Linux Books

36 products


  • Learn PowerShell in a Month of Lunches: Covers

    Manning Publications Learn PowerShell in a Month of Lunches: Covers

    15 in stock

    Book Synopsis"Not only for MacOS and Linux users, but also a great resource for Windows PS users." - Bruce Bergman Learn PowerShell in a Month of Lunches: Covers Windows, Linux, and macOS is a task-focused tutorial for administering Linux and macOS systems using Microsoft PowerShell. Adapted by PowerShell team members Travis Plunk and Tyler Leonhardt from the bestselling Learn Windows PowerShell in a Month of Lunches by community legends Don Jones and Jeffrey Hicks, it features Linux-based examples covering core language features and admin tasks. Designed for busy IT professionals, this innovative guide will take you from the basics to PowerShell proficiency through 25 tutorials you can do in your lunch break. about the technologyThe PowerShell scripting language and administrative shell was initially created for Windows, providing a high-quality command-line interface and awesome automation features. As part of Microsoft's ongoing strategy to support non-Windows platforms with its Azure cloud service and .NET Core framework, PowerShell now runs on Linux and macOS. Like Bash, PowerShell can execute and script nearly any aspect of Linux, so you can easily manage repetitive daily tasks, servers, Cloud resources, Continuous Integration pipelines, and more. Because PowerShell is a full-featured programming language, however, it provides capability well beyond traditional shell scripting languages, such as the ability to treat OS components as objects. about the bookLearn PowerShell in a Month of Lunches: Covers Windows, Linux, and macOS is a user-friendly tutorial to managing Linux and macOS systems with PowerShell. It's based on the bestselling Learn Windows PowerShell in a Month of Lunches, which has introduced PowerShell to nearly 100,000 readers. You'll learn how PowerShell shapes up to Bash or Python scripting as you write and run simple scripts that automate boring daily tasks. As you progress through the book, you'll use PowerShell to write Continuous Integration Pipelines and manage cloud-based servers. Just set aside one hour a day for a month, and you'll be automating tasks faster than you ever thought possible! what's inside- Why you should use PowerShell on Linux and macOS- Background jobs and automation techniques- Simple scripting to automate repetitive daily tasks- Common syntax and commands cheat sheet- Each lesson takes you an hour or less about the readerFor IT professionals comfortable administering Windows or Linux. No previous experience with PowerShell or Bash required. about the authorTravis Plunk has been a Software Engineer on various PowerShell teams since 2013, and at Microsoft since 1999. He was involved in open sourcing PowerShell and has worked on the project full time since shortly after the project was announced. James Petty is a Microsoft MVP, and the CEO and Executive Director for the DevOps Collective and PowerShell.org. Tyler Leonhardt has been a Software Engineer on the PowerShell team since 2017, and at Microsoft since 2016. He is a core maintainer of the PowerShell extension for Visual Studio Code. Learn Windows PowerShell in a Month of Lunches was written by PowerShell community legends Don Jones and Jeffrey Hicks, who have years of experience as successful PowerShell trainers.Trade Review“Notonly for MacOS and Linux users, but also a great resource for Windows PS users.” Bruce Bergman “Gives developers a lot of insight on how PowerShell works and how to accomplish everyday tasks.” Marcel van den Brink “This book enabled me to quickly get using PowerShell for real-lifetasks.” Rick Michaels “The book is great, especially if you have no previous experience with PowerShell, tasks automation, or DevOps.” Max Almonte “Approaches PowerShell from a building block like perspective.” FosterHaines “Unlike other PowerShell type books, this book expands beyond just Windows environments to accommodate those on Mac or Linux platforms who may want to explore this area as well.” James Matlock

    15 in stock

    £28.79

  • Python Distilled

    Pearson Education (US) Python Distilled

    15 in stock

    Book SynopsisDavid Beazley is the author of the Python Essential Reference, Fourth Edition (Addison-Wesley), and Python Cookbook, Third Edition (O'Reilly Media). He currently teaches advanced computer science courses through his company, Dabeaz LLC (www.dabeaz.com). He's been using, writing about, speaking about, and teaching Python since 1996.Table of ContentsPreface xiiiChapter 1: Python Basics 11.1 Running Python 11.2 Python Programs 21.3 Primitives, Variables, and Expressions 31.4 Arithmetic Operators 51.5 Conditionals and Control Flow 71.6 Text Strings 91.7 File Input and Output 121.8 Lists 131.9 Tuples 151.10 Sets 171.11 Dictionaries 181.12 Iteration and Looping 211.13 Functions 221.14 Exceptions 241.15 Program Termination 261.16 Objects and Classes 261.17 Modules 301.18 Script Writing 321.19 Packages 331.20 Structuring an Application 341.21 Managing Third-Party Packages 351.22 Python: It Fits Your Brain 36Chapter 2: Operators, Expressions, and Data Manipulation 372.1 Literals 372.2 Expressions and Locations 382.3 Standard Operators 392.4 In-Place Assignment 412.5 Object Comparison 422.6 Ordered Comparison Operators 422.7 Boolean Expressions and Truth Values 432.8 Conditional Expressions 442.9 Operations Involving Iterables 452.10 Operations on Sequences 472.11 Operations on Mutable Sequences 492.12 Operations on Sets 502.13 Operations on Mappings 512.14 List, Set, and Dictionary Comprehensions 522.15 Generator Expressions 542.16 The Attribute (.) Operator 562.17 The Function Call () Operator 562.18 Order of Evaluation 562.19 Final Words: The Secret Life of Data 58Chapter 3: Program Structure and Control Flow 593.1 Program Structure and Execution 593.2 Conditional Execution 593.3 Loops and Iteration 603.4 Exceptions 643.5 Context Managers and the with Statement 753.6 Assertions and __debug__ 773.7 Final Words 78Chapter 4: Objects, Types, and Protocols 794.1 Essential Concepts 794.2 Object Identity and Type 804.3 Reference Counting and Garbage Collection 814.4 References and Copies 834.5 Object Representation and Printing 844.6 First-Class Objects 854.7 Using None for Optional or Missing Data 874.8 Object Protocols and Data Abstraction 874.9 Object Protocol 894.10 Number Protocol 904.11 Comparison Protocol 924.12 Conversion Protocols 944.13 Container Protocol 954.14 Iteration Protocol 974.15 Attribute Protocol 984.16 Function Protocol 984.17 Context Manager Protocol 994.18 Final Words: On Being Pythonic 99Chapter 5: Functions 1015.1 Function Definitions 1015.2 Default Arguments 1015.3 Variadic Arguments 1025.4 Keyword Arguments 1035.5 Variadic Keyword Arguments 1045.6 Functions Accepting All Inputs 1045.7 Positional-Only Arguments 1055.8 Names, Documentation Strings, and Type Hints 1065.9 Function Application and Parameter Passing 1075.10 Return Values 1095.11 Error Handling 1105.12 Scoping Rules 1115.13 Recursion 1145.14 The lambda Expression 1145.15 Higher-Order Functions 1155.16 Argument Passing in Callback Functions 1185.17 Returning Results from Callbacks 1215.18 Decorators 1245.19 Map, Filter, and Reduce 1275.20 Function Introspection, Attributes, and Signatures 1295.21 Environment Inspection 1315.22 Dynamic Code Execution and Creation 1335.23 Asynchronous Functions and await 1355.24 Final Words: Thoughts on Functions and Composition 137Chapter 6: Generators 1396.1 Generators and yield 1396.2 Restartable Generators 1426.3 Generator Delegation 1426.4 Using Generators in Practice 1446.5 Enhanced Generators and yield Expressions 1466.6 Applications of Enhanced Generators 1486.7 Generators and the Bridge to Awaiting 1516.8 Final Words: A Brief History of Generators and Looking Forward 152Chapter 7: Classes and Object-Oriented Programming 1537.1 Objects 1537.2 The class Statement 1547.3 Instances 1557.4 Attribute Access 1567.5 Scoping Rules 1587.6 Operator Overloading and Protocols 1597.7 Inheritance 1607.8 Avoiding Inheritance via Composition 1637.9 Avoiding Inheritance via Functions 1667.10 Dynamic Binding and Duck Typing 1677.11 The Danger of Inheriting from Built-in Types 1677.12 Class Variables and Methods 1697.13 Static Methods 1737.14 A Word about Design Patterns 1767.15 Data Encapsulation and Private Attributes 1767.16 Type Hinting 1797.17 Properties 1807.18 Types, Interfaces, and Abstract Base Classes 1837.19 Multiple Inheritance, Interfaces, and Mixins 1877.20 Type-Based Dispatch 1937.21 Class Decorators 1947.22 Supervised Inheritance 1977.23 The Object Life Cycle and Memory Management 1997.24 Weak References 2047.25 Internal Object Representation and Attribute Binding 2067.26 Proxies, Wrappers, and Delegation 2087.27 Reducing Memory Use with __slots__ 2107.28 Descriptors 2117.29 Class Definition Process 2157.30 Dynamic Class Creation 2167.31 Metaclasses 2177.32 Built-in Objects for Instances and Classes 2227.33 Final Words: Keep It Simple 223Chapter 8: Modules and Packages 2258.1 Modules and the import Statement 2258.2 Module Caching 2278.3 Importing Selected Names from a Module 2288.4 Circular Imports 2308.5 Module Reloading and Unloading 2328.6 Module Compilation 2338.7 The Module Search Path 2348.8 Execution as the Main Program 2348.9 Packages 2358.10 Imports Within a Package 2378.11 Running a Package Submodule as a Script 2388.12 Controlling the Package Namespace 2398.13 Controlling Package Exports 2408.14 Package Data 2418.15 Module Objects 2428.16 Deploying Python Packages 2438.17 The Penultimate Word: Start with a Package 2448.18 The Final Word: Keep It Simple 245Chapter 9: Input and Output 2479.1 Data Representation 2479.2 Text Encoding and Decoding 2489.3 Text and Byte Formatting 2509.4 Reading Command-Line Options 2549.5 Environment Variables 2569.6 Files and File Objects 2569.7 I/O Abstraction Layers 2609.8 Standard Input, Output, and Error 2639.9 Directories 2649.10 The print() function 2659.11 Generating Output 2659.12 Consuming Input 2669.13 Object Serialization 2689.14 Blocking Operations and Concurrency 2699.15 Standard Library Modules 2739.16 Final Words 296Chapter 10: Built-in Functions and Standard Library 29710.1 Built-in Functions 29710.2 Built-in Exceptions 31410.3 Standard Library 31810.4 Final Words: Use the Built-Ins 320Index 321

