.24 Final Words: Thoughts on Functions and Composition 137Chapter 6: Generators 1396.1 Generators and yield 1396.2 Restartable Generators 1426.3 Generator Delegation 1426.4 Using Generators in Practice 1446.5 Enhanced Generators and yield Expressions 1466.6 Applications of Enhanced Generators 1486.7 Generators and the Bridge to Awaiting 1516.8 Final Words: A Brief History of Generators and Looking Forward 152Chapter 7: Classes and Object-Oriented Programming 1537.1 Objects 1537.2 The class Statement 1547.3 Instances 1557.4 Attribute Access 1567.5 Scoping Rules 1587.6 Operator Overloading and Protocols 1597.7 Inheritance 1607.8 Avoiding Inheritance via Composition 1637.9 Avoiding Inheritance via Functions 1667.10 Dynamic Binding and Duck Typing 1677.11 The Danger of Inheriting from Built-in Types 1677.12 Class Variables and Methods 1697.13 Static Methods 1737.14 A Word about Design Patterns 1767.15 Data Encapsulation and Private Attributes 1767.16 Type Hinting 1797.17 Properties 1807.18 Types, Interfaces, and Abstract Base Classes 1837.19 Multiple Inheritance, Interfaces, and Mixins 1877.20 Type-Based Dispatch 1937.21 Class Decorators 1947.22 Supervised Inheritance 1977.23 The Object Life Cycle and Memory Management 1997.24 Weak References 2047.25 Internal Object Representation and Attribute Binding 2067.26 Proxies, Wrappers, and Delegation 2087.27 Reducing Memory Use with __slots__ 2107.28 Descriptors 2117.29 Class Definition Process 2157.30 Dynamic Class Creation 2167.31 Metaclasses 2177.32 Built-in Objects for Instances and Classes 2227.33 Final Words: Keep It Simple 223Chapter 8: Modules and Packages 2258.1 Modules and the import Statement 2258.2 Module Caching 2278.3 Importing Selected Names from a Module 2288.4 Circular Imports 2308.5 Module Reloading and Unloading 2328.6 Module Compilation 2338.7 The Module Search Path 2348.8 Execution as the Main Program 2348.9 Packages 2358.10 Imports Within a Package 2378.11 Running a Package Submodule as a Script 2388.12 Controlling the Package Namespace 2398.13 Controlling Package Exports 2408.14 Package Data 2418.15 Module Objects 2428.16 Deploying Python Packages 2438.17 The Penultimate Word: Start with a Package 2448.18 The Final Word: Keep It Simple 245Chapter 9: Input and Output 2479.1 Data Representation 2479.2 Text Encoding and Decoding 2489.3 Text and Byte Formatting 2509.4 Reading Command-Line Options 2549.5 Environment Variables 2569.6 Files and File Objects 2569.7 I/O Abstraction Layers 2609.8 Standard Input, Output, and Error 2639.9 Directories 2649.10 The print() function 2659.11 Generating Output 2659.12 Consuming Input 2669.13 Object Serialization 2689.14 Blocking Operations and Concurrency 2699.15 Standard Library Modules 2739.16 Final Words 296Chapter 10: Built-in Functions and Standard Library 29710.1 Built-in Functions 29710.2 Built-in Exceptions 31410.3 Standard Library 31810.4 Final Words: Use the Built-Ins 320Index 321
£34.19
John Wiley & Sons Inc Linux AllInOne For Dummies
Book SynopsisTable of ContentsIntroduction 1 About This Book 1 Foolish Assumptions 2 Icons Used in This Book 3 Beyond the Book 4 Where to Go from Here 4 Book 1: Getting Started with Linux 5 Chapter 1: Introducing Linux 7 What Is Linux? 7 The Linux kernel 8 GNU utilities 11 Linux user interfaces 12 Linux Distributions: Why So Many? 16 Core Linux distributions 17 Specialized Linux distributions 18 Chapter 2: Installing Linux 21 Dual-Booting with Linux and Microsoft Windows 23 Installing a second hard drive 24 Partitioning an existing drive 24 Partitioning using Windows tools 25 Partitioning using Linux tools 26 Finally, Finally, Before You Get Started 27 Disabling the secure boot feature 27 Creating a boot disk 28 Installing Ubuntu 30 Your First Ubuntu Boot 36 Chapter 3: Living in a Virtual World 39 What Are Virtual Servers? 39 Installing VirtualBox 40 Creating a Linux Virtual Machine 42 Installing Linux on a Virtual Machine 45 Changing settings 45 Loading the operating system 47 Working with the sandbox 50 Chapter 4: Trying Out Linux 53 Starting Linux 53 Playing with the Shell 56 Starting the bash shell 56 Understanding shell commands 58 Trying a few Linux commands 58 Shutting Down 60 Chapter 5: Troubleshooting and Customizing Linux 63 Using Text Mode Installation 64 Lookin’ for Trouble 64 Using the kernel ring buffer 65 Using log files 66 Using the journal 67 Resolving Other Installation Problems 68 Using KNOPPIX boot commands 68 Handling the fatal signal 11 error 71 Getting around the PC reboot problem 71 Using Linux kernel boot options 71 Setting Up Printers 74 Managing DVDs, CD-ROMs, and Flash Drives 76 Updating the Operating System 77 Updating Ubuntu 77 Updating openSUSE 78 Installing New Software 79 Adding applications 80 Adding packages 81 Book 2: Linux Desktops 85 Chapter 1: The GNOME Desktop 87 Looking at the History of GNOME 87 Breaking Down the GNOME Desktop 88 Menu, please! 88 The desktop 90 Exploring the Activities Overview 91 Customizing Your Ride 92 Chapter 2: The KDE Plasma Desktop 93 The KDE Plasma Desktop 93 The Application launcher 95 The panel 96 The desktop 96 Using Widgets 98 Adding widgets 98 Getting more widgets 99 Plasma System Settings 99 Desktop Settings 100 Chapter 3: Other Popular Desktops 103 Spicing Things Up with Cinnamon 103 Reviewing the history of Cinnamon 104 Looking at the menu 105 Changing settings 105 Adding more spice 106 Working with MATE 107 The history of MATE 107 Looking at the menu 109 Changing desktop settings 109 Applets 110 The Xfce Desktop Interface 111 The history of Xfce 111 The Whisker menu 112 Changing Xfce settings 113 Applets 113 Chapter 4: Linux Desktop Applications 115 The LibreOffice Suite 115 Browsing the Web with Firefox 117 Configuring Firefox 117 Communicating with Email 119 Evolving into email 120 Working with KMail 121 The amazing Thunderbird 123 Listening to Audio 124 Listening to downloaded music 127 Viewing Movie Files 129 Creating and Modifying Graphics 130 Chapter 5: The Linux File System 133 Pieces of the Puzzle 133 Touring the Linux File System 134 The root of the tree 134 Where removable media lives 136 Managing Your File System without a Net (or Mouse) 136 Viewing information about files on the command line 136 Understanding file listing information 137 Comprehending file types 139 Navigating the file system in Linux 140 A Permissions Primer 141 Checking out the triplets 141 Beware of owners 143 Hanging out in groups 143 Clicking Your Way through the File System 144 Using files 145 Swimming with Dolphin 149 Don’t forget Xfce! 151 Finding Things 152 Chapter 6: Text Editors 155 Viewing the Contents of a Text File 155 Editing Text Files with nano 156 Going with gedit 157 Editing Text in the KDE Plasma Desktop 158 Writing with KWrite 159 Meet Kate 160 Text Editing with ed and vi 161 Using ed 162 Using vi 165 Book 3: Networking 171 Chapter 1: Connecting to the Internet 173 Understanding the Internet 174 Deciding How to Connect to the Internet 175 Connecting with DSL 176 How DSL works 176 DSL alphabet soup: ADSL, IDSL, SDSL 177 Typical DSL setup 179 Connecting with a Cable Modem 180 How a cable modem works 181 Typical cable modem setup 182 Chapter 2: Setting Up a Local Area Network 185 Understanding TCP/IP 185 IP addresses 187 Internet services and port numbers 189 Setting Up an Ethernet LAN 190 How Ethernet works 191 Ethernet cables 192 Configuring TCP/IP Networking 195 Connecting Your LAN to the Internet 196 Chapter 3: Going Wireless 199 Understanding Wireless Ethernet Networks 199 Understanding infrastructure and ad hoc modes 201 Understanding wireless security 201 Setting Up Wireless Hardware 203 Configuring the Wireless Access Point 204 Configuring Wireless Networks 205 Chapter 4: Managing the Network 207 Configuring Network Features 207 Manually editing network configuration files 208 Using a graphical tool 210 Using a command-line tool 212 Basic Network Troubleshooting 216 Advanced Network Troubleshooting 218 Book 4: Administration 223 Chapter 1: Working with the Shell 225 Opening Terminal Windows and Virtual Consoles 225 Using the Bash Shell 228 Understanding the syntax of shell commands 228 Working with files 230 Combining shell commands 231 Controlling command input and output 231 Going wild with asterisks and question marks 233 Discovering and Using Linux Commands 235 Becoming root (superuser) 240 Managing processes 241 Working with date and time 242 Processing files 243 Writing Shell Scripts 246 Chapter 2: Introducing Basic System Administration 249 Taking Stock of System Administration Tasks 250 Becoming root 251 Using the su - command 251 Using the sudo command 252 Understanding How Linux Boots 252 Understanding the SysVinit method 253 Understanding the Systemd method 259 Monitoring System Performance 264 Using the top utility 264 Using the uptime command 266 Using the vmstat utility 267 Checking disk performance and disk usage 267 Viewing System Information with the /proc File System 270 Understanding Linux Devices 273 Device files 274 Persistent device naming with udev 275 Managing Loadable Driver Modules 276 Loading and unloading modules 276 Understanding the /etc/modprobe.d files 277 Scheduling Jobs in Linux 278 Scheduling one-time jobs 278 Scheduling recurring jobs 281 Introducing Some GUI System Administration Tools 284 Chapter 3: Managing Users and Groups 287 Adding User Accounts 288 Managing user accounts by using a GUI user manager 288 Managing user accounts by using commands 290 Managing Groups 291 Exploring the User Environment 292 Changing User and Group Ownership of Files 295 Chapter 4: Managing File Systems 297 Exploring the Linux File System 297 Understanding the file-system hierarchy 298 Mounting a device on the file system 299 Examining the /etc/fstab file 303 Sharing Files with NFS 304 Installing NFS 305 Exporting a file system with NFS 306 Mounting an NFS file system 307 Accessing a DOS or Windows File System 308 Mounting a DOS or Windows disk partition 308 Mounting an NTFS partition 309 Book 5: Managing Linux Servers 311 Chapter 1: Hosting Internet Services 313 What Is a Linux Server? 313 Launching services 314 Listening for clients 316 Serving the Basics 318 Web services 319 Database services 320 Mail services 322 Serving Local Networks 324 File servers 325 Print servers 326 Network resource servers 326 Chapter 2: Managing a Web Server 331 Linux Web Servers 331 Apache 331 NGINX 333 The Apache Web Server 333 Installing an Apache server 333 Configuring an Apache server 336 The NGINX Server 344 Installing NGINX 344 Configuring NGINX 346 Chapter 3: Managing a Database Server 349 Using the MySQL/MariaDB Database 349 Installing MariaDB 350 Looking at the MariaDB command prompt 353 Using the mysql commands 356 Creating database objects 360 Using the PostgreSQL Database 363 Installing PostgreSQL 364 Looking at the PostgreSQL command interface 366 Creating PostgreSQL database objects 370 Chapter 4: Working with Samba and NFS 373 Sharing Files with NFS 373 Installing NFS 374 Exporting a file system with NFS 375 Mounting an NFS file system 378 Setting Up a Windows Server Using Samba 378 Installing Samba 380 Configuring Samba 382 Trying out Samba 383 Chapter 5: Managing Mail Servers 385 Working with sendmail 385 The sendmail configuration file 386 Syntax of the sendmail.cf file 391 Other sendmail files 393 The forward file 395 The sendmail alias file 395 Working with Postfix 396 A Mail-Delivery Test 398 Using the mail command 399 The mail-delivery mechanism 400 Book 6: Security 401 Chapter 1: Introducing Linux Security 403 Why Worry about Security? 404 Establishing a Security Framework 404 Determining business requirements for security 406 Performing risk analysis 406 Establishing a security policy 408 Implementing security solutions (mitigation) 409 Managing security 410 Securing Linux 410 Understanding the host-security issues 411 Understanding network-security issues 412 Delving Into Computer Security Terminology and Tools 413 Keeping Up with Security News and Updates 418 Chapter 2: Securing Linux 419 Securing Passwords 420 Shadow passwords 420 Pluggable authentication modules (PAMs) 421 Protecting Files and Directories 422 Viewing ownerships and permissions 423 Changing file ownerships 423 Changing file permissions 423 Setting default permission 424 Checking for set user ID permission 426 Encrypting and Signing Files with GnuPG 427 Understanding public key encryption 427 Understanding digital signatures 428 Using GPG 429 Monitoring System Security 433 Securing Internet Services 434 Turning off stand-alone services 434 Configuring the Internet super server 435 Configuring TCP wrapper security 436 Using Secure Shell for Remote Logins 437 Setting Up Simple Firewalls 439 Using NAT 442 Enabling packet filtering on your Linux system 443 Security Files to Be Aware Of 447 Chapter 3: Vulnerability Testing and Computer Security Audits 449 Understanding Security Audits 450 Nontechnical aspects of security audits 450 Technical aspects of security audits 451 Implementing a Security Test Methodology 452 Some common computer vulnerabilities 453 Host-security review 454 Network-security review 458 Vulnerability Testing Types 460 Exploring Security Testing Tools 461 Book 7: Scripting 465 Chapter 1: Introductory Shell Scripting 467 Trying Out Simple Shell Scripts 468 Exploring the Basics of Shell Scripting 469 Storing stuff 470 Calling shell functions 471 Controlling the flow 471 Exploring bash’s built-in commands 475 Chapter 2: Advanced Shell Scripting 479 Trying Out sed 479 Working with awk and sed 482 Step 1: Pull out the ISBN 483 Step 2: Calculate the 13th digit 484 Step 3: Add the 13th digit to the other 12 485 Step 4: Finish the process 485 Final Notes on Shell Scripting 486 Chapter 3: Programming in Linux 487 An Overview of Programming 488 Exploring the Software-Development Tools in Linux 489 GNU C and C++ compilers 490 The GNU make utility 493 The GNU debugger 502 Understanding the Implications of GNU Licenses 509 The GNU General Public License 510 The GNU Library General Public License 511 Book 8: Linux Certification 513 Chapter 1: Studying for the Linux Professional Institute Exams 515 Overview of LPI Certification Exams 515 Overview of the Linux Essentials Exam 516 Getting involved in the Linux community and finding a career in open source 517 Finding your way on a Linux system 518 The power of the command line 520 The Linux operating system 521 Security and file permissions 522 Overview of the Linux Professionals Exams 524 The LPIC-1 exams 524 The LPIC-2 exams 527 The LPIC-3 exams 528 Chapter 2: Studying for the CompTIA Linux+ Exam 529 Overview of the CompTIA Linux+ Exam 530 System Management 531 Security 532 Scripting, Containers, and Automation 533 Troubleshooting 533 Chapter 3: Other Linux Certifications 535 Vendor-Neutral Certifications 535 The Linux Foundation 535 The GIAC Certifications 536 Vendor-Specific Certifications 537 Index 539
£22.39
Cengage Learning, Inc Linux+ and LPIC-1 Guide to Linux Certification
Book SynopsisEckert's LINUX+ and LPIC-1 GUIDE TO LINUX CERTIFICATION, 6th EDITION, empowers you with the knowledge and skills you need to succeed on CompTIA's Linux��+ (XKO-005) certification exam and the Linux Professional Institute LPIC-1 (101-500 and 102-500) certification exams, as well as in your information technology career. The book covers the latest Linux�� distributions, as well as virtualization, containerization, cloud orchestration and enterprise storage. Comprehensive coverage also addresses key job-related services and cloud technologies, including firewalls, FTP, NFS, Samba, Apache, DNS, DHCP, NTP, Postfix, PostgreSQL, SSH, VNC, RDP, Docker and Kubernetes. Appendices allow you to apply your Linux knowledge to macOS�� and FreeBSD��. Hands-on projects give you practice using the latest Fedora��� and Ubuntu�� Linux�� distributions and can be performed on either a Windows�� PC (Intel�� or ARM��) or macOS�� PC (Intel�� or Apple�� Silicon).Table of Contents1. Introduction to Linux��. 2. Linux�� Installation and Usage. 3. Exploring Linux�� Filesystems. 4. Linux�� Filesystem Management. 5. Linux�� Filesystem Administration. 6. Linux�� Server Deployment. 7. Working with the Shell. 8. System Initialization, X Windows, and Localization. 9. Managing Linux�� Processes. 10. Common Administrative Tasks. 11. Compression, System Backup, and Software Installation. 12. Network Configuration. 13. Configuring Network Services and Cloud Technologies. 14. Security, Troubleshooting, and Performance. Appendix A: Certification. Appendix B: Finding Linux Resources on the Internet. Appendix C: Applying Your Linux�� Knowledge to macOS��. Appendix D: Applying Your Linux�� Knowledge to FreeBSD��.
