Unlike some operating systems, Linux doesn´t try to hide the important bits from you-it gives you full control of your computer. But to truly master Linux, you need to understand its internals, like how the system boots, how networking works, and what the kernel actually does. In this completely revised second edition of the perennial best seller How Linux Works, author Brian Ward makes the concepts behind Linux internals accessible to anyone curious about the inner workings of the operating system. Inside, you´ll find the kind of knowledge that normally comes from years of experience doing things the hard way. You´ll learn: -How Linux boots, from boot loaders to init implementations (systemd, Upstart, and System V) -How the kernel manages devices, device drivers, and processes -How networking, interfaces, firewalls, and servers work -How development tools work and relate to shared libraries -How to write effective shell scripts You´ll also explore the kernel and examine key system tasks inside user space, including system calls, input and output, and filesystems. With its combination of background, theory, real-world examples, and patient explanations, How Linux Works will teach you what you need to know to solve pesky problems and take control of your operating system.
You´ve experienced the shiny, point-and-click surface of your Linux computer-now dive below and explore its depths with the power of the command line. The Linux Command Line takes you from your very first terminal keystrokes to writing full programs in Bash, the most popular Linux shell. Along the way you´ll learn the timeless skills handed down by generations of gray-bearded, mouse-shunning gurus: file navigation, environment configuration, command chaining, pattern matching with regular expressions, and more. In addition to that practical knowledge, author William Shotts reveals the philosophy behind these tools and the rich heritage that your desktop Linux machine has inherited from Unix supercomputers of yore. As you make your way through the book´s short, easily-digestible chapters, you´ll learn how to: -Create and delete files, directories, and symlinks -Administer your system, including networking, package installation, and process management -Use standard input and output, redirection, and pipelines -Edit files with Vi, the world´s most popular text editor -Write shell scripts to automate common or boring tasks -Slice and dice text files with cut, paste, grep, patch, and sed Once you overcome your initial ´´shell shock,´´ you´ll find that the command line is a natural and expressive way to communicate with your computer. Just don´t be surprised if your mouse starts to gather dust.
Your one-stop guide to Linux--fully revised and expanded Get in-depth coverage of all Linux features, tools, and utilities from this thoroughly updated and comprehensive resource, designed for all Linux distributions. Written by Linux expert Richard Petersen, this book explains how to get up-and-running on Linux, use the desktops and shells, manage applications, deploy servers, implement security measures, and handle system and network administration tasks. With full coverage of the latest platform, Linux: The Complete Reference, Sixth Edition includes details on the very different and popular Debian (Ubuntu) and Red Hat/Fedora software installation and service management tools used by most distributions. This is a must-have guide for all Linux users. * Install, configure, and administer any Linux distribution * Work with files and folders from the BASH, TCSH, and Z shells * Use the GNOME and KDE desktops, X Windows, and display managers * Set up office, database, Internet, and multimedia applications * Secure data using SELinux, netfilter, SSH, and Kerberos * Encrypt network transmissions with GPG, LUKS, and IPsec * Deploy FTP, Web, mail, proxy, print, news, and database servers * Administer system resources using HAL, udev, and virtualization (KVM and Xen) * Configure and maintain IPv6, DHCPv6, NIS, networking, and remote access * Access remote files and devices using NFSv4, GFS, PVFS, NIS, and SAMBA
Leading embedded systems developer Rudolf Streif gives readers a solid grounding in the basics, then guides them through more advanced topics -- ranging from building board support packages to managing compliance. Students master the Yocto Project toolbox by working through the entire development lifecycle on a realistic project: a distributed home automation system consisting of multiple embedded devices with diverse functionality, all communicating via networking infrastructure.