    15 in stock

    £34.19

  • Linux AllInOne For Dummies

    John Wiley & Sons Inc Linux AllInOne For Dummies

    15 in stock

    Book SynopsisTable of ContentsIntroduction 1 About This Book 1 Foolish Assumptions 2 Icons Used in This Book 3 Beyond the Book 4 Where to Go from Here 4 Book 1: Getting Started with Linux 5 Chapter 1: Introducing Linux 7 What Is Linux? 7 The Linux kernel 8 GNU utilities 11 Linux user interfaces 12 Linux Distributions: Why So Many? 16 Core Linux distributions 17 Specialized Linux distributions 18 Chapter 2: Installing Linux 21 Dual-Booting with Linux and Microsoft Windows 23 Installing a second hard drive 24 Partitioning an existing drive 24 Partitioning using Windows tools 25 Partitioning using Linux tools 26 Finally, Finally, Before You Get Started 27 Disabling the secure boot feature 27 Creating a boot disk 28 Installing Ubuntu 30 Your First Ubuntu Boot 36 Chapter 3: Living in a Virtual World 39 What Are Virtual Servers? 39 Installing VirtualBox 40 Creating a Linux Virtual Machine 42 Installing Linux on a Virtual Machine 45 Changing settings 45 Loading the operating system 47 Working with the sandbox 50 Chapter 4: Trying Out Linux 53 Starting Linux 53 Playing with the Shell 56 Starting the bash shell 56 Understanding shell commands 58 Trying a few Linux commands 58 Shutting Down 60 Chapter 5: Troubleshooting and Customizing Linux 63 Using Text Mode Installation 64 Lookin’ for Trouble 64 Using the kernel ring buffer 65 Using log files 66 Using the journal 67 Resolving Other Installation Problems 68 Using KNOPPIX boot commands 68 Handling the fatal signal 11 error 71 Getting around the PC reboot problem 71 Using Linux kernel boot options 71 Setting Up Printers 74 Managing DVDs, CD-ROMs, and Flash Drives 76 Updating the Operating System 77 Updating Ubuntu 77 Updating openSUSE 78 Installing New Software 79 Adding applications 80 Adding packages 81 Book 2: Linux Desktops 85 Chapter 1: The GNOME Desktop 87 Looking at the History of GNOME 87 Breaking Down the GNOME Desktop 88 Menu, please! 88 The desktop 90 Exploring the Activities Overview 91 Customizing Your Ride 92 Chapter 2: The KDE Plasma Desktop 93 The KDE Plasma Desktop 93 The Application launcher 95 The panel 96 The desktop 96 Using Widgets 98 Adding widgets 98 Getting more widgets 99 Plasma System Settings 99 Desktop Settings 100 Chapter 3: Other Popular Desktops 103 Spicing Things Up with Cinnamon 103 Reviewing the history of Cinnamon 104 Looking at the menu 105 Changing settings 105 Adding more spice 106 Working with MATE 107 The history of MATE 107 Looking at the menu 109 Changing desktop settings 109 Applets 110 The Xfce Desktop Interface 111 The history of Xfce 111 The Whisker menu 112 Changing Xfce settings 113 Applets 113 Chapter 4: Linux Desktop Applications 115 The LibreOffice Suite 115 Browsing the Web with Firefox 117 Configuring Firefox 117 Communicating with Email 119 Evolving into email 120 Working with KMail 121 The amazing Thunderbird 123 Listening to Audio 124 Listening to downloaded music 127 Viewing Movie Files 129 Creating and Modifying Graphics 130 Chapter 5: The Linux File System 133 Pieces of the Puzzle 133 Touring the Linux File System 134 The root of the tree 134 Where removable media lives 136 Managing Your File System without a Net (or Mouse) 136 Viewing information about files on the command line 136 Understanding file listing information 137 Comprehending file types 139 Navigating the file system in Linux 140 A Permissions Primer 141 Checking out the triplets 141 Beware of owners 143 Hanging out in groups 143 Clicking Your Way through the File System 144 Using files 145 Swimming with Dolphin 149 Don’t forget Xfce! 151 Finding Things 152 Chapter 6: Text Editors 155 Viewing the Contents of a Text File 155 Editing Text Files with nano 156 Going with gedit 157 Editing Text in the KDE Plasma Desktop 158 Writing with KWrite 159 Meet Kate 160 Text Editing with ed and vi 161 Using ed 162 Using vi 165 Book 3: Networking 171 Chapter 1: Connecting to the Internet 173 Understanding the Internet 174 Deciding How to Connect to the Internet 175 Connecting with DSL 176 How DSL works 176 DSL alphabet soup: ADSL, IDSL, SDSL 177 Typical DSL setup 179 Connecting with a Cable Modem 180 How a cable modem works 181 Typical cable modem setup 182 Chapter 2: Setting Up a Local Area Network 185 Understanding TCP/IP 185 IP addresses 187 Internet services and port numbers 189 Setting Up an Ethernet LAN 190 How Ethernet works 191 Ethernet cables 192 Configuring TCP/IP Networking 195 Connecting Your LAN to the Internet 196 Chapter 3: Going Wireless 199 Understanding Wireless Ethernet Networks 199 Understanding infrastructure and ad hoc modes 201 Understanding wireless security 201 Setting Up Wireless Hardware 203 Configuring the Wireless Access Point 204 Configuring Wireless Networks 205 Chapter 4: Managing the Network 207 Configuring Network Features 207 Manually editing network configuration files 208 Using a graphical tool 210 Using a command-line tool 212 Basic Network Troubleshooting 216 Advanced Network Troubleshooting 218 Book 4: Administration 223 Chapter 1: Working with the Shell 225 Opening Terminal Windows and Virtual Consoles 225 Using the Bash Shell 228 Understanding the syntax of shell commands 228 Working with files 230 Combining shell commands 231 Controlling command input and output 231 Going wild with asterisks and question marks 233 Discovering and Using Linux Commands 235 Becoming root (superuser) 240 Managing processes 241 Working with date and time 242 Processing files 243 Writing Shell Scripts 246 Chapter 2: Introducing Basic System Administration 249 Taking Stock of System Administration Tasks 250 Becoming root 251 Using the su - command 251 Using the sudo command 252 Understanding How Linux Boots 252 Understanding the SysVinit method 253 Understanding the Systemd method 259 Monitoring System Performance 264 Using the top utility 264 Using the uptime command 266 Using the vmstat utility 267 Checking disk performance and disk usage 267 Viewing System Information with the /proc File System 270 Understanding Linux Devices 273 Device files 274 Persistent device naming with udev 275 Managing Loadable Driver Modules 276 Loading and unloading modules 276 Understanding the /etc/modprobe.d files 277 Scheduling Jobs in Linux 278 Scheduling one-time jobs 278 Scheduling recurring jobs 281 Introducing Some GUI System Administration Tools 284 Chapter 3: Managing Users and Groups 287 Adding User Accounts 288 Managing user accounts by using a GUI user manager 288 Managing user accounts by using commands 290 Managing Groups 291 Exploring the User Environment 292 Changing User and Group Ownership of Files 295 Chapter 4: Managing File Systems 297 Exploring the Linux File System 297 Understanding the file-system hierarchy 298 Mounting a device on the file system 299 Examining the /etc/fstab file 303 Sharing Files with NFS 304 Installing NFS 305 Exporting a file system with NFS 306 Mounting an NFS file system 307 Accessing a DOS or Windows File System 308 Mounting a DOS or Windows disk partition 308 Mounting an NTFS partition 309 Book 5: Managing Linux Servers 311 Chapter 1: Hosting Internet Services 313 What Is a Linux Server? 313 Launching services 314 Listening for clients 316 Serving the Basics 318 Web services 319 Database services 320 Mail services 322 Serving Local Networks 324 File servers 325 Print servers 326 Network resource servers 326 Chapter 2: Managing a Web Server 331 Linux Web Servers 331 Apache 331 NGINX 333 The Apache Web Server 333 Installing an Apache server 333 Configuring an Apache server 336 The NGINX Server 344 Installing NGINX 344 Configuring NGINX 346 Chapter 3: Managing a Database Server 349 Using the MySQL/MariaDB Database 349 Installing MariaDB 350 Looking at the MariaDB command prompt 353 Using the mysql commands 356 Creating database objects 360 Using the PostgreSQL Database 363 Installing PostgreSQL 364 Looking at the PostgreSQL command interface 366 Creating PostgreSQL database objects 370 Chapter 4: Working with Samba and NFS 373 Sharing Files with NFS 373 Installing NFS 374 Exporting a file system with NFS 375 Mounting an NFS file system 378 Setting Up a Windows Server Using Samba 378 Installing Samba 380 Configuring Samba 382 Trying out Samba 383 Chapter 5: Managing Mail Servers 385 Working with sendmail 385 The sendmail configuration file 386 Syntax of the sendmail.cf file 391 Other sendmail files 393 The forward file 395 The sendmail alias file 395 Working with Postfix 396 A Mail-Delivery Test 398 Using the mail command 399 The mail-delivery mechanism 400 Book 6: Security 401 Chapter 1: Introducing Linux Security 403 Why Worry about Security? 404 Establishing a Security Framework 404 Determining business requirements for security 406 Performing risk analysis 406 Establishing a security policy 408 Implementing security solutions (mitigation) 409 Managing security 410 Securing Linux 410 Understanding the host-security issues 411 Understanding network-security issues 412 Delving Into Computer Security Terminology and Tools 413 Keeping Up with Security News and Updates 418 Chapter 2: Securing Linux 419 Securing Passwords 420 Shadow passwords 420 Pluggable authentication modules (PAMs) 421 Protecting Files and Directories 422 Viewing ownerships and permissions 423 Changing file ownerships 423 Changing file permissions 423 Setting default permission 424 Checking for set user ID permission 426 Encrypting and Signing Files with GnuPG 427 Understanding public key encryption 427 Understanding digital signatures 428 Using GPG 429 Monitoring System Security 433 Securing Internet Services 434 Turning off stand-alone services 434 Configuring the Internet super server 435 Configuring TCP wrapper security 436 Using Secure Shell for Remote Logins 437 Setting Up Simple Firewalls 439 Using NAT 442 Enabling packet filtering on your Linux system 443 Security Files to Be Aware Of 447 Chapter 3: Vulnerability Testing and Computer Security Audits 449 Understanding Security Audits 450 Nontechnical aspects of security audits 450 Technical aspects of security audits 451 Implementing a Security Test Methodology 452 Some common computer vulnerabilities 453 Host-security review 454 Network-security review 458 Vulnerability Testing Types 460 Exploring Security Testing Tools 461 Book 7: Scripting 465 Chapter 1: Introductory Shell Scripting 467 Trying Out Simple Shell Scripts 468 Exploring the Basics of Shell Scripting 469 Storing stuff 470 Calling shell functions 471 Controlling the flow 471 Exploring bash’s built-in commands 475 Chapter 2: Advanced Shell Scripting 479 Trying Out sed 479 Working with awk and sed 482 Step 1: Pull out the ISBN 483 Step 2: Calculate the 13th digit 484 Step 3: Add the 13th digit to the other 12 485 Step 4: Finish the process 485 Final Notes on Shell Scripting 486 Chapter 3: Programming in Linux 487 An Overview of Programming 488 Exploring the Software-Development Tools in Linux 489 GNU C and C++ compilers 490 The GNU make utility 493 The GNU debugger 502 Understanding the Implications of GNU Licenses 509 The GNU General Public License 510 The GNU Library General Public License 511 Book 8: Linux Certification 513 Chapter 1: Studying for the Linux Professional Institute Exams 515 Overview of LPI Certification Exams 515 Overview of the Linux Essentials Exam 516 Getting involved in the Linux community and finding a career in open source 517 Finding your way on a Linux system 518 The power of the command line 520 The Linux operating system 521 Security and file permissions 522 Overview of the Linux Professionals Exams 524 The LPIC-1 exams 524 The LPIC-2 exams 527 The LPIC-3 exams 528 Chapter 2: Studying for the CompTIA Linux+ Exam 529 Overview of the CompTIA Linux+ Exam 530 System Management 531 Security 532 Scripting, Containers, and Automation 533 Troubleshooting 533 Chapter 3: Other Linux Certifications 535 Vendor-Neutral Certifications 535 The Linux Foundation 535 The GIAC Certifications 536 Vendor-Specific Certifications 537 Index 539

    15 in stock

    £22.39

  • Linux+ and LPIC-1 Guide to Linux Certification

    Cengage Learning, Inc Linux+ and LPIC-1 Guide to Linux Certification

    7 in stock

    Book SynopsisEckert's LINUX+ and LPIC-1 GUIDE TO LINUX CERTIFICATION, 6th EDITION, empowers you with the knowledge and skills you need to succeed on CompTIA's Linux��+ (XKO-005) certification exam and the Linux Professional Institute LPIC-1 (101-500 and 102-500) certification exams, as well as in your information technology career. The book covers the latest Linux�� distributions, as well as virtualization, containerization, cloud orchestration and enterprise storage. Comprehensive coverage also addresses key job-related services and cloud technologies, including firewalls, FTP, NFS, Samba, Apache, DNS, DHCP, NTP, Postfix, PostgreSQL, SSH, VNC, RDP, Docker and Kubernetes. Appendices allow you to apply your Linux knowledge to macOS�� and FreeBSD��. Hands-on projects give you practice using the latest Fedora��� and Ubuntu�� Linux�� distributions and can be performed on either a Windows�� PC (Intel�� or ARM��) or macOS�� PC (Intel�� or Apple�� Silicon).Table of Contents1. Introduction to Linux��. 2. Linux�� Installation and Usage. 3. Exploring Linux�� Filesystems. 4. Linux�� Filesystem Management. 5. Linux�� Filesystem Administration. 6. Linux�� Server Deployment. 7. Working with the Shell. 8. System Initialization, X Windows, and Localization. 9. Managing Linux�� Processes. 10. Common Administrative Tasks. 11. Compression, System Backup, and Software Installation. 12. Network Configuration. 13. Configuring Network Services and Cloud Technologies. 14. Security, Troubleshooting, and Performance. Appendix A: Certification. Appendix B: Finding Linux Resources on the Internet. Appendix C: Applying Your Linux�� Knowledge to macOS��. Appendix D: Applying Your Linux�� Knowledge to FreeBSD��.