£72.99
Pearson Education (US) The AWK Programming Language
Book SynopsisAlfred V. Aho is Lawrence Gussman Professor Emeritus of Computer Science at Columbia University, and former department chair. Well known for his work on algorithms, data structures, programming languages, compilers, and the foundations of computer science, he has received the ACM A. M. Turing Award and the IEEE John von Neumann Medal. Brian W. Kernighan was a member of the Computing Science Research Center at Bell Labs and is currently a professor in the Computer Science department at Princeton. He is the co-creator of several programming languages and the co-author of numerous books, including the computing classic, The C Programming Language. Peter J. Weinberger, currently at Google, has served as chief technology officer at Renaissance Technologies and as leader of computer science research at Bell Labs. He is a Fellow of the AAAS.Table of ContentsPreface ix Chapter 1: An Awk Tutorial 11.1 Getting Started 11.2 Simple Output 41.3 Formatted Output 71.4 Selection 81.5 Computing with Awk 101.6 Control-Flow Statements 131.7 Arrays 161.8 Useful One-liners 171.9 What Next? 19 Chapter 2: Awk in Action 212.1 Personal Computation 212.2 Selection 232.3 Transformation 252.4 Summarization 272.5 Personal Databases 282.6 A Personal Library 312.7 Summary 34 Chapter 3: Exploratory Data Analysis 353.1 The Sinking of the Titanic 363.2 Beer Ratings 413.3 Grouping Data 433.4 Unicode Data 453.5 Basic Graphs and Charts 473.6 Summary 49 Chapter 4: Data Processing 514.1 Data Transformation and Reduction 514.2 Data Validation 574.3 Bundle and Unbundle 594.4 Multiline Records 604.5 Summary 66 Chapter 5: Reports and Databases 675.1 Generating Reports 675.2 Packaged Queries and Reports 735.3 A Relational Database System 755.4 Summary 83 Chapter 6: Processing Words 856.1 Random Text Generation 856.2 Interactive Text-Manipulation 906.3 Text Processing 926.4 Making an Index 996.5 Summary 105 Chapter 7: Little Languages 1077.1 An Assembler and Interpreter 1087.2 A Language for Drawing Graphs 1117.3 A Sort Generator 1137.4 A Reverse-Polish Calculator 1157.5 A Different Approach 1177.6 A Recursive-Descent Parser for Arithmetic Expressions 1197.7 A Recursive-Descent Parser for a Subset of Awk 1227.8 Summary 126 Chapter 8: Experiments with Algorithms 1298.1 Sorting 1298.2 Profiling 1428.3 Topological Sorting 1448.4 Make: A File Updating Program 1488.5 Summary 153 Chapter 9: Epilogue 1559.1 Awk as a Language 1559.2 Performance 1579.3 Conclusion 160 Appendix A: Awk Reference Manual 163A.1 Patterns 165A.2 Actions 176A.3 User-Defined Functions 196A.4 Output 197A.5 Input 202A.6 Interaction with Other Programs 207A.7 Summary 208 Index 209
£28.79
Pearson Education (US) Red Hat RHCE 8 EX294 Cert Guide
Book Synopsis
£30.59
Pearson Education (US) Embedded Linux Systems with the Yocto Project
Book SynopsisRudolf J. Streif has more than twenty years of experience in software engineering as a developer and as a manager leading cross-functional engineering teams with more than one hundred members. He previously served as the Linux Foundation's Director of Embedded Solutions, coordinating the Foundation's efforts for Linux in embedded. Rudolf developed the Linux Foundation's training course on the Yocto Project, which he delivered multiple times to companies and in a crash course variant during Linux Foundation events. He lives in El Cajon, California.Table of ContentsForeword xv Preface xvii Acknowledgments xxi About the Author xxiii Chapter 1: Linux for Embedded Systems 1 1.1 Why Linux for Embedded Systems? 1 1.2 Embedded Linux Landscape 3 1.3 A Custom Linux Distribution–Why Is It Hard? 8 1.4 A Word about Open Source Licensing 9 1.5 Organizations, Relevant Bodies, and Standards 11 1.6 Summary 13 1.7 References 14 Chapter 2: The Yocto Project 15 2.1 Jumpstarting Your First Yocto Project Build 15 2.2 The Yocto Project Family 26 2.3 A Little Bit of History 28 2.4 Yocto Project Terms 31 2.5 Summary 33 2.6 References 34 Chapter 3: OpenEmbedded Build System 35 3.1 Building Open Source Software Packages 35 3.2 OpenEmbedded Workflow 39 3.3 OpenEmbedded Build System Architecture 45 3.4 Summary 56 3.5 References 57 Chapter 4: BitBake Build Engine 59 4.1 Obtaining and Installing BitBake 59 4.2 Running BitBake 61 4.3 BitBake Metadata 70 4.4 Metadata Syntax 71 4.5 Source Download 86 4.6 HelloWorld–BitBake Style 95 4.7 Dependency Handling 99 4.8 Version Selection 102 4.9 Variants 103 4.10 Default Metadata 103 4.11 Summary 107 4.12 References 108 Chapter 5: Troubleshooting 109 5.1 Logging 110 5.2 Task Execution 116 5.3 Analyzing Metadata 119 5.4 Development Shell 120 5.5 Dependency Graphs 121 5.6 Debugging Layers 122 5.7 Summary 124 Chapter 6: Linux System Architecture 127 6.1 Linux or GNU/Linux? 127 6.2 Anatomy of a Linux System 128 6.3 Bootloader 129 6.4 Kernel 134 6.5 User Space 141 6.6 Summary 143 6.7 References 144 Chapter 7: Building a Custom Linux Distribution 145 7.1 Core Images–Linux Distribution Blueprints 146 7.2 Building Images from Scratch 160 7.3 Image Options 161 7.4 Distribution Configuration 169 7.5 External Layers 181 7.6 Hob 181 7.7 Summary 184 Chapter 8: Software Package Recipes 185 8.1 Recipe Layout and Conventions 185 8.2 Writing a New Recipe 196 8.3 Recipe Examples 212 8.4 Devtool 218 8.5 Summary 224 8.6 References 224 Chapter 9: Kernel Recipes 225 9.1 Kernel Configuration 226 9.2 Kernel Patches 231 9.3 Kernel Recipes 233 9.4 Out-of-Tree Modules 251 9.5 Device Tree 257 9.6 Summary 258 9.7 References 259 Chapter 10: Board Support Packages 261 10.1 Yocto Project BSP Philosophy 261 10.2 Building with a BSP 265 10.3 Inside a Yocto Project BSP 277 10.4 Creating a Yocto Project BSP 282 10.5 Tuning 289 10.6 Creating Bootable Media Images 290 10.7 Summary 299 10.8 References 299 Chapter 11: Application Development 301 11.1 Inside a Yocto Project ADT 302 11.2 Setting Up a Yocto Project ADT 304 11.3 Building Applications 315 11.4 Eclipse Integration 317 11.5 Application Development Using an Emulated Target 331 11.6 Summary 333 11.7 References 334 Chapter 12: Licensing and Compliance 335 12.1 Managing Licenses 335 12.2 Managing Source Code 341 12.3 Summary 343 12.4 References 344 Chapter 13: Advanced Topics 345 13.1 Toaster 345 13.2 Build History 358 13.3 Source Mirrors 366 13.4 Autobuilder 368 13.5 Summary 374 13.6 References 375 Appendix A: Open Source Licenses 377 A.1 MIT License (MIT) 377 A.2 GNU General Public License (GPL) Version 2 378 A.3 GNU General Public License (GPL) Version 3 384 A.4 Apache License Version 2.0 397 Appendix B: Metadata Reference 403 Index 429
£33.29
John Wiley & Sons Inc Beginning Linux Programming 4th Edition
Book SynopsisBeginning Linux Programming, Fourth Edition continues its unique approach to teaching UNIX programming in a simple and structured way on the Linux platform. Through the use of detailed and realistic examples, students learn by doing, and are able to move from being a Linux beginner to creating custom applications in Linux. The book introduces fundamental concepts beginning with the basics of writing Unix programs in C, and including material on basic system calls, file I/O, interprocess communication (for getting programs to work together), and shell programming. Parallel to this, the book introduces the toolkits and libraries for working with user interfaces, from simpler terminal mode applications to X and GTK+ for graphical user interfaces. Advanced topics are covered in detail such as processes, pipes, semaphores, socket programming, using MySQL, writing applications for the GNOME or the KDE desktop, writing device drivers, POSIX Threads, and kernel programming for the latesTable of ContentsAcknowledgements x Foreword xxiii Introduction xxv Chapter 1: Getting Started 1 An Introduction to UNIX, Linux, and GNU 1 What Is UNIX? 1 What Is Linux? 3 The GNU Project and the Free Software Foundation 3 Linux Distributions 4 Programming Linux 4 Linux Programs 5 Text Editors 6 The C Compiler 7 Development System Roadmap 8 Getting Help 14 Summary 16 Chapter 2: Shell Programming 17 Why Program with a Shell? 18 A Bit of Philosophy 18 What Is a Shell? 19 Pipes and Redirection 21 Redirecting Output 21 Redirecting Input 22 Pipes 22 The Shell as a Programming Language 23 Interactive Programs 23 Creating a Script 24 Making a Script Executable 25 Shell Syntax 27 Variables 27 Conditions 31 Control Structures 34 Functions 46 Commands 49 Command Execution 68 Here Documents 73 Debugging Scripts 74 Going Graphical — The dialog Utility 75 Putting It All Together 81 Requirements 82 Design 82 Summary 91 Chapter 3: Working with Files 93 Linux File Structure 94 Directories 94 Files and Devices 95 System Calls and Device Drivers 96 Library Functions 97 Low-Level File Access 98 write 98 read 99 open 100 Initial Permissions 101 Other System Calls for Managing Files 106 The Standard I/O Library 109 fopen 110 fread 110 fwrite 111 fclose 111 fflush 111 fseek 112 fgetc, getc, and getchar 112 fputc, putc, and putchar 112 fgets and gets 113 Formatted Input and Output 113 printf, fprintf, and sprintf 113 scanf, fscanf, and sscanf 115 Other Stream Functions 117 Stream Errors 119 Streams and File Descriptors 119 File and Directory Maintenance 120 chmod 120 chown 120 unlink, link, and symlink 121 mkdir and rmdir 121 chdir and getcwd 122 Scanning Directories 122 opendir 123 readdir 123 telldir 123 seekdir 124 closedir 124 Errors 127 strerror 127 perror 127 The /proc File System 128 Advanced Topics: fcntl and mmap 132 fcntl 132 mmap 133 Summary 135 Chapter 4: The Linux Environment 137 Program Arguments 137 getopt 140 getopt_long 142 Environment Variables 144 Use of Environment Variables 146 The environ Variable 147 Time and Date 148 Temporary Files 156 User Information 158 Host Information 161 Logging 163 Resources and Limits 167 Summary 173 Chapter 5: Terminals 175 Reading from and Writing to the Terminal 175 Talking to the Terminal 180 The Terminal Driver and the General Terminal Interface 182 Overview 183 Hardware Model 183 The termios Structure 184 Input Modes 186 Output Modes 186 Control Modes 187 Local Modes 188 Special Control Characters 188 Terminal Speed 192 Additional Functions 192 Terminal Output 196 Terminal Type 197 Identify Your Terminal Type 197 Using terminfo Capabilities 200 Detecting Keystrokes 205 Virtual Consoles 207 Pseudo-Terminals 208 Summary 209 Chapter 6: Managing Text-Based Screens with curses 211 Compiling with curses 212 Curses Terminology and Concepts 213 The Screen 216 Output to the Screen 216 Reading from the Screen 217 Clearing the Screen 218 Moving the Cursor 218 Character Attributes 218 The Keyboard 221 Keyboard Modes 221 Keyboard Input 222 Windows 224 The WINDOW Structure 224 Generalized Functions 225 Moving and Updating a Window 225 Optimizing Screen Refreshes 229 Subwindows 230 The Keypad 232 Using Color 235 Redefining Colors 238 Pads 238 The CD Collection Application 240 Starting a New CD Collection Application 240 Looking at main 243 Building the Menu 243 Database File Manipulation 245 Querying the CD Database 250 Summary 254 Chapter 7: Data Management 255 Managing Memory 255 Simple Memory Allocation 256 Allocating Lots of Memory 257 Abusing Memory 260 The Null Pointer 261 Freeing Memory 262 Other Memory Allocation Functions 264 File Locking 264 Creating Lock Files 265 Locking Regions 268 Use of read and write with Locking 271 Competing Locks 276 Other Lock Commands 280 Deadlocks 280 Databases 281 The dbm Database 281 The dbm Routines 283 dbm