LINUX CLEARLY EXPLAINED: PFAFFENBER
Linux Networking Clearly Explained: Bryan Pfaffenberger, Michael Jang
All you need to know about Storage Area Networks The amount of data of an average company doubles every year. Thus, companies who own 1TB of data today will own 32TB in five years. Storage networks help to tame such data quantities and to manage this data growth efficiently. Since stored data and information are the biggest asset of any company, anyone who is involved in the planning or the operation of IT systems requires a basic knowledge of the principle and the use of storage networks. Storage Networks Explained covers the fundaments, techniques and functions of storage networks such as disk subsystems, Fibre Channel SAN, Internet SCSI (iSCSI), Fibre Channel over Ethernet (FCoE), Network Attached Storage (NAS), file systems, and storage virtualization. Furthermore the authors describe the use of these techniques and how they are designed to achieve high-availability, flexibility, and scalability of data and applications. Additional attention is given to network backup and the management of storage networks. Written by leading experts in the field, this book on storage area networks is updated and fully revised. Key features: * Presents the basic concepts of storage networks, such as I/O techniques, disk subsystems, virtualization, NAS and SAN file systems * Covers the design of storage networks which provide flexible, highly-available, and scaleable IT systems * Explains the use of storage networks for data sharing, data protection, and digital archiving * Discusses management of storage networks using SNMP, SMI-S, and IEEE 1244 This book provides system administrators and system architects, as well as students and decision makers, with the tools needed for optimal selection and cost-effective use of storage networks. The Linux Journal awarded the first edition with the ´´Editor´s Choice Award 2005´´ in the category ´´System Administration Book.´´
RHCSA & RHCE Red Hat Enterprise Linux 7: Training and Exam Preparation Guide (EX200 and EX300), Third Edition. Highlights: > Updated to the latest version of Red Hat Enterprise Linux 7 > Upated to cover ALL official exam objectives for the RHCSA and RHCE exams based on Red Hat Enterprise Linux 7 > Equally good for self-study and in-class training > Step-by-step exercises to accomplish tasks > Do-It-Yourself challenge labs at the end of each chapter > Concepts explained with diagrams > Commands and options summarized in tables > Exam tips included > FOUR scenario-based sample exams (TWO for RHCSA and TWO for RHCE) > TWENTY-FIVE chapters (THIRTEEN for RHCSA and TWELVE for RHCE) > Separate sections on RHCSA and RHCE RHCSA Section (chapters 1 to 13): covers local and network (automated with kickstart) RHEL7 installations, general Linux concepts and basic tools, compression and archiving, text file editing, file manipulation and security, processes and task scheduling, bash shell features, software package administration, yum repository configuration, host virtualization, virtual machines, system boot, kernel management, system initialization and service management with systemd, local logging, users and groups, LVM and file systems, AutoFS, Swap, ACLs, firewall, SELinux, network interfaces, NTP/LDAP clients, SSH, and TCP Wrappers. RHCE Section (chapters 14 to 25): covers shell scripting, interface bonding and teaming, IPv6 and routing configuration, NTP, firewalld, Kerberos authentication, kernel tuning, resource utilization reporting, network logging, block storage sharing with iSCSI, file sharing with NFS and Samba/CIFS, HTTP/HTTPS web servers and virtual hosting, Postfix mail SMTP, DNS, and MariaDB. Each chapter lists major topics and relevant exam objectives in the beginning and ends with a summary followed by review questions/answers and Do-It-Yourself challenge labs.
If you want to learn how to use Linux, but don´t know where to start, listen on. Knowing where to start when learning a new skill can be a challenge, especially when the topic seems so vast. There can be so much information available that you can´t even decide where to start. Or worse, you start down the path of learning and quickly discover too many concepts, commands, and nuances that aren´t explained. This kind of experience is frustrating and leaves you with more questions than answers. Linux for Beginners doesn´t make any assumptions about your background or knowledge of Linux. You need no prior knowledge to benefit from this audiobook. You will be guided step by step using a logical and systematic approach. As new concepts, commands, or jargon are encountered, they are explained in plain language, making it easy for anyone to understand. Here is what you will learn by listening to Linux for Beginners: How to get access to a Linux server if you don´t already What a Linux distribution is and which one to choose What software is needed to connect to Linux from Mac and Windows computers What SSH is and how to use it, including creating and using SSH keys The file system layout of Linux systems and where to find programs, configurations, and documentation The basic Linux commands you´ll use most often Creating, renaming, moving, and deleting directories Listing, reading, creating, editing, copying, and deleting files Exactly how permissions work and how to decipher the most cryptic Linux permissions with ease How to use the nano, vi, and emacs editors Two methods to search for files and directories What you learn in Linux for Beginners applies to any Linux environment including Ubuntu, Debian, Linux Mint, RedHat, Fedora, OpenSUSE, Slackware, and more. 1. Language: English. Narrator: Brian E. Smith. Audio sample: http://samples.audible.de/bk/acx0/020299/bk_acx0_020299_sample.mp3. Digital audiobook in aax.