    7 in stock

    £72.99

  • Red Hat RHCE 8 EX294 Cert Guide

    Pearson Education (US) Red Hat RHCE 8 EX294 Cert Guide

    Book Synopsis

    £30.59

  • Embedded Linux Systems with the Yocto Project

    Pearson Education (US) Embedded Linux Systems with the Yocto Project

    2 in stock

    Book SynopsisRudolf J. Streif has more than twenty years of experience in software engineering as a developer and as a manager leading cross-functional engineering teams with more than one hundred members. He previously served as the Linux Foundation's Director of Embedded Solutions, coordinating the Foundation's efforts for Linux in embedded. Rudolf developed the Linux Foundation's training course on the Yocto Project, which he delivered multiple times to companies and in a crash course variant during Linux Foundation events. He lives in El Cajon, California.Table of ContentsForeword xv Preface xvii Acknowledgments xxi About the Author xxiii Chapter 1: Linux for Embedded Systems 1 1.1 Why Linux for Embedded Systems? 1 1.2 Embedded Linux Landscape 3 1.3 A Custom Linux Distribution–Why Is It Hard? 8 1.4 A Word about Open Source Licensing 9 1.5 Organizations, Relevant Bodies, and Standards 11 1.6 Summary 13 1.7 References 14 Chapter 2: The Yocto Project 15 2.1 Jumpstarting Your First Yocto Project Build 15 2.2 The Yocto Project Family 26 2.3 A Little Bit of History 28 2.4 Yocto Project Terms 31 2.5 Summary 33 2.6 References 34 Chapter 3: OpenEmbedded Build System 35 3.1 Building Open Source Software Packages 35 3.2 OpenEmbedded Workflow 39 3.3 OpenEmbedded Build System Architecture 45 3.4 Summary 56 3.5 References 57 Chapter 4: BitBake Build Engine 59 4.1 Obtaining and Installing BitBake 59 4.2 Running BitBake 61 4.3 BitBake Metadata 70 4.4 Metadata Syntax 71 4.5 Source Download 86 4.6 HelloWorld–BitBake Style 95 4.7 Dependency Handling 99 4.8 Version Selection 102 4.9 Variants 103 4.10 Default Metadata 103 4.11 Summary 107 4.12 References 108 Chapter 5: Troubleshooting 109 5.1 Logging 110 5.2 Task Execution 116 5.3 Analyzing Metadata 119 5.4 Development Shell 120 5.5 Dependency Graphs 121 5.6 Debugging Layers 122 5.7 Summary 124 Chapter 6: Linux System Architecture 127 6.1 Linux or GNU/Linux? 127 6.2 Anatomy of a Linux System 128 6.3 Bootloader 129 6.4 Kernel 134 6.5 User Space 141 6.6 Summary 143 6.7 References 144 Chapter 7: Building a Custom Linux Distribution 145 7.1 Core Images–Linux Distribution Blueprints 146 7.2 Building Images from Scratch 160 7.3 Image Options 161 7.4 Distribution Configuration 169 7.5 External Layers 181 7.6 Hob 181 7.7 Summary 184 Chapter 8: Software Package Recipes 185 8.1 Recipe Layout and Conventions 185 8.2 Writing a New Recipe 196 8.3 Recipe Examples 212 8.4 Devtool 218 8.5 Summary 224 8.6 References 224 Chapter 9: Kernel Recipes 225 9.1 Kernel Configuration 226 9.2 Kernel Patches 231 9.3 Kernel Recipes 233 9.4 Out-of-Tree Modules 251 9.5 Device Tree 257 9.6 Summary 258 9.7 References 259 Chapter 10: Board Support Packages 261 10.1 Yocto Project BSP Philosophy 261 10.2 Building with a BSP 265 10.3 Inside a Yocto Project BSP 277 10.4 Creating a Yocto Project BSP 282 10.5 Tuning 289 10.6 Creating Bootable Media Images 290 10.7 Summary 299 10.8 References 299 Chapter 11: Application Development 301 11.1 Inside a Yocto Project ADT 302 11.2 Setting Up a Yocto Project ADT 304 11.3 Building Applications 315 11.4 Eclipse Integration 317 11.5 Application Development Using an Emulated Target 331 11.6 Summary 333 11.7 References 334 Chapter 12: Licensing and Compliance 335 12.1 Managing Licenses 335 12.2 Managing Source Code 341 12.3 Summary 343 12.4 References 344 Chapter 13: Advanced Topics 345 13.1 Toaster 345 13.2 Build History 358 13.3 Source Mirrors 366 13.4 Autobuilder 368 13.5 Summary 374 13.6 References 375 Appendix A: Open Source Licenses 377 A.1 MIT License (MIT) 377 A.2 GNU General Public License (GPL) Version 2 378 A.3 GNU General Public License (GPL) Version 3 384 A.4 Apache License Version 2.0 397 Appendix B: Metadata Reference 403 Index 429

    2 in stock

    £33.29

  • Beginning Linux Programming 4th Edition

    John Wiley & Sons Inc Beginning Linux Programming 4th Edition

    15 in stock

    Book SynopsisBeginning Linux Programming, Fourth Edition continues its unique approach to teaching UNIX programming in a simple and structured way on the Linux platform. Through the use of detailed and realistic examples, students learn by doing, and are able to move from being a Linux beginner to creating custom applications in Linux. The book introduces fundamental concepts beginning with the basics of writing Unix programs in C, and including material on basic system calls, file I/O, interprocess communication (for getting programs to work together), and shell programming. Parallel to this, the book introduces the toolkits and libraries for working with user interfaces, from simpler terminal mode applications to X and GTK+ for graphical user interfaces. Advanced topics are covered in detail such as processes, pipes, semaphores, socket programming, using MySQL, writing applications for the GNOME or the KDE desktop, writing device drivers, POSIX Threads, and kernel programming for the latesTable of ContentsAcknowledgements x Foreword xxiii Introduction xxv Chapter 1: Getting Started 1 An Introduction to UNIX, Linux, and GNU 1 What Is UNIX? 1 What Is Linux? 3 The GNU Project and the Free Software Foundation 3 Linux Distributions 4 Programming Linux 4 Linux Programs 5 Text Editors 6 The C Compiler 7 Development System Roadmap 8 Getting Help 14 Summary 16 Chapter 2: Shell Programming 17 Why Program with a Shell? 18 A Bit of Philosophy 18 What Is a Shell? 19 Pipes and Redirection 21 Redirecting Output 21 Redirecting Input 22 Pipes 22 The Shell as a Programming Language 23 Interactive Programs 23 Creating a Script 24 Making a Script Executable 25 Shell Syntax 27 Variables 27 Conditions 31 Control Structures 34 Functions 46 Commands 49 Command Execution 68 Here Documents 73 Debugging Scripts 74 Going Graphical — The dialog Utility 75 Putting It All Together 81 Requirements 82 Design 82 Summary 91 Chapter 3: Working with Files 93 Linux File Structure 94 Directories 94 Files and Devices 95 System Calls and Device Drivers 96 Library Functions 97 Low-Level File Access 98 write 98 read 99 open 100 Initial Permissions 101 Other System Calls for Managing Files 106 The Standard I/O Library 109 fopen 110 fread 110 fwrite 111 fclose 111 fflush 111 fseek 112 fgetc, getc, and getchar 112 fputc, putc, and putchar 112 fgets and gets 113 Formatted Input and Output 113 printf, fprintf, and sprintf 113 scanf, fscanf, and sscanf 115 Other Stream Functions 117 Stream Errors 119 Streams and File Descriptors 119 File and Directory Maintenance 120 chmod 120 chown 120 unlink, link, and symlink 121 mkdir and rmdir 121 chdir and getcwd 122 Scanning Directories 122 opendir 123 readdir 123 telldir 123 seekdir 124 closedir 124 Errors 127 strerror 127 perror 127 The /proc File System 128 Advanced Topics: fcntl and mmap 132 fcntl 132 mmap 133 Summary 135 Chapter 4: The Linux Environment 137 Program Arguments 137 getopt 140 getopt_long 142 Environment Variables 144 Use of Environment Variables 146 The environ Variable 147 Time and Date 148 Temporary Files 156 User Information 158 Host Information 161 Logging 163 Resources and Limits 167 Summary 173 Chapter 5: Terminals 175 Reading from and Writing to the Terminal 175 Talking to the Terminal 180 The Terminal Driver and the General Terminal Interface 182 Overview 183 Hardware Model 183 The termios Structure 184 Input Modes 186 Output Modes 186 Control Modes 187 Local Modes 188 Special Control Characters 188 Terminal Speed 192 Additional Functions 192 Terminal Output 196 Terminal Type 197 Identify Your Terminal Type 197 Using terminfo Capabilities 200 Detecting Keystrokes 205 Virtual Consoles 207 Pseudo-Terminals 208 Summary 209 Chapter 6: Managing Text-Based Screens with curses 211 Compiling with curses 212 Curses Terminology and Concepts 213 The Screen 216 Output to the Screen 216 Reading from the Screen 217 Clearing the Screen 218 Moving the Cursor 218 Character Attributes 218 The Keyboard 221 Keyboard Modes 221 Keyboard Input 222 Windows 224 The WINDOW Structure 224 Generalized Functions 225 Moving and Updating a Window 225 Optimizing Screen Refreshes 229 Subwindows 230 The Keypad 232 Using Color 235 Redefining Colors 238 Pads 238 The CD Collection Application 240 Starting a New CD Collection Application 240 Looking at main 243 Building the Menu 243 Database File Manipulation 245 Querying the CD Database 250 Summary 254 Chapter 7: Data Management 255 Managing Memory 255 Simple Memory Allocation 256 Allocating Lots of Memory 257 Abusing Memory 260 The Null Pointer 261 Freeing Memory 262 Other Memory Allocation Functions 264 File Locking 264 Creating Lock Files 265 Locking Regions 268 Use of read and write with Locking 271 Competing Locks 276 Other Lock Commands 280 Deadlocks 280 Databases 281 The dbm Database 281 The dbm Routines 283 dbm Access Functions 283 Additional dbm Functions 287 The CD Application 289 Updating the Design 289 The CD Database Application Using dbm 290 Summary 309 Chapter 8: MySQL 311 Installation 312 MySQL Packages 312 Post-Install Configuration 314 Post-Installation Troubleshooting 319 MySQL Administration 320 Commands 320 Creating Users and Giving Them Permissions 325 Passwords 327 Creating a Database 328 Data Types 329 Creating a Table 330 Graphical Tools 333 Accessing MySQL Data from C 335 Connection Routines 337 Error Handling 341 Executing SQL Statements 342 Miscellaneous Functions 357 The CD Database Application 358 Creating the Tables 359 Adding Some Data 362 Accessing the Application Data from C 364 Summary 375 Chapter 9: Development Tools 377 Problems of Multiple Source Files 377 The make Command and Makefiles 378 The Syntax of Makefiles 378 Options and Parameters to make 379 Comments in a Makefile 382 Macros in a Makefile 382 Multiple Targets 384 Built-in Rules 387 Suffix and Pattern Rules 388 Managing Libraries with make 389 Advanced Topic: Makefiles and Subdirectories 391 GNU make and gcc 391 Source Code Control 392 RCS 393 SCCS 399 Comparing RCS and SCCS 399 CVS 400 CVS Front Ends 404 Subversion 405 Writing a Manual Page 406 Distributing Software 409 The patch Program 410 Other Distribution Utilities 411 RPM Packages 413 Working with RPM Package Files 414 Installing RPM Packages 415 Building RPM Packages 415 Other Package Formats 424 Development Environments 424 KDevelop 425 Other Environments 425 Summary 427 Chapter 10: Debugging 429 Types of Errors 429 General Debugging Techniques 430 A Program with Bugs 430 Code Inspection 433 Instrumentation 434 Controlled Execution 436 Debugging with gdb 437 Starting gdb 437 Running a Program 438 Stack Trace 438 Examining Variables 439 Listing the Program 440 Setting Breakpoints 441 Patching with the Debugger 444 Learning More about gdb 445 More Debugging Tools 445 Lint: Removing the Fluff from Your Programs 446 Function Call Tools 449 Execution Profiling with prof/gprof 451 Assertions 452 Memory Debugging 453 ElectricFence 454 valgrind 455 Summary 459 Chapter 11: Processes and Signals 461 What Is a Process? 461 Process Structure 462 The Process Table 463 Viewing Processes 463 System Processes 464 Process Scheduling 467 Starting New Processes 468 Waiting for a Process 475 Zombie Processes 477 Input and Output Redirection 479 Threads 480 Signals 481 Sending Signals 484 Signal Sets 489 Summary 493 Chapter 12: POSIX Threads 495 What Is a Thread? 495 Advantages and Drawbacks of Threads 496 A First Threads Program 497 Simultaneous Execution 501 Synchronization 503 Synchronization with Semaphores 503 Synchronization with Mutexes 508 Thread Attributes 512 Canceling a Thread 517 Threads in Abundance 520 Summary 524 Chapter 13: Inter-Process Communication: Pipes 525 What Is a Pipe? 525 Process Pipes 526 Sending Output to popen 528 Passing More Data 529 How popen Is Implemented 530 The Pipe Call 531 Parent and Child Processes 535 Reading Closed Pipes 536 Pipes Used as Standard Input and Output 537 Named Pipes: FIFOs 540 Accessing a FIFO 542 Advanced Topic: Client/Server Using FIFOs 549 The CD Database Application 553 Aims 554 Implementation 555 Client Interface Functions 558 The Server Interface, server.c 565 The Pipe 569 Application Summary 574 Summary 575 Chapter 14: Semaphores, Shared Memory, and Message Queues 577 Semaphores 577 Semaphore Definition 579 A Theoretical Example 579 Linux Semaphore Facilities 580 Using Semaphores 582 Shared Memory 586 shmget 588 shmat 588 shmdt 589 shmctl 589 Message Queues 594 msgget 594 msgsnd 595 msgrcv 595 msgctl 596 The CD Database Application 599 Revising the Server Functions 600 Revising the Client Functions 602 IPC Status Commands 604 Displaying Semaphore Status 604 Displaying Shared Memory Status 604 Displaying Message Queue Status 605 Summary 605 Chapter 15: Sockets 607 What Is a Socket? 608 Socket Connections 608 Socket Attributes 612 Creating a Socket 614 Socket Addresses 615 Naming a Socket 616 Creating a Socket Queue 617 Accepting Connections 617 Requesting Connections 618 Closing a Socket 619 Socket Communications 619 Host and Network Byte Ordering 622 Network Information 624 The Internet Daemon (xinetd/inetd) 629 Socket Options 631 Multiple Clients 632 select 635 Multiple Clients 638 Datagrams 642 Summary 644 Chapter 16: Programming GNOME Using GTK+ 645 Introducing X 645 X Server 646 X Client 646 X Protocol 646 Xlib 647 Toolkits 647 Window Managers 647 Other Ways to Create a GUI — Platform-Independent Windowing APIs 648 Introducing GTK+ 648 GLib Type System 649 GTK+ Object System 650 Introducing GNOME 651 Installing the GNOME/GTK+ Development Libraries 652 Events, Signals, and Callbacks 655 Packing Box Widgets 658 GTK+ Widgets 661 GtkWindow 662 GtkEntry 663 GtkSpinButton 666 GtkButton 668 GtkTreeView 672 GNOME Widgets 676 GNOME Menus 677 Dialogs 682 GtkDialog 682 Modal Dialog Box 684 Nonmodal Dialogs 685 GtkMessageDialog 686 CD Database Application 687 Summary 699 Chapter 17: Programming KDE Using Qt 701 Introducing KDE and Qt 701 Installing Qt 702 Signals and Slots 705 Qt Widgets 712 QLineEdit 712 Qt Buttons 716 QComboBox 721 QListView 724 Dialogs 727 QDialog 728 QMessageBox 730 QInputDialog 731 Using qmake to Simplify Writing Makefiles 733 Menus and Toolbars with KDE 733 CD Database Application Using KDE/Qt 738 MainWindow 738 AddCdDialog 742 LogonDialog 743 main.cpp 745 Summary 746 Chapter 18: Standards for Linux 747 The C Programming Language 748 A Brief History Lesson 748 The GNU Compiler Collection 749 gcc Options 749 Interfaces and the Linux Standards Base 751 LSB Standard Libraries 752 LSB Users and Groups 754 LSB System Initialization 754 The Filesystem Hierarchy Standard 755 Further Reading about Standards 758 Summary 759 Index 761