Access Functions 283 Additional dbm Functions 287 The CD Application 289 Updating the Design 289 The CD Database Application Using dbm 290 Summary 309 Chapter 8: MySQL 311 Installation 312 MySQL Packages 312 Post-Install Configuration 314 Post-Installation Troubleshooting 319 MySQL Administration 320 Commands 320 Creating Users and Giving Them Permissions 325 Passwords 327 Creating a Database 328 Data Types 329 Creating a Table 330 Graphical Tools 333 Accessing MySQL Data from C 335 Connection Routines 337 Error Handling 341 Executing SQL Statements 342 Miscellaneous Functions 357 The CD Database Application 358 Creating the Tables 359 Adding Some Data 362 Accessing the Application Data from C 364 Summary 375 Chapter 9: Development Tools 377 Problems of Multiple Source Files 377 The make Command and Makefiles 378 The Syntax of Makefiles 378 Options and Parameters to make 379 Comments in a Makefile 382 Macros in a Makefile 382 Multiple Targets 384 Built-in Rules 387 Suffix and Pattern Rules 388 Managing Libraries with make 389 Advanced Topic: Makefiles and Subdirectories 391 GNU make and gcc 391 Source Code Control 392 RCS 393 SCCS 399 Comparing RCS and SCCS 399 CVS 400 CVS Front Ends 404 Subversion 405 Writing a Manual Page 406 Distributing Software 409 The patch Program 410 Other Distribution Utilities 411 RPM Packages 413 Working with RPM Package Files 414 Installing RPM Packages 415 Building RPM Packages 415 Other Package Formats 424 Development Environments 424 KDevelop 425 Other Environments 425 Summary 427 Chapter 10: Debugging 429 Types of Errors 429 General Debugging Techniques 430 A Program with Bugs 430 Code Inspection 433 Instrumentation 434 Controlled Execution 436 Debugging with gdb 437 Starting gdb 437 Running a Program 438 Stack Trace 438 Examining Variables 439 Listing the Program 440 Setting Breakpoints 441 Patching with the Debugger 444 Learning More about gdb 445 More Debugging Tools 445 Lint: Removing the Fluff from Your Programs 446 Function Call Tools 449 Execution Profiling with prof/gprof 451 Assertions 452 Memory Debugging 453 ElectricFence 454 valgrind 455 Summary 459 Chapter 11: Processes and Signals 461 What Is a Process? 461 Process Structure 462 The Process Table 463 Viewing Processes 463 System Processes 464 Process Scheduling 467 Starting New Processes 468 Waiting for a Process 475 Zombie Processes 477 Input and Output Redirection 479 Threads 480 Signals 481 Sending Signals 484 Signal Sets 489 Summary 493 Chapter 12: POSIX Threads 495 What Is a Thread? 495 Advantages and Drawbacks of Threads 496 A First Threads Program 497 Simultaneous Execution 501 Synchronization 503 Synchronization with Semaphores 503 Synchronization with Mutexes 508 Thread Attributes 512 Canceling a Thread 517 Threads in Abundance 520 Summary 524 Chapter 13: Inter-Process Communication: Pipes 525 What Is a Pipe? 525 Process Pipes 526 Sending Output to popen 528 Passing More Data 529 How popen Is Implemented 530 The Pipe Call 531 Parent and Child Processes 535 Reading Closed Pipes 536 Pipes Used as Standard Input and Output 537 Named Pipes: FIFOs 540 Accessing a FIFO 542 Advanced Topic: Client/Server Using FIFOs 549 The CD Database Application 553 Aims 554 Implementation 555 Client Interface Functions 558 The Server Interface, server.c 565 The Pipe 569 Application Summary 574 Summary 575 Chapter 14: Semaphores, Shared Memory, and Message Queues 577 Semaphores 577 Semaphore Definition 579 A Theoretical Example 579 Linux Semaphore Facilities 580 Using Semaphores 582 Shared Memory 586 shmget 588 shmat 588 shmdt 589 shmctl 589 Message Queues 594 msgget 594 msgsnd 595 msgrcv 595 msgctl 596 The CD Database Application 599 Revising the Server Functions 600 Revising the Client Functions 602 IPC Status Commands 604 Displaying Semaphore Status 604 Displaying Shared Memory Status 604 Displaying Message Queue Status 605 Summary 605 Chapter 15: Sockets 607 What Is a Socket? 608 Socket Connections 608 Socket Attributes 612 Creating a Socket 614 Socket Addresses 615 Naming a Socket 616 Creating a Socket Queue 617 Accepting Connections 617 Requesting Connections 618 Closing a Socket 619 Socket Communications 619 Host and Network Byte Ordering 622 Network Information 624 The Internet Daemon (xinetd/inetd) 629 Socket Options 631 Multiple Clients 632 select 635 Multiple Clients 638 Datagrams 642 Summary 644 Chapter 16: Programming GNOME Using GTK+ 645 Introducing X 645 X Server 646 X Client 646 X Protocol 646 Xlib 647 Toolkits 647 Window Managers 647 Other Ways to Create a GUI — Platform-Independent Windowing APIs 648 Introducing GTK+ 648 GLib Type System 649 GTK+ Object System 650 Introducing GNOME 651 Installing the GNOME/GTK+ Development Libraries 652 Events, Signals, and Callbacks 655 Packing Box Widgets 658 GTK+ Widgets 661 GtkWindow 662 GtkEntry 663 GtkSpinButton 666 GtkButton 668 GtkTreeView 672 GNOME Widgets 676 GNOME Menus 677 Dialogs 682 GtkDialog 682 Modal Dialog Box 684 Nonmodal Dialogs 685 GtkMessageDialog 686 CD Database Application 687 Summary 699 Chapter 17: Programming KDE Using Qt 701 Introducing KDE and Qt 701 Installing Qt 702 Signals and Slots 705 Qt Widgets 712 QLineEdit 712 Qt Buttons 716 QComboBox 721 QListView 724 Dialogs 727 QDialog 728 QMessageBox 730 QInputDialog 731 Using qmake to Simplify Writing Makefiles 733 Menus and Toolbars with KDE 733 CD Database Application Using KDE/Qt 738 MainWindow 738 AddCdDialog 742 LogonDialog 743 main.cpp 745 Summary 746 Chapter 18: Standards for Linux 747 The C Programming Language 748 A Brief History Lesson 748 The GNU Compiler Collection 749 gcc Options 749 Interfaces and the Linux Standards Base 751 LSB Standard Libraries 752 LSB Users and Groups 754 LSB System Initialization 754 The Filesystem Hierarchy Standard 755 Further Reading about Standards 758 Summary 759 Index 761
£25.60
Pearson Education (US) Linux Kernel Development
Book SynopsisRobert Love is an open source programmer, speaker, and author who has been using and contributing to Linux for more than 15 years. He is currently senior software engineer at Google, where he was a member of the team that developed the Android mobile platform's kernel. Prior to Google, he was Chief Architect, Linux Desktop, at Novell. Before Novell, he was a kernel engineer at MontaVista Software and Ximian. Love's kernel projects include the preemptive kernel, the process scheduler, the kernel events layer, inotify,VM enhancements, and several device drivers. He has given numerous talks on and has written multiple articles about the Linux kernel and is a contributing editor for Linux Journal. His other books include Linux System Programming and Linux in a Nutshell.Table of Contents1 Introduction to the Linux Kernel 2 Getting Started with the Kernel 3 Process Management 4 Process Scheduling 5 System Calls 6 Kernel Data Structures 7 Interrupts and Interrupt Handlers 8 Bottom Halves and Deferring Work 9 An Introduction to Kernel Synchronization 10 Kernel Synchronization Methods 11 Timers and Time Management 12 Memory Management 13 The Virtual Filesystem 14 The Block I/O Layer 15 The Process Address Space 16 The Page Cache and Page Writeback 17 Devices and Modules 18 Debugging 19 Portability 20 Patches, Hacking, and the Community
£35.14
O'Reilly Media Linux Iptables Pocket Reference
Book SynopsisOrganizing the subtle netfilter syntax for quick and easy lookup, this reference helps administrators remember all the values they need to enter to assure strict security. The text divides the listings of all iptables options into those that are suitable for firewalling, accounting, and Network Address Translation (NAT).
£7.59
O'Reilly Media Understanding Linux Network Internals
Book SynopsisA no-nonsense guide to Linux networking, which offers a clear view of the underlying concepts and teaches you to follow the C code that implements it. The topics include: system initialization, network interface card (NIC) device drivers, bridging, routing, ICMP, and more.Trade Review"Anyone who works with Linux networking should have a copy to hand to help with those inexplicable problems and to better understand how it all works." - James Millen, BJHC & IM, November 2006
£35.99
No Starch Press,US Linux Basics For Hackers: Getting Started with
Book SynopsisMany aspiring hackers are unfamiliar with Linux, having learned computer basics in a Windows or Mac environment. This can pose the single most important obstacle to mastering the skills to becoming a better hacker; while hacking can be done with Windows or OS X, nearly all hacking tools are developed specifically for Linux. Linux Basics for Hackers aims to provide you with a foundation of Linux skills that every hacker needs. As you progress, you'll have access to numerous real-world examples and hands-on exercises to apply your new knowledge and bring yourself up to speed.Trade Review"The information provided can help even a general user to get more comfortable with the Linux operating system without feeling overwhelmed by more complex, security-related topics and usage. While we could all benefit from more attention to security, Linux Basics for Hackers just might inspire the next crop of budding techies into the security rock stars of tomorrow."—Tim Everson, The Ethical Hacker Network"If you're just getting started or working your way to expert level, getting a copy of this book might be one of the best things you can do to develop your cybersecurity skills."—Sandra Henry-Stocker, Network World"Linux Basics for Hackers is immediately practical. Its quick and dirty approach to exploring and using a Linux system was welcome."—Jesse Smith, DistroWatch Weekly"If you are starting out in Computer Science and want to get up to speed quickly on Linux and Unix like operating systems, working through this book will put you well ahead of your fellow students, and quickly."—Greg Laden, Greg Laden's Blog"A great guide for those who are not familiar with Linux as well as those who are proficient."—Davin Jackson, Alpha Cyber Security, Books to Start Your Penetration Testing Journey"Linux Basics for Hackers is the best book for Jr. penetration testers and newbies who want to learn InfoSec. Though aimed at hacking, it's the best general intro to Linux I've read. Gives a great overview of Linux basics and useful terminal commands."—@hackerb0t "For an absolute beginner . . . this is a must read book. It breaks concepts down so simply . . . this book flies by and builds a foundation of knowledge for you to continue building on."—Matthew Hacks "A great intro to so many different parts of the Linux OS." —Michael Kaplan, Amazon Reviewer"Extremely well written, covers a broad variety of information and does a great job covering the basics." —The Security Noob"I highly recommend this book for anyone starting their cybersec journey."—Steve[INIT]
£28.49
O'Reilly Media Bash Pocket Reference 2e
Book SynopsisThis concise little book puts all of the essential information about Bash right at your fingertips. Updated for Bash version 4.4, this pocket reference has the answers to these and other problems in a format that makes browsing quick and easy.
£15.99
John Wiley & Sons Inc LPIC1 Certification Kit
Book Synopsis
£48.75
O'Reilly Media Efficient Linux at the Command Line
Book SynopsisTake your Linux skills to the next level! Whether you're a system administrator, software developer, site reliability engineer, or enthusiastic hobbyist, this practical, hands-on book will help you work faster, smarter, and more efficiently.