See how privileges, passwords, vulnerabilities, and exploits can be leveraged as an attack vector and breach any organization. Cyber attacks continue to increase in volume and sophistication. It is not a matter of if , but when your organization will be breached. Attackers target the perimeter network, but in recent years have refocused their efforts on the path of least resistance: users and their privileges. In decades past an entire enterprise might be sufficiently managed through just a handful of credentials. Today´s environmental complexity means privileged credentials are needed for a multitude of different account types (from domain admin and sysadmin to workstations with admin rights), operating systems (Windows, Unix, Linux, etc.), directory services, databases, applications, cloud instances, networking hardware, Internet of Things (IoT), social media, and more. When unmanaged, these privileged credentials pose a significant threat from external hackers and insider threats. There is not one silver bullet to provide the protection you need against all vectors and stages of an attack. And while some new and innovative solutions will help protect against or detect the initial infection, they are not guaranteed to stop 100% of malicious activity. The volume and frequency of privilege-based attacks continues to increase and test the limits of existing security controls and solution implementations. Privileged Attack Vector s details the risks associated with poor privilege management, the techniques that hackers and insiders leverage, and the defensive measures that organizations must adopt to protect against a breach, protect against lateral movement, and improve the ability to detect hacker activity or insider threats in order to mitigate the impact. What You´ll Learn Know how identities, credentials, passwords, and exploits can be leveraged to escalate privileges during an attack Implement defensive and auditing strategies to mitigate the threats and risk Understand a 12-step privileged account management Implementation plan Consider deployment and scope, including risk, auditing, regulations, and oversight solutions Who This Book Is For Security management professionals, new security professionals, and auditors looking to understand and solve privileged escalation threats
Get acquainted with the world of LXCAbout This BookGet the most practical and up-to-date resource on LXC and take full advantage of what Linux containers can offer in the day-to-day operations of large-scale applicationsLearn how to deploy and administer various workloads such as web applications inside LXCSave your organization time and money by building robust and secure containers and by speeding the deployment process of your softwareWho This Book Is ForThis book is for Linux engineers and software developers who are looking to deploy applications in a fast, secure, and scalable way for use in testing and production.What You Will LearnDeep dive into the foundations of Linux containers with kernel namespaces and cgroupsInstall, configure, and administer Linux containers with LXC and libvirtBegin writing applications using Python libvirt bindingsTake an in-depth look at container networkingSet up monitoring and security with LXCBuild and deploy a highly available application with LXC in the cloudIn DetailIn recent years, containers have gained wide adoption by businesses running a variety of application loads. This became possible largely due to the advent of kernel namespaces and better resource management with control groups (cgroups). Linux containers (LXC) are a direct implementation of those kernel features that provide operating system level virtualization without the overhead of a hypervisor layer.This book starts by introducing the foundational concepts behind the implementation of LXC, then moves into the practical aspects of installing and configuring LXC containers. Moving on, you will explore container networking, security, and backups. You will also learn how to deploy LXC with technologies like Open Stack and Vagrant. By the end of the book, you will have a solid grasp of how LXC is implemented and how to run production applications in a highly available and scalable way.Style and approachA practical guide that introduces the core technologies behind Linux containers and provides a deep dive into installation, configuration, and operations of LXC.