    15 in stock

    £25.60

  • Linux Basics For Hackers: Getting Started with

    No Starch Press,US Linux Basics For Hackers: Getting Started with

    15 in stock

    Book SynopsisMany aspiring hackers are unfamiliar with Linux, having learned computer basics in a Windows or Mac environment. This can pose the single most important obstacle to mastering the skills to becoming a better hacker; while hacking can be done with Windows or OS X, nearly all hacking tools are developed specifically for Linux. Linux Basics for Hackers aims to provide you with a foundation of Linux skills that every hacker needs. As you progress, you'll have access to numerous real-world examples and hands-on exercises to apply your new knowledge and bring yourself up to speed.Trade Review"The information provided can help even a general user to get more comfortable with the Linux operating system without feeling overwhelmed by more complex, security-related topics and usage. While we could all benefit from more attention to security, Linux Basics for Hackers just might inspire the next crop of budding techies into the security rock stars of tomorrow."—Tim Everson, The Ethical Hacker Network"If you're just getting started or working your way to expert level, getting a copy of this book might be one of the best things you can do to develop your cybersecurity skills."—Sandra Henry-Stocker, Network World"Linux Basics for Hackers is immediately practical. Its quick and dirty approach to exploring and using a Linux system was welcome."—Jesse Smith, DistroWatch Weekly"If you are starting out in Computer Science and want to get up to speed quickly on Linux and Unix like operating systems, working through this book will put you well ahead of your fellow students, and quickly."—Greg Laden, Greg Laden's Blog"A great guide for those who are not familiar with Linux as well as those who are proficient."—Davin Jackson, Alpha Cyber Security, Books to Start Your Penetration Testing Journey"Linux Basics for Hackers is the best book for Jr. penetration testers and newbies who want to learn InfoSec. Though aimed at hacking, it's the best general intro to Linux I've read. Gives a great overview of Linux basics and useful terminal commands."—@hackerb0t "For an absolute beginner . . . this is a must read book. It breaks concepts down so simply . . . this book flies by and builds a foundation of knowledge for you to continue building on."—Matthew Hacks "A great intro to so many different parts of the Linux OS." —Michael Kaplan, Amazon Reviewer"Extremely well written, covers a broad variety of information and does a great job covering the basics." —The Security Noob"I highly recommend this book for anyone starting their cybersec journey."—Steve[INIT]

    15 in stock

    £28.49

  • Bash Pocket Reference 2e

    O'Reilly Media Bash Pocket Reference 2e

    15 in stock

    Book SynopsisThis concise little book puts all of the essential information about Bash right at your fingertips. Updated for Bash version 4.4, this pocket reference has the answers to these and other problems in a format that makes browsing quick and easy.

    15 in stock

    £15.99

  • LPIC1 Certification Kit

    John Wiley & Sons Inc LPIC1 Certification Kit

    7 in stock

    Book Synopsis

    7 in stock

    £48.75

  • Efficient Linux at the Command Line

    O'Reilly Media Efficient Linux at the Command Line

    15 in stock

    Book SynopsisTake your Linux skills to the next level! Whether you're a system administrator, software developer, site reliability engineer, or enthusiastic hobbyist, this practical, hands-on book will help you work faster, smarter, and more efficiently.