£35.99
O'Reilly Media Learning Kali Linux
Book Synopsis
£35.99
Pearson Education (US) Linux Hardening in Hostile Networks
Book SynopsisKyle Rankin is the vice president of engineering operations for Final, Inc.; the author of DevOps Troubleshooting, The Official Ubuntu Server Book, Knoppix Hacks, Knoppix Pocket Reference, Linux Multimedia Hacks, and Ubuntu Hacks; and a contributor to a number of other books. Rankin is an award-winning columnist for Linux Journal and has written for PC Magazine, TechTarget websites, and other publications. He speaks frequently on Open Source software, including a keynote at SCALE 11x and numerous other talks at SCALE, O'Reilly Security Conference, OSCON, CactusCon, Linux World Expo, Penguicon, and a number of Linux Users' Groups. In his free time Kyle does much of what he does at workplays with Linux and computers in general. He's also interested in brewing, BBQing, playing the banjo, 3D printing, and far too many other hobbies.Table of ContentsForeword xiii Preface xv Acknowledgments xxiii About the Author xxv Chapter 1: Overall Security Concepts 1 Section 1: Security Fundamentals 1 Section 2: Security Practices Against a Knowledgeable Attacker 10 Section 3: Security Practices Against an Advanced Attacker 20 Summary 24 Chapter 2: Workstation Security 25 Section 1: Security Fundamentals 25 Section 2: Additional Workstation Hardening 33 Section 3: Qubes 37 Summary 52 Chapter 3: Server Security 53 Section 1: Server Security Fundamentals 53 Section 2: Intermediate Server-Hardening Techniques 58 Section 3: Advanced Server-Hardening Techniques 68 Summary 74 Chapter 4: Network 75 Section 1: Essential Network Hardening 76 Section 2: Encrypted Networks 87 Section 3: Anonymous Networks 100 Summary 107 Chapter 5: Web Servers 109 Section 1: Web Server Security Fundamentals 109 Section 2: HTTPS 113 Section 3: Advanced HTTPS Configuration 118 Summary 131 Chapter 6: Email 133 Section 1: Essential Email Hardening 133 Section 2: Authentication and Encryption 137 Section 3: Advanced Hardening 141 Summary 156 Chapter 7: DNS 157 Section 1: DNS Security Fundamentals 158 Section 2: DNS Amplification Attacks and Rate Limiting 161 Section 3: DNSSEC 166 Summary 175 Chapter 8: Database 177 Section 1: Database Security Fundamentals 177 Section 2: Database Hardening 185 Section 3: Database Encryption 191 Summary 195 Chapter 9: Incident Response 197 Section 1: Incident Response Fundamentals 197 Section 2: Secure Disk Imaging Techniques 200 Section 3: Walk Through a Sample Investigation 209 Summary 214 Appendix A: Tor 215 What Is Tor? 215 How Tor Works 216 Security Risks 219 Appendix B: SSL/TLS 221 What Is TLS? 221 How TLS Works 222 TLS Troubleshooting Commands 224 Security Risks 224 Index 229
£27.06
Pearson Education Ubuntu Unleashed 2017 Edition Includes Content
Book SynopsisBook + Content Update ProgramUbuntu Unleashed 2017 Edition is filled with unique and advanced information for everyone who wants to make the most of the Ubuntu Linux operating system. This new edition has been thoroughly updated by a long-time Ubuntu community leader to reflect the exciting new Ubuntu 16.04 LTS release with forthcoming online updates for 16.10, 17.04, and 17.10 when they are released.Former Ubuntu Forum administrator Matthew Helmke covers all you need to know about Ubuntu 16.04 installation, configuration, productivity, multimedia, development, system administration, server operations, networking, virtualization, security, DevOps, and more—including intermediate-to-advanced techniques you won’t find in any other book.Helmke presents up-to-the-minute introductions to Ubuntu’s key productivity and Web development tools, programming languages, hardware support, and more. You’ll find new or improved
£30.35
Pearson Education Ubuntu Unleashed 2019 Edition
Book SynopsisMatthew Helmke has used Ubuntu since 2005. He has written about Linux for several magazines and websites, is a lead author of The Official Ubuntu Book, and coauthored both A Practical Guide to Linux: Commands, Editors, and Shell Programming and The VMware Cookbook. In his day job, Matthew works as a technical writer for one of the largest and oldest open source software companies, Red Hat. Matthew first used UNIX in 1987, while studying Lisp on a Vax at the university. He has run a business using only free and open source software, has consulted, and has earned a master's degree in Information Resources and Library Science from the University of Arizona.
£34.42
Pearson Education (US) BPF Performance Tools
Book SynopsisBrendan Gregg, Netflix senior performance engineer, is a major contributor to BPF (eBPF) who has helped develop and maintain both main BPF front-ends, pioneered BPF's use for observability, and created dozens of BPF-based performance analysis tools. His books include the best-seller Systems Performance: Enterprise and the Cloud. Table of Contents Part I: Technologies 1. Introduction 2. Technology Background 3. Performance Analysis 4. bcc5. bpftrace Part II: Using BPF Tools 6. CPUs 7. Memory 8. File Systems 9. Disk I/O 10. Networking 11. Security 12. Languages 13. Applications 14. Kernel 15. Containers 16. Hypervisors Part III: Additional Topics 17. Other BPF Tools 18. Tips and Tricks Appendices A. bpftrace One-Liners B. bpftrace Cheat Sheet C. bcc Tool Development Glossary Bibliography
£46.79
Pearson Education CompTIA Linux XK0005 Cert Guide
Book SynopsisRoss Brunson has more than 30 years of experience as a Linux and open-source trainer, training manager, and certification architect, and is the author of the nowclassic LPIC-1 Exam Cram 2, several iterations of the CompTIA Linux+ Cert Guide, and dozens of technical courses for major organizations. Ross is currently the Education Architect at Grafana Labs (www.grafana.com), where he focuses on building a learning framework and training offerings that help employees and customers make the best use of Grafana to observe, troubleshoot, and maintain their environments. Previously, Ross was a Senior Technical Training Engineer for NGINX, where he completely redid the Fundamentals learning track, authored a number of Getting Started guides, and taught a number of customer engagements to help new NGINX customers take full advantage of the platform. Before NGIN
£40.49
Pearson Education (US) CompTIA Linux XK0005 Exam Cram
Book SynopsisAt the impressionable age of 14, William Bo Rothwell crossed paths with a TRS-80 Micro Computer System (affectionately known as a Trash 80). Soon after the adults responsible for Bo made the mistake of leaving him alone with the TSR-80, he dismantled it and held his first computer class, showing his friends what made this computer thing work. Since that experience, Bo's passion for understanding how computers work and sharing this knowledge with others has resulted in a rewarding career in IT training. His experience includes Linux, Unix, IT security, DevOps, cloud technologies, and programming languages such as Perl, Python, Tcl, and BASH. He is the founder and lead instructor of One Course Source, an IT training organization.Table of Contents Introduction. . . . . . . . . . . . xxiv Part I: System Management CHAPTER 1: Linux Fundamentals. . . . . . . . . . . 1 Filesystem Hierarchy Standard (FHS).. . . . . . . 1 Basic Boot Process.. . . . . . . . . . 3 Kernel Panic. . . . . . . . . . . 10 Device Types in /dev.. . . . . . . . . 10 Basic Package Compilation from Source.. . . . . . 13 ./configure.. . . . . . . . . . 13 make.. . . . . . . . . . . 15 make install.. . . . . . . . . . 16 Storage Concepts.. . . . . . . . . . 16 Listing Hardware Information.. . . . . . . . 22 CHAPTER 2: Manage Files and Directories.. . . . . . . . . 27 File Editing.. . . . . . . . . . . 27 File Compression, Archiving, and Backup. . . . . . 36 File Metadata.. . . . . . . . . . . 41 Soft and Hard Links.. . . . . . . . . 43 Copying Files Between Systems.. . . . . . . 46 File and Directory Operations.. . . . . . . . 49 CHAPTER 3: Configure and Manage Storage Using the Appropriate Tools.. . . 57 Disk Partitioning.. . . . . . . . . . 57 Mounting Local and Remote Devices.. . . . . . 61 Filesystem Management. . . . . . . . . 66 Monitoring Storage Space and Disk Usage. . . . . . 70 Creating and Modifying Volumes Using Logical Volume Manager (LVM).. . . . . . . . . . 71 Inspecting RAID Implementations.. . . . . . . 75 Storage Area Network (SAN)/Network-Attached Storage (NAS). . 78 Storage Hardware.. . . . . . . . . . 82 CHAPTER 4: Configure and Use the Appropriate Processes and Services.. . . 85 System Services. . . . . . . . . . 85 Scheduling Services. . . . . . . . . . 90 Process Management. . . . . . . . . 97 CHAPTER 5: Use the Appropriate Networking Tools or Configuration Files. . . 113 Interface Management.. . . . . . . . . 113 Name Resolution.. . . . . . . . . . 122 Network Monitoring.. . . . . . . . . 127 Remote Networking Tools.. . . . . . . . 132 CHAPTER 6: Build and Install Software. . . . . . . . . 139 Package Management.. . . . . . . . . 139 Sandboxed Applications.. . . . . . . . . 149 System Updates.. . . . . . . . . . 150 Part II: Security CHAPTER 7: Manage Software Configurations.. . . . . . . . 155 Updating Configuration Files.. . . . . . . . 155 Configure Kernel Options.. . . . . . . . 158 Configure Common System Services.. . . . . . . 165 Localization.. . . . . . . . . . . 172 CHAPTER 8: Security Best Practices in a Linux Environment.. . . . . 177 Managing Public Key Infrastructure (PKI) Certificates.. . . 177 Certificate Use Cases. . . . . . . . . 181 Authentication.. . . . . . . . . . 181 Linux Hardening.. . . . . . . . . . 188 CHAPTER 9: Implement Identity Management. . . . . . . . 201 Account Creation and Deletion. . . . . . . . 201 .bashrc. . . . . . . . . . . 212 Account Management.. . . . . . . . . 212 CHAPTER 10: Implement and Configure Firewalls.. . . . . . . . 219 Firewall Use Cases.. . . . . . . . . . 219 Common Firewall Technologies.. . . . . . . 221 Key Firewall Features.. . . . . . . . . 223 CHAPTER 11: Configure and Execute Remote Connectivity for System Management.. 227 SSH.. . . . . . . . . . . . 227 Executing Commands as Another User.. . . . . . 235 CHAPTER 12: Apply the Appropriate Access Controls. . . . . . . 241 File Permissions.. . . . . . . . . . 241 Security-Enhanced Linux (SELinux).. . . . . . . 243 AppArmor.. . . . . . . . . . . 247 Command-Line Utilities.. . . . . . . . . 250 Part III: Scripting, Containers, and Automation CHAPTER 13: Create Simple Shell Scripts to Automate Common Tasks. . . . 265 Shell Script Elements.. . . . . . . . . 265 Common Script Utilities.. . . . . . . . . 286 Environment Variables. . . . . . . . . 298 Relative and Absolute Paths.. . . . . . . . 302 CHAPTER 14: Perform Basic Container Operations. . . . . . . 305 Container Management.. . . . . . . . . 305 Container Image Operations.. . . . . . . . 312 CHAPTER 15: Perform Basic Version Control Using Git.. . . . . . . 317 Introduction to Version Control and Git.. . . . . . 317 clone.. . . . . . . . . . . . 321 push.. . . . . . . . . . . . 323 pull.. . . . . . . . . . . . 324 commit.. . . . . . . . . . . . 324 add.. . . . . . . . . . . . 325 branch/checkout.. . . . . . . . . . 325 tag.. . . . . . . . . . . . 329 gitignore.. . . . . . . . . . . 330 CHAPTER 16: Common Infrastructure as Code Technologies.. . . . . 333 File Formats. . . . . . . . . . . 334 Utilities.. . . . . . . . . . . . 335 Continuous Integration/Continuous Deployment (CI/CD).. . . 338 Advanced Git Topics.. . . . . . . . . 339 CHAPTER 17: Container, Cloud, and Orchestration Concepts.. . . . . 343 Kubernetes Benefits and Application Use Cases.. . . . . 344 Single-Node, Multicontainer Use Cases. . . . . . 346 Container Persistent Storage.. . . . . . . . 346 Container Networks.. . . . . . . . . 347 Service Mesh.. . . . . . . . . . . 349 Bootstrapping. . . . . . . . . . . 350 Container Registries.. . . . . . . . . 350 Part IV: Troubleshooting CHAPTER 18: Analyze and Troubleshoot Storage Issues.. . . . . . 353 High Latency.. . . . . . . . . . . 353 Input/Output Operations per Second (IOPS) Scenarios.. . . 354 Capacity Issues.. . . . . . . . . . 355 Filesystem Issues. . . . . . . . . . 358 I/O Scheduler. . . . . . . . . . . 359 Device Issues.. . . . . . . . . . . 360 Mount Option Problems.. . . . . . . . . 363 CHAPTER 19: Analyze and Troubleshoot Network Resource Issues.. . . . 365 Network Configuration Issues.. . . . . . . . 365 Firewall Issues.. . . . . . . . . . 367 Interface Errors.. . . . . . . . . . 367 Bandwidth Limitations. . . . . . . . . 373 Name Resolution Issues. . . . . . . . . 374 Testing Remote Systems.. . . . . . . . . 375 CHAPTER 20: Analyze and Troubleshoot Central Processing Unit (CPU) and Memory Issues. . . . 379 Runaway Processes.. . . . . . . . . . 379 Zombie Processes.. . . . . . . . . . 380 High Load Average.. . . . . . . . . . 383 High Run Queues.. . . . . . . . . . 384 CPU Times.. . . . . . . . . . . 384 CPU Process Priorities.. . . . . . . . . 384 Memory Exhaustion.. . . . . . . . . 385 Out of Memory (OOM). . . . . . . . . 385 Swapping.. . . . . . . . . . . 386 Hardware. . . . . . . . . . . 388 CHAPTER 21: Analyze and Troubleshoot User Access and File Permissions. . . 397 User Login Issues.. . . . . . . . . . 397 User File Access Issues. . . . . . . . . 400 Password Issues. . . . . . . . . . 404 Privilege Elevation.. . . . . . . . . . 405 Quota Issues. . . . . . . . . . . 405 CHAPTER 22: Use systemd to Diagnose and Resolve Common Problems with a Linux System. . . . . 411 Unit Files. . . . . . . . . . . 412 Common Problems.. . . . . . . . . . 429 9780137898558, TOC, 8/11/2022
£28.49
O'Reilly Media Linux Server Hacks