If you want to learn how to use Linux and level up your career but are pressed for time, listen on. As the founder of the Linux Training Academy and an instructor of several courses, I´ve had the good fortune of helping thousands of people hone their Linux skills. Interacting with so many people who are just getting started with the Linux operating system has given me invaluable insight into the particular struggles and challenges people face at this stage. One of the biggest challenges for people interested in learning the ins and outs of Linux is simply a lack of time. When you are working with a limited and extremely valuable resource, you want to make sure you make the most of it. The next biggest challenge for Linux newcomers is knowing where to start. There is so much information available that deciding what to focus your attention on first is a big enough hurdle to keep many people from even starting. What´s worse is starting down the path of learning only to discover too many concepts, commands, and nuances that aren´t explained. This kind of experience is frustrating and leaves you with more questions than answers. That´s why I´ve written this book. Not only have I condensed the most important material into five sections, each designed to be consumed in a day, but I´ve also structured the content in a logical and systematic manner. This way you´ll be sure to make the most out of your time by learning the foundational aspects of Linux first and then building upon that foundation each day. In Learn Linux in 5 Days, you will learn the most important concepts and commands and be guided step by step through several practical and real-world examples. As new concepts, commands, or jargon are encountered, they are explained in plain language, making it easy to understand. 1. Language: English. Narrator: Brian E. Smith. Audio sample: http://samples.audible.de/bk/acx0/033193/bk_acx0_033193_sample.mp3. Digital audiobook in aax.
If you want to learn how to program in Python, but don´t know where to start read on. Knowing where to start when learning a new skill can be a challenge, especially when the topic seems so vast. There can be so much information available that you can´t even decide where to start. Or worse, you start down the path of learning and quickly discover too many concepts, commands, and nuances that aren´t explained. This kind of experience is frustrating and leaves you with more questions than answers. Python Programming for Beginners doesn´t make any assumptions about your background or knowledge of Python or computer programming. You need no prior knowledge to benefit from this book. You will be guided step by step using a logical and systematic approach. As new concepts, commands, or jargon are encountered they are explained in plain language, making it easy for anyone to understand. Here is what you will learn by listening to Python Programming for Beginners: When to use Python 2 and when to use Python 3. How to install Python on Windows, Mac, and Linux. Screenshots included. How to prepare your computer for programming in Python. The various ways to run a Python program on Windows, Mac, and Linux. Suggested text editors and integrated development environments to use when coding in Python. How to work with various data types including strings, lists, tuples, dictionaries, booleans, and more. What variables are and when to use them. How to perform mathematical operations using Python. How to capture input from a user. Ways to control the flow of your programs. The importance of white space in Python. How to organize your Python programs - Learn what goes where. What modules are, when you should use them, and how to create your own. How to define 1. Language: English. Narrator: Sarah Faix. Audio sample: http://samples.audible.de/bk/acx0/030514/bk_acx0_030514_sample.mp3. Digital audiobook in aax.
Leverage Wireshark, Lua and Metasploit to solve any security challenge Wireshark is arguably one of the most versatile networking tools available, allowing microscopic examination of almost any kind of network activity. This book is designed to help you quickly navigate and leverage Wireshark effectively, with a primer for exploring the Wireshark Lua API as well as an introduction to the Metasploit Framework. Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to any Infosec position, providing detailed, advanced content demonstrating the full potential of the Wireshark tool. Coverage includes the Wireshark Lua API, Networking and Metasploit fundamentals, plus important foundational security concepts explained in a practical manner. You are guided through full usage of Wireshark, from installation to everyday use, including how to surreptitiously capture packets using advanced MiTM techniques. Practical demonstrations integrate Metasploit and Wireshark demonstrating how these tools can be used together, with detailed explanations and cases that illustrate the concepts at work. These concepts can be equally useful if you are performing offensive reverse engineering or performing incident response and network forensics. Lua source code is provided, and you can download virtual lab environments as well as PCAPs allowing them to follow along and gain hands on experience. The final chapter includes a practical case study that expands upon the topics presented to provide a cohesive example of how to leverage Wireshark in a real world scenario. * Understand the basics of Wireshark and Metasploit within the security space * Integrate Lua scripting to extend Wireshark and perform packet analysis * Learn the technical details behind common network exploitation * Packet analysis in the context of both offensive and defensive security research Wireshark is the standard network analysis tool used across many industries due to its powerful feature set and support for numerous protocols. When used effectively, it becomes an invaluable tool for any security professional, however the learning curve can be steep. Climb the curve more quickly with the expert insight and comprehensive coverage in Wireshark for Security Professionals. Master Wireshark to solve real-world security problems If you don´t already use Wireshark for a wide range of information security tasks, you will after this book. Mature and powerful, Wireshark is commonly used to find root cause of challenging network issues. This book extends that power to information security professionals, complete with a downloadable, virtual lab environment. Wireshark for Security Professionals covers both offensive and defensive concepts that can be applied to essentially any InfoSec role. Whether into network security, malware analysis, intrusion detection, or penetration testing, this book demonstrates Wireshark through relevant and useful examples. Master Wireshark through both lab scenarios and exercises. Early in the book, a virtual lab environment is provided for the purpose of getting hands-on experience with Wireshark. Wireshark is combined with two popular platforms: Kali, the security-focused Linux distribution, and the Metasploit Framework, the open-source framework for security testing. Lab-based virtual systems generate network traffic for analysis, investigation and demonstration. In addition to following along with the labs you will be challenged with end-of-chapter exercises to expand on covered material. Lastly, this book explores Wireshark with Lua, the light-weight programming language. Lua allows you to extend and customize Wireshark´s features for your needs as a security professional. Lua source code is available both in the book and online. Lua code and lab source code are available online through GitHub, which the book also introduces. The book´s final two chapters greatly draw on Lua and TShark, the command-line interface of Wireshark. By the end of the book you will gain the following: * Master the basics of Wireshark * Explore the virtual w4sp-lab environment that mimics a real-world network * Gain experience using the Debian-based Kali OS among other systems * Understand the technical details behind network attacks * Execute exploitation and grasp offensive and defensive activities, exploring them through Wireshark * Employ Lua to extend Wireshark features and create useful scripts To sum up, the book