    15 in stock

    £35.99

  • Learning Kali Linux

    O'Reilly Media Learning Kali Linux

    15 in stock

    Book Synopsis

    15 in stock

    £35.99

  • CompTIA Linux XK0005 Exam Cram

    Pearson Education (US) CompTIA Linux XK0005 Exam Cram

    1 in stock

    Book SynopsisAt the impressionable age of 14, William Bo Rothwell crossed paths with a TRS-80 Micro Computer System (affectionately known as a Trash 80). Soon after the adults responsible for Bo made the mistake of leaving him alone with the TSR-80, he dismantled it and held his first computer class, showing his friends what made this computer thing work.   Since that experience, Bo's passion for understanding how computers work and sharing this knowledge with others has resulted in a rewarding career in IT training. His experience includes Linux, Unix, IT security, DevOps, cloud technologies, and programming languages such as Perl, Python, Tcl, and BASH. He is the founder and lead instructor of One Course Source, an IT training organization.Table of Contents Introduction. . . . . . . . . . . . xxiv Part I: System Management CHAPTER 1: Linux Fundamentals. . . . . . . . . . . 1 Filesystem Hierarchy Standard (FHS).. . . . . . . 1 Basic Boot Process.. . . . . . . . . . 3 Kernel Panic. . . . . . . . . . . 10 Device Types in /dev.. . . . . . . . . 10 Basic Package Compilation from Source.. . . . . . 13 ./configure.. . . . . . . . . . 13 make.. . . . . . . . . . . 15 make install.. . . . . . . . . . 16 Storage Concepts.. . . . . . . . . . 16 Listing Hardware Information.. . . . . . . . 22 CHAPTER 2: Manage Files and Directories.. . . . . . . . . 27 File Editing.. . . . . . . . . . . 27 File Compression, Archiving, and Backup. . . . . . 36 File Metadata.. . . . . . . . . . . 41 Soft and Hard Links.. . . . . . . . . 43 Copying Files Between Systems.. . . . . . . 46 File and Directory Operations.. . . . . . . . 49 CHAPTER 3: Configure and Manage Storage Using the Appropriate Tools.. . . 57 Disk Partitioning.. . . . . . . . . . 57 Mounting Local and Remote Devices.. . . . . . 61 Filesystem Management. . . . . . . . . 66 Monitoring Storage Space and Disk Usage. . . . . . 70 Creating and Modifying Volumes Using Logical Volume Manager (LVM).. . . . . . . . . . 71 Inspecting RAID Implementations.. . . . . . . 75 Storage Area Network (SAN)/Network-Attached Storage (NAS). . 78 Storage Hardware.. . . . . . . . . . 82 CHAPTER 4: Configure and Use the Appropriate Processes and Services.. . . 85 System Services. . . . . . . . . . 85 Scheduling Services. . . . . . . . . . 90 Process Management. . . . . . . . . 97 CHAPTER 5: Use the Appropriate Networking Tools or Configuration Files. . . 113 Interface Management.. . . . . . . . . 113 Name Resolution.. . . . . . . . . . 122 Network Monitoring.. . . . . . . . . 127 Remote Networking Tools.. . . . . . . . 132 CHAPTER 6: Build and Install Software. . . . . . . . . 139 Package Management.. . . . . . . . . 139 Sandboxed Applications.. . . . . . . . . 149 System Updates.. . . . . . . . . . 150 Part II: Security CHAPTER 7: Manage Software Configurations.. . . . . . . . 155 Updating Configuration Files.. . . . . . . . 155 Configure Kernel Options.. . . . . . . . 158 Configure Common System Services.. . . . . . . 165 Localization.. . . . . . . . . . . 172 CHAPTER 8: Security Best Practices in a Linux Environment.. . . . . 177 Managing Public Key Infrastructure (PKI) Certificates.. . . 177 Certificate Use Cases. . . . . . . . . 181 Authentication.. . . . . . . . . . 181 Linux Hardening.. . . . . . . . . . 188 CHAPTER 9: Implement Identity Management. . . . . . . . 201 Account Creation and Deletion. . . . . . . . 201 .bashrc. . . . . . . . . . . 212 Account Management.. . . . . . . . . 212 CHAPTER 10: Implement and Configure Firewalls.. . . . . . . . 219 Firewall Use Cases.. . . . . . . . . . 219 Common Firewall Technologies.. . . . . . . 221 Key Firewall Features.. . . . . . . . . 223 CHAPTER 11: Configure and Execute Remote Connectivity for System Management.. 227 SSH.. . . . . . . . . . . . 227 Executing Commands as Another User.. . . . . . 235 CHAPTER 12: Apply the Appropriate Access Controls. . . . . . . 241 File Permissions.. . . . . . . . . . 241 Security-Enhanced Linux (SELinux).. . . . . . . 243 AppArmor.. . . . . . . . . . . 247 Command-Line Utilities.. . . . . . . . . 250 Part III: Scripting, Containers, and Automation CHAPTER 13: Create Simple Shell Scripts to Automate Common Tasks. . . . 265 Shell Script Elements.. . . . . . . . . 265 Common Script Utilities.. . . . . . . . . 286 Environment Variables. . . . . . . . . 298 Relative and Absolute Paths.. . . . . . . . 302 CHAPTER 14: Perform Basic Container Operations. . . . . . . 305 Container Management.. . . . . . . . . 305 Container Image Operations.. . . . . . . . 312 CHAPTER 15: Perform Basic Version Control Using Git.. . . . . . . 317 Introduction to Version Control and Git.. . . . . . 317 clone.. . . . . . . . . . . . 321 push.. . . . . . . . . . . . 323 pull.. . . . . . . . . . . . 324 commit.. . . . . . . . . . . . 324 add.. . . . . . . . . . . . 325 branch/checkout.. . . . . . . . . . 325 tag.. . . . . . . . . . . . 329 gitignore.. . . . . . . . . . . 330 CHAPTER 16: Common Infrastructure as Code Technologies.. . . . . 333 File Formats. . . . . . . . . . . 334 Utilities.. . . . . . . . . . . . 335 Continuous Integration/Continuous Deployment (CI/CD).. . . 338 Advanced Git Topics.. . . . . . . . . 339 CHAPTER 17: Container, Cloud, and Orchestration Concepts.. . . . . 343 Kubernetes Benefits and Application Use Cases.. . . . . 344 Single-Node, Multicontainer Use Cases. . . . . . 346 Container Persistent Storage.. . . . . . . . 346 Container Networks.. . . . . . . . . 347 Service Mesh.. . . . . . . . . . . 349 Bootstrapping. . . . . . . . . . . 350 Container Registries.. . . . . . . . . 350 Part IV: Troubleshooting CHAPTER 18: Analyze and Troubleshoot Storage Issues.. . . . . . 353 High Latency.. . . . . . . . . . . 353 Input/Output Operations per Second (IOPS) Scenarios.. . . 354 Capacity Issues.. . . . . . . . . . 355 Filesystem Issues. . . . . . . . . . 358 I/O Scheduler. . . . . . . . . . . 359 Device Issues.. . . . . . . . . . . 360 Mount Option Problems.. . . . . . . . . 363 CHAPTER 19: Analyze and Troubleshoot Network Resource Issues.. . . . 365 Network Configuration Issues.. . . . . . . . 365 Firewall Issues.. . . . . . . . . . 367 Interface Errors.. . . . . . . . . . 367 Bandwidth Limitations. . . . . . . . . 373 Name Resolution Issues. . . . . . . . . 374 Testing Remote Systems.. . . . . . . . . 375 CHAPTER 20: Analyze and Troubleshoot Central Processing Unit (CPU) and Memory Issues. . . . 379 Runaway Processes.. . . . . . . . . . 379 Zombie Processes.. . . . . . . . . . 380 High Load Average.. . . . . . . . . . 383 High Run Queues.. . . . . . . . . . 384 CPU Times.. . . . . . . . . . . 384 CPU Process Priorities.. . . . . . . . . 384 Memory Exhaustion.. . . . . . . . . 385 Out of Memory (OOM). . . . . . . . . 385 Swapping.. . . . . . . . . . . 386 Hardware. . . . . . . . . . . 388 CHAPTER 21: Analyze and Troubleshoot User Access and File Permissions. . . 397 User Login Issues.. . . . . . . . . . 397 User File Access Issues. . . . . . . . . 400 Password Issues. . . . . . . . . . 404 Privilege Elevation.. . . . . . . . . . 405 Quota Issues. . . . . . . . . . . 405 CHAPTER 22: Use systemd to Diagnose and Resolve Common Problems with a Linux System. . . . . 411 Unit Files. . . . . . . . . . . 412 Common Problems.. . . . . . . . . . 429 9780137898558, TOC, 8/11/2022

    1 in stock

    £28.49

  • LPI Linux Certification in a Nutshell 3e

    O'Reilly Media LPI Linux Certification in a Nutshell 3e

    1 in stock

    Book SynopsisA guide that helps you prepare for the technically challenging Level 1 LPI exams, which test basic knowledge of Linux installation, configuration, and command-line skills. It features a summary of the core skills you need, as well as sample exercises, test questions, and hints to help you focus.

    1 in stock

    £29.99

  • CompTIA Linux XK0004 Cert Guide

    Pearson Education (US) CompTIA Linux XK0004 Cert Guide

    1 in stock

    Book SynopsisAt the impressionable age of 14, William Bo Rothwell crossed paths with a TRS-80 Micro Computer System (affectionally known as a Trash 80). Soon after, the adults responsible for Bo made the mistake of leaving him alone with the TSR-80. He immediately dismantled it and held his first computer class, showing his friends what made this computer thing work. Since that experience, Bo's passion for understanding how computers work and sharing this knowledge with others has resulting in a rewarding career in IT training. His experience includes Linux, Unix, IT security, devops, and programming languages such as Perl, Python, Tcl, and BASH. He is the founder and lead instructor of One Course Source, an IT training organization. Ross Brunson has more than 25 years of experience as a Linux and open source trainer, training manager, and tech

    1 in stock

    £35.11

  • Linux with Operating System Concepts

    Taylor & Francis Ltd Linux with Operating System Concepts

    2 in stock

    Book SynopsisA True Textbook for an Introductory Course, System Administration Course, or a Combination CourseLinux with Operating System Concepts, Second Edition merges conceptual operating system (OS) and Unix/Linux topics into one cohesive textbook for undergraduate students. The book can be used for a one- or two-semester course on Linux or Unix. It is complete with review sections, problems, definitions, concepts and relevant introductory material, such as binary and Boolean logic, OS kernels and the role of the CPU and memory hierarchy.Details for Introductory and Advanced UsersThe book covers Linux from both the user and system administrator positions. From a user perspective, it emphasizes command-line interaction. From a system administrator perspective, the text reinforces shell scripting with examples of administration scripts that support the automation of administrator tasks.Thorough Coverage of Concepts and Linux CommandsTable of ContentsPreface. Acknowledgments and Contributions. Author. Chapter 1 Linux: What, Why, Who and When, and How. Chapter 2 Bash. Chapter 3 Linux File Commands. Chapter 4 Managing Processes. Chapter 5 Regular Expressions. Chapter 6 Shell Scripting. Chapter 7 User Accounts. Chapter 8 Administering Linux File Systems. Chapter 9 System Initialization and Services. Chapter 10 Network Configuration. Chapter 11 Software Installation and Maintenance. Chapter 12 Maintaining and Troubleshooting Linux. Bibliography. Index.

    2 in stock

    £78.84

  • Learning eBPF

    O'Reilly Media Learning eBPF

    7 in stock

    Book SynopsisThis practical book is ideal for developers, system administrators, operators, and students who are curious about eBPF and want to know how it works.