Book SynopsisThis is a collection of 100 industrial-strength hacks, providing tips and tools that solve practical problems for Linux system administrators. It contains tips, tools and scripts and provides direct, hands-on solutions that can be by anyone running a network of Linux servers.Trade Review"The book is such fun, that it has become a great way to test the memory and knowledge of other admins with quickfire questions over a drink. Overall the book is an excellent source of quick fixes for common problems." Linux Magazine, August 2003 "Definitely one for the bookshelf." Computer Shopper, March 2004Table of ContentsHow to Become a Hacker Preface Server Basics 1. Removing Unnecessary Services 2. Forgoing the Console Login 3. Common Boot Parameters 4. Creating a Persistent Daemon with init 5. Swap Standard Output and Standard Error 6. Building Complex Command Lines 7. Working with Tricky Files in xargs 8. Immutable Files in ext2/ext3 9. Speeding Up Compiles 10. At Home in Your Shell Environment 11. Finding and Eliminating setuid/setgid Binaries 12. Make sudo Work Harder 13. Using a Makefile to Automate Admin Tasks 14. Brute Forcing Your New Domain Name 15. Playing Hunt the Disk Hog 16. Fun with /proc 17. Manipulating Processes ymbolically with procps 18. Managing System Resources per Process 19. Cleaning Up after Ex-Users 20. Eliminating Unnecessary Drivers from the Kernel 21. Using Large Amounts of RAM 22. hdparm: Fine Tune IDE Drive Parameters Revision Control 23. Getting Started with RCS 24. Checking Out a Previous Revision in RCS 25. Tracking Changes with rcs2log 26. Getting Started with CVS 27. CVS: Checking Out a Module 28. CVS: Updating Your Working Copy 29. CVS: Using Tags 30. CVS: Making Changes to a Module 31. CVS: Merging Files 32. CVS: Adding and Removing Files and Directories 33. CVS: Branching Development 34. CVS: Watching and Locking Files 35. CVS: Keeping CVS Secure 36. CVS: Anonymous Repositories Backups 37. Backing Up with tar over ssh 38. Using rsync over ssh 39. Archiving with Pax 40. Backing Up Your Boot Sector 41. Keeping Parts of Filesystems in sync with rsync 42. Automated Snapshot-Style Incremental Backups with rsync 43. Working with ISOs and CDR/CDRWs 44. Burning a CD Without Creating an ISO File Networking 45. Creating a Firewall from the Command Line of any Server 46. Simple IP Masquerading 47. iptables Tips & Tricks 48. Forwarding TCP Ports to Arbitrary Machines 49. Using Custom Chains in iptables 50. Tunneling: IPIP Encapsulation 51. Tunneling: GRE Encapsulation 52. Using vtun over ssh to Circumvent NAT 53. Automatic vtund.conf Generator Monitoring 54. Steering syslog 55. Watching Jobs with watch 56. What's Holding That Port Open? 57. Checking On Open Files and Sockets with lsof 58. Monitor System Resources with top 59. Constant Load Average Display in the Titlebar 60. Network Monitoring with ngrep 61. Scanning Your Own Machines with nmap 62. Disk Age Analysis 63. Cheap IP Takeover 64. Running ntop for Real-Time Network Stats 65. Monitoring Web Traffic in Real Time with httptop SSH 66. Quick Logins with ssh Client Keys 67. Turbo-mode ssh Logins 68. Using ssh-Agent Effectively 69. Running the ssh-Agent in a GUI 70. X over ssh 71. Forwarding Ports over ssh Scripting 72. Get Settled in Quickly with movein.sh 73. Global Search and Replace with Perl 74. Mincing Your Data into Arbitrary Chunks (in bash) 75. Colorized Log Analysis in Your Terminal Information Servers 76. Running BIND in a chroot Jail 77. Views in BIND 9 78. Setting Up Caching DNS with Authority for Local Domains 79. Distributing Server Load with Round-Robin DNS 80. Runn
£15.99
O'Reilly Media Linux Network Administrators Guide
Book SynopsisThis resource takes an in-depth look at everything you need to know to join a network. Topics covered include all of the essential networking software that comes with the Linux operating system, plus information on a host of cutting-edge services including wireless hubs, spam filtering, and more.Table of ContentsPreface; 1. Introduction to Networking; History; TCP/IP Networks Linux Networking; Maintaining Your System; 2. Issues of TCP/IP Networking; Networking Interfaces; IP Addresses; The Internet Control Message Protocol; 3. Configuring the Serial Hardware Communications Software for Modem Links; Accessing Serial Devices Using the Configuration Utilities; Serial Devices and the login: Prompt; 4. Configuring TCP/IP Networking; Understanding the /proc Filesystem; 5. Name Service and Configuration; The Resolver Library; How DNS Works; Alternatives to BIND; 6. The Point-to-Point Protocol; PPP on Linux Running pppd; Using Options Files; Using chat to Automate Dialing; IP Configuration Options; Link Control Options; General Security Considerations Authentication with PPP; Debugging Your PPP Setup; More Advanced PPP Configurations; PPPoE Options in Linux; 7. TCP/IP Firewall Methods of Attack; What Is a Firewall?; What Is IP Filtering? Netfilter and iptables; iptables Concepts Setting Up Linux for Firewalling Using iptables The iptables Subcommands Basic iptables Matches A Sample Firewall Configuration References 8. IP Accounting; Configuring the Kernel for IP Accounting Configuring IP Accounting; Using IP Accounting Results Resetting the Counters; Flushing the Rule Set; Passive Collection of Accounting Data; 9. IP Masquerade and Network Address Translation Side Effects and Fringe Benefits; Configuring the Kernel for IP Masquerade Configuring IP Masquerade; Handling Nameserver Lookups More About Network Address Translation; 10. Important Network Features; The inetd Super Server; The tcpd Access Control Facility The xinetd Alternative; The Services and Protocols Files Remote Procedure Call Configuring Remote Login and Execution 11. Administration Issues with Electronic Mail; What Is a Mail Message?; How Is Mail Delivered? Email Addresses How Does Mail Routing Work? Mail Routing on the Internet; 12. sendmail Installing the sendmail Distribution; sendmail Configuration Files sendmail.cf Configuration Language; Creating a sendmail Configuration; sendmail Databases; Testing Your Configuration Running sendmail; Tips and Tricks; More Information 13. Configuring IPv6 Networks The IPv4 Problem and Patchwork Solutions; IPv6 as a Solution; 14. Configuring the Apache Web Server; Apache HTTPD Server-An Introduction; Configuring and Building Apache; Configuration File Options; VirtualHost Configuration Options; Apache and OpenSSL; Troubleshooting 15. IMAP; IMAP-An Introduction; Cyrus IMAP; 16. Samba Samba-An Introduction; 17. OpenLDAP; Understanding LDAP Obtaining OpenLDAP; 18. Wireless Networking; History The Standards; 802.11b Security Concerns Appendix: Example Network: The Virtual Brewery; Index
£20.99
O'Reilly Media High Performance Linux Clusters
Book SynopsisThis new guide covers everything you need to plan, build, and deploy a high-performance Linux cluster. You'll learn about planning, hardware choices, bulk installation of Linux on multiple systems, and other basic considerations. Learn about the major free software projects and how to choose those that are most helpful.Table of ContentsPreface Part I. An Introduction to Clusters 1. Cluster Architecture Modern Computing and the Role of Clusters Types of Clusters Distributed Computing and Clusters Limitations; My Biases 2. Cluster Planning Design Steps Determining Your Cluster's Mission Architecture and Cluster Software Cluster Kits CD-ROM-Based Clusters Benchmarks 3. Cluster Hardware; Design Decisions Environment 4. Linux for Clusters Installing Linux Configuring Services Cluster Security Part II. Getting Started Quickly 5. openMosix What is openMosix? How openMosix Works Selecting an Installation Approach Installing a Precompiled Kernel Using openMosix Recompiling the Kernel; Is openMosix Right for You? 6. OSCAR Why OSCAR? What's in OSCAR Installing OSCAR Security and OSCAR Using switcher; Using LAM/MPI with OSCAR 7. Rocks Installing Rocks Managing Rocks Using MPICH with Rocks Part III. Building Custom Clusters; 8. Cloning Systems Configuring Systems Automating Installations; Notes for OSCAR and Rocks Users 9. Programming Software Programming Languages Selecting a Library LAM/MPI MPICH Other Programming Software Notes for OSCAR Users Notes for Rocks Users 10. Management Software C3 Ganglia Notes for OSCAR and Rocks Users 11. Scheduling Software OpenPBS Notes for OSCAR and Rocks Users 12. Parallel Filesystems PVFS; Using PVFS Notes for OSCAR and Rocks Users Part IV. Cluster Programming 13. Getting Started with MPI MPI A Simple Problem; An MPI Solution I/O with MPI Broadcast Communications; 14. Additional MPI Features More on Point-to-Point Communication; More on Collective Communication Managing Communicators; Packaging Data 15. Designing Parallel Programs Overview; Problem Decomposition Mapping Tasks to Processors Other Considerations 16. Debugging Parallel Programs Debugging and Parallel Programs Avoiding Problems Programming Tools; Rereading Code Tracing with printf Symbolic Debuggers; Using gdb and ddd with MPI Notes for OSCAR and Rocks Users; 17. Profiling Parallel Programs Why Profile? Writing and Optimizing Code Timing Complete Programs Timing C Code Segments; Profilers MPE Customized MPE Logging Notes for OSCAR and Rocks Users Part V. Appendix References Books URLs; Index
£23.99
O'Reilly Media Linux Unwired
Book SynopsisWhether you're considering Wi-Fi as a supplement or alternative to cable and DSL, using Bluetooth to network devices in your home or office, or want to use cellular data plans for access to data nearly everywhere, this text will show you the full-spectrum view of wireless capabilities of Linux, and how to take advantage of them.Trade Review"'Out of the box' isn't a commonly heard phrase in the Linux community, but perhaps 'out of the book' should be! If you want your Linux wireless network with the minimum fuss, it's an essential read." Davey Winder - PC Plus, September; Linux Unwired covers a lot of ground in a short space and it manages to do it well, for the Linux WIFI enthusiast this book could become a constant reference. Computer Shopper, June 2005Table of ContentsForeword; Preface; 1. Introduction to Wireless Radio Waves Connections Without Wires Wireless Alphabet Soup Bluetooth Cellular Data Infrared; 2. Wi-Fi on Your Linux Box Quick Start Chipset Compatibility Four Steps to Wi-Fi Linux Wi-Fi Drivers in Depth; 3. Getting On the Network Hotspots Wireless Network Discovery; 4. Communicating Securely The Pitfalls of WEP The Future Is 802.11i WPA: a Subset of 802.11i WPA on Linux; 5. Configuring Access Points with Linux Linux-Friendly Wireless Vendors Commercial Wireless Equipment Overview Configuring Access Points Flashing Your Access Point; 6. Building Your Own Access Point Hardware Software Linux-Powered Off-the-Shelf; 7. Bluetooth Quick Start Bluetooth Basics Bluetooth Hardware Linux Bluetooth Support Installing the BlueZ Utilities Basic Configuration and Operation Graphical Applications Cool Bluetooth Tricks; 8. Infrared IrDA in the Kernel PC Laptop with Built-In IrDA Infrared Dongle Sharing a Network Connection over IrDA Connecting to the Internet with a Cell Phone Transferring Files with OpenOBEX Synchronizing with a Palm Pocket PC; 9. Cellular Networking Cellular Data Some Cellular Carriers Phones and Cards Sending a Fax Text Messaging Acceleration; 10. GPS Uses of GPS A GPS Glossary GPS Devices Listening to a GPS Mapping Wi-Fi Networks with Kismet GpsDrive Other Applications Index
£15.99
O'Reilly Media Running Linux
Book SynopsisFocusing on Linux, this problem-solving book answers several questions and tackles the configuration issues that frequently plague users. It covers basic communications, such as mail, Web surfing, and instant messaging, and also delves into the subtleties of network configuration, in case you need to set up your network manually.Table of ContentsPreface Part I. Enjoying and Being Productive on Linux 1. Introduction to Linux About This Book Who's Using Linux? System Features About Linux's Copyright Open Source and the Philosophy of Linux Sources of Linux Information Getting Help 2. Preinstallation and Installation Distributions of Linux Preparing to Install Linux Post-Installation Procedures Running into Trouble 3. Desktop Environments Why Use a Graphical Desktop? The K Desktop Environment KDE Applications The GNOME Desktop Environment GNOME Applications 4. Basic Unix Commands and Concepts Logging In Setting a Password Virtual Consoles Popular Commands Shells Useful Keys and How to Get Them to Work Typing Shortcuts Filename Expansion Saving Your Output What Is a Command? Putting a Command in the Background Remote Logins and Command Execution Manual Pages Startup Files Important Directories Basic Text Editing Advanced Shells and Shell Scripting 5. Web Browsers and Instant Messaging The World Wide Web Instant Messaging 6. Electronic Mail Clients Using KMail Using Mozilla Mail & News Getting the Mail to Your Computer with fetchmail OpenPGP Encryption with GnuPG 7. Games Gaming Quake III Return to Castle Wolfenstein Unreal Tournament 2004 Emulators Frozen Bubble Tux Racer 8. Office Suites and Personal Productivity Using OpenOffice KOffice Other Word Processors Synching PDAs Groupware Managing Your Finances 9. Multimedia Multimedia Concepts Kernel and Driver Issues Embedded and Other Multimedia Devices Desktop Environments Windows Compatibility Multimedia Applications Multimedia Toolkits and Development Environments Solutions to Common Problems References Part II. System Administration 10. System Administration Basics Maintaining the System Managing Filesystems Managing Swap Space The /proc Filesystem Device Files Scheduling Recurring Jobs Using cron Executing Jobs Once Managing System Logs Processes Programs That Serve You 11. Managing Users, Groups, and Permissions Managing User Accounts File Ownership and Permissions Changing the Owner, Group, and Permissions 12. Installing, Updating, and Compiling Programs Upgrading Software General Upgrade Procedure Automated and Bulk Upgrades Upgrading Software Not Provided in Packages Archive and Compression Utilities 13. Networking Networking with TCP/IP Dial-Up PPP PPP over ISDN ADSL Cable Modems Network Diagnostics Tools 14. Printing Printing Managing Print Services 15. File Sharing Sharing Files with Windows Systems (Samba) NFS and NIS Configuration 16. The X Window System A History of X X Concepts Hardware Requirements Installing X.org Configuring X.org Running X Running into Trouble X and 3D 17. System Start and Shutdown Booting the System System Startup and Initialization Single-User Mode Shutting Down the System A Graphical Runlevel Editor: KSysV 18. Configuring and Building the Kernel Building a New Kernel Loadable Device Drivers Loading Modules Automatically 19. Text Editing Editing Files Using vi The (X)Emacs Editor 20. Text Processing TeX and LaTeX XML and DocBook groff Texinfo Part III. Programming 21. Programming Tools Programming with gcc Makefiles Debugging with gdb Useful Utilities for C Programmers Using Perl Java Python Other Languages Introduction to OpenGL Programming Integrated Development Environments 22. Running a Web Server Configuring Your Own Web Server 23. Transporting and Handling Email Messages The Postfix MTA Procmail Filtering Spam 24. Running an FTP Server Introduction Compiling and Installing Running ProFTPD Configuration Part IV. Network Services 25. Running Web Applications with MySQL and PHP MySQL PHP The LAMP Server in Action 26. Running a Secure System A Perspective on System Security Initial Steps in Setting Up a Secure System TCP Wrapper Configuration Firewalls: Filtering IP Packets SELinux 27. Backup and Recovery Making Backups What to Do in an Emergency 28. Heterogeneous Networking and Running Windows Programs Sharing Partitions Emulation and Virtual Operating Systems Remote Desktop Access to Windows Programs FreeNX: Linux as a Remote Desktop Server Appendix: Sources of Linux Information Index