Serverumgebungen planen, verwalten und Probleme beheben Erläuterungen zu allen Themen der aktuellen CompTIA-Server+-Prüfung SKO-004 Aktuell, verständlich, praxistauglich Die CompTIA Server+-Prüfung teilt sich in mehrere Fachgebiete auf. In der aktuellen Fassung der Prüfung SKO-004 lauten sie: Serverarchitektur Serveradministration Speicher Sicherheit Networking Wiederherstellung im Notfall Fehlersuche Die Autoren erläutern Ihnen diese Themen ausführlich und vermitteln Ihnen so das für die Zertifizierung benötigte Fachwissen. Darüber möchten Sie Ihnen praxistaugliches Verständnis der Thematik nahebringen. Das beginnt damit, dass Server nicht einfach aufgerüstete PCs sind und sich insbesondere in Konfiguration und Einsatz unterscheiden. Sie lernen in diesem Buch die Eigenschaften und Einsatzgebiete, sowohl was die Hardware als auch was die spezifischen Betriebssysteme und Applikationen von Servern anbelangt, gründlich kennen. Nicht zuletzt befassen sich die Autoren mit Themen von der Planung über die physischen Umgebungsbedingungen bis hin zu aktuellen Themen wie der Virtualisierung, verschiedenen Fragen der Sicherheit, der Datensicherung und dem Disaster Recovery. Dieses Lehrmittel wurde für das CompTIA Authorized Curriculum geprüft und ist CAQC-zertifiziert. Weitere Informationen zu dieser Qualifizierung erhalten Sie unter: http://certification.comptia.org/Training/studymaterials.aspx Aus dem Inhalt: Server-Hardware: Prozessoren, Arbeitsspeicher, BIOS/UEFI Storagelösungen und -technologien: SSD, SAS, SATA, Fibre Channel, iSCSI Fehlertoleranz: RAID, Energieversorgung Server installieren und aktualisieren Hardware im Netzwerk: Kabel, Netzwerkkarten, Übertragungsgeräte TCP/IP: IPv4 und IPv6 Serverrollen: Datei- und Druckdienste, Internet- und Maildienste, Netzwerkdienste Netzwerkbetriebssysteme: Windows Server, UNIX/Linux und deren Installation Konfigurationsbetrachtungen: Dateisystem, Kontingentierung, Verzeichnisdienste, Gruppenrichtlinien Server Management: Remote-Verbindungen, Ereignisprotokolle, Monitoring, SNMP, WBEM Deployment- und Virtualisierungsszenarien Physische, technische und organisatorische Sicherheit Datensicherung in der Praxis Disaster Recovery Planning Unterhalt und Troubleshooting in der Praxis Die CompTIA Server+-Prüfung: Fragen, Antworten, Simulationstest Roland Cattini ist von Beruf Betriebs- und Elektroingenieur und befasst sich als Microsoft-Experte seit vielen Jahren mit Windows-Servern; Markus Kammermann berät und schult seit Jahren zu den Themen Hardware, Netzwerke und Systemadministration; Michael Zaugg ist der UNIX- und Linux-Spezialist unter den drei Autoren.
The Insider´s Best-Practice Guide to Rapid PyQt 4 GUI Development Whether you´re building GUI prototypes or full-fledged cross-platform GUI applications with native look-and-feel, PyQt 4 is your fastest, easiest, most powerful solution. Qt expert Mark Summerfield has written the definitive best-practice guide to PyQt 4 development. With Rapid GUI Programming with Python and Qt you´ll learn how to build efficient GUI applications that run on all major operating systems, including Windows, Mac OS X, Linux, and many versions of Unix, using the same source code for all of them. Summerfield systematically introduces every core GUI development technique: from dialogs and windows to data handling; from events to printing; and more. Through the book´s realistic examples you´ll discover a completely new PyQt 4-based programming approach, as well as coverage of many new topics, from PyQt 4´s rich text engine to advanced model/view and graphics/view programming. Every key concept is illuminated with realistic, downloadable examples-all tested on Windows, Mac OS X, and Linux with Python 2.5, Qt 4.2, and PyQt 4.2, and on Windows and Linux with Qt 4.3 and PyQt 4.3. Coverge includes Python basics for every PyQt developer: data types, data structures, control structures, classes, modules, and more Core PyQt GUI programming techniques: dialogs, main windows, and custom file formats Using Qt Designer to design user interfaces, and to implement and test dialogs, events, the Clipboard, and drag-and-drop Building custom widgets: Widget Style Sheets, composite widgets, subclassing, and more Making the most of Qt 4.2´s new graphics/view architecture Connecting to databases, executing SQL queries, and using form and table views Advanced model/view programming: custom views, generic delegates, and more Implementing online help, internationalizing applications, and using PyQt´s networking and multithreading facilities