    7 in stock

    £33.74

  • Cengage Learning Linux Operations and Administration

    5 in stock

    Book Synopsis

    5 in stock

    £169.20

  • Linux Bible

    John Wiley & Sons Inc Linux Bible

    1 in stock

    Book SynopsisTable of ContentsAcknowledgments xi Introduction xxxv Part I: Getting Started 1 Chapter 1: Starting with Linux 3 Understanding What Linux Is 4 Understanding How Linux Differs from Other Operating Systems 6 Exploring Linux History 7 Free-flowing UNIX culture at Bell Labs 7 Commercial UNIX 9 GNU transitions UNIX to freedom 11 BSD loses some steam 12 Linus builds the missing piece 13 OSI open source definition 14 Understanding How Linux Distributions Emerged 16 Choosing a Red Hat distribution 16 Choosing Ubuntu or another Debian distribution 19 Finding Professional Opportunities with Linux Today 19 Understanding how companies make money with Linux 20 Becoming Red Hat certified 21 Summary 25 Chapter 2: Creating the Perfect Linux Desktop 27 Understanding Linux Desktop Technology 28 Starting with the Fedora GNOME Desktop Live image 30 Using the GNOME 3 Desktop 31 After the computer boots up 31 Setting up the GNOME 3 desktop 38 Extending the GNOME 3 desktop 39 Starting with desktop applications 41 Stopping the GNOME 3 desktop 46 Using the GNOME 2 Desktop 46 Using the Metacity window manager 48 Changing GNOME’s appearance 49 Using the GNOME panels 50 Adding 3D effects with AIGLX 54 Summary 57 Exercises 57 Part II: Becoming a Linux Power User 59 Chapter 3: Using the Shell 61 About Shells and Terminal Windows 62 Using the shell prompt 63 Using a Terminal window 63 Using virtual consoles 65 Choosing Your Shell 65 Running Commands 66 Understanding command syntax 67 Locating commands 70 Recalling Commands Using Command History 72 Command-line editing 73 Command-line completion 75 Command-line recall 76 Connecting and Expanding Commands 78 Piping between commands 78 Sequential commands 79 Background commands 79 Expanding commands 80 Expanding arithmetic expressions 80 Expanding variables 80 Using Shell Variables 81 Creating and using aliases 81 Exiting the shell 83 Creating Your Shell Environment 84 Configuring your shell 84 Setting your prompt 85 Adding environment variables 87 Getting Information about Commands 88 Summary 90 Exercises 90 Chapter 4: Moving Around the Filesystem 93 Using Basic Filesystem Commands 96 Using Metacharacters and Operators 98 Using file-matching metacharacters 98 Using file-redirection metacharacters 99 Using brace expansion characters 101 Listing Files and Directories 101 Understanding File Permissions and Ownership 105 Changing permissions with chmod (numbers) 106 Changing permissions with chmod (letters) 107 Setting default file permission with umask 108 Changing file ownership 109 Moving, Copying, and Removing Files 109 Summary 111 Exercises 111 Chapter 5: Working with Text Files 113 Editing Files with vim and vi 113 Starting with vi 115 Skipping around in the file 119 Searching for text 119 Using ex mode 120 Learning more about vi and vim 120 Finding Files 120 Using locate to find files by name 121 Searching for files with find 122 Searching in files with grep 128 Summary 129 Exercises 129 Chapter 6: Managing Running Processes 131 Understanding Processes 131 Listing Processes 132 Listing processes with ps 132 Listing and changing processes with top 134 Listing processes with System Monitor 136 Managing Background and Foreground Processes 137 Starting background processes 138 Using foreground and background commands 139 Killing and Renicing Processes140 Killing processes with kill and killall 140 Setting processor priority with nice and renice 142 Limiting Processes with cgroups 143 Summary 144 Exercises 145 Chapter 7: Writing Simple Shell Scripts 147 Understanding Shell Scripts 147 Executing and debugging shell scripts 148 Understanding shell variables 149 Performing arithmetic in shell scripts 152 Using programming constructs in shell scripts 153 Trying some useful text manipulation programs 159 Using simple shell scripts 161 Summary 163 Exercises 163 Part III: Becoming a Linux System Administrator 165 Chapter 8: Learning System Administration 167 Understanding System Administration 167 Using Graphical Administration Tools 169 Using the root User Account 174 Exploring Administrative Commands, Configuration Files, and Log Files 178 Administrative commands 178 Administrative configuration files 179 Using Other Administrative Accounts 185 Checking and Configuring Hardware 186 Checking your hardware 187 Managing removable hardware 189 Working with loadable modules 191 Summary 193 Exercises 193 Chapter 9: Installing Linux 195 Choosing a Computer 196 Installing Fedora from Live Media 198 Installing Red Hat Enterprise Linux from Installation Media 201 Understanding Cloud-Based Installations 204 Installing Linux in the Enterprise 205 Exploring Common Installation Topics 207 Upgrading or installing from scratch 207 Dual booting 208 Installing Linux to run virtually 209 Using installation boot options 210 Using specialized storage 213 Partitioning hard drives 214 Using the GRUB boot loader 217 Summary 219 Exercises 219 Chapter 10: Getting and Managing Software 221 Managing Software on the Desktop 221 Going Beyond the Software Window 223 Understanding Linux RPM and DEB Software Packaging 224 Understanding DEB packaging 225 Understanding RPM packaging 226 Managing RPM Packages with YUM 229 Transitioning from yum to dnf 229 Understanding how yum works 229 Using YUM with third-party software repositories 233 Managing software with the yum command 233 Installing, Querying, and Verifying Software with the rpm Command 241 Installing and removing packages with rpm 241 Querying rpm information 242 Verifying RPM packages 244 Managing Software in the Enterprise 245 Summary 246 Exercises 247 Chapter 11: Managing User Accounts 249 Creating User Accounts 249 Adding users with useradd 252 Setting user defaults 255 Modifying users with usermod 257 Deleting users with userdel 258 Understanding Group Accounts 259 Using group accounts 259 Creating group accounts 260 Managing Users in the Enterprise 261 Setting permissions with Access Control Lists 262 Centralizing User Accounts 269 Summary 270 Exercises 270 Chapter 12: Managing Disks and Filesystems 273 Understanding Disk Storage 273 Partitioning Hard Disks 275 Understanding partition tables 275 Viewing disk partitions 276 Creating a single-partition disk 277 Creating a multiple-partition disk 281 Using Logical Volume Manager Partitions 285 Checking an existing LVM 286 Creating LVM logical volumes 289 Growing LVM logical volumes 290 Mounting Filesystems 291 Supported filesystems 291 Enabling swap areas 293 Disabling swap area 294 Using the fstab file to define mountable file systems 295 Using the mount command to mount file systems 297 Mounting a disk image in loopback 298 Using the umount command 299 Using the mkfs Command to Create a Filesystem 300 Managing Storage with Cockpit 301 Summary 303 Exercises 303 Part IV: Becoming a Linux Server Administrator 305 Chapter 13: Understanding Server Administration 307 Starting with Server Administration 308 Step 1: Install the server 308 Step 2: Configure the server 310 Step 3: Start the server 311 Step 4: Secure the server 312 Step 5: Monitor the server 314 Checking and Setting Servers 316 Managing Remote Access with the Secure Shell Service 316 Starting the openssh-server service 317 Using SSH client tools 318 Using key-based (passwordless) authentication 324 Configuring System Logging 326 Enabling system logging with rsyslog 326 Watching logs with logwatch 331 Checking System Resources with sar 332 Checking System Space 334 Displaying system space with df 334 Checking disk usage with du 334 Finding disk consumption with find 335 Managing Servers in the Enterprise 336 Summary 336 Exercises 337 Chapter 14: Administering Networking 339 Configuring Networking for Desktops 340 Checking your network interfaces 342 Configuring network interfaces 349 Configuring a network proxy connection 352 Configuring Networking from the Command Line 353 Configure networking with nmtui 354 Editing a NetworkManager TUI connection 354 Understanding networking configuration files 355 Setting alias network interfaces 360 Setting up Ethernet channel bonding 361 Setting custom routes 363 Configuring Networking in the Enterprise 364 Configuring Linux as a router 364 Configuring Linux as a DHCP server 365 Configuring Linux as a DNS server 365 Configuring Linux as a proxy server 366 Summary 366 Exercises 367 Chapter 15: Starting and Stopping Services 369 Understanding the Initialization Daemon (init or systemd) 370 Understanding the classic init daemons 371 Understanding systemd initialization 377 Checking the Status of Services 384 Checking services for SysVinit systems 385 Stopping and Starting Services 387 Stopping and starting SysVinit services 387 Enabling Persistent Services 391 Configuring persistent services for SysVinit 391 Configuring a Default Runlevel or Target Unit 394 Configuring the SysVinit default runlevel 394 Adding New or Customized Services 396 Adding new services to SysVinit 396 Adding new services to systemd 399 Summary 401 Exercises 401 Chapter 16: Configuring a Print Server 403 Common UNIX Printing System 403 Setting Up Printers 405 Adding a printer automatically 405 Using web-based CUPS administration 406 Using the Print Settings window 409 Working with CUPS Printing 415 Configuring the CUPS server (cupsdconf) 415 Starting the CUPS server 417 Configuring CUPS printer options manually 417 Using Printing Commands 418 Printing with lp 419 Listing status with lpstat -t 419 Removing print jobs with lprm 419 Configuring Print Servers 420 Configuring a shared CUPS printer 420 Configuring a shared Samba printer 422 Summary 424 Exercises 424 Chapter 17: Configuring a Web Server 427 Understanding the Apache Web Server 427 Getting and Installing Your Web Server 428 Understanding the httpd package 428 Installing Apache 431 Starting Apache 432 Securing Apache 433 Understanding the Apache configuration files 435 Adding a virtual host to Apache 440 Allowing users to publish their own web content 442 Securing your web traffic with SSL/TLS 443 Troubleshooting Your Web Server 449 Checking for configuration errors 449 Accessing forbidden and server internal errors 451 Summary 453 Exercises 453 Chapter 18: Configuring an FTP Server 455 Understanding FTP 455 Installing the vsftpd FTP Server 457 Starting the vsftpd Service 458 Securing Your FTP Server 461 Opening up your firewall for FTP 461 Configuring SELinux for your FTP server 463 Relating Linux file permissions to vsftpd 465 Configuring Your FTP Server 465 Setting up user access 465 Allowing uploading 467 Setting up vsftpd for the Internet 468 Using FTP Clients to Connect to Your Server 469 Accessing an FTP server from Firefox 470 Accessing an FTP server with the lftp command 470 Using the gFTP client 472 Summary 473 Exercises 473 Chapter 19: Configuring a Windows File Sharing (Samba) Server 475 Understanding Samba 475 Installing Samba 476 Starting and Stopping Samba 478 Starting the Samba (smb) service 478 Starting the NetBIOS (nmbd) name server 480 Stopping the Samba (smb) and NetBIOS (nmb) services 481 Securing Samba 482 Configuring firewalls for Samba 482 Configuring SELinux for Samba 484 Configuring Samba host/user permissions 486 Configuring Samba 486 Configuring the [global] section 486 Configuring the [homes] section487 Configuring the [printers] section 489 Accessing Samba Shares 493 Accessing Samba shares in Linux 493 Accessing Samba shares in Windows 496 Using Samba in the Enterprise 497 Summary 497 Exercises 498 Chapter 20: Configuring an NFS File Server 499 Installing an NFS Server 502 Starting the NFS service 502 Sharing NFS Filesystems 503 Configuring the /etc/exports file 504 Exporting the shared filesystems 507 Securing Your NFS Server 508 Opening up your firewall for NFS 508 Allowing NFS access in TCP wrappers 510 Configuring SELinux for your NFS server 511 Using NFS Filesystems 512 Viewing NFS shares 512 Manually mounting an NFS filesystem 512 Mounting an NFS filesystem at boot time 513 Using autofs to mount NFS filesystems on demand 517 Unmounting NFS filesystems 520 Summary 521 Exercises 521 Chapter 21: Troubleshooting Linux 523 Boot-Up Troubleshooting 523 Understanding Startup Methods 524 Starting from the firmware (BIOS or UEFI) 526 Troubleshooting the GRUB boot loader 528 GRUB 2 Boot loader 530 Starting the kernel 532 Troubleshooting Software Packages 542 Fixing RPM databases and cache 545 Troubleshooting Networking 547 Troubleshooting outgoing connections 547 Troubleshooting incoming connections 550 Troubleshooting Memory 553 Uncovering memory issues 554 Troubleshooting in Rescue Mode 559 Summary 561 Exercises 561 Part V: Learning Linux Security Techniques 563 Chapter 22: Understanding Basic Linux Security 565 Implementing Physical Security 565 Implementing disaster recovery 566 Securing user accounts 566 Securing passwords 570 Securing the filesystem 576 Managing software and services 579 Advanced implementation 580 Monitoring Your Systems 580 Monitoring log files 581 Monitoring user accounts 584 Monitoring the filesystem 587 Auditing and Reviewing Linux 595 Conducting compliance reviews 595 Conducting security reviews 596 Summary 596 Exercises 597 Chapter 23: Understanding Advanced Linux Security 599 Implementing Linux Security with Cryptography 599 Understanding hashing 600 Understanding encryption/decryption 602 Implementing Linux cryptography 610 Implementing Linux Security with PAM 618 Understanding the PAM authentication process 619 Administering PAM on your Linux system 622 Obtaining more information on PAM 633 Summary 633 Exercises 633 Chapter 24: Enhancing Linux Security with SELinux 635 Understanding SELinux Benefits 635 Understanding How SELinux Works 637 Understanding Type Enforcement 637 Understanding Multi-Level Security 638 Implementing SELinux security models 639 Configuring SELinux 645 Setting the SELinux mode 645 Setting the SELinux policy type 647 Managing SELinux security contexts 648 Managing SELinux policy rule packages 651 Managing SELinux via Booleans 653 Monitoring and Troubleshooting SELinux 654 Understanding SELinux logging 654 Troubleshooting SELinux logging 656 Troubleshooting common SELinux problems 657 Putting It All Together 659 Obtaining More Information on SELinux 659 Summary 660 Exercises 660 Chapter 25: Securing Linux on a Network 663 Auditing Network Services 663 Evaluating access to network services with nmap 665 Using nmap to audit your network services advertisements 668 Working with Firewalls 672 Understanding firewalls 673 Implementing firewalls 674 Summary 688 Exercises 688 Part VI: Engaging with Cloud Computing 691 Chapter 26: Shifting to Clouds and Containers 693 Understanding Linux Containers 694 Namespaces 695 Container registries 695 Base images and layers 696 Starting with Linux Containers 697 Pulling and running containers 697 Starting and stopping containers 701 Building a container image 702 Tagging and pushing an image to a registry 705 Using containers in the enterprise 706 Summary 706 Exercises 707 Chapter 27: Using Linux for Cloud Computing 709 Overview of Linux and Cloud Computing 710 Trying Basic Cloud Technology 713 Setting Up a Small Cloud 714 Configuring hypervisors 715 Configuring storage 718 Creating virtual machines 720 Managing virtual machines 724 Migrating virtual machines 725 Summary 727 Exercises 727 Chapter 28: Deploying Linux to the Cloud 729 Getting Linux to Run in a Cloud 729 Creating Linux Images for Clouds 731 Configuring and running a cloud-init cloud instance 731 Investigating the cloud instance 733 Cloning the cloud instance 734 Using cloud-init in enterprise computing 738 Using OpenStack to Deploy Cloud Images 739 Starting from the OpenStack Dashboard 739 Using Amazon EC2 to Deploy Cloud Images 744 Summary 746 Exercises 746 Chapter 29: Automating Apps and Infrastructure with Ansible 749 Understanding Ansible 750 Exploring Ansible Components 751 Inventories 751 Playbooks 752 Stepping Through an Ansible Deployment 753 Installing Ansible 756 Running Ad-Hoc Ansible Commands 760 Automating Tasks with Ansible Tower Automation Framework 762 Summary 763 Exercises 763 Chapter 30: Deploying Applications as Containers with Kubernetes 765 Understanding Kubernetes 766 Kubernetes masters 766 Kubernetes workers 767 Kubernetes applications 767 Kubernetes interfaces 768 Trying Kubernetes 768 Getting Kubernetes 769 Running the Kubernetes Basics tutorial 771 Enterprise-Quality Kubernetes with OpenShift 782 Summary 783 Exercises 783 Part VII: Appendixes 785 Appendix A: Media 787 Appendix B: Exercise Answers 797 Index 863