£29.99
O'Reilly Media Linux Desktop Pocket Guide
Book SynopsisUsing Linux doesn't have to be hard. This book introduces you to the five popular desktop distributions, and covers topics such as configuring video cards screen resolution and wireless networking. It covers laptop issues, and explores desktop apps, including browsers, IM, and email clients with the same functionality as those used on Windows.Table of ContentsPreface Chapter 1:. Distributions Choosing a Distribution Fedora Gentoo Mandriva SUSE Ubuntu Other Distributions Getting a Distribution Chapter 2:. Logging In Graphical Logins Text Logins Chapter 3:. GNOME GNOME Desktop File Manager The GNOME Menu and Program Launchers GNOME Configuration Chapter 4:. KDE The KDE Desktop File Manager The KDE Menu The KDE Control Center Chapter 5:. Applications Web Browsers Email Instant Messaging and IRC Office Suites Video Players Music Ripping, Encoding, and Playing CD and DVD Burning Digital Images Games Chapter 6:. Add, Remove, and Update Programs Fedora Gentoo Mandriva SUSE Ubuntu Using RPMs Build Your Own Chapter 7:. Configuration Sound Printing Wired Networking Wireless Networking X Chapter 8:. Laptops Touchpads Kernel Support for Power Management Extending Battery Life Putting Your Laptop to Sleep Hibernating Your Laptop Distribution Support Appendix: Running Commands and Editing Text Index
£10.79
O'Reilly Media Fedora Linux
Book SynopsisWhether you are running the stable version of Fedora Core or Rawhide releases, this book has something for users at various levels. It includes the modular, lab-based approach that not only shows you how things work - but also explains why - and provides you with the answers you need to get up and running with Fedora Linux.Table of ContentsPreface 1. Quick Start: Installing Fedora 1.1 Choosing Fedora: Is It Right for You? 1.2 Obtaining Fedora Core Software 1.3 Installing Fedora Core 2. Using Fedora on Your Desktop 2.1 Getting Started Using the Fedora Graphical User Interfaces 2.2 Customizing GNOME 2.3 Customizing KDE 2.4 Fine-Tuning Your Display Configuration 2.5 Configuring Printing 2.6 Configuring Sound 2.7 Adding and Configuring Fonts 2.8 Using USB Storage 3. Using Fedora on Your Notebook 3.1 Power Management 3.2 Configuring Networking 3.3 Configuring a Touchpad 3.4 Using Dual Video Output 4. Basic System Management 4.1 Using the Command Line 4.2 Accessing Online Documentation 4.3 Managing Files 4.4 Basic Text Editing Using vi 4.5 Using Runlevels 4.6 Managing and Configuring Services 4.7 Managing Users and Groups 4.8 Control Access to Files 4.9 Managing Processes 4.10 Remote Management Using SSH 4.11 Using Shell Redirection and Piping 4.12 Writing Simple Scripts 5. Package Management 5.1 Querying the Package Management Database 5.2 Installing and Removing Software Using RPM 5.3 Using Repositories 5.4 Rolling Back a Package Installation, Upgrade, or Removal 5.5 Automating Updates 5.6 Installing From Source 5.7 Making Your Own RPM Packages 5.8 Rebuilding an RPM Package for a Different Architecture 6. Storage Administration 6.1 Using Logical Volume Management 6.2 Managing RAID 6.3 Making Backups 6.4 Scheduling Tasks 7. Network Services 7.1 Configuring Samba to Share Files with Windows Systems 7.2 Configuring a DHCP Server 7.3 Configuring a Domain Name Server 7.4 Configuring a CUPS Print Server 7.5 Using the Apache Web Server 7.6 Configuring the sendmail Server 7.7 Configuring IMAP and POP3 Email 7.8 Configuring Webmail 7.9 Creating Databases and Accounts on a MySQL Server 7.10 Installing and Configuring a Wiki 7.11 Configuring an FTP Server 7.12 Analyzing Web and FTP Logs 8. Securing Your System 8.1 Prevent Unwanted Connections 8.2 Using SELinux 8.3 Using Access Control Lists 8.4 Making Files Immutable 8.5 Using sudo to Delegate Privilege 8.6 Configuring PAM and consolehelper 8.7 Logging 8.8 Detecting File Changes with AIDE 9. The Fedora Community 9.1 Participating in the Fedora Mailing Lists 9.2 Using IRC 9.3 Using Bugzilla 9.4 Running Rawhide 9.5 Participating in Fedora Projects 10. Advanced Installation 10.1 Resizing a Windows Partition 10.2 Configuring RAID and LVM During Installation 10.3 Preparing Alternate Installation Media 10.4 Installing with Kickstart 10.5 Configuring the GRUB Bootloader 10.6 Using Rescue Mode on an Installation Disc 10.7 Installing Xen Virtual Machines Index
£23.99
O'Reilly Media LPI Linux Certification in a Nutshell 3e
Book SynopsisA guide that helps you prepare for the technically challenging Level 1 LPI exams, which test basic knowledge of Linux installation, configuration, and command-line skills. It features a summary of the core skills you need, as well as sample exercises, test questions, and hints to help you focus.
£29.99
Pearson Education (US) CompTIA Linux XK0004 Cert Guide
Book SynopsisAt the impressionable age of 14, William Bo Rothwell crossed paths with a TRS-80 Micro Computer System (affectionally known as a Trash 80). Soon after, the adults responsible for Bo made the mistake of leaving him alone with the TSR-80. He immediately dismantled it and held his first computer class, showing his friends what made this computer thing work. Since that experience, Bo's passion for understanding how computers work and sharing this knowledge with others has resulting in a rewarding career in IT training. His experience includes Linux, Unix, IT security, devops, and programming languages such as Perl, Python, Tcl, and BASH. He is the founder and lead instructor of One Course Source, an IT training organization. Ross Brunson has more than 25 years of experience as a Linux and open source trainer, training manager, and tech
£35.11
Taylor & Francis Ltd Linux with Operating System Concepts
Book SynopsisA True Textbook for an Introductory Course, System Administration Course, or a Combination CourseLinux with Operating System Concepts, Second Edition merges conceptual operating system (OS) and Unix/Linux topics into one cohesive textbook for undergraduate students. The book can be used for a one- or two-semester course on Linux or Unix. It is complete with review sections, problems, definitions, concepts and relevant introductory material, such as binary and Boolean logic, OS kernels and the role of the CPU and memory hierarchy.Details for Introductory and Advanced UsersThe book covers Linux from both the user and system administrator positions. From a user perspective, it emphasizes command-line interaction. From a system administrator perspective, the text reinforces shell scripting with examples of administration scripts that support the automation of administrator tasks.Thorough Coverage of Concepts and Linux CommandsTable of ContentsPreface. Acknowledgments and Contributions. Author. Chapter 1 Linux: What, Why, Who and When, and How. Chapter 2 Bash. Chapter 3 Linux File Commands. Chapter 4 Managing Processes. Chapter 5 Regular Expressions. Chapter 6 Shell Scripting. Chapter 7 User Accounts. Chapter 8 Administering Linux File Systems. Chapter 9 System Initialization and Services. Chapter 10 Network Configuration. Chapter 11 Software Installation and Maintenance. Chapter 12 Maintaining and Troubleshooting Linux. Bibliography. Index.
£78.84
O'Reilly Media Learning eBPF
Book SynopsisThis practical book is ideal for developers, system administrators, operators, and students who are curious about eBPF and want to know how it works.
£33.74
Cengage Learning Linux Operations and Administration
Book Synopsis
£169.20
John Wiley & Sons Inc Linux Bible
Book SynopsisTable of ContentsAcknowledgments xi Introduction xxxv Part I: Getting Started 1 Chapter 1: Starting with Linux 3 Understanding What Linux Is 4 Understanding How Linux Differs from Other Operating Systems 6 Exploring Linux History 7 Free-flowing UNIX culture at Bell Labs 7 Commercial UNIX 9 GNU transitions UNIX to freedom 11 BSD loses some steam 12 Linus builds the missing piece 13 OSI open source definition 14 Understanding How Linux Distributions Emerged 16 Choosing a Red Hat distribution 16 Choosing Ubuntu or another Debian distribution 19 Finding Professional Opportunities with Linux Today 19 Understanding how companies make money with Linux 20 Becoming Red Hat certified 21 Summary 25 Chapter 2: Creating the Perfect Linux Desktop 27 Understanding Linux Desktop Technology 28 Starting with the Fedora GNOME Desktop Live image 30 Using the GNOME 3 Desktop 31 After the computer boots up 31 Setting up the GNOME 3 desktop 38 Extending the GNOME 3 desktop 39 Starting with desktop applications 41 Stopping the GNOME 3 desktop 46 Using the GNOME 2 Desktop 46 Using the Metacity window manager 48 Changing GNOME’s appearance 49 Using the GNOME panels 50 Adding 3D effects with AIGLX 54 Summary 57 Exercises 57 Part II: Becoming a Linux Power User 59 Chapter 3: Using the Shell 61 About Shells and Terminal Windows 62 Using the shell prompt 63 Using a Terminal window 63 Using virtual consoles 65 Choosing Your Shell 65 Running Commands 66 Understanding command syntax 67 Locating commands 70 Recalling Commands Using Command History 72 Command-line editing 73 Command-line completion 75 Command-line recall 76 Connecting and Expanding Commands 78 Piping between commands 78 Sequential commands 79 Background commands 79 Expanding commands 80 Expanding arithmetic expressions 80 Expanding variables 80 Using Shell Variables 81 Creating and using aliases 81 Exiting the shell 83 Creating Your Shell Environment 84 Configuring your shell 84 Setting your prompt 85 Adding environment variables 87 Getting Information about Commands 88 Summary 90 Exercises 90 Chapter 4: Moving Around the Filesystem 93 Using Basic Filesystem Commands 96 Using Metacharacters and Operators 98 Using file-matching metacharacters 98 Using file-redirection metacharacters 99 Using brace expansion characters 101 Listing Files and Directories 101 Understanding File Permissions and Ownership 105 Changing permissions with chmod (numbers) 106 Changing permissions with chmod (letters) 107 Setting default file permission with umask 108 Changing file ownership 109 Moving, Copying, and Removing Files 109 Summary 111 Exercises 111 Chapter 5: Working with Text Files 113 Editing Files with vim and vi 113 Starting with vi 115 Skipping around in the file 119 Searching for text 119 Using ex mode 120 Learning more about vi and vim 120 Finding Files 120 Using locate to find files by name 121 Searching for files with find 122 Searching in files with grep 128 Summary 129 Exercises 129 Chapter 6: Managing Running Processes 131 Understanding Processes 131 Listing Processes 132 Listing processes with ps 132 Listing and changing processes with top 134 Listing processes with System Monitor 136 Managing Background and Foreground Processes 137 Starting background processes 138 Using foreground and background commands 139 Killing and Renicing Processes140 Killing processes with kill and killall 140 Setting processor priority with nice and renice 142 Limiting Processes with cgroups 143 Summary 144 Exercises 145 Chapter 7: Writing Simple Shell Scripts 147 Understanding Shell Scripts 147 Executing and debugging shell scripts 148 Understanding shell variables 149 Performing arithmetic in shell scripts 152 Using programming constructs in shell scripts 153 Trying some useful text manipulation programs 159 Using simple shell scripts 161 Summary 163 Exercises 163 Part III: Becoming a Linux System Administrator 165 Chapter 8: Learning System Administration 167 Understanding System Administration 167 Using Graphical Administration Tools 169 Using the root User Account 174 Exploring Administrative Commands, Configuration Files, and Log Files 178 Administrative commands 178 Administrative configuration files 179 Using Other Administrative Accounts 185 Checking and Configuring Hardware 186 Checking your hardware 187 Managing removable hardware 189 Working with loadable modules 191 Summary 193 Exercises 193 Chapter 9: Installing Linux 195 Choosing a Computer 196 Installing Fedora from Live Media 198 Installing Red Hat Enterprise Linux from Installation Media 201 Understanding Cloud-Based Installations 204 Installing Linux in the Enterprise 205 Exploring Common Installation Topics 207 Upgrading or installing from scratch 207 Dual booting 208 Installing Linux to run virtually 209 Using installation boot options 210 Using specialized storage 213 Partitioning hard drives 214 Using the GRUB boot loader 217 Summary 219 Exercises 219 Chapter 10: Getting and Managing Software 221 Managing Software on the Desktop 221 Going Beyond the Software Window 223 Understanding Linux RPM and DEB Software Packaging 224 Understanding DEB packaging 225 Understanding RPM packaging 226 Managing RPM Packages with YUM 229 Transitioning from yum to dnf 229 Understanding how yum works 229 Using YUM with third-party software repositories 233 Managing software with the yum command 233 Installing, Querying, and Verifying Software with the rpm Command 241 Installing and removing packages with rpm 241 Querying rpm information 242 Verifying RPM packages 244 Managing Software in the Enterprise 245 Summary 246 Exercises 247 Chapter 11: Managing User Accounts 249 Creating User Accounts 249 Adding users with useradd 252 Setting user defaults 255 Modifying users with usermod 257 Deleting users with userdel 258 Understanding Group Accounts 259 Using group accounts 259 Creating group accounts 260 Managing Users in the Enterprise 261 Setting permissions with Access Control Lists 262 Centralizing User Accounts 269 Summary 270 Exercises 270 Chapter 12: Managing Disks and Filesystems 273 