    1 in stock

    £47.50

  • LPIC1 Linux Professional Institute Certification

    John Wiley & Sons Inc LPIC1 Linux Professional Institute Certification

    15 in stock

    Book SynopsisThe bestselling study guide for the popular Linux Professional Institute Certification Level 1 (LPIC-1). The updated fifth edition of LPIC-1: Linux Professional Institute Certification Study Guide is a comprehensive, one-volume resource that covers 100% of all exam objectives. Building on the proven Sybex Study Guide approach, this essential resource offers a comprehensive suite of study and learning tools such as assessment tests, hands-on exercises, chapter review questions, and practical, real-world examples. This book, completely updated to reflect the latest 101-500 and 102-500 exams, contains clear, concise, and user-friendly information on all of the Linux administration topics you will encounter on test day. Key exam topics include system architecture, Linux installation and package management, GNU and UNIX commands, user interfaces and desktops, essential system services, network and server security, and many more. Linux Servers currently have a Table of ContentsIntroduction xxi Assessment Test xxxix Part I Exam 101-500 1 Chapter 1 Exploring Linux Command-Line Tools 3 Understanding Command-Line Basics 4 Discussing Distributions 4 Reaching a Shell 5 Exploring Your Linux Shell Options 5 Using a Shell 7 Using Environment Variables 11 Getting Help 17 Editing Text Files 20 Looking at Text Editors 20 Understanding vim Modes 24 Exploring Basic Text-Editing Procedures 24 Saving Changes 27 Processing Text Using Filters 28 File-Combining Commands 28 File-Transforming Commands 31 File-Formatting Commands 33 File-Viewing Commands 36 File-Summarizing Commands 40 Using Regular Expressions 45 Using grep 45 Understanding Basic Regular Expressions 47 Understanding Extended Regular Expressions 50 Using Streams, Redirection, and Pipes 50 Redirecting Input and Output 51 Piping Data between Programs 55 Using sed 56 Generating Command Lines 60 Summary 61 Exam Essentials 61 Review Questions 62 Chapter 2 Managing Software and Processes 67 Looking at Package Concepts 68 Using RPM 69 RPM Distributions and Conventions 69 The rpm Command Set 71 Extracting Data from RPMs 77 Using YUM 78 Using ZYpp 83 Using Debian Packages 86 Debian Package File Conventions 87 The dpkg Command Set 87 Looking at the APT Suite 92 Using apt-cache 93 Using apt-get 94 Reconfiguring Packages 97 Managing Shared Libraries 98 Library Principles 98 Locating Library Files 99 Loading Dynamically 100 Library Management Commands 100 Managing Processes 102 Examining Process Lists 102 Employing Multiple Screens 109 Understanding Foreground and Background Processes 116 Managing Process Priorities 120 Sending Signals to Processes 121 Summary 126 Exam Essentials 127 Review Questions 129 Chapter 3 Configuring Hardware 133 Configuring the Firmware and Core Hardware 134 Understanding the Role of Firmware 134 Device Interfaces 136 The /dev Directory 138 The /proc Directory 139 The /sys Directory 143 Working with Devices 144 Hardware Modules 148 Storage Basics 154 Types of Drives 154 Drive Partitions 155 Automatic Drive Detection 155 Storage Alternatives 156 Multipath 156 Logical Volume Manager 157 Using RAID Technology 158 Partitioning Tools 158 Working with fdisk 158 Working with gdisk 161 The GNU parted Command 162 Graphical Tools 163 Understanding Filesystems 164 The Virtual Directory 164 Maneuvering Around the Filesystem 166 Formatting Filesystems 167 Common Filesystem Types 167 Creating Filesystems 169 Mounting Filesystems 170 Manually Mounting Devices 170 Automatically Mounting Devices 172 Managing Filesystems 173 Retrieving Filesystem Stats 173 Filesystem Tools 173 Summary 174 Exam Essentials 175 Review Questions 177 Chapter 4 Managing Files 181 Using File Management Commands 182 Naming and Listing Files 182 Exploring Wildcard Expansion Rules 186 Understanding the File Commands 189 Compressing File Commands 199 Archiving File Commands 202 Managing Links 213 Managing File Ownership 218 Assessing File Ownership 219 Changing a File’s Owner 219 Changing a File’s Group 220 Controlling Access to Files 221 Understanding Permissions 221 Changing a File’s Mode 223 Setting the Default Mode 226 Changing Special Access Modes 228 Locating Files 229 Getting to Know the FHS 229 Employing Tools to Locate Files 231 Summary 239 Exam Essentials 239 Review Questions 241 Chapter 5 Booting, Initializing, and Virtualizing Linux 245 Understanding the Boot Process 246 The Boot Process 246 Extracting Information about the Boot Process 247 Looking at Firmware 249 The BIOS Startup 249 The UEFI Startup 250 Looking at Boot Loaders 251 Boot Loader Principles 251 Using GRUB Legacy as the Boot Loader 251 Using GRUB 2 as the Boot Loader 255 Adding Kernel Boot Parameters 259 Using Alternative Boot Loaders 260 The Initialization Process 261 Using the systemd Initialization Process 262 Exploring Unit Files 263 Focusing on Service Unit Files 265 Focusing on Target Unit Files 268 Looking at systemctl 270 Examining Special systemd Commands 273 Using the SysV Initialization Process 276 Understanding Runlevels 277 Investigating SysVinit Commands 280 Stopping the System 283 Notifying the Users 284 Virtualizing Linux 286 Looking at Virtual Machines 287 Understanding Containers 291 Looking at Infrastructure as a Service 293 Summary 295 Exam Essentials 295 Review Questions 298 Part II Exam 102-500 303 Chapter 6 Configuring the GUI, Localization, and Printing 305 Understanding the GUI 306 Understanding the X11 Architecture 307 Examining X.Org 308 Figuring Out Wayland 309 Managing the GUI 311 Standard GUI Features 311 The X GUI Login System 313 Common Linux Desktop Environments 314 Providing Accessibility 323 Using X11 for Remote Access 325 Remote X11 Connections 326 Tunneling your X11 Connection 326 Using Remote Desktop Software 328 Viewing VNC 328 Grasping Xrdp 330 Exploring NX 332 Studying SPICE 332 Understanding Localization 333 Character Sets 333 Environment Variables 334 Setting Your Locale 335 Installation Locale Decisions 335 Changing Your Locale 336 Looking at Time 338 Working with Time Zones 338 Setting the Time and Date 339 Configuring Printing 343 Summary 345 Exam Essentials 346 Review Questions 348 Chapter 7 Administering the System 353 Managing Users and Groups 354 Understanding Users and Groups 354 Configuring User Accounts 355 Configuring Groups 371 Managing Email 375 Understanding Email 375 Choosing Email Software 376 Working with Email 377 Using Log and Journal Files 384 Examining the syslog Protocol 385 Viewing the History of Linux Logging 387 Logging Basics Using rsyslogd 387 Journaling with systemd-journaldd 394 Maintaining the System Time 403 Understanding Linux Time Concepts 403 Viewing and Setting Time 404 Understanding the Network Time Protocol 408 Using the NTP Daemon 411 Using the chrony Daemon 413 Summary 416 Exam Essentials 416 Review Questions 419 Chapter 8 Configuring Basic Networking 423 Networking Basics 424 The Physical Layer 424 The Network Layer 426 The Transport Layer 430 The Application Layer 431 Configuring Network Features 433 Network Configuration Files 433 Graphical Tools 436 Command-Line Tools 438 Getting Network Settings Automatically 445 Bonding Network Cards 445 Basic Network Troubleshooting 447 Sending Test Packets 447 Tracing Routes 448 Finding Host Information 449 Advanced Network Troubleshooting 452 The netstat Command 452 Examining Sockets 455 The netcat Utility 456 Summary 457 Exam Essentials 458 Review Questions 460 Chapter 9 Writing Scripts 465 Shell Variables 466 Global Environment Variables 466 Local Environment Variables 468 Setting Local Environment Variables 470 Setting Global Environment Variables 472 Locating System Environment Variables 472 Using Command Aliases 474 The Basics of Shell Scripting 475 Running Multiple Commands 475 Redirecting Output 476 Piping Data 477 The Shell Script Format 478 Running the Shell Script 479 Advanced Shell Scripting 481 Displaying Messages 481 Using Variables in Scripts 482 Command-Line Arguments 484 Getting User Input 484 The Exit Status 488 Writing Script Programs 489 Command Substitution 489 Performing Math 490 Logic Statements 492 Loops 496 Functions 498 Running Scripts in Background Mode 500 Running in the Background 501 Running Multiple Background Jobs 502 Running Scripts Without a Console 503 Sending Signals 504 Interrupting a Process 504 Pausing a Process 504 Job Control 506 Viewing Jobs 506 Restarting Stopped Jobs 508 Running Like Clockwork 509 Scheduling a Job Using the at Command 509 Scheduling Regular Scripts 513 Summary 515 Exam Essentials 516 Review Questions 518 Chapter 10 Securing Your System 523 Administering Network Security 524 Disabling Unused Services 524 Using Super Server Restrictions 534 Restricting via TCP Wrappers 538 Administering Local Security 539 Securing Passwords 539 Limiting root Access 543 Auditing User Access 547 Setting Login, Process, and Memory Limits 549 Locating SUID/SGID Files 551 Exploring Cryptography Concepts 553 Discovering Key Concepts 553 Securing Data 554 Signing Transmissions 555 Looking at SSH 555 Exploring Basic SSH Concepts 555 Configuring SSH 558 Generating SSH Keys 560 Authenticating with SSH Keys 561 Authenticating with the Authentication Agent 564 Tunneling 565 Using SSH Securely 567 Using GPG 567 Generating Keys 568 Importing Keys 569 Encrypting and Decrypting Data 570 Signing Messages and Verifying Signatures 571 Revoking a Key 573 Summary 574 Exam Essentials 575 Review Questions 577 Appendix Answers to Review Questions 583 Chapter 1: Exploring Linux Command-Line Tools 584 Chapter 2: Managing Software and Processes 587 Chapter 3: Configuring Hardware 590 Chapter 4: Managing Files 593 Chapter 5: Booting, Initializing, and Virtualizing Linux 597 Chapter 6: Configuring the GUI, Localization, and Printing 601 Chapter 7: Administering the System 605 Chapter 8: Configuring Basic Networking 608 Chapter 9: Writing Scripts 611 Chapter 10: Securing Your System 615 Index 619