Understanding Disk Storage 273 Partitioning Hard Disks 275 Understanding partition tables 275 Viewing disk partitions 276 Creating a single-partition disk 277 Creating a multiple-partition disk 281 Using Logical Volume Manager Partitions 285 Checking an existing LVM 286 Creating LVM logical volumes 289 Growing LVM logical volumes 290 Mounting Filesystems 291 Supported filesystems 291 Enabling swap areas 293 Disabling swap area 294 Using the fstab file to define mountable file systems 295 Using the mount command to mount file systems 297 Mounting a disk image in loopback 298 Using the umount command 299 Using the mkfs Command to Create a Filesystem 300 Managing Storage with Cockpit 301 Summary 303 Exercises 303 Part IV: Becoming a Linux Server Administrator 305 Chapter 13: Understanding Server Administration 307 Starting with Server Administration 308 Step 1: Install the server 308 Step 2: Configure the server 310 Step 3: Start the server 311 Step 4: Secure the server 312 Step 5: Monitor the server 314 Checking and Setting Servers 316 Managing Remote Access with the Secure Shell Service 316 Starting the openssh-server service 317 Using SSH client tools 318 Using key-based (passwordless) authentication 324 Configuring System Logging 326 Enabling system logging with rsyslog 326 Watching logs with logwatch 331 Checking System Resources with sar 332 Checking System Space 334 Displaying system space with df 334 Checking disk usage with du 334 Finding disk consumption with find 335 Managing Servers in the Enterprise 336 Summary 336 Exercises 337 Chapter 14: Administering Networking 339 Configuring Networking for Desktops 340 Checking your network interfaces 342 Configuring network interfaces 349 Configuring a network proxy connection 352 Configuring Networking from the Command Line 353 Configure networking with nmtui 354 Editing a NetworkManager TUI connection 354 Understanding networking configuration files 355 Setting alias network interfaces 360 Setting up Ethernet channel bonding 361 Setting custom routes 363 Configuring Networking in the Enterprise 364 Configuring Linux as a router 364 Configuring Linux as a DHCP server 365 Configuring Linux as a DNS server 365 Configuring Linux as a proxy server 366 Summary 366 Exercises 367 Chapter 15: Starting and Stopping Services 369 Understanding the Initialization Daemon (init or systemd) 370 Understanding the classic init daemons 371 Understanding systemd initialization 377 Checking the Status of Services 384 Checking services for SysVinit systems 385 Stopping and Starting Services 387 Stopping and starting SysVinit services 387 Enabling Persistent Services 391 Configuring persistent services for SysVinit 391 Configuring a Default Runlevel or Target Unit 394 Configuring the SysVinit default runlevel 394 Adding New or Customized Services 396 Adding new services to SysVinit 396 Adding new services to systemd 399 Summary 401 Exercises 401 Chapter 16: Configuring a Print Server 403 Common UNIX Printing System 403 Setting Up Printers 405 Adding a printer automatically 405 Using web-based CUPS administration 406 Using the Print Settings window 409 Working with CUPS Printing 415 Configuring the CUPS server (cupsdconf) 415 Starting the CUPS server 417 Configuring CUPS printer options manually 417 Using Printing Commands 418 Printing with lp 419 Listing status with lpstat -t 419 Removing print jobs with lprm 419 Configuring Print Servers 420 Configuring a shared CUPS printer 420 Configuring a shared Samba printer 422 Summary 424 Exercises 424 Chapter 17: Configuring a Web Server 427 Understanding the Apache Web Server 427 Getting and Installing Your Web Server 428 Understanding the httpd package 428 Installing Apache 431 Starting Apache 432 Securing Apache 433 Understanding the Apache configuration files 435 Adding a virtual host to Apache 440 Allowing users to publish their own web content 442 Securing your web traffic with SSL/TLS 443 Troubleshooting Your Web Server 449 Checking for configuration errors 449 Accessing forbidden and server internal errors 451 Summary 453 Exercises 453 Chapter 18: Configuring an FTP Server 455 Understanding FTP 455 Installing the vsftpd FTP Server 457 Starting the vsftpd Service 458 Securing Your FTP Server 461 Opening up your firewall for FTP 461 Configuring SELinux for your FTP server 463 Relating Linux file permissions to vsftpd 465 Configuring Your FTP Server 465 Setting up user access 465 Allowing uploading 467 Setting up vsftpd for the Internet 468 Using FTP Clients to Connect to Your Server 469 Accessing an FTP server from Firefox 470 Accessing an FTP server with the lftp command 470 Using the gFTP client 472 Summary 473 Exercises 473 Chapter 19: Configuring a Windows File Sharing (Samba) Server 475 Understanding Samba 475 Installing Samba 476 Starting and Stopping Samba 478 Starting the Samba (smb) service 478 Starting the NetBIOS (nmbd) name server 480 Stopping the Samba (smb) and NetBIOS (nmb) services 481 Securing Samba 482 Configuring firewalls for Samba 482 Configuring SELinux for Samba 484 Configuring Samba host/user permissions 486 Configuring Samba 486 Configuring the [global] section 486 Configuring the [homes] section487 Configuring the [printers] section 489 Accessing Samba Shares 493 Accessing Samba shares in Linux 493 Accessing Samba shares in Windows 496 Using Samba in the Enterprise 497 Summary 497 Exercises 498 Chapter 20: Configuring an NFS File Server 499 Installing an NFS Server 502 Starting the NFS service 502 Sharing NFS Filesystems 503 Configuring the /etc/exports file 504 Exporting the shared filesystems 507 Securing Your NFS Server 508 Opening up your firewall for NFS 508 Allowing NFS access in TCP wrappers 510 Configuring SELinux for your NFS server 511 Using NFS Filesystems 512 Viewing NFS shares 512 Manually mounting an NFS filesystem 512 Mounting an NFS filesystem at boot time 513 Using autofs to mount NFS filesystems on demand 517 Unmounting NFS filesystems 520 Summary 521 Exercises 521 Chapter 21: Troubleshooting Linux 523 Boot-Up Troubleshooting 523 Understanding Startup Methods 524 Starting from the firmware (BIOS or UEFI) 526 Troubleshooting the GRUB boot loader 528 GRUB 2 Boot loader 530 Starting the kernel 532 Troubleshooting Software Packages 542 Fixing RPM databases and cache 545 Troubleshooting Networking 547 Troubleshooting outgoing connections 547 Troubleshooting incoming connections 550 Troubleshooting Memory 553 Uncovering memory issues 554 Troubleshooting in Rescue Mode 559 Summary 561 Exercises 561 Part V: Learning Linux Security Techniques 563 Chapter 22: Understanding Basic Linux Security 565 Implementing Physical Security 565 Implementing disaster recovery 566 Securing user accounts 566 Securing passwords 570 Securing the filesystem 576 Managing software and services 579 Advanced implementation 580 Monitoring Your Systems 580 Monitoring log files 581 Monitoring user accounts 584 Monitoring the filesystem 587 Auditing and Reviewing Linux 595 Conducting compliance reviews 595 Conducting security reviews 596 Summary 596 Exercises 597 Chapter 23: Understanding Advanced Linux Security 599 Implementing Linux Security with Cryptography 599 Understanding hashing 600 Understanding encryption/decryption 602 Implementing Linux cryptography 610 Implementing Linux Security with PAM 618 Understanding the PAM authentication process 619 Administering PAM on your Linux system 622 Obtaining more information on PAM 633 Summary 633 Exercises 633 Chapter 24: Enhancing Linux Security with SELinux 635 Understanding SELinux Benefits 635 Understanding How SELinux Works 637 Understanding Type Enforcement 637 Understanding Multi-Level Security 638 Implementing SELinux security models 639 Configuring SELinux 645 Setting the SELinux mode 645 Setting the SELinux policy type 647 Managing SELinux security contexts 648 Managing SELinux policy rule packages 651 Managing SELinux via Booleans 653 Monitoring and Troubleshooting SELinux 654 Understanding SELinux logging 654 Troubleshooting SELinux logging 656 Troubleshooting common SELinux problems 657 Putting It All Together 659 Obtaining More Information on SELinux 659 Summary 660 Exercises 660 Chapter 25: Securing Linux on a Network 663 Auditing Network Services 663 Evaluating access to network services with nmap 665 Using nmap to audit your network services advertisements 668 Working with Firewalls 672 Understanding firewalls 673 Implementing firewalls 674 Summary 688 Exercises 688 Part VI: Engaging with Cloud Computing 691 Chapter 26: Shifting to Clouds and Containers 693 Understanding Linux Containers 694 Namespaces 695 Container registries 695 Base images and layers 696 Starting with Linux Containers 697 Pulling and running containers 697 Starting and stopping containers 701 Building a container image 702 Tagging and pushing an image to a registry 705 Using containers in the enterprise 706 Summary 706 Exercises 707 Chapter 27: Using Linux for Cloud Computing 709 Overview of Linux and Cloud Computing 710 Trying Basic Cloud Technology 713 Setting Up a Small Cloud 714 Configuring hypervisors 715 Configuring storage 718 Creating virtual machines 720 Managing virtual machines 724 Migrating virtual machines 725 Summary 727 Exercises 727 Chapter 28: Deploying Linux to the Cloud 729 Getting Linux to Run in a Cloud 729 Creating Linux Images for Clouds 731 Configuring and running a cloud-init cloud instance 731 Investigating the cloud instance 733 Cloning the cloud instance 734 Using cloud-init in enterprise computing 738 Using OpenStack to Deploy Cloud Images 739 Starting from the OpenStack Dashboard 739 Using Amazon EC2 to Deploy Cloud Images 744 Summary 746 Exercises 746 Chapter 29: Automating Apps and Infrastructure with Ansible 749 Understanding Ansible 750 Exploring Ansible Components 751 Inventories 751 Playbooks 752 Stepping Through an Ansible Deployment 753 Installing Ansible 756 Running Ad-Hoc Ansible Commands 760 Automating Tasks with Ansible Tower Automation Framework 762 Summary 763 Exercises 763 Chapter 30: Deploying Applications as Containers with Kubernetes 765 Understanding Kubernetes 766 Kubernetes masters 766 Kubernetes workers 767 Kubernetes applications 767 Kubernetes interfaces 768 Trying Kubernetes 768 Getting Kubernetes 769 Running the Kubernetes Basics tutorial 771 Enterprise-Quality Kubernetes with OpenShift 782 Summary 783 Exercises 783 Part VII: Appendixes 785 Appendix A: Media 787 Appendix B: Exercise Answers 797 Index 863
£45.00
John Wiley & Sons Inc LPIC1 Linux Professional Institute Certification
Book SynopsisThe bestselling study guide for the popular Linux Professional Institute Certification Level 1 (LPIC-1). The updated fifth edition of LPIC-1: Linux Professional Institute Certification Study Guide is a comprehensive, one-volume resource that covers 100% of all exam objectives. Building on the proven Sybex Study Guide approach, this essential resource offers a comprehensive suite of study and learning tools such as assessment tests, hands-on exercises, chapter review questions, and practical, real-world examples. This book, completely updated to reflect the latest 101-500 and 102-500 exams, contains clear, concise, and user-friendly information on all of the Linux administration topics you will encounter on test day. Key exam topics include system architecture, Linux installation and package management, GNU and UNIX commands, user interfaces and desktops, essential system services, network and server security, and many more. Linux Servers currently have a Table of ContentsIntroduction xxi Assessment Test xxxix Part I Exam 101-500 1 Chapter 1 Exploring Linux Command-Line Tools 3 Understanding Command-Line Basics 4 Discussing Distributions 4 Reaching a Shell 5 Exploring Your Linux Shell Options 5 Using a Shell 7 Using Environment Variables 11 Getting Help 17 Editing Text Files 20 Looking at Text Editors 20 Understanding vim Modes 24 Exploring Basic Text-Editing Procedures 24 Saving Changes 27 Processing Text Using Filters 28 File-Combining Commands 28 File-Transforming Commands 31 File-Formatting Commands 33 File-Viewing Commands 36 File-Summarizing Commands 40 Using Regular Expressions 45 Using grep 45 Understanding Basic Regular Expressions 47 Understanding Extended Regular Expressions 50 Using Streams, Redirection, and Pipes 50 Redirecting Input and Output 51 Piping Data between Programs 55 Using sed 56 Generating Command Lines 60 Summary 61 Exam Essentials 61 Review Questions 62 Chapter 2 Managing Software and Processes 67 Looking at Package Concepts 68 Using RPM 69 RPM Distributions and Conventions 69 The rpm Command Set 71 Extracting Data from RPMs 77 Using YUM 78 Using ZYpp 83 Using Debian Packages 86 Debian Package File Conventions 87 The dpkg Command Set 87 Looking at the APT Suite 92 Using apt-cache 93 Using apt-get 94 Reconfiguring Packages 97 Managing Shared Libraries 98 Library Principles 98 Locating Library Files 99 Loading Dynamically 100 Library Management Commands 100 Managing Processes 102 Examining Process Lists 102 Employing Multiple Screens 109 Understanding Foreground and Background Processes 116 Managing Process Priorities 120 Sending Signals to Processes 121 Summary 126 Exam Essentials 127 Review Questions 129 Chapter 3 Configuring Hardware 133 Configuring the Firmware and Core Hardware 134 Understanding the Role of Firmware 134 Device Interfaces 136 The /dev Directory 138 The /proc Directory 139 The /sys Directory 143 Working with Devices 144 Hardware Modules 148 Storage Basics 154 Types of Drives 154 Drive Partitions 155 Automatic Drive Detection 155 Storage Alternatives 156 Multipath 156 Logical Volume Manager 157 Using RAID Technology 158 Partitioning Tools 158 Working with fdisk 158 Working with gdisk 161 The GNU parted Command 162 Graphical Tools 163 Understanding Filesystems 164 The Virtual Directory 164 Maneuvering Around the Filesystem 166 Formatting Filesystems 167 Common Filesystem Types 167 Creating Filesystems 169 Mounting Filesystems 170 Manually Mounting Devices 170 Automatically Mounting Devices 172 Managing Filesystems 173 Retrieving Filesystem Stats 173 Filesystem Tools 173 Summary 174 Exam Essentials 175 Review Questions 177 Chapter 4 Managing Files 181 Using File Management Commands 182 Naming and Listing Files 182 Exploring Wildcard Expansion Rules 186 Understanding the File Commands 189 Compressing File Commands 199 Archiving File Commands 202 Managing Links 213 Managing File Ownership 218 Assessing File Ownership 219 Changing a File’s Owner 219 Changing a File’s Group 220 Controlling Access to Files 221 Understanding Permissions 221 Changing a File’s Mode 223 Setting the Default Mode 226 Changing Special Access Modes 228 Locating Files 229 Getting to Know the FHS 229 Employing Tools to Locate Files 231 Summary 239 Exam Essentials 239 Review Questions 241 Chapter 5 Booting, Initializing, and Virtualizing Linux 245 Understanding the Boot Process 246 The Boot Process 246 Extracting Information about the Boot Process 247 Looking at Firmware 249 The BIOS Startup 249 The UEFI Startup 250 Looking at Boot Loaders 251 Boot Loader Principles 251 Using GRUB Legacy as the Boot Loader 251 Using GRUB 2 as the Boot Loader 255 Adding Kernel Boot Parameters 259 Using Alternative Boot Loaders 260 The Initialization Process 261 Using the systemd Initialization Process 262 Exploring Unit Files 263 Focusing on Service Unit Files 265 Focusing on Target Unit Files 268 Looking at systemctl 270 Examining Special systemd Commands 273 Using the SysV Initialization Process 276 Understanding Runlevels 277 Investigating SysVinit Commands 280 Stopping the System 283 Notifying the Users 284 Virtualizing Linux 286 Looking at Virtual Machines 287 Understanding Containers 291 Looking at Infrastructure as a Service 293 Summary 295 Exam Essentials 295 Review Questions 298 Part II Exam 102-500 303 Chapter 6 Configuring the GUI, Localization, and Printing 305 Understanding the GUI 306 Understanding the X11 Architecture 307 Examining X.Org 308 Figuring Out Wayland 309 Managing the GUI 311 Standard GUI Features 311 The X GUI Login System 313 Common Linux Desktop Environments 314 Providing Accessibility 323 Using X11 for Remote Access 325 Remote X11 Connections 326 Tunneling your X11 Connection 326 Using Remote Desktop Software 328 Viewing VNC 328 Grasping Xrdp 330 Exploring NX 332 Studying SPICE 332 Understanding Localization 333 Character Sets 333 Environment Variables 334 Setting Your Locale 335 Installation Locale Decisions 335 Changing Your Locale 336 Looking at Time 338 Working with Time Zones 338 Setting the Time and Date 339 Configuring Printing 343 Summary 345 Exam Essentials 346 Review Questions 348 Chapter 7 Administering the System 353 Managing Users and Groups 354 Understanding Users and Groups 354 Configuring User Accounts 355 Configuring Groups 371 Managing Email 375 Understanding Email 375 Choosing Email Software 376 Working with Email 377 Using Log and Journal Files 384 Examining the syslog Protocol 385 Viewing the History of Linux Logging 387 Logging Basics Using rsyslogd 387 Journaling with systemd-journaldd 394 Maintaining the System Time 403 Understanding Linux Time Concepts 403 Viewing and Setting Time 404 Understanding the Network Time Protocol 408 Using the NTP Daemon 411 Using the chrony Daemon 413 Summary 416 Exam Essentials 416 Review Questions 419 Chapter 8 Configuring Basic Networking 423 Networking Basics 424 The Physical Layer 424 The Network Layer 426 The Transport Layer 430 The Application Layer 431 Configuring Network Features 433 Network Configuration Files 433 Graphical Tools 436 Command-Line Tools 438 Getting Network Settings Automatically 445 Bonding Network Cards 445 Basic Network Troubleshooting 447 Sending Test Packets 447 Tracing Routes 448 Finding Host Information 449 Advanced Network Troubleshooting 452 The netstat Command 452 Examining Sockets 455 The netcat Utility 456 Summary 457 Exam Essentials 458 Review Questions 460 Chapter 9 Writing Scripts 465 Shell Variables 466 Global Environment Variables 466 Local Environment Variables 468 Setting Local Environment Variables 470 Setting Global Environment Variables 472 Locating System Environment Variables 472 Using Command Aliases 474 The Basics of Shell Scripting 475 Running Multiple Commands 475 Redirecting Output 476 Piping Data 477 The Shell Script Format 478 Running the Shell Script 479 Advanced Shell Scripting 481 Displaying Messages 481 Using Variables in Scripts 482 Command-Line Arguments 484 Getting User Input 484 The Exit Status 488 Writing Script Programs 489 Command Substitution 489 Performing Math 490 Logic Statements 492 Loops 496 Functions 498 Running Scripts in Background Mode 500 Running in the Background 501 Running Multiple Background Jobs 502 Running Scripts Without a Console 503 Sending Signals 504 Interrupting a Process 504 Pausing a Process 504 Job Control 506 Viewing Jobs 506 Restarting Stopped Jobs 508 Running Like Clockwork 509 Scheduling a Job Using the at Command 509 Scheduling Regular Scripts 513 Summary 515 Exam Essentials 516 Review Questions 518 Chapter 10 Securing Your System 523 Administering Network Security 524 Disabling Unused Services 524 Using Super Server Restrictions 534 Restricting via TCP Wrappers 538 Administering Local Security 539 Securing Passwords 539 Limiting root Access 543 Auditing User Access 547 Setting Login, Process, and Memory Limits 549 Locating SUID/SGID Files 551 Exploring Cryptography Concepts 553 Discovering Key Concepts 553 Securing Data 554 Signing Transmissions 555 Looking at SSH 555 Exploring Basic SSH Concepts 555 Configuring SSH 558 Generating SSH Keys 560 Authenticating with SSH Keys 561 Authenticating with the Authentication Agent 564 Tunneling 565 Using SSH Securely 567 Using GPG 567 Generating Keys 568 Importing Keys 569 Encrypting and Decrypting Data 570 Signing Messages and Verifying Signatures 571 Revoking a Key 573 Summary 574 Exam Essentials 575 Review Questions 577 Appendix Answers to Review Questions 583 Chapter 1: Exploring Linux Command-Line Tools 584 Chapter 2: Managing Software and Processes 587 Chapter 3: Configuring Hardware 590 Chapter 4: Managing Files 593 Chapter 5: Booting, Initializing, and Virtualizing Linux 597 Chapter 6: Configuring the GUI, Localization, and Printing 601 Chapter 7: Administering the System 605 Chapter 8: Configuring Basic Networking 608 Chapter 9: Writing Scripts 611 Chapter 10: Securing Your System 615 Index 619
£37.50
McGraw-Hill Education CompTIA Linux Certification AllinOne Exam Guide
Book SynopsisThis comprehensive study guide delivers 100% coverage of every topic on the challenging CompTIA Linux+ examGet complete coverage of all the objectives included on CompTIA Linux+ exam XK0-005 from this up-to-date resource. Written by Linux experts and technology trainers, the book provides learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth answer explanations. Designed to help you pass this challenging exam, this definitive volume also serves as an essential on-the-job reference.Covers all exam topics, including how to: Use the vi text editor Work with the Linux shell Manage Linux users, groups, files, and directories Administer ownership, permissions, and quotas Install Linux and manage the boot process Perform container operations and version control with Git Manage software and hardware Write shell scripts Manage network settings and s
£37.49
Cengage Learning, Inc CompTIA Linux Guide to Linux Certification
Book SynopsisEquip yourself with the most up-to-date information to pass CompTIA''s Linux?+ (Powered by LPI) Certification exam successfully and excel when using Linux? in today?s business world with Eckert?s LINUX?+ GUIDE TO LINUX? CERTIFICATION, 4E. This complete guide provides the solid conceptual foundation and mastery of hands-on skills necessary to work with the Linux? operation system in today?s network administration environment. You?ll find a focus on quality throughout with an emphasis on preparing you for valuable real-world experiences. This edition?s comprehensive coverage presents updated information on the latest Linux? distributions as well as storage technologies commonly used in server environments, such as LVM and ZFS. New, expanded material addresses key job-related networking services, including FTP, NFS, Samba, Apache, DNS, DHCP, NTP, Squid, Postfix, SSH, VNC, Postgresql, and iptables/firewalld. You study the latest information on current and emerging security practices and te
£75.99
O'Reilly Media Linux System Programming
Book SynopsisWrite software that draws directly on services offered by the Linux kernel and core system libraries. With this comprehensive book, Linux kernel contributor Robert Love provides you with a tutorial on Linux system programming, a reference manual on Linux system calls, and an insider's guide to writing smarter, faster code.
£41.99
O'Reilly Media Learning Kali Linux
Book SynopsisThis practical book covers Kali’s expansive security capabilities and helps you identify the tools you need to conduct a wide range of security tests and penetration tests. You’ll also explore the vulnerabilities that make those tests necessary.
£47.99
O'Reilly Media Linux Observability with BPF
Book SynopsisBuild your expertise in the BPF virtual machine in the Linux kernel with this practical guide for systems engineers. You'll not only dive into the BPF program lifecycle but also learn to write applications that observe and modify the kernel's behavior; inject code to monitor, trace, and securely observe events in the kernel; and more.
£33.74
O'Reilly Media bash Idioms
Book SynopsisWith this practical book, you'll learn how to decipher old bash code and write new code that's as clear and readable as possible.
£38.39
MC Press, LLC DB2 9.7 for Linux, UNIX, and Windows Database
Book SynopsisThe relational database-management system DB2 9.7 is given detailed and comprehensive treatment in this exam-preparation resource. Compiled from presentation material used in the popular “Crammer Course” at the IBM Information On Demand Conference, everything required for certification is presented here, including server management, design, business rules implementation, activity monitoring, security, and networking. An essential resource, this guide is helpful when studying to pass the official DB2 9.7 for LUW DBA certification exam.
£19.95
No Starch Press,US Your Linux Toolbox: A Zine Boxset
Book SynopsisEver wished you could spy on your computer with a handy incantation or bewitch your programs to debug themselves - now you can by becoming a Linux wizard! Okay, reading these zines won't actually make you a wizard, but you'll sure feel like one after you learn some neat Linux tricks. With this collected edition of Julia Evans's wildly popular Linux zines, you'll view programming in a way you never have before - now on fancier paper!Trade Review"This is a fantastic way to teach young ones about linux and the command line and I also found it great to learn from myself. Really nicely made and illustrated and would highly recommend!"—Tobias F, The Pi Hut Reviewer"A rich, illustrated book about the multiple Linux utilities . . . Excellent guidance for any technical person."—Senthil Kumaran, GoodReads Librarian"Exquisite reference zine, a perfect tool to begin your learning experience with. The graphics are super cute, but also brilliantly descriptive and insightful. These are a must have for anyone new to Linux, or who has to use one occasionally for work. A+ product!"–Joanna White, Amazon ReviewerTable of ContentsSo You Want to Be a WizardBite-Size Linux!Networking, ACK!Let's Learn tcpdump!Linux Debugging Tools You'll LoveSpying on Your Programs with straceProfiling & Tracing with perf
£23.19
Fultus Corporation Introduction to Linux (Second Edition)
Book Synopsis
£24.75
WWW.Snowballpublishing.com Cathedral and the Bazaar
£6.99
Manning Publications Docker in Action
Book SynopsisThe idea behind Docker is simple. Create a tiny virtual environment called a container that holds just your application and its dependencies. The Docker engine uses the host operating system to keep track of your containers. Applications running inside containers share resources, making their footprints small. They are easy to install, manage, and remove. Docker in Action, Second Edition teaches you to create, deploy, and manage applications hosted in Docker containers running on Linux. Fully updated, with four new chapters and revised best practices and examples, this second edition begins with a clear explanation of the Docker model. Then, you go hands-on with packaging applications, testing, installing, running programs securely, and deploying them across a cluster of hosts. With examples showing how Docker benefits the whole dev lifecycle, you'll discover techniques for everything from dev-and-test machines to full-scale cloud deployments.Trade Review'Jeff and Stephen took their battle-hardened experience and updated this already great book with new details and examples.' Bret Fisher, Docker Captain and Container Consultant 'Strikes the perfect balance between instructional manual and reference book. Ideal for everyone from beginner to seasoned pro.' Paul G. Brown, Diversified Services Network 'A must-have for those looking to level-up their organization's software and infrastructure virtualization.' Chris Phillips, Dell 'An excellent and detailed resource. Useful for developers, IT admins, and dev-ops engineers.' Ethan Rivett, PowerleyTable of Contentstable of contents READ IN LIVEBOOK 1WELCOME TO DOCKER 1.1What is Docker? 1.1.1“Hello, World” 1.1.2Containers 1.1.3Containers are not virtualization 1.1.4Running software in containers for isolation 1.1.5Shipping containers 1.2What problems does Docker solve? 1.2.1Getting organized 1.2.2Improving portability 1.2.3Protecting your computer 1.3Why is Docker important? 1.4Where and when to use Docker 1.5Docker in the Larger Ecosystem 1.6Getting help with the Docker command line Summary PART 1: PROCESS ISOLATION AND ENVIRONMENT-INDEPENDENT COMPUTING READ IN LIVEBOOK 2RUNNING SOFTWARE IN CONTAINERS READ IN LIVEBOOK 3SOFTWARE INSTALLATION SIMPLIFIED READ IN LIVEBOOK 4WORKING WITH STORAGE AND VOLUMES READ IN LIVEBOOK 5SINGLE-HOST NETWORKING READ IN LIVEBOOK 6LIMITING RISK WITH RESOURCE CONTROLS PART 2: PACKAGING SOFTWARE FOR DISTRIBUTION READ IN LIVEBOOK 7PACKAGING SOFTWARE IN IMAGES READ IN LIVEBOOK 8BUILDING IMAGES AUTOMATICALLY WITH DOCKERFILES READ IN LIVEBOOK 9PUBLIC AND PRIVATE SOFTWARE DISTRIBUTION READ IN LIVEBOOK 10IMAGE PIPELINES PART 3: HIGHER-LEVEL ABSTRACTIONS AND ORCHESTRATION READ IN LIVEBOOK 11SERVICES WITH DOCKER AND COMPOSE READ IN LIVEBOOK 12FIRST-CLASS CONFIGURATION ABSTRACTIONS READ IN LIVEBOOK 13ORCHESTRATING SERVICES ON A CLUSTER OF DOCKER HOSTS WITH SWARM
£27.89