    15 in stock

    £37.50

  • CompTIA Linux Certification AllinOne Exam Guide

    McGraw-Hill Education CompTIA Linux Certification AllinOne Exam Guide

    15 in stock

    Book SynopsisThis comprehensive study guide delivers 100% coverage of every topic on the challenging CompTIA Linux+ examGet complete coverage of all the objectives included on CompTIA Linux+ exam XK0-005 from this up-to-date resource. Written by Linux experts and technology trainers, the book provides learning objectives at the beginning of each chapter, exam tips, practice exam questions, and in-depth answer explanations. Designed to help you pass this challenging exam, this definitive volume also serves as an essential on-the-job reference.Covers all exam topics, including how to: Use the vi text editor Work with the Linux shell Manage Linux users, groups, files, and directories Administer ownership, permissions, and quotas Install Linux and manage the boot process Perform container operations and version control with Git Manage software and hardware Write shell scripts Manage network settings and s

    15 in stock

    £37.49

  • CompTIA Linux Guide to Linux Certification

    Cengage Learning, Inc CompTIA Linux Guide to Linux Certification

    3 in stock

    Book SynopsisEquip yourself with the most up-to-date information to pass CompTIA''s Linux?+ (Powered by LPI) Certification exam successfully and excel when using Linux? in today?s business world with Eckert?s LINUX?+ GUIDE TO LINUX? CERTIFICATION, 4E. This complete guide provides the solid conceptual foundation and mastery of hands-on skills necessary to work with the Linux? operation system in today?s network administration environment. You?ll find a focus on quality throughout with an emphasis on preparing you for valuable real-world experiences. This edition?s comprehensive coverage presents updated information on the latest Linux? distributions as well as storage technologies commonly used in server environments, such as LVM and ZFS. New, expanded material addresses key job-related networking services, including FTP, NFS, Samba, Apache, DNS, DHCP, NTP, Squid, Postfix, SSH, VNC, Postgresql, and iptables/firewalld. You study the latest information on current and emerging security practices and te

    3 in stock

    £75.99

  • Linux System Programming

    O'Reilly Media Linux System Programming

    4 in stock

    Book SynopsisWrite software that draws directly on services offered by the Linux kernel and core system libraries. With this comprehensive book, Linux kernel contributor Robert Love provides you with a tutorial on Linux system programming, a reference manual on Linux system calls, and an insider's guide to writing smarter, faster code.

    4 in stock

    £41.99

  • Linux Observability with BPF

    O'Reilly Media Linux Observability with BPF

    1 in stock

    Book SynopsisBuild your expertise in the BPF virtual machine in the Linux kernel with this practical guide for systems engineers. You'll not only dive into the BPF program lifecycle but also learn to write applications that observe and modify the kernel's behavior; inject code to monitor, trace, and securely observe events in the kernel; and more.

    1 in stock

    £33.74

  • bash Idioms

    O'Reilly Media bash Idioms

    2 in stock

    Book SynopsisWith this practical book, you'll learn how to decipher old bash code and write new code that's as clear and readable as possible.

    2 in stock

    £38.39

  • DB2 9.7 for Linux, UNIX, and Windows Database

    MC Press, LLC DB2 9.7 for Linux, UNIX, and Windows Database

    15 in stock

    Book SynopsisThe relational database-management system DB2 9.7 is given detailed and comprehensive treatment in this exam-preparation resource. Compiled from presentation material used in the popular “Crammer Course” at the IBM Information On Demand Conference, everything required for certification is presented here, including server management, design, business rules implementation, activity monitoring, security, and networking. An essential resource, this guide is helpful when studying to pass the official DB2 9.7 for LUW DBA certification exam.

    15 in stock

    £19.95

  • Your Linux Toolbox: A Zine Boxset

    No Starch Press,US Your Linux Toolbox: A Zine Boxset

    3 in stock

    Book SynopsisEver wished you could spy on your computer with a handy incantation or bewitch your programs to debug themselves - now you can by becoming a Linux wizard! Okay, reading these zines won't actually make you a wizard, but you'll sure feel like one after you learn some neat Linux tricks. With this collected edition of Julia Evans's wildly popular Linux zines, you'll view programming in a way you never have before - now on fancier paper!Trade Review"This is a fantastic way to teach young ones about linux and the command line and I also found it great to learn from myself. Really nicely made and illustrated and would highly recommend!"—Tobias F, The Pi Hut Reviewer"A rich, illustrated book about the multiple Linux utilities . . . Excellent guidance for any technical person."—Senthil Kumaran, GoodReads Librarian"Exquisite reference zine, a perfect tool to begin your learning experience with. The graphics are super cute, but also brilliantly descriptive and insightful. These are a must have for anyone new to Linux, or who has to use one occasionally for work. A+ product!"–Joanna White, Amazon ReviewerTable of ContentsSo You Want to Be a WizardBite-Size Linux!Networking, ACK!Let's Learn tcpdump!Linux Debugging Tools You'll LoveSpying on Your Programs with straceProfiling & Tracing with perf

    3 in stock

    £23.19

  • Cathedral and the Bazaar

    WWW.Snowballpublishing.com Cathedral and the Bazaar

    15 in stock

    15 in stock

    £6.99

  • Docker in Action

    Manning Publications Docker in Action

    15 in stock

    Book SynopsisThe idea behind Docker is simple. Create a tiny virtual environment called a container that holds just your application and its dependencies. The Docker engine uses the host operating system to keep track of your containers. Applications running inside containers share resources, making their footprints small. They are easy to install, manage, and remove. Docker in Action, Second Edition teaches you to create, deploy, and manage applications hosted in Docker containers running on Linux. Fully updated, with four new chapters and revised best practices and examples, this second edition begins with a clear explanation of the Docker model. Then, you go hands-on with packaging applications, testing, installing, running programs securely, and deploying them across a cluster of hosts. With examples showing how Docker benefits the whole dev lifecycle, you'll discover techniques for everything from dev-and-test machines to full-scale cloud deployments.Trade Review'Jeff and Stephen took their battle-hardened experience and updated this already great book with new details and examples.' Bret Fisher, Docker Captain and Container Consultant 'Strikes the perfect balance between instructional manual and reference book. Ideal for everyone from beginner to seasoned pro.' Paul G. Brown, Diversified Services Network 'A must-have for those looking to level-up their organization's software and infrastructure virtualization.' Chris Phillips, Dell 'An excellent and detailed resource. Useful for developers, IT admins, and dev-ops engineers.' Ethan Rivett, PowerleyTable of Contentstable of contents READ IN LIVEBOOK 1WELCOME TO DOCKER 1.1What is Docker? 1.1.1“Hello, World” 1.1.2Containers 1.1.3Containers are not virtualization 1.1.4Running software in containers for isolation 1.1.5Shipping containers 1.2What problems does Docker solve? 1.2.1Getting organized 1.2.2Improving portability 1.2.3Protecting your computer 1.3Why is Docker important? 1.4Where and when to use Docker 1.5Docker in the Larger Ecosystem 1.6Getting help with the Docker command line Summary PART 1: PROCESS ISOLATION AND ENVIRONMENT-INDEPENDENT COMPUTING READ IN LIVEBOOK 2RUNNING SOFTWARE IN CONTAINERS READ IN LIVEBOOK 3SOFTWARE INSTALLATION SIMPLIFIED READ IN LIVEBOOK 4WORKING WITH STORAGE AND VOLUMES READ IN LIVEBOOK 5SINGLE-HOST NETWORKING READ IN LIVEBOOK 6LIMITING RISK WITH RESOURCE CONTROLS PART 2: PACKAGING SOFTWARE FOR DISTRIBUTION READ IN LIVEBOOK 7PACKAGING SOFTWARE IN IMAGES READ IN LIVEBOOK 8BUILDING IMAGES AUTOMATICALLY WITH DOCKERFILES READ IN LIVEBOOK 9PUBLIC AND PRIVATE SOFTWARE DISTRIBUTION READ IN LIVEBOOK 10IMAGE PIPELINES PART 3: HIGHER-LEVEL ABSTRACTIONS AND ORCHESTRATION READ IN LIVEBOOK 11SERVICES WITH DOCKER AND COMPOSE READ IN LIVEBOOK 12FIRST-CLASS CONFIGURATION ABSTRACTIONS READ IN LIVEBOOK 13ORCHESTRATING SERVICES ON A CLUSTER OF DOCKER HOSTS WITH SWARM

    15 in stock

    £27.89

  • Docker in Action

    Manning Publications Docker in Action

    3 in stock

    Book Synopsis DESCRIPTION The idea behind Docker, a free an open source program, is simple. Create a tiny virtual environment, called a container, for an application that includes only its particular set of dependencies. The Docker engine accounts for, manages, and builds these containers through functionality provided by the host operating system. Software running inside containers share the Linux OS and other resources, making their footprints radically smaller, and the containerized applications easy to install, manage, and remove. Applications can be packaged without worrying about environment-specific deployment concerns, and the operations team gets cleaner, more efficient systems across the board. Docker in Action starts with a clear explanation of the Docker model of virtualization and shows how to create, deploy, and manage applications hosted in Docker containers. It offers specific techniques for testing and distributing applications via Docker Hub and other registries. It shows how to take advantage of the Linux OS features that Docker uses to run programs securely, and how to manage shared resources. Using carefully-designed examples, the book guides readers on orchestrating containers and applications from installation to removal. Along the way, it teaches techniques for using Docker on systems ranging from personal dev-and-test machine to full-scale cloud deployments. KEY SELLING POINTS Explains the "why" and "how" of Docker Simplify software installation Addresses many of the everyday software problems faced by developers AUDIENCE Readers need a working knowledge of installing and running software on the Linux OS. No prior experience with Docker or other virtualization technologies is required. ABOUT THE TECHNOLOGY Docker provides software logistics. It uses "container" abstraction to hide complex tooling for packaging software, and running software in virtualized environments without overhead of a full virtual machine. Docker and the container abstraction are driving a change in the way people write, test, deploy, and distribute software.

    3 in stock

    £35.99

  • SUSE Linux Enterprise Server 12 - System Analysis

    12th Media Services SUSE Linux Enterprise Server 12 - System Analysis

    1 in stock

    Book Synopsis

    1 in stock

    £12.99

  • SUSE Linux Enterprise Server 12 - Security Guide

    12th Media Services SUSE Linux Enterprise Server 12 - Security Guide

    1 in stock

    Book Synopsis

    1 in stock

    £17.99

  • FreeBSD Architecture Handbook

    12th Media Services FreeBSD Architecture Handbook

    1 in stock

    Book Synopsis

    1 in stock

    £9.71

  • Linux Mint Essentials

    Packt Publishing Limited Linux Mint Essentials

    15 in stock

    15 in stock

    £39.99

  • Linux in easy steps

    In Easy Steps Limited Linux in easy steps

    7 in stock

    Book SynopsisNow in its seventh edition, Linux in easy steps explains the Linux environment and how to get more out of this stable, as well as free, operating system. You'll be able to download, install and customize Linux, and master the desktop, in no time. Then, explore the key Linux apps, including:The LibreOffice suite: Writer (word processor), Calc (spreadsheet), Impress (presentation), Draw (drawing tool), and Base (database).Firefox for browsing the web.Thunderbird for exchanging emails.GIMP, Pix, Celluloid, Hypnotix, and Rhythmbox media apps to edit photos and videos and to enjoy music and movies.The final chapters show how to use the powerful Linux shell to communicate directly with the kernel at the very heart of Linux for total control.This guide will open the door to the whole new world of digital possibilities using Linux. Ideal for Linux newbies!

    7 in stock

    £11.39

  • Linux Server Cookbook: Get Hands-on Recipes to

    BPB Publications Linux Server Cookbook: Get Hands-on Recipes to

    1 in stock

    Book SynopsisThe book will then guide you through new technologies related to automation, containers, and continuous integration/delivery pipelines. Lastly, it will help you explore concepts such as Infrastructure as Code and Infrastructure as a Service and the usage of Linux on Public and Private clouds in detail with multiple examples.

    1 in stock

    £28.49

© 2025 Book Curl

    • American Express
    • Apple Pay
    • Diners Club
    • Discover
    • Google Pay
    • Maestro
    • Mastercard
    • PayPal
    • Shop Pay
    • Union Pay
    • Visa

    Login

    Forgot your password?

    Don't have an account yet?
    Create account